Advertisement

Preparing for the Attack: Tactics That Establish Control

  • James F. KennyEmail author
Chapter

Abstract

As the attack becomes more likely, predators seek to establish control over their targets, social settings, and circumstances to maximize their chances of success. They may achieve this by reducing target resistance and eliminating potential help sources. At this point in the criminal victimization process, the situation has become more dangerous and there are fewer options available for targets. Recognizing control tactics quickly may provide the targets the opportunity to take action before the attack has commenced. If possible, they must act promptly to avoid, contain, or defend themselves from the potential attackers. Aggressors may employ control tactics such as verbal abuse, intimidations, threats, manufactured anger, stalking, securing weapons, or exploiting authority to establish dominance. They may attempt to isolate targets from those who can assist. Aggressors may lie in wait at public places, or lure their targets to private locations where they can exercise greater control.

References

  1. Borum, R., Fein, R., Vossekuil, B., & Berglund, J. (1999). Threat assessment: Defining an approach for evaluating risk of targeted violence. Behavioral Sciences & the Law, 17, 323–337.CrossRefGoogle Scholar
  2. Breiding, M., Smith, S., Basile, K., Walters, M. & Chen, J. (2014). Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization: National intimate partner and sexual violence survey, United States 2011. Atlanta, GA: Centers for Disease Control and Prevention.Google Scholar
  3. Catalano, S. (2012). Stalking victims in the United States-revised. Washington, DC: Bureau of Justice Statistics.Google Scholar
  4. CNN. (2012). Jerry Sandusky gets sentence of 30 to 60 years for child sex abuse. Retrieved March 19, 2019 from http://news.blogs.cnn.com/2012/10/09/jerry-sandusky-proclaims-his-innocense
  5. Cooper, A. (2013). 360 Interview with Elizabeth Smart. Retrieved March 18, 2019 from http://ac360.blogs.cnn.com/2013/10/08/360-interview-elizabeth-smart
  6. De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown and Company.Google Scholar
  7. De Becker, G., Taylor, T., & Marquart, J. (2008). Just 2 seconds: Using time and space to defeat assassins and other adversaries. Studio City, CA: The Gavin De Becker Center for the Study and Reduction of Violence.Google Scholar
  8. Drysdale, D., Modzeleski, W., & Simons, A. (2010). In United States Secret Service, United States Department of Education and Federal Bureau of Investigation (Ed.), Campus attacks: Targeted violence affecting institutions of higher education. Washington, DC.Google Scholar
  9. Evans, P. (1992). The verbally abuse relationship: How to recognize it and how to respond. Holbrook, MA: Bob Adams Inc.Google Scholar
  10. Evans, P. (2002). Controlling people: How to recognize, understand, and deal with people who try to control you. Avon, MA: Adams Media.Google Scholar
  11. Everytown. (2017). Mass shootings in the United States: 2009–2016. Retrieved June 7, 2018 from https://www.everytownresearch.org/reports/mass-shootings-analsysis
  12. Federal Bureau of Investigation. (2015). Crime in the United States 2014. Washington, DC: U.S. Department of Justice.Google Scholar
  13. Finkelhor, D., & Williams, L. (1988). Nursery crimes: A study of sexual abuse in daycare. Newbury Park, CA: Sage.Google Scholar
  14. Grant, B., Wilkerson, S., de Koven, P., Cosby, A., & Henschel, M. (2017). A case study of k-12 school employee sexual misconduct. Magnolia Consulting. Retrieved March 24, 2019 from https://magnoliaconsulting.org
  15. Hazelwood, R. & Warren, J. (1989). The serial rapist: His characteristics and victims. Washington, DC: FBI Law Enforcement Bulletin.Google Scholar
  16. Hickey, E. (2013). Serial murderers and their victims. Belmont, CA: Thompson/Wadsworth.Google Scholar
  17. Lannings, K. (2010). Child molesters: A behavior analysis. Alexandria, VA: National Center for Missing and Exploited Children and the Office of Juvenile Justice and Delinquency Prevention.Google Scholar
  18. McNamara, M. (2018). I’ll be gone in the dark: One woman’s obsessive search for the golden state killer. New York: Harper Collins.Google Scholar
  19. Mohandie, K., Meloy, J., McGowan, M., & Williams, J. (2006). The RECON typology of stalking: Reliability and validity upon a large sample of north American stalkers. Journal of Forensic Sciences, 51, 147–155.CrossRefGoogle Scholar
  20. National Center for Missing and Exploited Children. (2018). NCMEC data. Retrieved June 13, 2018 from http://www.missingkids.com
  21. National Center for Victims of Crimes. (n.d.). Stalking: Problem-oriented guides for police problem-specific guides series no. 22. Washington, DC: U.S. Department of Justice.Google Scholar
  22. Office of Victims of Crime. (2016). Crime and victimization fact sheets. Washington, DC: Office of Victims of Crime and the National Center for Victims of Crime. Retrieved June 6, 2018 form http://www.ovc.ncjrs.gov
  23. Planty, M., & Truman, J. (2013). Firearm violence, 1993–2011. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.Google Scholar
  24. Roncek, D., & Maier, P. (1991). Bars, blocks, and crimes revisited: Linking the theory of routine activities to the empiricism of hot spots. Criminology, 29(4), 185–188.CrossRefGoogle Scholar
  25. Rossmo, K. (1997). Geographic profiling. In J. Jackson & D. Bekerian (Eds.), Offender profiling: Theory, research and practice (pp. 159–175). Chichester, UK: Wiley.Google Scholar
  26. Sacco, V., & Kennedy, L. (2002). The criminal event. Perspectives in space and time. Belmont, CA: Wadsworth/Thomson Learning.Google Scholar
  27. Schlesinger, L., & Mesa, B. (2008). Homicidal celebrity stalkers: Dangerous obsessions with nonpolitical public figures. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures a psychological and behavioral analysis. New York: Oxford University Press.Google Scholar
  28. Shakeshaft, C. (2004). Educator sexual misconduct: A synthesis of existing literature. Washington, DC: US Department of Education.Google Scholar
  29. Simon, G. (1996). In sheep’s clothing: Understanding & dealing with manipulative people. Little Rock, AR: AJ Christopher and Company.Google Scholar
  30. Smith, S., Zhang, X., Basile, K., Merrick, M., Wang, J., Kresnow, M., et al. (2018). National intimate partner and sexual violence survey: 2015 data brief. Atlanta, GA: Centers for Disease Control and Prevention. Retrieved June 7, 2018 from https://www.cdc.gov/violenceprevention/nisva/2015NISVSdatabrief.html Google Scholar
  31. Stark, R. (1987). Deviant places: A theory of ecology of crime. Criminology, 25(4), 893–909.CrossRefGoogle Scholar
  32. Wiltz, S., & Goodwin, M. (2004). Slave master. New York: Kensington Publishing Group.Google Scholar
  33. Wright, R., & Decker, S. (2003). Create the illusion of impending death: Armed robbers in action. In P. Cromwell (Ed.), In their own words: Criminals on crime (pp. 210–216). Los Angeles: Roxbury Publishing Company.Google Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.Fairleigh Dickinson UniversityTeaneckUSA

Personalised recommendations