📄 Extracted Text (10,434 words)
Psychology of Violence
Xe0 Anima, rldsawrica to.cuni,
•15514:2131mes 2011. eq. N. No. 2. tar- iSi
narmit.ongturinnumucoNom
Observing Coercive Control Beyond Intimate Partner Violence: Examining
the Perceptions of Professionals About Common Tactics Used in
Victimization
Jacquelynn F. Duran Laura Johnson
Rutgers. The State University of New Jersey Temple University
Gretchen L. Hoge Judy L. Postrnus
Lewis University University of Maryland
Objective: Coercive control has traditionally been used as a concept to describe the coercive strategies
used by perpetrators in intimate partner violence (IPV). Yet. these strategies we often experienced across
a wide range of victimizations including child abuse. trafficking. IPV. sexual violence, and elder abuse.
Professionals working with victims and/or perpetrators of coercive control are uniquely positioned to
describe how they have observed coercive control in their clients, allowing for an examination of
commonalities across vicUmszation types. This study explored the perceptions of professionals who
identified common tactics used by perpetrators to isolate. groom. and control individuals—Wel/rot Key
stakeholders (N 22) with expertise working with perpetrators and victims of child abuse, elder abuse,
WV. human trafficking. and gang or colt recruitment completed semistruchned interviews to discuss their
perspectives of predatory tactics. Raabe: Using a directed content analysis procedure. emergent themes
revealed that perpetrators engage individuals in exploitative relationships by (a) identifying potential
victims. (b) infiltrating lives through grooming. lc) isolating to gain control. and (d) maintaining control
through any meatus necessary. Conclusions: Although nuanced victimization experiences exist. profes-
sionals working with perpetrators andfor victims of abuse describe a common pattern of predatory
strategies implemented by perpetrators that transcends rt.:limit:anon type. Applying the language of
coercive control to these tactics broadens the recognition of instances when an individual's personal
freedoms are limited by another individual's exertion of control.
4: a Kmscerds: coercive control. predatory tactics. vicumszation. professionals. interviews
The concept of coercive control (Stark. 2007) was initially theory for understanding intimate partner violence (IPV: Ham-
developed to explain the dynamics of violence used by perpetra- herger. Larsen. & Lchrner. 2017). However, victims of child
tors against their intimate partners and has long been a primary abuse. sexual violence, elder abuse, and trafficking are all subject
to the same type of coercive control tactics (Lc., grooming and
isolation) that draw and trap them in relationships with their
perpetrators and alienate them from their support systems. Even
This article was published Online First October IS. 2020. gangs and cults recruit members using similar coercive practices.
O' lacquelynn E l)uron. School of Social Work. Roger. The Stale Uni- This article seeks to expand the concept of coercive control from
sasity of New Jersey; 0 Laura Johnson. School of Social Work. Temple a singular focus on IPV to a broader one based on the use of
University; 0 Cketchen I.. Hoge. Department of Social Work. Lewis Uni-
coercive control tactics that, at the most general level. could
venaty: Judy L. PC611111.n. SeFICOI of Social Work, University of Maryland.
improve identification across various types of victimization.
The authors would like to acknowledge the support of Karen Zurlo who
served as an expert consultant on older adults and Delaney Cronin who Hence. the purpose of this study was to explore the perspectives of
helped to coordinate this project and write the organiational report. This professionals working with or on behalf of victims to derive a
research received funding from the Department of Children and Families framework of commonly used victimization tactics.
and Department of Human Services. Stale of New Jersey. under Contract
I7AAMA with Rutgers University. The points of view shared in this
document are those of the authors and do not necessarily represent the Theory of Coercive Control
official position or policies of the Department of Children and Families or
Coercive control theory draws parallels between psychological
the Department of Human Services.
Correspondence concerning this article should be addressed to Jacque- coercion techniques and the tactics used by perpetrators of abuse in
lynn F. Duran. School of Social Work. Rutgers. The State University of intimate relationships to entrap victims. particularly women (Stark.
