Skip to main content

“Getting to Know You”: Confirming Target Suitability

  • Chapter
  • First Online:
Hiding in Plain Sight
  • 124 Accesses

Abstract

Before committing to the attack, an aggressor will often attempt to confirm the suitability of a potential target. At this stage in the victimization process, the aggressor needs to determine that the potential target will pose minimal risk and present maximum opportunity for success. Good reconnaissance can confirm whether the potential target is unwilling or incapable of fighting back and susceptible to attacks to their self-esteem. The aggressor may deploy deceptive tactics to minimize suspicion while they secure the necessary information. Some of the most common tactics include testing the target’s resolve, interviewing the target for information, probing for vulnerabilities and access, and researching social media.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Biesterfeld, J., & Meloy, J. (2008). The public figure assassin as terrorist. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.

    Google Scholar 

  • Bureau of Justice Statistics. (n.d.). Detailed place of occurrence for violent and property crimes, average annual 2004–2008. U.S. Department of Justice. Retrieve April 14, 2019 from https://www.bjs.gov/index.cfm?ty=tp&tid=44

  • De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown, and company.

    Google Scholar 

  • Federal Bureau of Investigation. (2017). The 2016 internet crime complaint center report. Washington, DC: U.S. Department of Justice.

    Google Scholar 

  • Federal Bureau of Investigation. (2018a). Scams and safety: About protecting your kids. Retrieved March 24, 2018 from: www.fbi.gov/scams-and-safety/Protecting-your-kids

  • Federal Bureau of Investigation. (2018b). Internet social networking risks. Retrieved March 24, 2018 from: www.fbi.gov/file-repository/internet-social-networking-risks

  • Gilligan, J. (1997). Violence: Reflections on a national epidemic. New York, NY: Vintage Books.

    Google Scholar 

  • Gray, L. (2010). Grooming: How child molesters create willing victims. National Association of Adult survivors of Child Abuse. Retrieved April 5, 2019 from http://www.naasca.or/2012-Articles040512-GroomingWillingVictims.htm

  • Highhouse Insurance Company. (2018). Burglars use social media to target homes. Retrieved March 24, 2018 from http://www.highhouseinsurance.com

  • Jones, J. (2011). Let me take you down: Inside the mind of mark David Chapman, the man who killed John Lennon. New York: Villard.

    Google Scholar 

  • Lieberman, D. (2000). Get anyone to do anything: Never feel powerless again with psychological secrets to control and influence every situation. New York: St. Martin’s Griffen.

    Google Scholar 

  • MacYoung, M., & MacYoung, D. (2019). The interview. No Nonsense Self-Defense. Retrieved April 16, 2019 from https://nononsenseselfdefense.com/interview.htm

  • Meloy, R., Mohandie, K., & Green, M. (2008). A forensic investigation of those who stalk celebrities. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.

    Chapter  Google Scholar 

  • National Center for the Analysis of Violent Crime. (2017). Making prevention a reality: Identifying, assessing, and managing the threat of targeted attacks. Washington, DC: Behavior Analysis Unit, Federal Bureau of Investigation.

    Google Scholar 

  • Sanchez, R. (2019, January 20). The Jayme Closs case: A chilling take of murder, kidnapping and escape in rural America. CNN. Retrieved March 31, 2019 from https://www.cnn.com/2019/us/jayme-closs-case-moment-by-moment/index.html

  • Schifferle, L. (2019). Those (not really) IRS calls. Federal Trade Commission. Retrieved May 24, 2019 from https://ftc.gov

  • Schlesinger, L., & Mesa, B. (2008). Homicidal celebrity stalkers: Dangerous obsessions with nonpolitical public figures. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.

    Google Scholar 

  • SecurAmerica. (2013). Home burglary awareness and prevention. Retrieved April 18, 2019 from https://www.securamericallc.com

  • Simon, G. (1996). In sheep’s clothing: Understanding and dealing with manipulative people. Little Rock, AK: A. J. Christopher & Company.

    Google Scholar 

  • State of Virginia. (2013). Study of child pornography and electronic solicitation of minor crimes in Virginia. Retrieved April 5, 2019 from https://www.vcsc.virginia.gov

  • Walker, L. (1979). The battered woman. New York: Harper & Row.

    Google Scholar 

  • Wolak, J., Finkelhor, D., & Mitchell, K. (2005). Child pornography possessors arrested in internet-related crimes: Findings from the National Juvenile Online Victimization Study. Washington, DC: National Center for Missing & Exploited Children.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James F. Kenny .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kenny, J.F. (2020). “Getting to Know You”: Confirming Target Suitability. In: Hiding in Plain Sight. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26867-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26867-1_5

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-26866-4

  • Online ISBN: 978-3-030-26867-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics