Phase 2: Attack Part 2

This is the fourth post on the phases of an attack. Please follow the links to the Intro, Phase 1 and Phase 2 Part 1 before reading on.

In part one, we discussed how a predator can use charm to manipulate you into a vulnerable position. Furthermore, we examine how the assailant can set up the trap in a way that feels like you initiated and choose every step in the process. [1] This post is going to focus on the blitz portion of the attack phase. The blitz attack can be broken down into two parts: mental and physical. There is no specific order to how the blitz is done. For example, it can be physical to make the pain and fear real then transition to mental, by using intimidation to control you. It can be mental and then transition to physical when intimidation is no longer working. These are interchangeable and can change dynamically throughout an attack.

Phase 2 with blitzAlthough both the charm and blitz have mental attacks, it is important to note that the mental attacks are quite different and should be categorized as such. In charm, the predator is attempting to persuade you with social attractiveness. Whereas, in a mental blitz attack, the predator is using the threat of violence to force you.

For most criminals, using a mental blitz is beneficial for several reasons: 1) it is safer physically for them. (Criminals know that sometimes luck happens or that they may pick the wrong target) and 2) it is safer criminally for them to intimidate you into submission rather than beat you there. Most criminals have an understanding of how criminal law works. They know that cases with injuries have more resources allocated to solving it, have a higher likelihood of conviction, and carry heavier penalties. [2] Don’t rely on this. Some criminals have dehumanized you enough to kill you to get what they want. Finally, 3) if they have not dehumanized you enough to kill you, they can fake it through intimidation with a pretty good chance of getting what they want.

When you are blitz attacked, the assailant will use whichever tactic he believes will be the surest and safest to get what he wants. Position, speed, surprise, violence of action, and power will be used once the physical blitz begins. The attacker will attempt to take control before you can put up any type of resistance. Sometimes this is in effort to keep you from responding and/or to make your response unsuccessful. [3]

If you are attacked, there are several things you can do to give you a better chance of fighting off your attacker or running away and surviving. Stay aware and know the terrain (avenue of approach, limited mobility, exits, escape routes, etc. ). Attacks do not happen in random locations. Criminals pick areas with one or more of these in mind. Although, some people are just targets of opportunity, not paying attention or the mind is distracted by something else. Common distractions are radio, reading, and talking on the phone; things we pretty much do everyday. Sometimes the threat will set you up with something as simple as, “Hey man, do you have the time?” When you are aware, you can pick up on pre-attack indicators and you can focus in on the threat prior to being attack. This keeps you from being taken by surprise, which in itself, is a deterrent. Also, you won’t be as likely to freeze if you are attacked.

In later posts, we will go over other tactics such as disrupting someone’s O.O.D.A loop, appropriate levels of awareness, how to properly escape and evade from an attacke,r and how to evaluate your daily routines to increase your safety.

1. Rory Miller Facing Violence (Wolfeboro, N.H.: YMAA Pub 2011), 40
2. Miller, 40
3. Miller, 37-39


What do you think?

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: