Removing the Blindfold: Recognizing Deceptive and Dangerous Advances

  • James F. KennyEmail author


Aggressors often plot, stage, and carry out their attacks in plain sight without seemingly being noticed. Social environments such as large cities, disorganized neighborhoods, and fast-paced, impersonal encounters afford the few dangerous people the ability to blend in with the many who mean no harm. Sometimes individuals may actually see behaviors of concern before the attack, but they may dismiss them due to misinformation, personal bias, or feelings of helplessness. They may even attempt to convince themselves that everything is normal. Rather than feeling incapable, individuals can choose to create a readiness to recognize criminal advances, trust their intuition, and observe details in the environment. They can secure pertinent information by listening for clues and clarifying what they heard. They can learn the warning signs of potential victimization, remain objective, and refuse to be blinded by misleading information.


  1. ASIS International. (2005). Workplace violence prevention and response guidelines. Alexandria, VA: ASIS International.Google Scholar
  2. Center for Conflict Management. (1996). Conflict management skills: Publication 9952—106. Washington, DC: Internal Revenue Service.Google Scholar
  3. De Becker, G. (2002). Fear less: Real truth about risk, safety, and security in a time of terrorism. Boston: Little, Brown and Company.Google Scholar
  4. Deisinger, G., Randazzo, M., O’Neill, D., & Savage, J. (2008). The handbook for campus threat assessment & management teams. Boston: Applied Risk Management.Google Scholar
  5. Dimitrius, J., & Mazzarella, W. (2008). Reading people. New York: Ballantine Books.Google Scholar
  6. Drysdale, D., Modzeleski, W., & Simons, A. (2010). In United States Secret Service, United States Department of Education, and Federal Bureau of Investigation (Ed.), Campus attacks: Targeted violence affecting institutions of higher education. Washington, DC.Google Scholar
  7. FBI Behavior Analysis Unit. (2017). Making prevention a reality: Identifying, assessing and managing the threat of targeted attacks. Washington, DC: Department of Justice.Google Scholar
  8. Federal Bureau of Investigation (1996). FBI National Press Release, December 18, 2096. Earl Edwin Potter. U.S. Justice Department. Retrieved June 22, 18 from
  9. Federal Bureau of Investigation {FBI}. (2018). Active shooter resources. Retrieved June 27, 2018 from
  10. Fisher, R., Ury, W., & Patton, B. (1991). Getting to yes. Negotiating agreements without giving in. New York: Penguin Books.Google Scholar
  11. Gladwell, M. (2005). Blink: The power of thinking without thinking. New York: Little, Brown and Company.Google Scholar
  12. Glennon, J. (2007). Intuition on the street: Harnessing the power of the sixth sense. Police One. Com. Retrieved March 28, 2019 from sixth-sense/
  13. Kenny, J. (2010). Risk assessment and management teams: A comprehensive approach to early intervention in workplace violence. Journal of Applied Security Research, 5, 159–175.CrossRefGoogle Scholar
  14. Lieberman, D. (2000). Get anyone to do anything. New York: St. Martin’s Press.Google Scholar
  15. Meadows, R. (2007). Understanding violence and victimization. Upper Saddle River, NJ: Pearson Education.Google Scholar
  16. Muti, R., & Buckley, C. (2012). The charmer: The true story of Robert Reldan – Rapist, murderer, and millionaire – And the women who fell victim to his allure. Green Bay: Title Town Publishing. LLC.Google Scholar
  17. Namie, G., & Namie, R. (2003). The bully at work: What you can do to stop the hurt and reclaim your dignity on the job. Naperville, IL: Sourcebooks Inc.Google Scholar
  18. O’Toole, M., & Bowman, A. (2012). Dangerous instincts: Use an FBI profiler’s tactics to avoid unsafe situations. New York: Plume.Google Scholar
  19. Office of Victims of Crime. (2012). OVC help sources for crime victims. Washington, DC: Department of Justice.Google Scholar
  20. Patire, T. (2003). Tom Patire’s personal protection handbook. New York: Three Rivers Press.Google Scholar
  21. Pease, A., & Pease, B. (2004). The definitive book of body language. New York: Bantam Books.Google Scholar
  22. Ready Houston. (2012). Run-hide-fight: Surviving an active shooter incident. City of Houston Mayor’s Office of Public Safety and Homeland Security. Retrieved June 27, 2018 from https://www.readyhoustontx.Gov
  23. Thompson, G., & Jenkins, J. (1993). Verbal judo: The gentle art of persuasion. New York: Quill William Morrow.Google Scholar
  24. Tufano, A. (2014). Conflict management for security professionals. Boston: Elsevier Inc.Google Scholar
  25. U.S. Attorney General’s Task Force on Family Violence. (1984). Washington, DC: U.S. Government Printing Office.Google Scholar
  26. U.S. Secret Service National Threat Assessment Center. (2000). An interim report on the prevention of targeted violence in schools. Washington, DC: U.S. Secret Service and US Department of Education.Google Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.Fairleigh Dickinson UniversityTeaneckUSA

Personalised recommendations