Abstract
As the attack becomes more likely, predators seek to establish control over their targets, social settings, and circumstances to maximize their chances of success. They may achieve this by reducing target resistance and eliminating potential help sources. At this point in the criminal victimization process, the situation has become more dangerous and there are fewer options available for targets. Recognizing control tactics quickly may provide the targets the opportunity to take action before the attack has commenced. If possible, they must act promptly to avoid, contain, or defend themselves from the potential attackers. Aggressors may employ control tactics such as verbal abuse, intimidations, threats, manufactured anger, stalking, securing weapons, or exploiting authority to establish dominance. They may attempt to isolate targets from those who can assist. Aggressors may lie in wait at public places, or lure their targets to private locations where they can exercise greater control.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Borum, R., Fein, R., Vossekuil, B., & Berglund, J. (1999). Threat assessment: Defining an approach for evaluating risk of targeted violence. Behavioral Sciences & the Law, 17, 323–337.
Breiding, M., Smith, S., Basile, K., Walters, M. & Chen, J. (2014). Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization: National intimate partner and sexual violence survey, United States 2011. Atlanta, GA: Centers for Disease Control and Prevention.
Catalano, S. (2012). Stalking victims in the United States-revised. Washington, DC: Bureau of Justice Statistics.
CNN. (2012). Jerry Sandusky gets sentence of 30 to 60 years for child sex abuse. Retrieved March 19, 2019 from http://news.blogs.cnn.com/2012/10/09/jerry-sandusky-proclaims-his-innocense
Cooper, A. (2013). 360 Interview with Elizabeth Smart. Retrieved March 18, 2019 from http://ac360.blogs.cnn.com/2013/10/08/360-interview-elizabeth-smart
De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown and Company.
De Becker, G., Taylor, T., & Marquart, J. (2008). Just 2 seconds: Using time and space to defeat assassins and other adversaries. Studio City, CA: The Gavin De Becker Center for the Study and Reduction of Violence.
Drysdale, D., Modzeleski, W., & Simons, A. (2010). In United States Secret Service, United States Department of Education and Federal Bureau of Investigation (Ed.), Campus attacks: Targeted violence affecting institutions of higher education. Washington, DC.
Evans, P. (1992). The verbally abuse relationship: How to recognize it and how to respond. Holbrook, MA: Bob Adams Inc.
Evans, P. (2002). Controlling people: How to recognize, understand, and deal with people who try to control you. Avon, MA: Adams Media.
Everytown. (2017). Mass shootings in the United States: 2009–2016. Retrieved June 7, 2018 from https://www.everytownresearch.org/reports/mass-shootings-analsysis
Federal Bureau of Investigation. (2015). Crime in the United States 2014. Washington, DC: U.S. Department of Justice.
Finkelhor, D., & Williams, L. (1988). Nursery crimes: A study of sexual abuse in daycare. Newbury Park, CA: Sage.
Grant, B., Wilkerson, S., de Koven, P., Cosby, A., & Henschel, M. (2017). A case study of k-12 school employee sexual misconduct. Magnolia Consulting. Retrieved March 24, 2019 from https://magnoliaconsulting.org
Hazelwood, R. & Warren, J. (1989). The serial rapist: His characteristics and victims. Washington, DC: FBI Law Enforcement Bulletin.
Hickey, E. (2013). Serial murderers and their victims. Belmont, CA: Thompson/Wadsworth.
Lannings, K. (2010). Child molesters: A behavior analysis. Alexandria, VA: National Center for Missing and Exploited Children and the Office of Juvenile Justice and Delinquency Prevention.
McNamara, M. (2018). I’ll be gone in the dark: One woman’s obsessive search for the golden state killer. New York: Harper Collins.
Mohandie, K., Meloy, J., McGowan, M., & Williams, J. (2006). The RECON typology of stalking: Reliability and validity upon a large sample of north American stalkers. Journal of Forensic Sciences, 51, 147–155.
National Center for Missing and Exploited Children. (2018). NCMEC data. Retrieved June 13, 2018 from http://www.missingkids.com
National Center for Victims of Crimes. (n.d.). Stalking: Problem-oriented guides for police problem-specific guides series no. 22. Washington, DC: U.S. Department of Justice.
Office of Victims of Crime. (2016). Crime and victimization fact sheets. Washington, DC: Office of Victims of Crime and the National Center for Victims of Crime. Retrieved June 6, 2018 form http://www.ovc.ncjrs.gov
Planty, M., & Truman, J. (2013). Firearm violence, 1993–2011. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.
Roncek, D., & Maier, P. (1991). Bars, blocks, and crimes revisited: Linking the theory of routine activities to the empiricism of hot spots. Criminology, 29(4), 185–188.
Rossmo, K. (1997). Geographic profiling. In J. Jackson & D. Bekerian (Eds.), Offender profiling: Theory, research and practice (pp. 159–175). Chichester, UK: Wiley.
Sacco, V., & Kennedy, L. (2002). The criminal event. Perspectives in space and time. Belmont, CA: Wadsworth/Thomson Learning.
Schlesinger, L., & Mesa, B. (2008). Homicidal celebrity stalkers: Dangerous obsessions with nonpolitical public figures. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures a psychological and behavioral analysis. New York: Oxford University Press.
Shakeshaft, C. (2004). Educator sexual misconduct: A synthesis of existing literature. Washington, DC: US Department of Education.
Simon, G. (1996). In sheep’s clothing: Understanding & dealing with manipulative people. Little Rock, AR: AJ Christopher and Company.
Smith, S., Zhang, X., Basile, K., Merrick, M., Wang, J., Kresnow, M., et al. (2018). National intimate partner and sexual violence survey: 2015 data brief. Atlanta, GA: Centers for Disease Control and Prevention. Retrieved June 7, 2018 from https://www.cdc.gov/violenceprevention/nisva/2015NISVSdatabrief.html
Stark, R. (1987). Deviant places: A theory of ecology of crime. Criminology, 25(4), 893–909.
Wiltz, S., & Goodwin, M. (2004). Slave master. New York: Kensington Publishing Group.
Wright, R., & Decker, S. (2003). Create the illusion of impending death: Armed robbers in action. In P. Cromwell (Ed.), In their own words: Criminals on crime (pp. 210–216). Los Angeles: Roxbury Publishing Company.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
Kenny, J.F. (2020). Preparing for the Attack: Tactics That Establish Control. In: Hiding in Plain Sight. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26867-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-26867-1_9
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-26866-4
Online ISBN: 978-3-030-26867-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)