Skip to main content

Enticing the Target: Tactics That Fabricate Trust and Reduce Suspicion

  • Chapter
  • First Online:
Hiding in Plain Sight
  • 122 Accesses

Abstract

Once the targets have passed the selection stage, the aggressors may take steps to prepare for potential attacks. They expect that their targets may attempt to keep a safe distance when strangers or little-known acquaintances suddenly approach them. For the attack to be successful, the aggressors need to draw their targets close to them or keep them at a striking distance. Initially, they may employ subtle tactics that entice their targets by building a rapport with them or attempting to minimize their concerns. Many aggressors believe that people just need a good reason to discount uneasy feelings. They count on their targets feeling guilty about forming negative judgments of others. Some common tactics that are used to build trust and minimize suspicion are using charm, creating goodwill, fabricating relationships, doing small favors, offering unsolicited promises, minimizing risks, or appealing to the targets’ egos.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Banks, D., & Kychelhahn, T. (2011). Characteristics of suspected human trafficking incidents. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.

    Google Scholar 

  • Berman, K., & Knight, J. (2009). What did Bernard Madoff do? Harvard Business Review. Retrieved March 7, 2019 from https://www.hbr.org/2009/06/what-did-bernard-madoff-do

  • Bullock, A. (1971). Hitler: A study in tyranny. New York: Harper & Row Publishers.

    Google Scholar 

  • Carlson, M. (1989). $1 billion worth of influence. Time (November 6): 27–28.

    Google Scholar 

  • Carnegie, D. (2009). How to win friends and influence people. New York: Simon and Schuster.

    Google Scholar 

  • Cialdini, R. (2007). Influence: The psychology of persuasion. New York: Collins Business.

    Google Scholar 

  • De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown, and Company.

    Google Scholar 

  • Deutch, L. (1995). OJ vows to find killers. Associated Press, October 4, 1995. Retrieved March 2, 2019 from https://journaltimes.com

  • Effron, L., Pararella, A., & Taudte, J. (2019). The scandals that brought down the Bakkers, once among US’s most famous televangelists. ABC News, January 17, 2019. Retrieved March 10, 2019 from https://www.abcnews.go.com/us/

  • Ekman, P., & Friesen, W. (2003). Unmasking the face: A guide to recognizing emotions from facial expressions. Cambridge, MA: Malor Books.

    Google Scholar 

  • Emswiller, T., Deaux, K., & Willits, J. (1971). Similarity, sex, and requests for small favors. Journal of Applied Social Psychology, 1(1), 284–291.

    Article  Google Scholar 

  • Fletcher, E. (2019). Romance scams rank number one on total reported losses. Federal Trade Commission. Retrieved March 4, 2019 from https://www.ftc.gov/news-events/blog/data-spotlight/2019/02/romance-scams-rank-number-one-on-total-reported-losses

  • Francevilla, W. (2018). Of course you are too smart to be scammed. Think again. Retrieved March 7, 2019 from https://www.cnbc.com/2018/04/30

  • Friedrichs, D. (2010). Trusted criminals: White collar crime in contemporary society. Belmont, CA: Wadsworth Cengage Learning.

    Google Scholar 

  • Hickey, E. (2013). Serial murderers and their victims. Belmont, CA: Thompson Wadsworth.

    Google Scholar 

  • Lieberman, D. (2000). Get anyone to do anything. New York: St. Martin’s Griffin.

    Google Scholar 

  • McLaughlin, E. (2019). Manson family murderer recommended for parole in 22nd attempt. CNN. Retrieved March 4, 2019 from https://www.cnn.com/2019/01/31/manson-family-murderer-recommended-for-parole-in-22nd-attempt

  • Muti, R., & Buckley, C. (2012). The charmer: The true story of Robert Reldan – Rapist, murder, and millionaire – And the women who fell victim to his allure. Green Bay, WI: Title Town Publishing.

    Google Scholar 

  • O’Connor, J., & Seymour, J. (2002). Introducing NLP: Psychological skills for understanding and influencing people. London: Element.

    Google Scholar 

  • Pease, A., & Pease, B. (2004). The definitive book of body language. New York: Bantam Books.

    Google Scholar 

  • Polaris Project. (2019a). Labor trafficking. Retrieved March 7, 2019 from https://www.polarisproject.org/labor-trafficing

  • Polaris Project. (2019b). Sex trafficking. Retrieved March 7, 2019 from https://www.polarisproject.org/sex-trafficing

  • Simon, G. (1996). In sheep’s clothing: Understanding and dealing with manipulative people. Little Rock, AR: A. J. Christopher & Company.

    Google Scholar 

  • Thompson, G., & Jenkins, J. (1993). Verbal judo: The gentle art of persuasion. New York: Quill.

    Google Scholar 

  • Walker, L. (1979). The battered woman. New York: Harper & Row.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James F. Kenny .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kenny, J.F. (2020). Enticing the Target: Tactics That Fabricate Trust and Reduce Suspicion. In: Hiding in Plain Sight. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26867-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26867-1_7

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-26866-4

  • Online ISBN: 978-3-030-26867-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics