Skip to main content
Skip to content
Case File
efta-efta00156941Other

Psychology of Violence

Date
Unknown
Source
Reference
EFTA 00156941
Pages
11
Persons
4
Integrity
No Hash Available

Summary

Psychology of Violence 4: a • Xe0 Anima, rldsawrica to.cuni, 15514:2131mes 2011. eq. N. No. 2. tar- iSi narmit.ongturinnumucoNom Observing Coercive Control Beyond Intimate Partner Violence: Examining the Perceptions of Professionals About Common Tactics Used in Victimization Jacquelynn F. Duran Laura Johnson Rutgers. The State University of New Jersey Temple University Gretchen L. Hoge Judy L. Postrnus Lewis University University of Maryland Objective: Coercive control has traditionally been used as a concept to describe the coercive strategies used by perpetrators in intimate partner violence (IPV). Yet. these strategies we often experienced across a wide range of victimizations including child abuse. trafficking. IPV. sexual violence, and elder abuse. Professionals working with victims and/or perpetrators of coercive control are uniquely positioned to describe how they have observed coercive control in their clients, allowing for an examination of commonalities

Tags

eftadataset-9vol00009
Ask AI about this document

Search 264K+ documents with AI-powered analysis

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
Psychology of Violence 4: a • Xe0 Anima, rldsawrica to.cuni, 15514:2131mes 2011. eq. N. No. 2. tar- iSi narmit.ongturinnumucoNom Observing Coercive Control Beyond Intimate Partner Violence: Examining the Perceptions of Professionals About Common Tactics Used in Victimization Jacquelynn F. Duran Laura Johnson Rutgers. The State University of New Jersey Temple University Gretchen L. Hoge Judy L. Postrnus Lewis University University of Maryland Objective: Coercive control has traditionally been used as a concept to describe the coercive strategies used by perpetrators in intimate partner violence (IPV). Yet. these strategies we often experienced across a wide range of victimizations including child abuse. trafficking. IPV. sexual violence, and elder abuse. Professionals working with victims and/or perpetrators of coercive control are uniquely positioned to describe how they have observed coercive control in their clients, allowing for an examination of commonalities across vicUmszation types. This study explored the perceptions of professionals who identified common tactics used by perpetrators to isolate. groom. and control individuals—Wel/rot Key stakeholders (N 22) with expertise working with perpetrators and victims of child abuse, elder abuse, WV. human trafficking. and gang or colt recruitment completed semistruchned interviews to discuss their perspectives of predatory tactics. Raabe: Using a directed content analysis procedure. emergent themes revealed that perpetrators engage individuals in exploitative relationships by (a) identifying potential victims. (b) infiltrating lives through grooming. lc) isolating to gain control. and (d) maintaining control through any meatus necessary. Conclusions: Although nuanced victimization experiences exist. profes- sionals working with perpetrators andfor victims of abuse describe a common pattern of predatory strategies implemented by perpetrators that transcends rt.:limit:anon type. Applying the language of coercive control to these tactics broadens the recognition of instances when an individual's personal freedoms are limited by another individual's exertion of control. Kmscerds: coercive control. predatory tactics. vicumszation. professionals. interviews The concept of coercive control (Stark. 2007) was initially developed to explain the dynamics of violence used by perpetra- tors against their intimate partners and has long been a primary This article was published Online First October IS. 2020. O' lacquelynn E l)uron. School of Social Work. Roger. The Stale Uni- sasity of New Jersey; 0 Laura Johnson. School of Social Work. Temple University; 0 Cketchen I.. Hoge. Department of Social Work. Lewis Uni- venaty: Judy L. PC611111.n. SeFICOI of Social Work, University of Maryland. The authors would like to acknowledge the support of Karen Zurlo who served as an expert consultant on older adults and Delaney Cronin who helped to coordinate this project and write the organiational report. This research received funding from the Department of Children and Families and Department of Human Services. Stale of New Jersey. under Contract I7AAMA with Rutgers University. The points of view shared in this document are those of the authors and do not necessarily represent the official position or policies of the Department of Children and Families or the Department of Human Services. Correspondence concerning this article should be addressed to Jacque- lynn F. Duran. School of Social Work. Rutgers. The State University of New Jersey. 390 George Street. Suite 713. New Brunswick. Nl 08901. E-mail: jduroneissw.rulgasedu 144 theory for understanding intimate partner violence (IPV: Ham- herger. Larsen. & Lchrner. 2017). However, victims of child abuse. sexual violence, elder abuse, and trafficking are all subject to the same type of coercive control tactics (Lc., grooming and isolation) that draw and trap them in relationships with their perpetrators and alienate them from their support systems. Even gangs and cults recruit members using similar coercive practices. This article seeks to expand the concept of coercive control from a singular focus on IPV to a broader one based on the use of coercive control tactics that, at the most general level. could improve identification across various types of victimization. Hence. the purpose of this study was to explore the perspectives of professionals working with or on behalf of victims to derive a framework of commonly used victimization tactics. Theory of Coercive Control Coercive control theory draws parallels between psychological coercion techniques and the tactics used by perpetrators of abuse in intimate relationships to entrap victims. particularly women (Stark. 2007). Stark described how coercive control is founded on gender inequality and the devaluation of women that targets the victim's 3502-023 Page 1 of 11 EFIA_00001600 EFTA00156941 PERSPECTIVES OF PROFESSIONALS ABOUT COERCIVE CONTROL 145 sense of agency and results in a loss of freedom through domina- tion by the perpetrator. More recently. the adaptation of coercive control in criminal law in England and Scotland has demonstrated the applicability of this framework for victims who experience these patterns of behavior perpetrated by family members or intimate partners, regardless of gender or sexual orientation (Stark & Hester. 2019). Perpetrators use tactics such as physical or sexual violence. intimidation, isolation. and undue influence to suppress an individual's freedom (Static. 2007). Perpetrators also use grooming tactics by promising to end the abuse. seeking help for problematic behaviors. or offering gifts. Perpetrators physically and emotionally isolate victims from supportive networks of friends, family, coworkers. or helping providers to have total control (Stark, 2007). Ultimately, the tactics used create a condi- tion of authority for the perpetrator—a sense of fear in the victim and an "invisible cage"—to perpetuate the victim's entrapment (Stark. 2007). Stark (2007) highlighted how there are similar tactics used across various types of victimization, such as isolation of victims and rituals of degradation: however. he also identified partialities central to IPV such as its frequency and direct gender entrapment that distinguish IPV from other fonns of power and control. Dutton and Goodman (2005) have also conceptualized coercive control as it relates to 1PV. These authors suggested that perpetra- tors prime victims for coercion through four means: (a) creating the expectation of negative consequences for resistance to de- mands. (b) creating or exploiting the victim's vulnerabilities, (c) wearing down the victim's resistance to coercion. and (d) facili- tating and exploiting emotional and other forms of victim depen- dency. Surveillance is also a key element for exerting control and creating fear (Dutton & Goodman. 2005). These conceptualizations of the theory of coercive control pro- vide an important lens for examining coercive tactics used by perpetrators of IPV that might also extend to behaviors used across different types of victimization. building on Stark's (2007) iden- tification of commonalities between coercive control in 1PV and other contexts of power and control. Coercive control is the phe- nomena of victimization that is grounded in relational interactions. namely, behavioral tactics. such as the use of grooming. including normalizing behaviors. and isolation as mechanisms in which perpetrators gain and maintain power over their victims. What follows is a review of such tactics used by perpetrators of other forms of abuse beyond IPV. Grooming Tactics Grooming techniques used by perpetrators center on establish- ing trust with the victim. desensitizing the victim to the abuse or exploitation they are experiencing. providing a sense of family. and romancing or buying gifts for the victim. In some cases. a perpetrator will use high pressure tactics to groom the victim. Establishing Trust Perpetrators groom victims by first establishing trust. which often begins with the cultivation of a relationship between the perpetrator. victim, and sometimes the victim's family (Olson. Daggs, Ellevold. & Rogers. 2007). Trust has been described as a central dynamic in cases of online relationships and cyber abuse (Mishna. McLuckie. & Saini, 2009). and financial scams and exploitation of older adults (Langenderfer & Shimp. 2001). Traf- fickers also rely on the development of trust. doing so by helping victimized youth and young adults in ways they need. such as by providing shelter. food. clothing, money. personal items, or trans- portation (Reid 2016). Desensitizing the Victim Another key tactic in the grooming of victims involves desen- sitization through gradual. incremental exposure to abuse or ex- ploitation that limits victims' feelings of distress as the frequency and intensity of acts slowly increase. In cases of sexual predation. perpetrators begin by verbally and physically desensitizing youth to sexual contact (Olson et al., 2007) and using previous sexual acts as leverage for engagement in new acts (Mishna et al.. 2009). Traffickers often use peers. such as friends and boyfriends, to recruit new victims and glamorize the sex trade by describing it as a smart way to make money that also demonstrates an individual's worth (Reid. 2016). Older adults may acclimate to new caregivers and surroundings. readily responding to financial requests for help (Whitty. 2013). Among cults, involvement incrementally increases through engagement in activities like bible study. thus keeping victims unaware of their increased entrapment in the group (Singer & Lalich, 1995). Creating a Family-Like Bond Perpetrators also provide an alternative family connection for victims. Research on gangs suggests that youth perceive member- ship as an escape from their own dysfunctional families (Moore & Hagedorn, 2001). Victims of online sexual predation recount en- gaging in cybersex or meeting for sexual encounters as a way to engage with someone who would listen to them or as a distraction from trouble at home (Mishna et al.. 2009). 'The idea of perpetra- tors providing love and affection not found elsewhere has been found in research on sexual predation of youth (Olson et al.. 2007) and in trafficking (Reid. 2016). Gift Giving Romancing and gift giving is also used to lure victims during the grooming process. "Love bombing" refers to providing a victim with extreme attention and affection, or by offering a prize in exchange for an agreement by extremist groups (Hills. 2015). sexual predators (CiAttu., 1994). or traffickers (Reid. 2016). This form of targeting and control is also used in cases of exploitation of older adults, where a perpetrator will send a small gift such as flowers hoping that the victim will then send the requested money in return (Whitty. 2013). High-Pressure Tactics In some situations. high-pressure tactics may be used. such as in scams where victims are lured into paying money up front for goods or services, or for a prize to be released upon receipt of "customs duties" paid by the victim (Langenderfer & Shimp. 2001). In these instances the perpetrator skillfully focuses the victim's attention on the reward pushing aside any concerns raised by the victim (Langenderfer & Shimp. 2001). 3502-023 Page 2 of 11 EFIA_00001601 EFTA00156942 146 DURON, JOHNSON. HOGE. AND POSTMUS - Isolation Techniques Coupled with grooming tactics. isolation techniques are another signature approach involved in coercive behaviors to maintain power and control over victims. Isolation may occur in physical or mental forms and serves to keep victims away from social sup- ports. including family and friends (Baldwin. Fehrenbacher. & Eisenman. 2015). Physical Isolation Perpetrators act as gatekeepers who control incoming and out- going information. using isolation to limit victim communication with those who provide social support (Singer. 1992: Whitsctt & Kent. 2003). In cults or with older adults. isolation may involve taking control over the victim's social. physical. and/or online environment. including how they spend their time (Singer & Lalich. 1995: Whitsett & Kent. 2003: Whiny. 2013). Physical isolation may also include the geographical relocation of a victim to another place away from their support networks. as in cases of trafficking (Reid. 2016). Traffickers isolate youth by checking and controlling access to cell phones and social media. and by chang- ing phone numbers and passwords (Reid. 2016). Mental Isolation Mental isolation occurs when the perpetrator creates or enlarges a psychological and emotional separation between the victim and their support networks, so the perpetrator can then occupy that space (Olson et al.. 2007). In trafficking situations. women have described how their traffickers limited their exposure to the outside world: traffickers would call frequently as a way to monopolize their attention (Baldwin a al.. 2015). Cults may interfere with a victim's ability to accurately assess and react to their environment through control tactics such as the disparaging of members precult lives (Whitsett & Kent. 2003). Victims of elder abuse who arc highly stressed and held captive may be manipulated into believing in a false version of reality beyond their confines. leading them to form bonds with and become dependent on the perpetrator for fear of the outside world (Singer. 1992). Current literature reveals how perpetrators of various forms of abuse use multiple. often similar tactics to exert power and control over individuals. Questions remain as to which of these tactics arc commonly identified by professionals working with or on behalf of victims or perpetrators from a variety of settings to inform screen- ing efforts across a range of victimization types. This study ad- dresses this gap by examining how coercive control is experienced across types of abuse from adolescence to adulthood. Professionals working with or on behalf of victims often have exposure to multiple narratives of coercion. allowing for greater breadth of discovery in consideration of numerous types of victimization. Research Goal 1: To examine the perceptions of profession- als working with or on behalf of victims regarding how coercive control is applied across various types of victim experiences of abuse, control. and/or exploitation. Research Goal 2: To identify the perceptions of professionals working with or on behalf of victims regarding what common strategies are used to facilitate coercive control across various types of victim experiences of abuse. control. and/or exploitation. Method This qualitative study took a phenomenological approach (Cre- swell. 1998) based on data collected as part of a statewide initiative to understand predatory alienation—a new term created by an advocacy group to describe a person's extreme undue influence on. or coercive persuasion or psychologically damaging manipulation of another person that results in physical or emotional harm or the loss of financial assets. disrupts a fluent-child relationship. leads to a deceptive or exploitative rela- tionship. or isolates the person from family and friends. (New Jersey Senate Bill 2562: htips://legiscancom/Nlitext/S2562/20I6) The charge by the state was to understand common predatory• practices used to victimize individuals across the life span. The research team was composed of academic experts on child abuse. IPV. trafficking. and elder abuse who had familiarity with predatory practices particular to these subjects. All experts iden- tified as cisgender females between the ages of early 20s and late 505 and identified as White or Latina. Participants The research team used agency referrals and snowball sampling to identify professionals who represented a wide variety of human service and criminal justice positions with expertise in predatory• practices. A list of potential participants was created by the re- search team with suggestions from several state departments (e.g.. child welfare. human services) from the researchers home Mate. In addition to this list. at the conclusion of each interview. each professional was asked to provide the names of other passible participants. Within the United States. social service providers most com- monly work with one particular population (e.g.. victims of IPV') as opposed to victims of coercive control more broadly. As such. we determined that the inclusion of various professional roles would best facilitate the goal of achieving a comprehensive un- derstanding of the issue of predatory practices as it pertained to various victim types rather than specific professional role or type of victimization. Hence. criteria for participation included profes- sional engagement in issues of predatory victimization through advocacy or direct services (e.g.. human services. law enforce- ment. legal services). Professionals worked with a variety of victims including those experiencing child abuse. human traffick- ing. IPV. gang activity, elder abuse. and cultic influence. Although most professionals interacted with victims who had experienced some form of interpersonal abuse. others worked with or on behalf of individuals who had been isolated from family and friends through coercion. A few professionals. particularly those in law IPV professionals included in this study work with survivors of all types of abuse including physical. sexual. emotional. and financial, as well as stalking and dating violence. depending on what abuse experiences are presented by victims seeking services. Hence, the term IPV in this article includes all these types of abuse that are perpetrated in intimate relation- ships. 3502-023 Page 3 of 11 EFFA_00001602 EFTA00156943 PERSPECTIVES OF PROFESSIONALS ABOUT COERCIVE CONTROL 147 = enforcement. also worked with perpetrators of interpersonal abuse and coercion. Some professionals had experience researching is- sues of coercion in addition to engaging in advocacy efforts. The majority of professionals were over the age of 40 years (90.9%) and identified as White (86.4%). Slightly more than half of the sample was male (59.1%). and the majority held a master's degree or Ph.D.. law. or medical degree (72.7%). Slightly more than half of the sample worked in a role consistent with service providers (59.1%). whereas other participants worked in law en- forcement and legal services (40.9%). Service providers included direct service providers. expert consultants. and advocates. Law enforcement and legal services included professionals such as prosecutors. investigators. and lawyers serving in administrative roles. Most of the professionals worked in a nonspecific field with multiple populations (27.3%). but many also worked in the fields of trafficking and sexual abuse (22.7%). The majority of partici- pants had been in their current professional positions for an aver- age of 12.08 years (SD = 9.49). Data Collection The research team contacted 33 professionals via c-mail and invited them to participate in a one-time• in-depth interview on a date and at a location that was convenient for them. Of these, three declined to participate because of lack of agency permission or other reasons and eight did not respond. A total of 22 professionals participated in semistructured interviews between July and Sep- tember 2017. Interviews ranged from 21 to 118 min. with an average interview completed in 56 min. The final sample size was determined by evaluating the quality of information gathered (San- delowski. 1995). which included an evaluation of saturation of ideas and repeated descriptions (Benaux. 1981: Lincoln & Guba 1985). Saturation was defined in terms of the discovery and stability of codes, but also in terms of a full exploration of the meaning of such codes (Hennink. Kaiser. & Marconi. 2017). Interviews were conducted in person. via phone. or over a video conferencing service. The study protocol described here was ap- proved by the university's institutional review board. Two research team members attended each interview, with one facilitating the interview and the other taking detailed notes on a laptop. Each interview was also audio recorded. To protect confi- dentiality. each participant was assigned a numeric identifier. Interview notes referred to the participant by this unique identifier and did not include any information that could be used to identify the individual. Members of the research team debriefed following each interview and then transcribed the interviews using the audio recording and notes. To ensure that the research team accurately interpreted key themes expressed by the study participants (1Crefting. 1991). mem- ber checking interviews with five of the 22 professionals were completed to gather feedback on the findings and recommenda- tions. These five participants were selected because they each worked with a different population represented within the study. To ascertain feedback. a summary of study findings and a sum- mary of recommendations were separately presented to the partic- ipants, who were then asked to share their impressions with a member of the research team. Findings from the member checking process were used to expand upon study findings by aiding in the interpretation of themes. Interviems A semistructured interview guide was developed based on an in-depth literature review of predatory behaviors using terms in- cluding predatory alienation, coercive control. and undue influ- ence. The guide was reviewed by the team of researchers and assistants and edited for salience. comprehension, and clarity. The interview guide (see Appendix) covered the participant's under- standing of predatory• behaviors. professional role and experiences related to predatory victimization. identification of victims, risk factors, and common predatory tactics. Nine core areas of ques- tioning were pursued with follow-up prompts initiated as needed. Though the team used the term ••predatory alienation." most par- ticipants were unfamiliar with the term. Once defined. participants instead focused on predatory tactics used or experienced by their clients. As such. the research team also adjusted the questions to focus on generic predatory• practices instead of using the term "predatory alienation." The semistructured interview guide al- lowed the research team to study complex phenomena guided by theory. with the flexibility to elicit descriptive information about the lived experience of participants (GaRena. 2013). Data Analysis A directed content analysis approach was used to code interview transcripts. using NVivo to manage the data (Hsieh & Shannon. 2005: Vaismoradi. Tunmen. & Bondas. 2013). The directive ap- proach was deductively informed by sensitizing concepts drawn from the literature review. such as "isolation techniques" and "grooming tactics." that acted as an initial coding scheme for the coding process. Following preparation that included reading all transcripts, a member of the research team applied the initial coding scheme to participant responses by question. but also inductively identified new codes that allowed the codebook to be expanded and refined (Hsieh & Shannon. 2005). After completing the first level of analysis. the researcher compiled the codes that emerged into categories and subcategories. To enhance the rigor of the analysis. a second member of the research team then indepen- dently coded the interviews. Codes from this second level of analysis were also collapsed into categories and subcategories. The team members met to review and refine codes. coming to consen- sus about the codebook and then applied these codes to refine their analyses. Memos were written and discussed throughout the anal- ysis process to manage each researcher's views of the data, assist in structuring the content. and reconcile codes. The coders then compared categories and subcategories. discussing interpretations and refining these groupings into a joint consensus version (Patton. 2002). There were no significant discrepancies in codes and cat- egories. and differences that arose in coding were easily resolved. Member checking was then completed with a subsample of par- ticipants. such that each person represented the diversity of victim experiences including 1PV. human trafficking. gangs and youth violence, cults, and elder exploitation. Notes taken during member checking were analyzed by both coders and used to refine the descriptions of emergent themes. Findings Interviews with professionals revealed four primary strategics exemplifying a coercive control pattern of approach and tactics 3502-023 Page 4 of 11 EFIA_00001603 EFTA00156944 148 DURONJOHNSON. HOGE. AND POSTMUS commonly used by perpetrators across abuse types and victim ages to engage individuals in exploitative relationships. These strategies are as follows: (a) identifying potential victims. (b) infiltrating lives through grooming. (c) isolating to gain control. and (d) maintaining control through any means necessary. Within each theme. we describe strategies described by professionals that glob- ally apply across victims. Collectively, these strategies illuminate a process used by perpetrators to coercively gain and maintain control. The findings presented here identify commonalities reported consistently. regardless of victim type. As one professional re- flected. "I've worked in the domestic violence and sexual violence field for a long time and human trafficking. For everything we talk about the isolation of coercive control tactics. It's the same thing to me. It's what a perp does to control their victim." [human trafficking] If any distinctions in strategics were found by victim type. these arc also presented. Quotes have been ascribed to the participant's primary area of professional engagement. such as human trafficking. A range of quotes from professionals with mixed areas of victim expertise arc presented to demonstrate how commonalities were indicated across participants. Congruity in experiences described across the diversity of victimization types illustrates how coercive control applies to predatory interactions across a range of circumstances. Identifying Potential VIctims Professionals were asked to describe what makes individuals vulnerable to perpetrators. Participants indicated that some perpe- trators lure victims. whereas others target them. In this way. perpetration is a process that involves considering the potential for baiting someone and calculating the potential response to gain something. The "something" perpetrators want is oftentimes power and control over the individual: this leads the perpetrator to make demands. both of the person and their property. One participant described this motivation as "self-satisfaction out of being able to control someone else." [cults] Consistently. participants described perpetrators gain as having someone "do certain things you want them to do" [youth] including granting access to personal finances. fulfilling sexual demands. acting as a servant. or committing crimes like stealing goods or selling drugs. Professionals across the areas of expertise noted a common vulnerability for victimization. One participant shared. In each case the vulnerability is going to be different. But these guys do not pick on you because of your vulnerabilities. They exploit your vulnerabilities... the reason they target you is because of something that they want ... that you have. not something you do not have. The vulnerability in these cases is as much defined by what people do have as it is by their weaknesses ... and they're not selected because they are weak. {WV) Although global risk for perpetration exists. there are also elevated personal. interpersonal. or environmental vulnerabilities that make individuals susceptible to victimization. Professionals recounted stories of individuals who were exploited because of risk factors that included lack of family involvement or supportive systems. feelings of loneliness. social isolation, and limited options or resources. In many cases. participants indicated that the victims they served identified as female. Cultural factors. especially lan- guage differences and legal status. could also attract the interest of predators. Although anyone is susceptible to predatory behaviors. these risk factors increased the likelihood of exposure to and experience of victimization. One participant considered how youths' desire to be pan of something could be a hazard: Thai dynamic is wired into your psyche for your entire life. Just the playground changes ... So I think that these master manipulators. these predators key in on it. they know that some kids are mote susceptible to wanting to be ... Sonic kith their desire to belong to anything is greater ... some kids may have the tools necessary to resist. Maybe a strong family. strong religion. stronger set of friends and values so that they resist any type of lute. But there are other kids that have absolutely nothing so any group is better than no group. Any attention becomes better than no attention ... Igangst Although similar vulnerabilities exist across groups. there were also some variations based on age or developmental capacity. Older adults and adolescents arc often perceived to be trusting or gullible and easy to exploit. Older adults were described as having higher levels of dependency. lower levels of cognitive functioning. less mobility. or greater health issues. These vulnerabilities were identified for both elders in the community and those in institu- tional settings. However. one professional noted that community dwellers may face more social isolation making it "easier to disconnect them from other people." [IPV] Among adolescents and young adults, risks were also linked to greater exposure to social media gaming. the Internet. and phone technologies that heighten perpetrator access to these youths. Participants also re- ported that youths' lack of cognitive and emotional maturity or experiences of developmental delays could increase risks for vic- timization. Infiltrating Lives Through Grooming Professionals described how perpetrators carefully craft rela- tionships with victims by cultivating victim allegiance through psychological coercion. This process generally occurs over the course of weeks or months and is distinguished from single event crimes. At the core of the grooming process is gaining the victim's trust. often through fulfillment of the victim's needs and goals. These needs can be physical such as a need for money or food. relational such as a need for friendship. or aspirational such as the goal for advancement. The most common way perpetrators enact grooming is through "love bombing." Participants described this tactic as offering compliments, affection and gifts to a victim to make them feel special. One professional described this as "flat- tery. but to an excessive extent." [cults] For youth it may be serving as a "Romeo ... who will give them care and love ... Initially. they will give them clothes. food, a place to stay. get their nails done." [human trafficking] For older adults. perpetrators may run errands for them or complete tasks they cannot do themselves. He would biing her groceries, he would stop by and see her after work ... he would cut the lawn for her. He would do a lot of things that she needed to do that she couldn't do herself ... He started filling a lot of those gaps in her life. folder Muhl The gradual dependency that is established between victims and perpetrators helps perpetrators create new memories that disrupt victims' beliefs. One service provider explained. 3502-023 Page 5 of 11 EFIA_00001604 EFTA00156945 PERSPECTIVES OF PROFESSIONALS ABOUT COERCIVE CONTROL 149 ;d Te comnton one is to criticize or somehow upset or destroy the existing belief system or contacts ... by destroying a connection with the people you love. oftentimes by alienating someone horn their belief system. so that could be from their family or from their religious beliefs. spiritual beliefs. social beliefs, that son of thing. ... "well if you love me you'll stop doing that"... so it's the severing of ties ... the use of guilt ... [cults] Incremental escalation of exploitation is another technique used that desensitizes victims. A participant who worked with victims of cults referenced this as -the foot in the door technique"2 in sharing how victims may be swindled for more money after making a small charitable contribution that appeals to the victim's sense of compassion or "good- nature. In reference to gang activ- ity. another participant reflected. "There is always an escalation of violence. They start them out with small crimes like robbery. then selling drugs. and eventually shootings" [gangs] Professionals described the role of technology in grooming as a way of facilitating communication. Perpetrators use the Internet. chat rooms. social media and gaming platforms to find victims. particularly for trafficking and sexual abuse. Through virtual com- munication. the perpetrator becomes familiar with the victim and makes increasingly larger requests. These requests intensify as entrapment progresses until a victim is convinced to meet in person. The ability of perpetrators to maintain control over a victim. even in the absence of physical restraint. was discussed by some participants: "A lot of them ]victims) are 'compliant.' They are not really compliant because they don't have physical chains on them but there are psychological chains on them in order to maintain control and compliance from the victim." [human traf- ficking] Isolating to Gain Control As grooming occurs. professionals described how perpetrators begin to isolate victims from their support systems as a way of increasing dependency on the perpetrator. Isolation serves to en- trap the victim in the relationship. making it difficult for the victim to leave the perpetrator. These groups. in order to control that person. have to isolate ihem from everything and have to isolate them from everyone in order to have the focus on them. fruits] Isolation from friends and family is a tactic across the board... taking people out of the circle of individuals that would mmte say "hey this a red flag" or you know. do you need some support? 'human trafficking] Incrementally. perpetrators consume the victim's time with con- stant contact, either electronically or in person. Perpetrators begin to influence the places victims go by exerting strong opinions or demands about activities. encouraging exclusive time between the victim and perpetrator. and facilitating an expectation that the victim should seek permission from the perpetrator to engage in activities. In some situations, the perpetrator may encourage reli- ance of the victim on the perpetrator as the primary mode of transportation. As control becomes more pervasive. the perpetrator will restrict and monitor access to basic necessities. IAn outsider may notice that) there is usually the one person in then life that ... it menu dui they have control over their medications. their feeding, their grooming. their toileting. their physician's appoint- ments. and their money. [older adults] [This control becomes] regulation of everyday life. beginning to set rules and expectations. (IPV) Creating distance between victims and their social supports often includes restricting communication. particularly by limiting access to a mobile phone. In reference to an older adult who was victim- ized by a caretaker. one professional shared. "Slowly and slowly [sic] the phone calls stop coming into the house. They didn't really stop coming. they just hid the phone or turned off the ringer." [older adults] Preexisting limited social contact may accelerate a perpetrator's plans for severing ties to the victim's support systems to dominate the victim's life and promote dependency. Isolation as an essential dynamic in perpetration fosters control for whatever benefit the perpetrator desires. The point of isolation ... is to make you increasingly dependent to your own sense of reality. That also makes your own sense of self and self-esteem dependent on his approval ... So. isolation is not only universal. it's devastatingly important element ... but in itself its meaningless unless there's some other set of demands. IIPVI These are people who are using intentional techniques to influence the target ... sometimes to get their money or property for older people. for young people ii might he for purposes of controlling them for sex. work. or prostitution. (curb) As described by participants. perpetrator demands can include a variety of victimizing outcomes including assault, prostitution. trafficking. servitude. financial exploitation, gang activities. or cultic involvement. As isolation ensues. perpetrators will use mul- tiple tactics to establish and retain control. including the use of violence. Maintaining Control Through Any Means Necessary The height of perpetrator control is often exhibited through the gradual transferring of power from the victim to the perpetrator. frequently achieved without violence. although abuse and threats may be used as necessary to retain control. Several professionals described how control is overwhelmingly an achievement of dom- inance—over body. thoughts. and feelings. One participant stated. 'This coercive control has the cumulative effect of entrapment . .. Coercive control is control without physical boundaries. It crosses physical spaces" such that domination is achieved even when the victim is not within physical proximity of the perpetrator. [IPVJ Once they cross that line where the combination of trust. isolation. and subordination are achieved and may be met with fear and shame. victims feel "like there's a point of no return. they have no other options but to stay." [youth] One participant offered this explanation: The psychological effects we see are isolation. fear. not knowing where to turn for help. They do not want to he the victim so they may he [durum to report things. They do not want to be looked at as stupid or senile or losing it People are often depressed. 'older adults] 2 The -foot in the door technique" was coined by Freedman and Fraser 11966) to describe how individuals can be induced to engage in tasks they would rather not do. 3502-023 Page 6 of 11 EFIA_00001605 EFTA00156946 150 DURON. JOHNSON. HOGE. AND POSTMUS As victims contend with their situations. potentially questioning or resisting their circumstances. perpetrators implement a variety of devices that perpetuate fear and hopelessness. The mechanisms for asserting control for extended periods may include surveilling the victim's whereabouts and engagements. withholding things and information. threatening. and manipulating. One participant de- scribed some of these mechanisms: Physical isolation—milieu control. if someone controls the environ- ment they control the money. they control the contacts with outside people and friends, they'll criticize the shopping. criticize the way the laundry is done and folded—they become critical and they undermine the person's self-esteem. Undermining the relationship with others by criticizing, by finding fault ... they find the sore point. Typically. it's something that somebody has revealed to the person themselves. [cults] There may be strong messages "to accentuate the vulnerabilities of the person. They start telling people they aren't able to do something. you can't do this. you can't leave the house. it is very dangerous out there." [older adults] Messages of praise often follow degrading remarks as a way of demonstrating benevolence. Violence may be deemed necessary when victim submission waiv- ers and can include physical. sexual. and emotional abuse that "tends to be frequent but low level." (IPVJ This repertoire of tactics is confounding for a victim. One participant explains. A lot of people will not even define it as violence—pushing shoving. even strangling ... because it doesn't result in injury ... There's intimidation. There's {sic] threats against family. children ... What all coercive control is based on is the cost of noncompliance is greater than the can of compliance ... They have an exaggerated response to a minor infraction that has them walking on pins and needles ... Once he shows that level of rage. he doesn't have to exercise it again ... Treating you like a servant—basically commanding you to service... There's regulation of everyday life, setting rules and expectations ... Them are general practices of rewards and punishment ... They create dilemmas of my way a the highway ... They create a series of tests of loyalty ...That has the effect of isolating you and making you more dependent. IIPV] The various tactics are executed by perpetrators as they arc needed to keep individuals isolated from others and continue the entrapment. Some tactics may serve as a consequence for disobey- ing such as "the actual physical perpetration of violence if they did reach out to their support circle" [human trafficking] or "being shunned. for experiencing] unreasonable confinement." [older adults] Other tactics intensify the victim's fears by deliberate actions or lies that magnify the pressure to comply: ... they are quick to get them pregnant too. They are real quick because once you tie them with a baby ... they'll start telling the girl you know this baby is part of the gang now. Shethe belongs to the gang ... They threaten her and her baby's lives. They are too afraid to speak up. The police cannot otter them real safety. (gangs) Iles] very much emotional. sonic of die scams involve saying that a family n.ember is in jail or bun ... they are able to be convinced and create an urgency that something has to be done quickly. They capitalize on vulnerability in mental capacity. dementia. or forgetful- ness. 'older adults] Ultimately retaining control is often about "[using] a lot of emotion rather than an appeal to reason" (cults] so that there "doesn't always have to be physical abuse but the fear of being physically hurt it is more a psychological lactic." (WV] Coercive control uses tactics to reinforce submission such that "perpetrators may even threaten to leave, and that victim begins to fear being left alone, and they are caught in a web of dependency on their perpetrator: IIPV] Discussion Although coercive control is frequently discussed in the field of WV (Dutton & Goodman. 2005: Johnson. 2008: Stark. 2007). it is less often used to describe the dynamics of violence that occur across other types of abuse. The purpose of this study was to explore the experiences of professionals working with or on behalf of victims to identify the approach and common predatory tactics that are the sine qua non of coercive control across various forms of abuse. Although theories on grooming tactics exist. scholarship tends to silo this knowledge according to specific types of exploi- tation. Findings demonstrate that there is a common pattern of predatory strategies that transcend the nuanced experiences of particular victimization types. These common patterns are part of a broader framework of coercive control that includes (a) identifying potential victims. (b) infiltrating lives through grooming. (c) iso- lating to gain control. and (d) maintaining control through any means necessary. Taken together. these strategies illuminate a common process used by predators to gain and maintain control over their victims. As Stark and Hester (2019) noted. coercive control can be reconceptualized as "a strategy for establishing dominance across a spectrum of relationships" (p. 98). The term coercive control applied globally to describe the process whereby an individual is gradually exploited or victimized could aid in early identification of the problem. Notably. participants in this study suggested that as a first step in the victimization process. predators connect with potential tar- gets to assess the opportunity for exploitation. As pan of this initial selection. predators often recruit their victims deliberately based on a particular set of assets or attributes that they observe and find alluring. Essentially. victim selection involves perpetrators at- tempting to connect with individuals where the possibility of exerting influence to manipulate individuals choices and behav- iors exists. This is a unique finding. as most theories of coercive control discuss the mechanisms that predators use to gain and maintain power and control once they are already in a relationship with the victim. but not the initial contact. For example. Dutton and Goodman (2005) highlighted the means through which per- petrators prime their victims through coercion once a relationship has already been established. By understanding the recruitment processes used by predators. more targeted prevention efforts can be implemented. Further. participants identified several sociocul- tural vulnerabilities that reflect how characteristics such as ethnic- ity. gender. and poverty are associated with greater risk of victim- ization. In describing coercive control. Stark (2007) has long held that societal and cultural forces such as sexual inequality and discrimination are linked to the coercive control experience. Following an initial introduction between a predator and an individual. a gradual infiltration process unfolds using grooming strategies and isolation techniques to engage the individual in 3502-023 Page 7 of 11 EFIA_00001606 EFTA00156947 PERSPECTIVES OF PROFESSIONALS ABOUT COERCIVE CONTROL 151 developing trust and fostering a relationship. Grooming is a pred- atory tactic that is often discussed in the context of child sexual abuse (Gilgun. 1994: Olson ct al.. 2007) although it has been used to describe the process in which predators establish trust with their victims in other violent contexts (Binetti. 2015: Roe-Sepowitz. Hicklc, Dahlstedt. & Gallagher. 2014). Participants discussed grooming as a coercive process used by offenders to incrementally establish control by using strategies such as gift giving or love bombing (GiIsm.. 1994: Hills. 2015: Reid. 2016). fostering a family connection (Moore & Hagedom. 2001: Mishna ct al.. 2009: Whitty. 2013). and incremental escalation (Olson et al.. 2007: Singer & Lalich, 1995). Although establishing trust (Mishna ct al.. 2009: Olson et al.. 2007: Reid. 2016) also emerged as a key element in the coercion process, participants discussed building trust in the context of fostering dependency. Other mechanisms used to foster this dependency that were highlighted less fre- quently in the literature were reframing experiences and the vic- tims understanding of self. as well as appealing to emotion and serving as a savior. Collectively this list illustrates that predators have a toolkit of manipulative tactics that they use as they strive to gain victims' confidence and incrementally entrap them. These tactics transcend victimization type: predators tailor their groom- ing strategies to the unique vulnerabilities of their victims. Consistent with previous scholarship on physical and mental isolation (Baldwin a al.. 2015: Singer. 1992: Whitsett & Kent. 2003). participants discussed techniques used by predators to maintain control of victims by consuming their time and space (Singer & Lalich. 1995: Stark, 2007: Whitsett & Kent. 2003). Perpetrators dominate all aspects of victims' lives by constantly exerting their presence and slowly reducing contact with others. The disconnection between victims and essential sources of sup- port allows perpetrators to enforce a state of complete reliance of victims on perpetrators. Further. this confinement in physical and emotional being for victims lends itself to the development of confusion. fear. and doubt about the circumstances experienced. essentially altering victims' sense of self (Stark. 2007). Isolation allows perpetrators to escalate dependency and main- tain control. Participants in this study identified ways in which perpetrators maintained control of their victims through the use of entrapment. abuse. and threats. Although there was some overlap between these and the compliance-inducing coercion strategies identified by Biderman (1957. as cited in Baldwin et al.. 2015) such as degradation and threats, participants discussed threats in a more nuanced way by making distinctions in the types of threats made (i.e., threats to self vs. threats to family or threats via authority). Participants also discussed predators' use of high- pressure tactics, which sometimes involved generating a sense of urgency in a situation to elicit an immediate response from a victim. In this sense. the high-pressure tactics discussed by pro- fessionals were different in nature than those discussed by Lan- genderfer and Shimp (2001). which focused specifically on finan- cial exploitation. Taken together. these grooming and isolation strategies allow predators to gain control over their victims. The term psycholog- ical chains was used by one participant to describe how varied coercive control tactics, such as grooming and isolation. entrap victims. Stark (2007) used the term invisible cage to describe this phenomenon. Once predators succeed in gaining control over their victims, they will use any means necessary to maintain it. Coercive control may be used in the absence of violence, along with vio- lence. or as a precursor for later acts of violence (Johnson. 2008). In some instances. nonviolent coercive control strategies are suf- ficient for maintaining victim submission (Johnson. 2008: Stark & Hester. 2019). However, predators may use threats of or actual physical or sexual violence. or other tactics, to incite fear and ensure submission. particularly if victim compliance begins to waiver. These tactics may also escalate in nature over time and become more frequent. violent. or fear inducing. Limitations Although this study provided unique insight into how predators use coercive control tactics to maintain power across victimization types. there are several limitations that should be considered dur- ing interpretation. This study was exploratory, requiring further research to validate the findings. Because purposive sampling within one state was used. these themes may not generalize to other populations and circumstances. Although this study explores predatory practices. the information collected reflects the opinions of professionals in human service and criminal justice and not victims or perpetrators themselves. Additionally. though this study covers diversity in ages. settings. and abuse types. the literature and the data from professionals did not specifically consider the role that culture plays in coercive control. Finally, participants did not distinguish between the different types of abuse (i.e.. physical. sexual, emotional. financial. stalking. or dating) under the IPV lens. Research Implications Future research should be expanded to include victims' experi- ences of and perpetrator's use of coercive control tactics. Research is needed to explore the similarities and differences for how coercive control is experienced by different cultures based on ethnicity. country of origin. gender. socioeconomic status. sexual orientation and identity, and disabilities. Although this research focused on commonly used tactics. we recognize that both wide- ranging and targeted tactics may be used to exert coercive control. Identifying the tactics commonly used to achieve coercive control can facilitate more expansive screenings by professionals that may also include screenings for specialized tactics or experiences ac- cording to the larger diversity of victimization. Future research should focus on the development and validation of a universal screening tool. which could be used by professionals to initially assess a range of common predatory tactics implemented accord- ing to a coercive control framework. Furthermore. additional re- search related to common tactics used across victimization types and research examining how the coercive control theory fits var- ious situations would help to establish the concept of coercive control as a broader framework for using isolation and control to exploit an individual. Clinical and Policy implications The language of coercive control (Stark. 2007) allows for broad recognition of the limitations of freedom that arc pursued by perpetrators as they exert a self-claimed authority to victimize individuals. Viewing each phase of the predation process as part of 3502-023 Page 8 of 11 EFTA_00001607 EFTA00156948 152 DURON, JOHNSON. HOGE. AND POSTMUS 3 7 the coercive control framework has implications for practice. The use of a coercive control framework can lead to improvements in the ways in which potential victims and predators are screened and identified. Currently. a range of screening tools exist to assist with identifying signs of child abuse (Zolotor et al.. 2009). IPV (Rabin. Jennings, Campbell. & Bair-Merritt. 2009). human trafficking (Bespalova. Morgan. & Coverdale. 2016). and elder abuse (Ful- mer. Guadagno. Bitondo Dyer. & Connolly. 2004). Additionally. there arc a number of risk assessment instruments designed to predict future violence or recidivism: however. similar to screen- ing tools. risk assessments tend to be specific to a particular type of victimization or perpetration. and the predictive validity of such instruments varies (Campbell. French. & Gendreau. 2009: Singh. Grann. & Faze'. 2011: Yang. Wong. & Coid, 2010). Although there is value in the specificity of such tools for professionals whose aim is to identify particular types of victims, they may be impractical for professionals working in settings where several types of victims and polyvictimization are encountered. such as emergency rooms. doctors offices. clinics. educational settings. and law enforcement agencies. It would be cumbersome to imple- ment multiple screening tools and yet using just one may result in failure to identify other types of abuse beyond what is being screened and assessed. Given these challenges. professionals gen- erally only screen for one risk area at a time. As study findings suggest. predatory behaviors unfold through a series of stages that can vary widely from one victim to another. Therefore. it is possible that individuals seeking services may perceive their situations differently depending on their stage of predatory engagement and the degree of coercive control tactics used by perpetrators. In the grooming stage. for example. a victim may not yet fear their abuser, despite the fact that predatory behaviors and red flags exist. Alternatively. victims who feel entrapped in their relationships may hesitate to disclose abuse out of fear of repercussions. Further. although there is a recognized need for professionals to collaborate as part of service provisions. organizations are often divided by type of victimization. despite the fact that many indi- viduals experience victimization of several types. For example. a victim in a human trafficking situation may also view her trafficker as an intimate partner. Thus, there may be value in the implemen- tation of a cross-systems approach in which professionals work across victimization type to address victims' experiences with predatory tactics. Often a barrier to this type of collaboration is that the professionals in each system use their own language and framework to describe victimization. This makes it difficult for professionals to communicate across systems. By using coercive control as the framework for understanding victimization across types and through the implementation of universal screening, professionals will be better able to communicate about victims' experiences and needs. Use of a common term and screening effort for coercive control in combination with specific terms and screening efforts for par- ticular types of abuse likes IPV broaden the possibilities for earlier detection. Analogous to the generalist practice of completing an annual physical. a universal concept for the exploitation process with screening for such exposures could detect symptoms indica- tive of a bigger problem. This specific problem could then be further investigated by a specialist who explores the complexities of an individual's ordeal to prescribe an appropriate course of treatment. Universal screening procedures. aside from a formal screening measure. might include such questions as - Within the last year have you had any encounters with an individual who has gained your trust or developed a closer relationship to you by meeting your most pressing needs. giving you gifts. or comple- menting you? Have you experienced feelings of being alone or separated from friends or family members? Have you had to check in regularly. been pushed by, pressured to engage in sexual activ- ity. given money to. or done things for this person that you feel unsure about?' Questions such as these recognize the process revealed in this study's findings. which suggest that an individual may have a new person in their lives or a known person with a closer relationship who uses grooming tactics to gain trust and isolate the individual to achieve control that is maintained through a variety of strategies. Examining predation from the framework of coercive control can potentially help to destigmatize victimization. Although services often require a victim to identify with a panic- ular form of victimization (e.g.. human trafficking). using the standardized language of a coercive control framework may ini- tially allow victims to focus on the particular predatory tactics they experienced. A primary finding of this study was that predators use common tactics to maintain control of their victims. Although there are certain risk factors that may make an individual vulnerable to predation. professionals working with or on behalf of victims also emphasized that victimization is not a sign of individual weakness. In 2015. coercive controlling behaviors within an intimate or family relationship were made a criminal offense in England and Wales (Wiener. 2017). The recognition of coercive control as a criminal behavior validates the experiences of victims enduring these predatory practices and normalizes discussions around abu- sive behaviors beyond physical violence (Stark. 2018). The imple- mentation of such a policy is not without challenges. It requires law enforcement to have a strong understanding of how to recog- nize coercive control within abusive relationships and use the criminal charge to build a case (Stark. 2018). However. the enact- ment of such a policy represents a broader shift of our understand- ing of coercive control from a behavioral tactic to a criminal behavior and perhaps can serve as a first step toward the devel- opment of broader policies that focus on the coercive control process. References Baldwin. S. B.. Fehrenbaclier, A. E. & Eisrnman. D. P. (2015). Psycho- logical coercion in human trafficking. Qualitative Health Research. 25. 1171-1181. http://th.doroggflO.I ONI0497323I4157087 Etenaux, D. (1981). From the bfe-history approach to the transformation of sociological practice. In D. Bettaux (Ed.). Biography and SOCiety: The life history approach in she social sciences (pp. 29 -45). London. United Kingdom: Sage. Bespalova. N.. hforgan. J.. & Covenble. I. (2.0l6). A pathway to freedom: An evaluation of screening tools for the identification of trafficking victims. Academic Psychiatry. 40. 124-128. hultlfdx.doi.otg/I0.1007f Binetti. A. (200). A new frontier: Human trafficking and ISIS': recntit. merit of women from the west. Washington. DC: Georgetown Institute for Women. Peace and Security. Campbell. M. A.. French. S.. & Gendreau. P. (2.009). The prediction of violence in adult offenders: A meta-analytic comparison of instrunients 3502-023 Page 9 of 11 EF1A_00001608 EFTA00156949 PERSPECTIVES OF PROFESSIONALS ABOUT COERCIVE CONTROL 153 and methods of assessment Criminal Justice and Behavior. 36. 567- 590. lutp://dx.doe.oeg/10.1177/0093854809333610 Creswell. J. W. (1998). Qualitative inanity and research design: Choosing wrong fire traditions. Thousand Oaks. CA: SAGE Publications. Inc. Dutton. M. A.. & Goodman. L. A. (2005). Coercion an intimate partner violence: Toward a new conceptualisation. Sea Roles. 52. 743-756. lutp://dx.doircg/10.1007/s11199-005-4196-6 Freednun. J. L.. & Fraser. S. C. (1966). Compliance without pressure: The footanthe-don technique. Journal of Persorwlity and Social Psycho!. ogy. 4. 195-202. littp://dx.dot.oeg/10.1037/h0023552 Fulmer. T.. Guadagno. L. Bitondo Dyer. C.. & Connolly. M. T. (2004). Progress in elder abuse screening and assessment instruments. Journal of the American Geriatrics Society. .5Z 297-304. hup://dx.dolotg/10.1111/ 3.1532.5415.20M.52074.x Catlett.. A. (2013). Mastering the semi .strurtured interview and beyond: From research design toanalysis and publication. New York. NY: NYU Press. lutp://dx.doi.org/10.18574Thyuf9780814732939.001.0001 Gilpin. J. F. (1994). Avengers. conquerors- playmates. and lovers: Roles played by child sexual abuse perpetrators. Families in Society. 75. 467-480. hup://dx.doi.ofg/10.1177/104438949407500801 Hamberger. L K.. Larsen. S. E.. & Lehner. A. (2017). Coercive control in intimate partner violence. Aggression and Violent Behavior. 37. Imp://dx.iknotg/10.1016/j.avb.2017.0%.003 Hennink, M. NI.. Kaiser. B. N.. & Marconi. V. C. (2017). Code saturation versus meaning saturation: How many interviews ate enough? Qualita. five Health Research. 27. 591-608. hup://dx.dotorg/10.11771 1049712316665344 Hills. C. (2015. January). Here's what ISIS recruiters and sexual predators have in common. The World. Retrieved from hups://www.pri.otestosies/ 2015 -01 14/het es-w ha t-isis ecr uite is-and-sex ual-preda tots-have - common Hsieh. H. F.. & Shannon. S. E. (2005). Thee approaches to qualitative content analysis. Qualitative Health Research. 15. 1277-1288. Istipl/dx .doi.ots/10.1177/1049732305276687 Johnson. M. P. (2008). A (apology of domestic violence: Intimate terrorism violent resistance and situational couple violence. Lebanon. NH: North- eastern University Press. Krefting. L (1991). Rigor in qualitative research: The assessment of trustworthiness. The American Journal of Occupational Therapy. 45. 214-222. hupd/dx.doi.org/10.5014/a)o[45.3.214 Lusgendeffer. J.. & Stump. T. A. (2001). Consumer vulnerability to scams. swindles, and fraud: A new theory of visceral influences on persuasion. Psychology and Marketing. 18. 763-781. hupd/dx.doi.otg/10.1002/mat .1029 Lincoln. Y. S.. & Guba, E. G. (1985). Naturalistic inquiry. Beverly Hills. CA: Sage. htpl/dx.doi.org/10.1016/0147-1767(85p(pti2.8 Mishna. F.. hIcLuckie. A.. & Saini. M. (2009). Real-world dangers an an online reality: A qualitative study examining online relationships and cyber abuse. Social Work Research. 33. 107-118. hupd/dx.doi.ots/10 .1093/swi/33.2.107 Moose. J. W.. & Hagedorn. J. (2001f. Female gangs: A fixity on research. Washington. DC: U. S. Department of Justice. Office of Justice PIO. grants. Office of Juvenile Justice and Delinquency Prevention. Olson. L N.. Daggs. J. L. EllevoltL B. L.. & Rogers. T. K. K. (2007). Entrapping die innocent: Toward a theory of child sexual predators' luring communication. Communication Theory. 17. 231-251. http://dx .doi.ot8/10.1I11/37468-2885.2007.00294.4. Patton, M. Q. (2002). Qualitative research and evaluation methods (3rd ed.). Thousand Oaks. CA: Sage. Rabin. R. F.. Jennings. J. M.. Campbell. J. C.. & Bair-Aferritt. M. H. (2009). Intimate partner violence screening tools: A systematic review. American Journal of Preventive Medicine. 36. 439-445. e4. lutp://d. aloiorg/10.1016flonfiryn.2009.01.024 Roe-Sepantz. D. E.. tackle. K. E.. Daldstedt. J.. & Gallagher.1. (2014). Victim or whole: The similarities and differences between victim's experiences of domestic violence and sex trafficking. Journal of Human Behavior in the Social Environment. 24. 881-898. Read. J. A. (2016). Entrapment and enmeshment schemes used by sex traffickers. Sento, Abuse. 28. 491-511. lutp://dx.dotorg/10.1177/ 1079061214544334 Sandelowski. M. (1995). Sample size in qualitative research. Research in Nursing and Health. 18. 179-183. hup://dx.sloi.org/10.1002./nur .4770180211 Singer. M.. & Lalrch. J. (1995). Cults in our midst. San Francisco. CA: Jossey-Bass. Singer. M. T. (1992). Undue influence and written documents: Psycholog- ical aspects. Journal of Questioned Document Fulmination. 1. 2-11. Singh. J. P.. Grant M.. & Fazel. S. (2011). A comparative study of violence risk assessment tools: A systematic review and nvetategrcssion analysis of 68 studies involving 25.980 participants. Clinical Psychologv Review. 3/. 499-513. littp://dx.doi.oeg/10.1016/j.cpt.2010.11.009 Stark. E. (2007). Coercive control: How men entrap women in personal life. New York. NY: Oxford University Press. Stark. E. (2018). Coercive control as a framework foe responding to male partner abuse in the U.K.: Opportunities and challenges. In N. Lombard (Ed.). The Routledge handbook of gender and violence (pp. 15-27). London. United Kingdom: Routledge. hup://dx.doLotg/10.4124/ 9781315612997-2 Static. E.. & Hester. M. (2019). Coercive control: Update and review. Violence Against Women. 15. 81-104. hup://dxsloi.org/10.1177/ 1077801218816191 Vaismoradi. M.. 'Innen. H.. & Hondas. T. (2013). Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing and Health Sciences. 15. 198-405. http://dx.doLorg/10 .1111/nhs. 12048 Whitsett D.. & Kent. S. (2001). Cults and families. Families in Society•. 84. 491-502. hupd/dx.doiotg/10.1606/1044-3894.147 Whiny. M. T. (2013). The scammers persuasive techniques model: Devel- opment of a stage model to explain the online dating romance scam. British Journal of Criminology. 53. 665-684. httpd/dx.doi.ots/10.1093/ hie/n[009 Wiener. C. (2017). Seeing what is 'invisible in plain sight: Policing coercive control. Howard Journal of Criminal Justice. 56. 500-515. hup://dx.dolotg/10.1111/hojo.12227 Yang. M.. Wong. S. C. P.. & Coid. J. (2010). The efficacy of violence prediction: A meta-analytic comparison of nine tisk assessment tools. Psychological Bulletin. 136. 740-767. hup://dx.doi.org/10.1037/ a0020473 2olotor. A. J.. Runyan. IX IC. Dunne. M. P.. Jain. D.. Mtn. H. Ft.. Ramirez. C.. . . . Ineva. 0. (2009). ISPCAN Child Abuse Screening Tool Children's Version (ICAST-C): Instrument development and multi-national pilot testing. Child Abuse and Neglect. 33. 813-841. hup://dx.doi.org/10.1016/).chiabu.20C)999.004 (Appendix follows) 3502-023 Page 10 of 11 EFTA_00001609 EFTA00156950 154 DURON. JOHNSON. HOGE. AND POSTMUS 1. What is your understanding of predatory alienation? a. How do you define the term predatory alienation? b. How is this term similar to other terms you may use that describe the same phenomena? (this establishes the term used by interviewee for predatory tactics) c. How have you seen this in your work? d. How long have you worked with or on behalf of victims of (term used by interviewee)? 2. How long have you worked with or on behalf of victims? Years or Months 3. Have you received any specialized training for working with victims of (predatory alienationAerrn used by interviewee)? a. How long was this training? b. Who conducted the training? c. What was the content of the training? d. Did you find it helpful? 4. How do you recognize a victim or perpetrator of (predatory alienation/term used by interviewee)? a. Are there specific predatory patterns and common tactics among perpetrators? b. Are there certain risk factors among victims? 5. What is the nature of your work with victims of (predatory alienation/term used by interviewee)? a. Do you provide advocacy? If so. how? b. Do you assist with the investigation? If so. how? c. Do you provide representation (legal or other)? If so. how? 6. How is a victim of (predatory alienation/term used by inter- viewee) identified among your clients? Appendix Interview Guide a. Arc they referred to you? If yes. how? b. What are some barriers to identifying clients? c. How would you improve identification? d. Is there a specific screening process? If yes. what does the process look like? 7. How do online predators. human traffickers, con mists. gangs. cults, and other groups use (predatory alienationAerm used by interviewee) to isolate young adults and senior citi- zens? a. What arc the grooming practices used to target and control young adults and senior citizens? b. What are the high-pressure tactics used in scams and exploitative relationships to manipulate. control, and take advantage of senior citizens? 8. What makes young adults and senior citizens particularly vulnerable (predatory alienation/term used by interviewee)? a. How can young adults and senior citizens protect them- selves? 9. Do you have other feedback to provide about the investiga- tion or advocacy provided to victims of (predatory alienation/ term used by interviewee)? a. What arc the challenges with the current policy and pro- cess? b. What am the strengths of the current policy and process? c. Do you have any specific recommendations for improving service provision for victims? Received July 29. 2019 Revision received July 27. 2020 Accepted August II. 2020 ■ E-Mail Notification of Your Latest Issue Online! Would you like to know when the next issue of your favorite APA journal will be available online? This service is now available to you. Sign up at https://my.apa.org/ponaUalens/ and you will be notified by e-mail when issues of interest to you become available! 3502-023 Page 1 I of 11 EFTA_00001610 EFTA00156951

Related Documents (6)

OtherUnknown

From: '

From: ' To: " Subject: Re: [EXTERNAL EMAIL] - FBI Daily News Briefing - July 31, 2023 Date: Mon, 31 Jul 2023 16:57:36 +0000 Importance: Normal Hello Can I request to add my ASACs to this distro list? From: FBI News Briefing Sent: Monday, July 31, 2023 6:15:04 AM To: FBINewsBriefing < Subject: [EXTERNAL EMAIL] - FBI Daily News Briefing - July 31, 2023 View In Browser P,Federal Bureau of Investigation - Seal July 31, 2023 Federal Bureau of Investigation Daily News Briefing (In coordination with the Office of Public Affairs) Email Public Affairs to subscribe to the Daily News Briefing. Mobile version and archive available here. Table of Contents IN THE NEWS • Suicide Bomber at Political Rally in Northwest Pakistan Kills at Least 44 People, Wounds Nearly 200 • Russia Says Two Drones Hit Buildings in Moscow in Latest Wave of Attacks • West African Leaders Threaten Force Against Niger Plotters • U.S. Nurse, Child Abducted in Haiti, Non-Profit Organization Says • How N

27p
OtherUnknown

From: Chris DiIorio

From: Chris DiIorio To: Subject: Fw: Formal appeal for covered action 2015-016/ Knight Capital TCR & Appendix Date: Tue, 17 Aug 2021 02:55:02 +0000 Attachments: KCG_Appendix_3-20_13_penultimate.docx; KCG_TCR_3-20-13-penultimate_draft.pdf; KCG_TCR_3-20-13-penultimate_draft.docx; KCG_Appendix_3-20_13_penultimate.pdf; kcglq2015.pdf; IMDS2012shareincrease.pdf; IMDS2013authshareinc.pdf; IMDS2014offering.pdf; IMDSShareincrease2017.pdf; IMDSshareincJune282018.pdf; IMDSdecauthorizedJuly122018.pdf SDNY,NY Supreme Court, NJ Judges et al IRREFUTABLE proof of SEC criminal Obstruction and corruption IMDS Florida SoS page ALL of the links have been expunged Detail by Entity Name (sunbiz.org) EFTA00069571 Good thing I have electronic versions: see attached 2012 share increase from 4,000,000,000 to 10,000,000,000 2013 share increase from 10,000,000,000 to 20,000,000,000 2014 Series M with Viable 2017 share increase from 20,000,000,000 to 30,000,000,000 June 2018 share increase 30,

145p
OtherUnknown

FRENCH REPUBLIC

FRENCH REPUBLIC MINISTRY OF JUSTICE APPEAL COURT OF PARIS PUBLIC PROSECUTOR'S OFFICE OF PARIS COURT OF JUSTICE Paris, July 8, 2020 DIVISION Section P4 - Public Prosecution Service for Minors. The Public Prosecutor To Prosecutor-General at the Appeal Court of Paris. SUBJECT: Request for international legal assistance in criminal matter addressed to the United States authorities concerning the investigation related to Jean-Luc BRUNEI., and others, in connection with the "EPSTEIN case". N/REF : prosecution number : 19 235 449 V/REF : APPLICANT AUTHORITY The Public Prosecutor at the Paris Court of Justice. AUTHORITY ADDRESSED TO The competent authorities of the United States of America. Having regard to the accord between the European Union and the United States of America dated June 25, 2003 which entered into force on February 1, 2010 ; Having regard to the Article 14 of the Treaty on Mutual Legal Assistance between France and the United States dated December 10,

7p
OtherUnknown

AO 93 (Rev. 5/85) Search Warrant

AO 93 (Rev. 5/85) Search Warrant United States District Court SOUTHERN DISTRICT OF In the Matter of the Search of (Name, address or brief description of property Of premises to be searched) One PNY Technologies 128 Megabyte CompactFlash memory card, marked THNCF128MMAITOOCB) 999223 TAIWAN 0247 in the custody of the Federal Bureau of Investigation TO: Ej States: FLORIDA SEARCH WARRANT CASE NUMBER 08 8068-LRJ FEDERAL BUREAU OF INVESTIGATION , and any Authorized Officer of the United Af I idavit(s) having been made before me by E. believe that who has reason to Affiant r] on the person of or [Xi on the premises known as insole, description and/or locahon) One PNY Technologies 128 Megabyte CompactFlash memory card, marked THNCF128MMAITOOCB) 999223 TAIWAN 0247 in the custody of the Federal Bureau of Investigation, 505 S. Flagler Drive, Suite 500, West Palm Beach, Florida in the SOUTHERN District of concealed a certain person or property, namely Idescobo ine pers

19p
OtherUnknown

j782epsC kjc

j782epsC kjc UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK x 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 UNITED STATES OF AMERICA, v. JEFFREY EPSTEIN, Defendant. Before: x New York, N.Y. 19 Cr. 490(RMB) Conference July 8, 2019 1:20 p.m. HON. HENRY B. PITMAN, APPEARANCES GEOFFREY S. BERMAN United States Attorney for the Southern District of New York BY: Assistant United States Attorneys STEPTOE & JOHNSON, LLP Attorneys for Defendant BY: REID H. WEINGARTEN MARTIN G. WEINBERG Attorney for Defendant MARC FERNICH Attorney for Defendant Also Present: Special Agent Detective FBI , NYPD Magistrate Judge SOUTHERN DISTRICT REPORTERS, P.C. EFTA00079704 j782epsC kjc 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 (Case called) THE DEPUTY CLERK: Counsel, please state your name for the record. MR. : Good afternoon, your Honor. For the government, , and With us are Special

24p
OtherUnknown

LAW of riccs Of

LAW of riccs Of GERALD B. LEpcouErr, P.C. A PROFESSIONAL CORPORATION 148 EAST 78" STREET NEW YORK, NEW YORK 10021 GERALD B. LEFCOURT lefccitul@letcourtlaw corn SHERYL E. REICH NideilkOuNsw.com RENATO C. STABILE stablefcaurlaw.com FAITH A. FRIEDMAN flriolmsnalccostlawcom BY FEDERAL EXPRESS July 6, 2007 Jeffrey Sloman, Esq., First Assistant United States Attorney Matthew Menchel, Esq., Chief, Criminal Division The United States Attorney's Office Southern District of Florida 99 NE 4'h Street Miami, Florida 33132 Andrew Lourie, Deputy Chief, Northern Region A. Marie Villafafia, Assistant United States Attorney The United States Attorney's Office Southern District of Florida 500 South Australian Avenue, Suite 400 West Palm Beach, Florida 33401 Jeffrey Epstein Dear Messrs. Sloman, Menchel and Lourie and Ms. Villafafia: TELEPHONE (alai 737-0400 FACSIMILE 1212)124384192 We write as counsel to Jeffrey Epstein to follow-up on our meeting on June 26, 2007. We tho

23p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.