New Jersey. 390 George Street. Suite 713. New Brunswick. Nl 08901. 2007). Stark described how coercive control is founded on gender
E-mail: jduroneissw.rulgasedu inequality and the devaluation of women that targets the victim's
144
3502-023
Page 1 of 11
EFIA_00001600
EFTA00156941
PERSPECTIVES OF PROFESSIONALS ABOUT COERCIVE CONTROL 145
sense of agency and results in a loss of freedom through domina- (Mishna. McLuckie. & Saini, 2009). and financial scams and
tion by the perpetrator. More recently. the adaptation of coercive exploitation of older adults (Langenderfer & Shimp. 2001). Traf-
control in criminal law in England and Scotland has demonstrated fickers also rely on the development of trust. doing so by helping
the applicability of this framework for victims who experience victimized youth and young adults in ways they need. such as by
these patterns of behavior perpetrated by family members or providing shelter. food. clothing, money. personal items, or trans-
intimate partners, regardless of gender or sexual orientation (Stark portation (Reid 2016).
& Hester. 2019). Perpetrators use tactics such as physical or sexual
violence. intimidation, isolation. and undue influence to suppress Desensitizing the Victim
an individual's freedom (Static. 2007). Perpetrators also use
grooming tactics by promising to end the abuse. seeking help for Another key tactic in the grooming of victims involves desen-
problematic behaviors. or offering gifts. Perpetrators physically sitization through gradual. incremental exposure to abuse or ex-
and emotionally isolate victims from supportive networks of ploitation that limits victims' feelings of distress as the frequency
friends, family, coworkers. or helping providers to have total and intensity of acts slowly increase. In cases of sexual predation.
control (Stark, 2007). Ultimately, the tactics used create a condi- perpetrators begin by verbally and physically desensitizing youth
tion of authority for the perpetrator—a sense of fear in the victim to sexual contact (Olson et al., 2007) and using previous sexual
and an "invisible cage"—to perpetuate the victim's entrapment acts as leverage for engagement in new acts (Mishna et al.. 2009).
(Stark. 2007). Stark (2007) highlighted how there are similar Traffickers often use peers. such as friends and boyfriends, to
tactics used across various types of victimization, such as isolation recruit new victims and glamorize the sex trade by describing it as
of victims and rituals of degradation: however. he also identified a smart way to make money that also demonstrates an individual's
partialities central to IPV such as its frequency and direct gender worth (Reid. 2016). Older adults may acclimate to new caregivers
entrapment that distinguish IPV from other fonns of power and and surroundings. readily responding to financial requests for help
control. (Whitty. 2013). Among cults, involvement incrementally increases
Dutton and Goodman (2005) have also conceptualized coercive through engagement in activities like bible study. thus keeping
control as it relates to 1PV. These authors suggested that perpetra- victims unaware of their increased entrapment in the group (Singer
tors prime victims for coercion through four means: (a) creating & Lalich, 1995).
the expectation of negative consequences for resistance to de-
mands. (b) creating or exploiting the victim's vulnerabilities, (c) Creating a Family-Like Bond
wearing down the victim's resistance to coercion. and (d) facili-
Perpetrators also provide an alternative family connection for
tating and exploiting emotional and other forms of victim depen-
victims. Research on gangs suggests that youth perceive member-
dency. Surveillance is also a key element for exerting control and
ship as an escape from their own dysfunctional families (Moore &
creating fear (Dutton & Goodman. 2005).
Hagedorn, 2001). Victims of online sexual predation recount en-
These conceptualizations of the theory of coercive control pro-
gaging in cybersex or meeting for sexual encounters as a way to
vide an important lens for examining coercive tactics used by
engage with someone who would listen to them or as a distraction
perpetrators of IPV that might also extend to behaviors used across
from trouble at home (Mishna et al.. 2009). 'The idea of perpetra-
different types of victimization. building on Stark's (2007) iden-
tors providing love and affection not found elsewhere has been
tification of commonalities between coercive control in 1PV and
found in research on sexual predation of youth (Olson et al.. 2007)
other contexts of power and control. Coercive control is the phe-
and in trafficking (Reid. 2016).
nomena of victimization that is grounded in relational interactions.
namely, behavioral tactics. such as the use of grooming. including
normalizing behaviors. and isolation as mechanisms in which Gift Giving
perpetrators gain and maintain power over their victims. What Romancing and gift giving is also used to lure victims during the
follows is a review of such tactics used by perpetrators of other grooming process. "Love bombing" refers to providing a victim
forms of abuse beyond IPV. with extreme attention and affection, or by offering a prize in
exchange for an agreement by extremist groups (Hills. 2015).
Grooming Tactics sexual predators (CiAttu., 1994). or traffickers (Reid. 2016). This
form of targeting and control is also used in cases of exploitation
Grooming techniques used by perpetrators center on establish- of older adults, where a perpetrator will send a small gift such as
ing trust with the victim. desensitizing the victim to the abuse or flowers hoping that the victim will then send the requested money
exploitation they are experiencing. providing a sense of family. in return (Whitty. 2013).
and romancing or buying gifts for the victim. In some cases. a
perpetrator will use high pressure tactics to groom the victim.
High-Pressure Tactics
In some situations. high-pressure tactics may be used. such as in
Establishing Trust
scams where victims are lured into paying money up front for
Perpetrators groom victims by first establishing trust. which goods or services, or for a prize to be released upon receipt of
often begins with the cultivation of a relationship between the "customs duties" paid by the victim (Langenderfer & Shimp.
perpetrator. victim, and sometimes the victim's family (Olson. 2001). In these instances the perpetrator skillfully focuses the
Daggs, Ellevold. & Rogers. 2007). Trust has been described as a victim's attention on the reward pushing aside any concerns raised
central dynamic in cases of online relationships and cyber abuse by the victim (Langenderfer & Shimp. 2001).
3502-023
Page 2 of 11
EFIA_00001601
EFTA00156942
146 DURON, JOHNSON. HOGE. AND POSTMUS
Isolation Techniques types of victim experiences of abuse. control. and/or
exploitation.
Coupled with grooming tactics. isolation techniques are another
signature approach involved in coercive behaviors to maintain
power and control over victims. Isolation may occur in physical or Method
mental forms and serves to keep victims away from social sup-
This qualitative study took a phenomenological approach (Cre-
ports. including family and friends (Baldwin. Fehrenbacher. &
Eisenman. 2015). swell. 1998) based on data collected as part of a statewide initiative
to understand predatory alienation—a new term created by an
advocacy group to describe
Physical Isolation
a person's extreme undue influence on. or coercive persuasion or
Perpetrators act as gatekeepers who control incoming and out- psychologically damaging manipulation of another person that results
going information. using isolation to limit victim communication in physical or emotional harm or the loss of financial assets. disrupts
with those who provide social support (Singer. 1992: Whitsctt & a fluent-child relationship. leads to a deceptive or exploitative rela-
Kent. 2003). In cults or with older adults. isolation may involve tionship. or isolates the person from family and friends. (New Jersey
taking control over the victim's social. physical. and/or online Senate Bill 2562: htips://legiscancom/Nlitext/S2562/20I6)
environment. including how they spend their time (Singer &
Lalich. 1995: Whitsett & Kent. 2003: Whiny. 2013). Physical The charge by the state was to understand common predatory•
isolation may also include the geographical relocation of a victim practices used to victimize individuals across the life span.
to another place away from their support networks. as in cases of The research team was composed of academic experts on child
- trafficking (Reid. 2016). Traffickers isolate youth by checking and abuse. IPV. trafficking. and elder abuse who had familiarity with
controlling access to cell phones and social media. and by chang- predatory practices particular to these subjects. All experts iden-
ing phone numbers and passwords (Reid. 2016). tified as cisgender females between the ages of early 20s and late
505 and identified as White or Latina.
Mental Isolation
Participants
Mental isolation occurs when the perpetrator creates or enlarges
a psychological and emotional separation between the victim and The research team used agency referrals and snowball sampling
their support networks, so the perpetrator can then occupy that to identify professionals who represented a wide variety of human
space (Olson et al.. 2007). In trafficking situations. women have service and criminal justice positions with expertise in predatory•
described how their traffickers limited their exposure to the outside practices. A list of potential participants was created by the re-
world: traffickers would call frequently as a way to monopolize search team with suggestions from several state departments (e.g..
their attention (Baldwin a al.. 2015). Cults may interfere with a child welfare. human services) from the researchers home Mate. In
victim's ability to accurately assess and react to their environment addition to this list. at the conclusion of each interview. each
through control tactics such as the disparaging of members precult professional was asked to provide the names of other passible
lives (Whitsett & Kent. 2003). Victims of elder abuse who arc participants.
highly stressed and held captive may be manipulated into believing Within the United States. social service providers most com-
in a false version of reality beyond their confines. leading them to monly work with one particular population (e.g.. victims of IPV')
form bonds with and become dependent on the perpetrator for fear as opposed to victims of coercive control more broadly. As such.
of the outside world (Singer. 1992). we determined that the inclusion of various professional roles
Current literature reveals how perpetrators of various forms of would best facilitate the goal of achieving a comprehensive un-
abuse use multiple. often similar tactics to exert power and control derstanding of the issue of predatory practices as it pertained to
over individuals. Questions remain as to which of these tactics arc various victim types rather than specific professional role or type
commonly identified by professionals working with or on behalf of of victimization. Hence. criteria for participation included profes-
victims or perpetrators from a variety of settings to inform screen- sional engagement in issues of predatory victimization through
ing efforts across a range of victimization types. This study ad- advocacy or direct services (e.g.. human services. law enforce-
dresses this gap by examining how coercive control is experienced ment. legal services). Professionals worked with a variety of
across types of abuse from adolescence to adulthood. Professionals victims including those experiencing child abuse. human traffick-
working with or on behalf of victims often have exposure to ing. IPV. gang activity, elder abuse. and cultic influence. Although
multiple narratives of coercion. allowing for greater breadth of most professionals interacted with victims who had experienced
discovery in consideration of numerous types of victimization. some form of interpersonal abuse. others worked with or on behalf
of individuals who had been isolated from family and friends
Research Goal 1: To examine the perceptions of profession- through coercion. A few professionals. particularly those in law
als working with or on behalf of victims regarding how
coercive control is applied across various types of victim
experiences of abuse, control. and/or exploitation. IPV professionals included in this study work with survivors of all
types of abuse including physical. sexual. emotional. and financial, as well
as stalking and dating violence. depending on what abuse experiences are
Research Goal 2: To identify the perceptions of professionals presented by victims seeking services. Hence, the term IPV in this article
working with or on behalf of victims regarding what common includes all these types of abuse that are perpetrated in intimate relation-
strategies are used to facilitate coercive control across various ships.
3502-023
Page 3 of 11
EFFA_00001602
EFTA00156943
PERSPECTIVES OF PROFESSIONALS ABOUT COERCIVE CONTROL 147
enforcement. also worked with perpetrators of interpersonal abuse Interviems
and coercion. Some professionals had experience researching is-
sues of coercion in addition to engaging in advocacy efforts. A semistructured interview guide was developed based on an
The majority of professionals were over the age of 40 years in-depth literature review of predatory behaviors using terms in-
(90.9%) and identified as White (86.4%). Slightly more than half cluding predatory alienation, coercive control. and undue influ-
of the sample was male (59.1%). and the majority held a master's ence. The guide was reviewed by the team of researchers and
degree or Ph.D.. law. or medical degree (72.7%). Slightly more assistants and edited for salience. comprehension, and clarity. The
than half of the sample worked in a role consistent with service interview guide (see Appendix) covered the participant's under-
providers (59.1%). whereas other participants worked in law en- standing of predatory• behaviors. professional role and experiences
forcement and legal services (40.9%). Service providers included related to predatory victimization. identification of victims, risk
direct service providers. expert consultants. and advocates. Law factors, and common predatory tactics. Nine core areas of ques-
enforcement and legal services included professionals such as tioning were pursued with follow-up prompts initiated as needed.
prosecutors. investigators. and lawyers serving in administrative Though the team used the term ••predatory alienation." most par-
roles. Most of the professionals worked in a nonspecific field with ticipants were unfamiliar with the term. Once defined. participants
multiple populations (27.3%). but many also worked in the fields instead focused on predatory tactics used or experienced by their
of trafficking and sexual abuse (22.7%). The majority of partici- clients. As such. the research team also adjusted the questions to
pants had been in their current professional positions for an aver- focus on generic predatory• practices instead of using the term
age of 12.08 years (SD = 9.49). "predatory alienation." The semistructured interview guide al-
lowed the research team to study complex phenomena guided by
theory. with the flexibility to elicit descriptive information about
Data Collection the lived experience of participants (GaRena. 2013).
The research team contacted 33 professionals via c-mail and
invited them to participate in a one-time• in-depth interview on a Data Analysis
date and at a location that was convenient for them. Of these, three A directed content analysis approach was used to code interview
declined to participate because of lack of agency permission or transcripts. using NVivo to manage the data (Hsieh & Shannon.
other reasons and eight did not respond. A total of 22 professionals 2005: Vaismoradi. Tunmen. & Bondas. 2013). The directive ap-
participated in semistructured interviews between July and Sep- proach was deductively informed by sensitizing concepts drawn
tember 2017. Interviews ranged from 21 to 118 min. with an from the literature review. such as "isolation techniques" and
average interview completed in 56 min. The final sample size was "grooming tactics." that acted as an initial coding scheme for the
determined by evaluating the quality of information gathered (San- coding process. Following preparation that included reading all
delowski. 1995). which included an evaluation of saturation of transcripts, a member of the research team applied the initial
ideas and repeated descriptions (Benaux. 1981: Lincoln & Guba coding scheme to participant responses by question. but also
1985). Saturation was defined in terms of the discovery and inductively identified new codes that allowed the codebook to be
stability of codes, but also in terms of a full exploration of the expanded and refined (Hsieh & Shannon. 2005). After completing
meaning of such codes (Hennink. Kaiser. & Marconi. 2017). the first level of analysis. the researcher compiled the codes that
Interviews were conducted in person. via phone. or over a video emerged into categories and subcategories. To enhance the rigor of
= conferencing service. The study protocol described here was ap- the analysis. a second member of the research team then indepen-
proved by the university's institutional review board. dently coded the interviews. Codes from this second level of
Two research team members attended each interview, with one analysis were also collapsed into categories and subcategories. The
facilitating the interview and the other taking detailed notes on a team members met to review and refine codes. coming to consen-
laptop. Each interview was also audio recorded. To protect confi- sus about the codebook and then applied these codes to refine their
dentiality. each participant was assigned a numeric identifier. analyses. Memos were written and discussed throughout the anal-
Interview notes referred to the participant by this unique identifier ysis process to manage each researcher's views of the data, assist
and did not include any information that could be used to identify in structuring the content. and reconcile codes. The coders then
the individual. Members of the research team debriefed following compared categories and subcategories. discussing interpretations
each interview and then transcribed the interviews using the audio and refining these groupings into a joint consensus version (Patton.
recording and notes. 2002). There were no significant discrepancies in codes and cat-
To ensure that the research team accurately interpreted key egories. and differences that arose in coding were easily resolved.
themes expressed by the study participants (1Crefting. 1991). mem- Member checking was then completed with a subsample of par-
ber checking interviews with five of the 22 professionals were ticipants. such that each person represented the diversity of victim
completed to gather feedback on the findings and recommenda- experiences including 1PV. human trafficking. gangs and youth
tions. These five participants were selected because they each violence, cults, and elder exploitation. Notes taken during member
worked with a different population represented within the study. checking were analyzed by both coders and used to refine the
To ascertain feedback. a summary of study findings and a sum- descriptions of emergent themes.
mary of recommendations were separately presented to the partic-
ipants, who were then asked to share their impressions with a
Findings
member of the research team. Findings from the member checking
process were used to expand upon study findings by aiding in the Interviews with professionals revealed four primary strategics
interpretation of themes. exemplifying a coercive control pattern of approach and tactics
3502-023
Page 4 of 11
EFIA_00001603
EFTA00156944
148 DURONJOHNSON. HOGE. AND POSTMUS
commonly used by perpetrators across abuse types and victim ages guage differences and legal status. could also attract the interest of
to engage individuals in exploitative relationships. These strategies predators. Although anyone is susceptible to predatory behaviors.
are as follows: (a) identifying potential victims. (b) infiltrating these risk factors increased the likelihood of exposure to and
lives through grooming. (c) isolating to gain control. and (d) experience of victimization. One participant considered how
maintaining control through any means necessary. Within each youths' desire to be pan of something could be a hazard:
theme. we describe strategies described by professionals that glob-
ally apply across victims. Collectively, these strategies illuminate Thai dynamic is wired into your psyche for your entire life. Just the
playground changes ... So I think that these master manipulators.
a process used by perpetrators to coercively gain and maintain
these predators key in on it. they know that some kids are mote
control. susceptible to wanting to be ... Sonic kith their desire to belong to
The findings presented here identify commonalities reported anything is greater ... some kids may have the tools necessary to
consistently. regardless of victim type. As one professional re- resist. Maybe a strong family. strong religion. stronger set of friends
flected. "I've worked in the domestic violence and sexual violence and values so that they resist any type of lute. But there are other kids
field for a long time and human trafficking. For everything we talk that have absolutely nothing so any group is better than no group. Any
about the isolation of coercive control tactics. It's the same thing attention becomes better than no attention ... Igangst
to me. It's what a perp does to control their victim." [human
trafficking] If any distinctions in strategics were found by victim Although similar vulnerabilities exist across groups. there were
type. these arc also presented. Quotes have been ascribed to the also some variations based on age or developmental capacity.
participant's primary area of professional engagement. such as Older adults and adolescents arc often perceived to be trusting or
human trafficking. A range of quotes from professionals with gullible and easy to exploit. Older adults were described as having
mixed areas of victim expertise arc presented to demonstrate how higher levels of dependency. lower levels of cognitive functioning.
commonalities were indicated across participants. Congruity in less mobility. or greater health issues. These vulnerabilities were
experiences described across the diversity of victimization types identified for both elders in the community and those in institu-
illustrates how coercive control applies to predatory interactions tional settings. However. one professional noted that community
across a range of circumstances. dwellers may face more social isolation making it "easier to
disconnect them from other people." [IPV] Among adolescents
and young adults, risks were also linked to greater exposure to
Identifying Potential VIctims social media gaming. the Internet. and phone technologies that
heighten perpetrator access to these youths. Participants also re-
Professionals were asked to describe what makes individuals
ported that youths' lack of cognitive and emotional maturity or
vulnerable to perpetrators. Participants indicated that some perpe-
experiences of developmental delays could increase risks for vic-
trators lure victims. whereas others target them. In this way.
timization.
perpetration is a process that involves considering the potential for
baiting someone and calculating the potential response to gain
something. The "something" perpetrators want is oftentimes power Infiltrating Lives Through Grooming
and control over the individual: this leads the perpetrator to make
demands. both of the person and their property. One participant Professionals described how perpetrators carefully craft rela-
described this motivation as "self-satisfaction out of being able to tionships with victims by cultivating victim allegiance through
control someone else." [cults] Consistently. participants described psychological coercion. This process generally occurs over the
perpetrators gain as having someone "do certain things you want course of weeks or months and is distinguished from single event
them to do" [youth] including granting access to personal finances. crimes. At the core of the grooming process is gaining the victim's
fulfilling sexual demands. acting as a servant. or committing trust. often through fulfillment of the victim's needs and goals.
crimes like stealing goods or selling drugs. Professionals across the These needs can be physical such as a need for money or food.
areas of expertise noted a common vulnerability for victimization. relational such as a need for friendship. or aspirational such as the
One participant shared. goal for advancement. The most common way perpetrators enact
grooming is through "love bombing." Participants described this
In each case the vulnerability is going to be different. But these guys tactic as offering compliments, affection and gifts to a victim to
do not pick on you because of your vulnerabilities. They exploit your make them feel special. One professional described this as "flat-
vulnerabilities... the reason they target you is because of something tery. but to an excessive extent." [cults] For youth it may be
that they want ... that you have. not something you do not have. The serving as a "Romeo ... who will give them care and love ...
vulnerability in these cases is as much defined by what people do have
Initially. they will give them clothes. food, a place to stay. get their
as it is by their weaknesses ... and they're not selected because they
are weak. {WV) nails done." [human trafficking] For older adults. perpetrators may
run errands for them or complete tasks they cannot do themselves.
Although global risk for perpetration exists. there are also elevated
He would biing her groceries, he would stop by and see her after work
personal. interpersonal. or environmental vulnerabilities that make
... he would cut the lawn for her. He would do a lot of things that she
individuals susceptible to victimization. Professionals recounted needed to do that she couldn't do herself ... He started filling a lot of
stories of individuals who were exploited because of risk factors those gaps in her life. folder Muhl
that included lack of family involvement or supportive systems.
feelings of loneliness. social isolation, and limited options or The gradual dependency that is established between victims and
resources. In many cases. participants indicated that the victims perpetrators helps perpetrators create new memories that disrupt
they served identified as female. Cultural factors. especially lan- victims' beliefs. One service provider explained.
3502-023
Page 5 of 11
EFIA_00001604
EFTA00156945
PERSPECTIVES OF PROFESSIONALS ABOUT COERCIVE CONTROL 149
Te comnton one is to criticize or somehow upset or destroy the their feeding, their grooming. their toileting. their physician's appoint-
existing belief system or contacts ... by destroying a connection ments. and their money. [older adults]
with the people you love. oftentimes by alienating someone horn their
belief system. so that could be from their family or from their religious [This control becomes] regulation of everyday life. beginning to set
beliefs. spiritual beliefs. social beliefs, that son of thing. ... "well if rules and expectations. (IPV)
you love me you'll stop doing that"... so it's the severing of ties ...
the use of guilt ... [cults] Creating distance between victims and their social supports often
includes restricting communication. particularly by limiting access
Incremental escalation of exploitation is another technique used to a mobile phone. In reference to an older adult who was victim-
that desensitizes victims. A participant who worked with victims ized by a caretaker. one professional shared. "Slowly and slowly
of cults referenced this as - the foot in the door technique"2 in [sic] the phone calls stop coming into the house. They didn't really
sharing how victims may be swindled for more money after stop coming. they just hid the phone or turned off the ringer."
making a small charitable contribution that appeals to the victim's [older adults] Preexisting limited social contact may accelerate a
sense of compassion or "good- nature. In reference to gang activ- perpetrator's plans for severing ties to the victim's support systems
ity. another participant reflected. "There is always an escalation of to dominate the victim's life and promote dependency. Isolation as
violence. They start them out with small crimes like robbery. then an essential dynamic in perpetration fosters control for whatever
selling drugs. and eventually shootings" [gangs] benefit the perpetrator desires.
Professionals described the role of technology in grooming as a
The point of isolation ... is to make you increasingly dependent to
way of facilitating communication. Perpetrators use the Internet.
your own sense of reality. That also makes your own sense of self and
chat rooms. social media and gaming platforms to find victims. self-esteem dependent on his approval ... So. isolation is not only
;d
particularly for trafficking and sexual abuse. Through virtual com- universal. it's devastatingly important element ... but in itself its
munication. the perpetrator becomes familiar with the victim and meaningless unless there's some other set of demands. IIPVI
makes increasingly larger requests. These requests intensify as
entrapment progresses until a victim is convinced to meet in These are people who are using intentional techniques to influence the
person. The ability of perpetrators to maintain control over a target ... sometimes to get their money or property for older people.
victim. even in the absence of physical restraint. was discussed by for young people ii might he for purposes of controlling them for sex.
work. or prostitution. (curb)
some participants: "A lot of them ]victims) are 'compliant.' They
are not really compliant because they don't have physical chains As described by participants. perpetrator demands can include a
on them but there are psychological chains on them in order to variety of victimizing outcomes including assault, prostitution.
maintain control and compliance from the victim." [human traf- trafficking. servitude. financial exploitation, gang activities. or
ficking] cultic involvement. As isolation ensues. perpetrators will use mul-
tiple tactics to establish and retain control. including the use of
Isolating to Gain Control violence.
As grooming occurs. professionals described how perpetrators
begin to isolate victims from their support systems as a way of Maintaining Control Through Any Means Necessary
increasing dependency on the perpetrator. Isolation serves to en-
The height of perpetrator control is often exhibited through the
trap the victim in the relationship. making it difficult for the victim
gradual transferring of power from the victim to the perpetrator.
to leave the perpetrator.
frequently achieved without violence. although abuse and threats
These groups. in order to control that person. have to isolate ihem may be used as necessary to retain control. Several professionals
from everything and have to isolate them from everyone in order to described how control is overwhelmingly an achievement of dom-
have the focus on them. fruits] inance—over
ℹ️ Document Details
SHA-256
f8ca5fac58b2b7497bb843123d8bc4efb9db369bee94e515405a2c6f4d849659
Bates Number
EFTA00156941
Dataset
DataSet-9
Document Type
document
Pages
11
Comments 0