Advertisement

“Getting to Know You”: Confirming Target Suitability

  • James F. KennyEmail author
Chapter

Abstract

Before committing to the attack, an aggressor will often attempt to confirm the suitability of a potential target. At this stage in the victimization process, the aggressor needs to determine that the potential target will pose minimal risk and present maximum opportunity for success. Good reconnaissance can confirm whether the potential target is unwilling or incapable of fighting back and susceptible to attacks to their self-esteem. The aggressor may deploy deceptive tactics to minimize suspicion while they secure the necessary information. Some of the most common tactics include testing the target’s resolve, interviewing the target for information, probing for vulnerabilities and access, and researching social media.

References

  1. Biesterfeld, J., & Meloy, J. (2008). The public figure assassin as terrorist. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.Google Scholar
  2. Bureau of Justice Statistics. (n.d.). Detailed place of occurrence for violent and property crimes, average annual 2004–2008. U.S. Department of Justice. Retrieve April 14, 2019 from https://www.bjs.gov/index.cfm?ty=tp&tid=44
  3. De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown, and company.Google Scholar
  4. Federal Bureau of Investigation. (2017). The 2016 internet crime complaint center report. Washington, DC: U.S. Department of Justice.Google Scholar
  5. Federal Bureau of Investigation. (2018a). Scams and safety: About protecting your kids. Retrieved March 24, 2018 from: www.fbi.gov/scams-and-safety/Protecting-your-kids
  6. Federal Bureau of Investigation. (2018b). Internet social networking risks. Retrieved March 24, 2018 from: www.fbi.gov/file-repository/internet-social-networking-risks
  7. Gilligan, J. (1997). Violence: Reflections on a national epidemic. New York, NY: Vintage Books.Google Scholar
  8. Gray, L. (2010). Grooming: How child molesters create willing victims. National Association of Adult survivors of Child Abuse. Retrieved April 5, 2019 from http://www.naasca.or/2012-Articles040512-GroomingWillingVictims.htm
  9. Highhouse Insurance Company. (2018). Burglars use social media to target homes. Retrieved March 24, 2018 from http://www.highhouseinsurance.com
  10. Jones, J. (2011). Let me take you down: Inside the mind of mark David Chapman, the man who killed John Lennon. New York: Villard.Google Scholar
  11. Lieberman, D. (2000). Get anyone to do anything: Never feel powerless again with psychological secrets to control and influence every situation. New York: St. Martin’s Griffen.Google Scholar
  12. MacYoung, M., & MacYoung, D. (2019). The interview. No Nonsense Self-Defense. Retrieved April 16, 2019 from https://nononsenseselfdefense.com/interview.htm
  13. Meloy, R., Mohandie, K., & Green, M. (2008). A forensic investigation of those who stalk celebrities. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.CrossRefGoogle Scholar
  14. National Center for the Analysis of Violent Crime. (2017). Making prevention a reality: Identifying, assessing, and managing the threat of targeted attacks. Washington, DC: Behavior Analysis Unit, Federal Bureau of Investigation.Google Scholar
  15. Sanchez, R. (2019, January 20). The Jayme Closs case: A chilling take of murder, kidnapping and escape in rural America. CNN. Retrieved March 31, 2019 from https://www.cnn.com/2019/us/jayme-closs-case-moment-by-moment/index.html
  16. Schifferle, L. (2019). Those (not really) IRS calls. Federal Trade Commission. Retrieved May 24, 2019 from https://ftc.gov
  17. Schlesinger, L., & Mesa, B. (2008). Homicidal celebrity stalkers: Dangerous obsessions with nonpolitical public figures. In J. Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking, threatening, and attacking public figures. New York: Oxford University Press.Google Scholar
  18. SecurAmerica. (2013). Home burglary awareness and prevention. Retrieved April 18, 2019 from https://www.securamericallc.com
  19. Simon, G. (1996). In sheep’s clothing: Understanding and dealing with manipulative people. Little Rock, AK: A. J. Christopher & Company.Google Scholar
  20. State of Virginia. (2013). Study of child pornography and electronic solicitation of minor crimes in Virginia. Retrieved April 5, 2019 from https://www.vcsc.virginia.gov
  21. Walker, L. (1979). The battered woman. New York: Harper & Row.Google Scholar
  22. Wolak, J., Finkelhor, D., & Mitchell, K. (2005). Child pornography possessors arrested in internet-related crimes: Findings from the National Juvenile Online Victimization Study. Washington, DC: National Center for Missing & Exploited Children.Google Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.Fairleigh Dickinson UniversityTeaneckUSA

Personalised recommendations