Skip to main content

Preparing for the Attack: Tactics That Establish Control

  • Chapter
  • First Online:
Hiding in Plain Sight
  • 112 Accesses

Abstract

As the attack becomes more likely, predators seek to establish control over their targets, social settings, and circumstances to maximize their chances of success. They may achieve this by reducing target resistance and eliminating potential help sources. At this point in the criminal victimization process, the situation has become more dangerous and there are fewer options available for targets. Recognizing control tactics quickly may provide the targets the opportunity to take action before the attack has commenced. If possible, they must act promptly to avoid, contain, or defend themselves from the potential attackers. Aggressors may employ control tactics such as verbal abuse, intimidations, threats, manufactured anger, stalking, securing weapons, or exploiting authority to establish dominance. They may attempt to isolate targets from those who can assist. Aggressors may lie in wait at public places, or lure their targets to private locations where they can exercise greater control.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Borum, R., Fein, R., Vossekuil, B., & Berglund, J. (1999). Threat assessment: Defining an approach for evaluating risk of targeted violence. Behavioral Sciences & the Law, 17, 323–337.

    Article  Google Scholar 

  • Breiding, M., Smith, S., Basile, K., Walters, M. & Chen, J. (2014). Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization: National intimate partner and sexual violence survey, United States 2011. Atlanta, GA: Centers for Disease Control and Prevention.

    Google Scholar 

  • Catalano, S. (2012). Stalking victims in the United States-revised. Washington, DC: Bureau of Justice Statistics.

    Google Scholar 

  • CNN. (2012). Jerry Sandusky gets sentence of 30 to 60 years for child sex abuse. Retrieved March 19, 2019 from http://news.blogs.cnn.com/2012/10/09/jerry-sandusky-proclaims-his-innocense

  • Cooper, A. (2013). 360 Interview with Elizabeth Smart. Retrieved March 18, 2019 from http://ac360.blogs.cnn.com/2013/10/08/360-interview-elizabeth-smart

  • De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown and Company.

    Google Scholar 

  • De Becker, G., Taylor, T., & Marquart, J. (2008). Just 2 seconds: Using time and space to defeat assassins and other adversaries. Studio City, CA: The Gavin De Becker Center for the Study and Reduction of Violence.

    Google Scholar 

  • Drysdale, D., Modzeleski, W., & Simons, A. (2010). In United States Secret Service, United States Department of Education and Federal Bureau of Investigation (Ed.), Campus attacks: Targeted violence affecting institutions of higher education. Washington, DC.

    Google Scholar 

  • Evans, P. (1992). The verbally abuse relationship: How to recognize it and how to respond. Holbrook, MA: Bob Adams Inc.

    Google Scholar 

  • Evans, P. (2002). Controlling people: How to recognize, understand, and deal with people who try to control you. Avon, MA: Adams Media.

    Google Scholar 

  • Everytown. (2017). Mass shootings in the United States: 2009–2016. Retrieved June 7, 2018 from https://www.everytownresearch.org/reports/mass-shootings-analsysis

  • Federal Bureau of Investigation. (2015). Crime in the United States 2014. Washington, DC: U.S. Department of Justice.

    Google Scholar 

  • Finkelhor, D., & Williams, L. (1988). Nursery crimes: A study of sexual abuse in daycare. Newbury Park, CA: Sage.

    Google Scholar 

  • Grant, B., Wilkerson, S., de Koven, P., Cosby, A., & Henschel, M. (2017). A case study of k-12 school employee sexual misconduct. Magnolia Consulting. Retrieved March 24, 2019 from https://magnoliaconsulting.org

  • Hazelwood, R. & Warren, J. (1989). The serial rapist: His characteristics and victims. Washington, DC: FBI Law Enforcement Bulletin.

    Google Scholar 

  • Hickey, E. (2013). Serial murderers and their victims. Belmont, CA: Thompson/Wadsworth.

    Google Scholar 

  • Lannings, K. (2010). Child molesters: A behavior analysis. Alexandria, VA: National Center for Missing and Exploited Children and the Office of Juvenile Justice and Delinquency Prevention.

    Google Scholar 

  • McNamara, M. (2018). I’ll be gone in the dark: One woman’s obsessive search for the golden state killer. New York: Harper Collins.

    Google Scholar 

  • Mohandie, K., Meloy, J., McGowan, M., & Williams, J. (2006). The RECON typology of stalking: Reliability and validity upon a large sample of north American stalkers. Journal of Forensic Sciences, 51, 147–155.

    Article  Google Scholar 

  • National Center for Missing and Exploited Children. (2018). NCMEC data. Retrieved June 13, 2018 from http://www.missingkids.com

  • National Center for Victims of Crimes. (n.d.). Stalking: Problem-oriented guides for police problem-specific guides series no. 22. Washington, DC: U.S. Department of Justice.

    Google Scholar 

  • Office of Victims of Crime. (2016). Crime and victimization fact sheets. Washington, DC: Office of Victims of Crime and the National Center for Victims of Crime. Retrieved June 6, 2018 form http://www.ovc.ncjrs.gov

  • Planty, M., & Truman, J. (2013). Firearm violence, 1993–2011. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics.

    Google Scholar 

  • Roncek, D., & Maier, P. (1991). Bars, blocks, and crimes revisited: Linking the theory of routine activities to the empiricism of hot spots. Criminology, 29(4), 185–188.

    Article  Google Scholar 

  • Rossmo, K. (1997). Geographic profiling. In J. Jackson & D. Bekerian (Eds.), Offender profiling: Theory, research and practice (pp. 159–175). Chichester, UK: Wiley.

    Google Scholar 

  • Sacco, V., & Kennedy, L. (2002). The criminal event. Perspectives in space and time. Belmont, CA: Wadsworth/Thomson Learning.

    Google Scholar 

  • Schlesinger, L., & Mesa, B. (2008). Homicidal celebrity stalkers: Dangerous obsessions with nonpolitical public figures. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures a psychological and behavioral analysis. New York: Oxford University Press.

    Google Scholar 

  • Shakeshaft, C. (2004). Educator sexual misconduct: A synthesis of existing literature. Washington, DC: US Department of Education.

    Google Scholar 

  • Simon, G. (1996). In sheep’s clothing: Understanding & dealing with manipulative people. Little Rock, AR: AJ Christopher and Company.

    Google Scholar 

  • Smith, S., Zhang, X., Basile, K., Merrick, M., Wang, J., Kresnow, M., et al. (2018). National intimate partner and sexual violence survey: 2015 data brief. Atlanta, GA: Centers for Disease Control and Prevention. Retrieved June 7, 2018 from https://www.cdc.gov/violenceprevention/nisva/2015NISVSdatabrief.html

    Google Scholar 

  • Stark, R. (1987). Deviant places: A theory of ecology of crime. Criminology, 25(4), 893–909.

    Article  Google Scholar 

  • Wiltz, S., & Goodwin, M. (2004). Slave master. New York: Kensington Publishing Group.

    Google Scholar 

  • Wright, R., & Decker, S. (2003). Create the illusion of impending death: Armed robbers in action. In P. Cromwell (Ed.), In their own words: Criminals on crime (pp. 210–216). Los Angeles: Roxbury Publishing Company.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James F. Kenny .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kenny, J.F. (2020). Preparing for the Attack: Tactics That Establish Control. In: Hiding in Plain Sight. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26867-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26867-1_9

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-26866-4

  • Online ISBN: 978-3-030-26867-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics