Skip to main content

Developing a Smoke Screen: Tactics That Disguise Criminal Advances

  • Chapter
  • First Online:
Book cover Hiding in Plain Sight
  • 123 Accesses

Abstract

Once aggressors and fraudsters have gained access to their targets, they are now ready to advance. As they prepare for assault, they can conceal their intentions by utilizing tactics that distract or divert their targets’ attention. These strategies help shift attention away from what is happening to some random issues, preventing the targets from setting up their defenses. While these aggressors would prefer to be trusted, they will settle for reducing their targets’ suspicion and increasing their level of confusion. Tactics that criminals use to disguise dangerous advances and confuse their targets may include offering numerous details, stereotyping, blaming, laying guilt, playing the role of a victim, shaming, or claiming to help others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Amir, M. (1971). Patterns of forcible rape. Chicago: University of Chicago Press.

    Google Scholar 

  • Charity Navigator. (2018). Retrieved May 27, 2018 from http://charitynavigator.org

  • Charity Watch. (2018). Retrieved May 31, 2018 from http://charitywatch.org/charitywatch-articles

  • De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown and Company.

    Google Scholar 

  • Enron Annual Report 2000. (2001). Retrieved March 12, 2019 from http://www.picker.uchicago.edu/enron/enronannualreport

  • Federal Trade Commission. (2018). Retrieved May 27, 2018 from http://ftc.gov/blog

  • Franklin, C., & Franklin, A. (1976). Victimology revisited: A critique and suggestions for future direction. Criminology, 14, 177–214.

    Article  Google Scholar 

  • Friedrichs, D. (2010). Trusted criminals: White collar crime in contemporary society. Belmont, CA: Wadsworth Cengage Learning.

    Google Scholar 

  • Gilligan, J. (1997). Violence: Reflections on a national epidemic. New York: Vintage Books.

    Google Scholar 

  • Hickey, E. (2013). Serial murderers and their victims. Belmont, CA: Thompson Wadsworth.

    Google Scholar 

  • Leggett, M., & Schwartz, M. (1996). The aftermath of campus sexual assault. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Las Vegas, NV.

    Google Scholar 

  • Matza, D. (1964). Delinquency and drift. New York: Wiley.

    Google Scholar 

  • Morin, A. (2019). 5 Reasons people share way too many details of their personal lives. Inc.Com. Retrieved March 12, 2019 from http://inc.com/amy-morin/5-reasons-people-share-way-too-many-details-of-their-personal-lives

  • Namie, G., & Namie, R. (2003). The bully at work. What you can do to stop the hurt and reclaim your dignity on the job. Naperville, IL: Sourcebooks Inc.

    Google Scholar 

  • O’Toole, M., & Bowman, A. (2012). Dangerous instincts: Use an FBI profiler’s tactics to avoid unsafe situations. New York: Plume.

    Google Scholar 

  • Peled, E., Jaffe, P., & Edleson, J. (1995). Ending the cycle of violence: Community responses to children of battered women. Thousand Oaks, CA: Sage Publications, Inc.

    Book  Google Scholar 

  • Rape, Abuse, and Incest National Network [RAINN]. (2019). If you suspect a child is being harmed. Retrieved March 13, 2019 from http://www.rainn.org/article/if-you-suspect-a-child-is-being-harmed

  • Schreier, L. (2007). Confessions of a time-share salesperson. CNN.com. Retrieved March 13, 2019 from http://cnn.com/2007/TRAVEL/05/08/timeshare.salesperson

  • Schwartz, M., & DeKeseredy, W. (1997). Sexual assault on the college campus. The role of male peer support. Thousand Oaks, CA: Sage Publishing.

    Google Scholar 

  • Schwendinger, J., & Schwendinger, H. (1974). Rape myths: In legal, theoretical, and everyday practices. Crime and Social Justice, 1, 18–26.

    Google Scholar 

  • Simon, G. (1996). In Sheep’s clothing: Understanding and dealing with manipulative people. Little Rock, AK: A. J. Christopher & Company.

    Google Scholar 

  • Walker, L. (1979). The battered woman. New York: Harper and Row.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James F. Kenny .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kenny, J.F. (2020). Developing a Smoke Screen: Tactics That Disguise Criminal Advances. In: Hiding in Plain Sight. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26867-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26867-1_8

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-26866-4

  • Online ISBN: 978-3-030-26867-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics