Abstract
Before committing to the attack, an aggressor will often attempt to confirm the suitability of a potential target. At this stage in the victimization process, the aggressor needs to determine that the potential target will pose minimal risk and present maximum opportunity for success. Good reconnaissance can confirm whether the potential target is unwilling or incapable of fighting back and susceptible to attacks to their self-esteem. The aggressor may deploy deceptive tactics to minimize suspicion while they secure the necessary information. Some of the most common tactics include testing the target’s resolve, interviewing the target for information, probing for vulnerabilities and access, and researching social media.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Biesterfeld, J., & Meloy, J. (2008). The public figure assassin as terrorist. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.
Bureau of Justice Statistics. (n.d.). Detailed place of occurrence for violent and property crimes, average annual 2004–2008. U.S. Department of Justice. Retrieve April 14, 2019 from https://www.bjs.gov/index.cfm?ty=tp&tid=44
De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown, and company.
Federal Bureau of Investigation. (2017). The 2016 internet crime complaint center report. Washington, DC: U.S. Department of Justice.
Federal Bureau of Investigation. (2018a). Scams and safety: About protecting your kids. Retrieved March 24, 2018 from: www.fbi.gov/scams-and-safety/Protecting-your-kids
Federal Bureau of Investigation. (2018b). Internet social networking risks. Retrieved March 24, 2018 from: www.fbi.gov/file-repository/internet-social-networking-risks
Gilligan, J. (1997). Violence: Reflections on a national epidemic. New York, NY: Vintage Books.
Gray, L. (2010). Grooming: How child molesters create willing victims. National Association of Adult survivors of Child Abuse. Retrieved April 5, 2019 from http://www.naasca.or/2012-Articles040512-GroomingWillingVictims.htm
Highhouse Insurance Company. (2018). Burglars use social media to target homes. Retrieved March 24, 2018 from http://www.highhouseinsurance.com
Jones, J. (2011). Let me take you down: Inside the mind of mark David Chapman, the man who killed John Lennon. New York: Villard.
Lieberman, D. (2000). Get anyone to do anything: Never feel powerless again with psychological secrets to control and influence every situation. New York: St. Martin’s Griffen.
MacYoung, M., & MacYoung, D. (2019). The interview. No Nonsense Self-Defense. Retrieved April 16, 2019 from https://nononsenseselfdefense.com/interview.htm
Meloy, R., Mohandie, K., & Green, M. (2008). A forensic investigation of those who stalk celebrities. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.
National Center for the Analysis of Violent Crime. (2017). Making prevention a reality: Identifying, assessing, and managing the threat of targeted attacks. Washington, DC: Behavior Analysis Unit, Federal Bureau of Investigation.
Sanchez, R. (2019, January 20). The Jayme Closs case: A chilling take of murder, kidnapping and escape in rural America. CNN. Retrieved March 31, 2019 from https://www.cnn.com/2019/us/jayme-closs-case-moment-by-moment/index.html
Schifferle, L. (2019). Those (not really) IRS calls. Federal Trade Commission. Retrieved May 24, 2019 from https://ftc.gov
Schlesinger, L., & Mesa, B. (2008). Homicidal celebrity stalkers: Dangerous obsessions with nonpolitical public figures. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.
SecurAmerica. (2013). Home burglary awareness and prevention. Retrieved April 18, 2019 from https://www.securamericallc.com
Simon, G. (1996). In sheep’s clothing: Understanding and dealing with manipulative people. Little Rock, AK: A. J. Christopher & Company.
State of Virginia. (2013). Study of child pornography and electronic solicitation of minor crimes in Virginia. Retrieved April 5, 2019 from https://www.vcsc.virginia.gov
Walker, L. (1979). The battered woman. New York: Harper & Row.
Wolak, J., Finkelhor, D., & Mitchell, K. (2005). Child pornography possessors arrested in internet-related crimes: Findings from the National Juvenile Online Victimization Study. Washington, DC: National Center for Missing & Exploited Children.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
Kenny, J.F. (2020). “Getting to Know You”: Confirming Target Suitability. In: Hiding in Plain Sight. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26867-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-26867-1_5
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-26866-4
Online ISBN: 978-3-030-26867-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)