@article{ref1, title="An empirical examination of the victim-search methods utilized by serial stranger sexual offenders: a classification approach", journal="Journal of interpersonal violence", year="2016", author="Hewitt, Ashley N. and Beauregard, Eric and Davies, Garth", volume="ePub", number="ePub", pages="ePub-ePub", abstract="Past research on the spatial mobility of serial offenders has generally found that these individuals make calculated decisions about the ways in which they come into contact with suitable victims. Within the geographic profiling literature, four victim-search methods have been theorized that describe how serial predatory offenders hunt for their victims: hunter, poacher, troller, and trapper Using latent class analysis, the aim of this study is to test whether this theoretical typology can be empirically derived using data that were collected from both police files and semi-structured interviews with 72 serial sex offenders who committed 361 stranger sexual assaults. Empirical support is found for each of the aforementioned victim-search methods, in addition to two others: indiscriminate opportunist and walking prowler Chi-square analyses are also conducted to test for associations between this typology and characteristics of the offense such as victim information, environmental factors, and the offender's modus operandi strategies.

FINDINGS from these analyses suggest that the types of victims and environments targeted by the offender, as well as the behaviors that take place both before and during the offense, are dependent upon the offender's victim-search strategy. Although the theoretical hunter, poacher, troller, and trapper were intended to describe the victim-search methods of serial violent predators more generally, the finding that these strategies exist along with two others in this sample of sexual offenders may indicate that search behavior is specific to certain crime types. Furthermore, these findings may be of assistance in the investigation of stranger sexual assaults by providing law-enforcement officials with possible clues as to the characteristics of the unknown suspect, the times and places likely targeted in any past or future events, and possibly even his base of operations.

© The Author(s) 2016.

Language: en

", language="en", issn="0886-2605", doi="10.1177/0886260516675921", url="http://dx.doi.org/10.1177/0886260516675921" }