Abstract
Captive-taking is an extensive international and domestic problem that faces law enforcement, as well as the military and intelligence communities. To date, a modicum of research has been done to understand these offenders and the methods they employ in the commission of their crimes. Understanding the tactics, techniques, and procedures that perpetrators use to execute a captive-taking event will better prepare law enforcement agencies and others to prevent, mitigate, respond to, and recover from captive-taking incidents. The current research is drawn from a pilot study consisting of interviews of seven captive-takers. Consensual qualitative analysis was utilized to draw conclusions from the interview transcripts about the modus operandi of these perpetrators. Sixty-one domains of M.O. were yielded, grouped into 35 core ideas, and cross analyzed with weighted labels identifying the frequency each particular domain/core idea arose. The results presented are unique because they are derived directly from the perspective of the captive-takers themselves and the data were gathered using a systematic methodological approach (Perpetrator-Motive Research Design). Limitations, strengths and future research directions are also discussed.
Similar content being viewed by others
References
Adinkrah M (2005) Vigilante homicides in contemporary Ghana. Journal of Criminal Justice 33:413–4127. doi:10.1016/j.jcrimjus.2005.06.008
Atta-Asamoah A (2009) Understanding the West African cyber crime process. African Security Review 18:106–114. doi:10.1080/10246029.2009.9627562
Ballezza, R. A. (2003, November). Health club credit card theft: A national crime problem. FBI Law Enforcement Bulletin, 8-13.
Beauregard E, Busina I (2013) Journey “during” crime: Predicting criminal mobility patterns in sexual assaults. Journal of Interpersonal Violence 28:2052–2067. doi:10.1177/0886260512471084
Beauregard E, Leclerc B, Lussier P (2012) Decision making in the crime commission process: Comparing rapists, child molesters, and victim-crossover sex offenders. Criminal Justice and Behavior 39:1275–1295. doi:10.1177/0093854812453120
Beauregard E, Martineau M (2013) A descriptive study of sexual homicide in Canada: Implications for police investigation. International Journal of Offender Therapy and Comparative Criminology 57:1454–1476. doi:10.1177/0306624X12456682
Beauregard E, Martineau M (2014) No body, no crime? The role of forensic awareness in avoiding police detection in cases of sexual homicide. Journal of Criminal Justice 42:213–220. doi:10.1016/j.jcrimjus.2013.06.007
Beauregard E, Proulx J, Rossmo DK (2005) Spatial patterns of sex offenders: Theoretical, empirical, and practical issues. Aggression and Violent Behavior 10:579–603. doi:10.1016/j.avb.2004.12.003
Burton DL (2003) Male adolescents: Sexual victimization and subsequent sexual abuse. Child and Adolescent Social Work Journal 20:277–296
Chapman R, Smith LL, Bond JW (2005) An investigation into the differentiating characteristics between car key burglars and regular burglars. Journal of Forensic Sciences 57:939–945. doi:10.1111/j.1556-4029.2012.02096.x
Cohen LE, Felson M (1979) Social change and crime rate trends: A routine activity approach. American Sociological Review 44:588–608
Copes H, Vieraitis LM (2009) Understanding identity theft: Offenders’ accounts of their lives and crimes. Criminal Justice Review 34:329–349. doi:10.1177/0734016808330589
Daniels JA, Page J (2012) School barricaded captive-taking: A literature review and critique. Aggression and Violent Behavior 17:140--146. doi:10.1016/j.avb.2011.11.002
Daniels JA, Angleman AJ, Grinnan E (2015) Standardizing research methods on violent offenders: Perpetrator-motive research design and consensual qualitative research. Aggression and Violent Behavior 21:125--132. doi:10.1016/j.avb.2015.02.001
Davies A, Witterbrood K, Jackson JL (1997) Predicting the criminal antecedents of a stranger rapist from his offence behaviour. Science & Justice 37:161–170
Davis L (2003) Carjacking – Insights from South Africa to a new crime problem. The Australian and New Zealand Journal of Criminology 36:173–191
Elliott IA, Ashfield S (2011) The use of online technology in the modus operandi of female sex offenders. Journal of Sexual Aggression 17:92–104. doi:10.1080/13552600.2010.537379
Elliott IA, Beech AR (2009) Understanding online child pornography use: Applying sexual offense theory to internet offenders. Aggression and Violent Behavior 14:180–193. doi:10.1016/j.avb.2009.03.002
Green E, Wakefield RP (1979) Patterns of middle and upper class homicide. The Journal of Criminal Law and Criminology 70:172–181
Gurian EA (2011) Female serial murderers: Directions for future research on a hidden population. International Journal of Offender Therapy and Comparative Criminology 55:27–42. doi:10.1177/0306624X09352451
Hazelwood RR, Warren JI (2009) Linkage analysis: M.O., ritual, and signature in serial sexual crimes. In: Hazelwood RR, Burgess AW (eds) Practical aspects of rape investigation: A multidisciplinary approach, 4th edn. CRC Press, Boca Raton, FL, pp 171–180
Hewitt A, Beauregard E (2014) Sexual crime and place: The impact of the environmental context on sexual assault outcomes. Journal of Criminal Justice 42:375–383. doi:10.1016/j.jcrimjus.2014.05.003
Hewitt A, Beauregard E, Davies G (2012) “Catch and release”: Predicting encounter and victim release location choice in serial rape events. Policing: An International Journal of Police Strategies & Management 35:835–856. doi:10.1108/13639511211275814
Hill CE (ed) (2012) Consensual qualitative research: A practical resource for investigating social science phenomena. American Psychological Association, Washington, DC
Hill CE, Knox S, Thompson BJ, Williams EN, Hess SA, Ladany N (2005) Consensual qualitative research: An update. Journal of Counseling Psychology 52:196–205
Hill CE, Thompson BJ, Williams EN (1997) A guide to conducting consensual qualitative research. The Counseling Psychologist 25:517–572
Iacono EL (2014) Victims, sex workers and perpetrators: Gray areas in the trafficking of Nigerian women. Trends in Organized Crime 17:110–128. doi:10.1007/s12117-014-9212-1
Kaufman KL, Holmberg JK, Orts KA, McCrady FE, Rotzien AL, Daleiden EL, Hilliker DR (1998) Factors influencing sexual offenders’ modus operandi: An examination of victim-offender relatedness and age. Child Maltreatment 3:349–361
Kaufman KL, Wallace AM, Johnson CF, Reeder ML (1995) Comparing female and male perpetrators’ modus operandi: Victims’ reports of sexual abuse. Journal of Interpersonal Violence 10:322–333
Keppel RD, Birnes WJ (2009) Serial violence: Analysis of modus operandi and signature characteristics of killers. CRC Press, Boca Raton, FL
Ladany N, Thompson BJ, Hill CE (2012) Cross-analysis. In: Hill CE (ed) Consensual qualitative research: A practical resource for investigating social science phenomena. American Psychological Association, Washington, DC, pp 117–134
Laukkanen M, Santtila P (2006) Predicting the residential location of a serial commercial robber. Forensic Science International 157:71–82. doi:10.1016/j.forsciint.2005.03.020
Leclerc B, Tremblay P (2007) Strategic behavior in adolescent sexual offenses against children: Linking modus operandi to sexual behaviors. Sex Abuse 19:23–41. doi:10.1007/s11194-006-9034-z
Maedl A (2011) Rape as weapon of war in the Eastern DRC? The victims’ perspective. Human Rights Quarterly 33:128–147
Malesky AL (2007) Predatory online behavior: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the internet. Journal of Child Sexual Abuse 16:23–32. doi:10.1300/J070v16n02_02
Markson L, Woodhams J, Bond JW (2010) Linking serial residential burglary: Comparing the utility of modus operandi behaviours, geographical proximity, and temporal proximity. Journal of Investigative Psychology and Offender Profiling 7:91–107. doi:10.1002/jip.120
Robin GD (1969) Employees as offenders. Journal of Research in Crime & Delinquency 6:17–33. doi:10.1177/002242786900600103
Sidebottom A, Bowers K (2010) Bag theft in bars: An analysis of relative risk, perceived risk and modus operandi. Security Journal 23:206–224
Sidebottom A, Belur J, Bowers K, Tomson L, Johnson SD (2011) Theft in price-volatile markets: On the relationship between copper price and copper theft. Journal of Research in Crime and Delinquency 48:396–418. doi:10.1177/0022427810393021
Sutherland EH (1947) Principles of criminology. J. B. Lippinicott, New York
Vecchi GM, Van Hasselt VB, Angleman AJ (2013) The Perpetrator-Motive Research Design: A strategy for understanding motivations, values, and tactics of criminal offenders. Aggression and Violent Behavior 18:11–18. doi:10.1016/j.avb.2012.06.001
Von Hoesslin K (2012) Piracy and armed robbery at sea in Southeast Asia: Organized and fluid. Studies in Conflict & Terrorism 35:542–552. doi:10.1080/1057610X.2012.684652
Wilson W, Hilton T (1998) Modus operandi of female serial kills. Psychological Reports 82:495–498
Zinn R (2008) The modus operandi of house robbers in the Gauteng Province. Acta Criminologica 21:56–69
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Daniels, J.A., Angleman, A.J., Vecchi, G.M. et al. A Pilot Study of Criminal Captive-takers’ Modus Operandi . J Police Crim Psych 31, 37–47 (2016). https://doi.org/10.1007/s11896-015-9167-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11896-015-9167-4