Abstract
Once aggressors and fraudsters have gained access to their targets, they are now ready to advance. As they prepare for assault, they can conceal their intentions by utilizing tactics that distract or divert their targets’ attention. These strategies help shift attention away from what is happening to some random issues, preventing the targets from setting up their defenses. While these aggressors would prefer to be trusted, they will settle for reducing their targets’ suspicion and increasing their level of confusion. Tactics that criminals use to disguise dangerous advances and confuse their targets may include offering numerous details, stereotyping, blaming, laying guilt, playing the role of a victim, shaming, or claiming to help others.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amir, M. (1971). Patterns of forcible rape. Chicago: University of Chicago Press.
Charity Navigator. (2018). Retrieved May 27, 2018 from http://charitynavigator.org
Charity Watch. (2018). Retrieved May 31, 2018 from http://charitywatch.org/charitywatch-articles
De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Boston: Little, Brown and Company.
Enron Annual Report 2000. (2001). Retrieved March 12, 2019 from http://www.picker.uchicago.edu/enron/enronannualreport
Federal Trade Commission. (2018). Retrieved May 27, 2018 from http://ftc.gov/blog
Franklin, C., & Franklin, A. (1976). Victimology revisited: A critique and suggestions for future direction. Criminology, 14, 177–214.
Friedrichs, D. (2010). Trusted criminals: White collar crime in contemporary society. Belmont, CA: Wadsworth Cengage Learning.
Gilligan, J. (1997). Violence: Reflections on a national epidemic. New York: Vintage Books.
Hickey, E. (2013). Serial murderers and their victims. Belmont, CA: Thompson Wadsworth.
Leggett, M., & Schwartz, M. (1996). The aftermath of campus sexual assault. Paper presented at the annual meetings of the Academy of Criminal Justice Sciences, Las Vegas, NV.
Matza, D. (1964). Delinquency and drift. New York: Wiley.
Morin, A. (2019). 5 Reasons people share way too many details of their personal lives. Inc.Com. Retrieved March 12, 2019 from http://inc.com/amy-morin/5-reasons-people-share-way-too-many-details-of-their-personal-lives
Namie, G., & Namie, R. (2003). The bully at work. What you can do to stop the hurt and reclaim your dignity on the job. Naperville, IL: Sourcebooks Inc.
O’Toole, M., & Bowman, A. (2012). Dangerous instincts: Use an FBI profiler’s tactics to avoid unsafe situations. New York: Plume.
Peled, E., Jaffe, P., & Edleson, J. (1995). Ending the cycle of violence: Community responses to children of battered women. Thousand Oaks, CA: Sage Publications, Inc.
Rape, Abuse, and Incest National Network [RAINN]. (2019). If you suspect a child is being harmed. Retrieved March 13, 2019 from http://www.rainn.org/article/if-you-suspect-a-child-is-being-harmed
Schreier, L. (2007). Confessions of a time-share salesperson. CNN.com. Retrieved March 13, 2019 from http://cnn.com/2007/TRAVEL/05/08/timeshare.salesperson
Schwartz, M., & DeKeseredy, W. (1997). Sexual assault on the college campus. The role of male peer support. Thousand Oaks, CA: Sage Publishing.
Schwendinger, J., & Schwendinger, H. (1974). Rape myths: In legal, theoretical, and everyday practices. Crime and Social Justice, 1, 18–26.
Simon, G. (1996). In Sheep’s clothing: Understanding and dealing with manipulative people. Little Rock, AK: A. J. Christopher & Company.
Walker, L. (1979). The battered woman. New York: Harper and Row.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
Kenny, J.F. (2020). Developing a Smoke Screen: Tactics That Disguise Criminal Advances. In: Hiding in Plain Sight. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26867-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-26867-1_8
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-26866-4
Online ISBN: 978-3-030-26867-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)