Please take a look at Articles on self-defense/conflict/violence for introductions to the references found in the bibliography page.

Please take a look at my bibliography if you do not see a proper reference to a post.

Please take a look at my Notable Quotes

Hey, Attention on Deck!

Hey, NOTHING here is PERSONAL, get over it - Teach Me and I will Learn!


When you begin to feel like you are a tough guy, a warrior, a master of the martial arts or that you have lived a tough life, just take a moment and get some perspective with the following:


I've stopped knives that were coming to disembowel me

I've clawed for my gun while bullets ripped past me

I've dodged as someone tried to put an ax in my skull

I've fought screaming steel and left rubber on the road to avoid death

I've clawed broken glass out of my body after their opening attack failed

I've spit blood and body parts and broke strangle holds before gouging eyes

I've charged into fires, fought through blizzards and run from tornados

I've survived being hunted by gangs, killers and contract killers

The streets were my home, I hunted in the night and was hunted in turn


Please don't brag to me that you're a survivor because someone hit you. And don't tell me how 'tough' you are because of your training. As much as I've been through I know people who have survived much, much worse. - Marc MacYoung

WARNING, CAVEAT AND NOTE

The postings on this blog are my interpretation of readings, studies and experiences therefore errors and omissions are mine and mine alone. The content surrounding the extracts of books, see bibliography on this blog site, are also mine and mine alone therefore errors and omissions are also mine and mine alone and therefore why I highly recommended one read, study, research and fact find the material for clarity. My effort here is self-clarity toward a fuller understanding of the subject matter. See the bibliography for information on the books. Please make note that this article/post is my personal analysis of the subject and the information used was chosen or picked by me. It is not an analysis piece because it lacks complete and comprehensive research, it was not adequately and completely investigated and it is not balanced, i.e., it is my personal view without the views of others including subject experts, etc. Look at this as “Infotainment rather then expert research.” This is an opinion/editorial article/post meant to persuade the reader to think, decide and accept or reject my premise. It is an attempt to cause change or reinforce attitudes, beliefs and values as they apply to martial arts and/or self-defense. It is merely a commentary on the subject in the particular article presented.


Note: I will endevor to provide a bibliography and italicize any direct quotes from the materials I use for this blog. If there are mistakes, errors, and/or omissions, I take full responsibility for them as they are mine and mine alone. If you find any mistakes, errors, and/or omissions please comment and let me know along with the correct information and/or sources.



“What you are reading right now is a blog. It’s written and posted by me, because I want to. I get no financial remuneration for writing it. I don’t have to meet anyone’s criteria in order to post it. Not only I don’t have an employer or publisher, but I’m not even constrained by having to please an audience. If people won’t like it, they won’t read it, but I won’t lose anything by it. Provided I don’t break any laws (libel, incitement to violence, etc.), I can post whatever I want. This means that I can write openly and honestly, however controversial my opinions may be. It also means that I could write total bullshit; there is no quality control. I could be biased. I could be insane. I could be trolling. … not all sources are equivalent, and all sources have their pros and cons. These needs to be taken into account when evaluating information, and all information should be evaluated. - God’s Bastard, Sourcing Sources (this applies to this and other blogs by me as well; if you follow the idea's, advice or information you are on your own, don't come crying to me, it is all on you do do the work to make sure it works for you!)



“You should prepare yourself to dedicate at least five or six years to your training and practice to understand the philosophy and physiokinetics of martial arts and karate so that you can understand the true spirit of everything and dedicate your mind, body and spirit to the discipline of the art.” - cejames (note: you are on your own, make sure you get expert hands-on guidance in all things martial and self-defense)



“All I say is by way of discourse, and nothing by way of advice. I should not speak so boldly if it were my due to be believed.” - Montaigne


I am not a leading authority on any one discipline that I write about and teach, it is my hope and wish that with all the subjects I have studied it provides me an advantage point that I offer in as clear and cohesive writings as possible in introducing the matters in my materials. I hope to serve as one who inspires direction in the practitioner so they can go on to discover greater teachers and professionals that will build on this fundamental foundation. Find the authorities and synthesize a wholehearted and holistic concept, perception and belief that will not drive your practices but rather inspire them to evolve, grow and prosper. My efforts are born of those who are more experienced and knowledgable than I. I hope you find that path! See the bibliography I provide for an initial list of experts, professionals and masters of the subjects.

Habitual Acts of Physical Violence

The Common Attacks People Have Always Used Against One Another


by CEJames (researcher/author) & Akira Ichinose (editor/research assistant)

 

Fist drawn from habit—

the ancient arc never sleeps,

muscle remembers.


Know the old patterns—

what has always been will come;

wisdom sees first.

 

CAVEAT (Keikoku [警告])

The content presented here is for educational and entertainment purposes only and does not constitute legal advice or a certified self-defense methodology. Laws governing the use of force vary by jurisdiction. Readers should consult a qualified attorney and seek instruction from a certified self-defense professional before making any decisions regarding personal protection.

 

Introduction: The Vocabulary of Human Violence

There is an uncomfortable truth that sits at the heart of all serious self-defense study: violence is, by and large, remarkably predictable. Not in the way a chess game is predictable, where a master can see twenty moves ahead, but in the way weather is predictable — broadly, historically, and with recurring patterns that anyone willing to pay attention can learn to read.


Across cultures, across centuries, across the drunken parking lots of America and the back alleys of feudal Japan, human beings have attacked one another using a surprisingly limited repertoire of techniques. Researchers and practitioners in the field — people like Rory Miller, Marc MacYoung, and Geoff Thompson — have given these a name: habitual acts of physical violence, or HAV. The term itself is blunt and utilitarian, which is appropriate. Violence, when it arrives, is rarely elegant.


This piece is an attempt to survey that repertoire honestly — to name the attacks, describe how and why they happen, and offer the kind of contextual understanding that separates genuine self-defense education from bar-stool bravado. Along the way we'll pause for a few parables, because sometimes a story reaches places that analysis alone cannot. And at the end, we'll sit with a counter-argument that deserves to be heard: the perspective that categorizing human aggression as a list of 'habitual acts' risks flattening the complex social and psychological terrain in which real violence actually lives.


Read it all. The counter-argument especially.

 

Part One: Why Violence Is Habitual

Before we get to the specific attacks, it helps to understand why human violence tends to cluster into recognizable patterns in the first place. The short answer is: the body under stress defaults to what it knows.


Stress inoculation research — particularly the work of Bruce Siddle and later Dave Grossman — established that as arousal increases, fine motor skills deteriorate first, complex cognitive processing degrades next, and what remains is gross motor movement: big, simple, powerful actions driven by the brainstem and the limbic system rather than the prefrontal cortex. In plain English, when a person's heart rate spikes past 175 beats per minute, they do not throw a technically perfect jab-cross combination. They swing. They grab. They tackle. They do what their nervous system already knows how to do.


Add to this the social scripts that govern human conflict. Anthropologist David Levinson's cross-cultural studies of family violence, and Rory Miller's observations from years of working in corrections, both point to the same conclusion: most interpersonal violence follows a predictable social script — an escalating sequence of posturing, challenges, and positioning that, if you know what you're looking at, telegraphs what's coming well before the first blow lands.


Parable: The Mongoose and the Cobra

A young mongoose watched an old mongoose face a cobra. The young one was impressed by how quickly the elder moved, how decisively it acted. 'How did you know where to strike?' the young one asked afterward. The old mongoose replied: 'I didn't know where the cobra would strike. I knew where cobras strike. I have seen a hundred cobras. The cobra does not know it is being read.' There is a difference between knowing what a specific person will do and knowing what that type of person, in that type of situation, typically does. The second knowledge is learnable. The first is hubris.

 

This is the foundation of HAV study. We are not trying to read minds. We are learning the grammar of human aggression — and grammar, once internalized, allows us to understand sentences we've never encountered before.

 

Part Two: The Habitual Acts — Attack by Attack

What follows is a survey of the most commonly documented attacks in real-world violence. These are not tournament techniques. They are what actually happens.


1. The Haymaker — The Overhand Roundhouse Punch

This is the king of habitual attacks. It shows up in prison fight footage, bar brawl recordings, domestic violence incidents, and road rage altercations at a rate that dwarfs every other unarmed strike. It goes by many names — the roundhouse, the wild right, the haymaker, the sucker-punch follow-up — but its structure is consistent: a large, looping overhand punch thrown with the dominant hand, usually from outside measured fighting range, powered by the rotation of the whole body.


Why is it so common? 


Because it is devastatingly effective when it lands, it requires no training to execute, and the body under high stress naturally wants to use large muscle groups. The shoulder, the back, the hip — all engaged. If you hit someone with it clean, especially to the temple or jaw, they go down. People learn this young, often accidentally, and it becomes the body's go-to answer for 'I need to hurt this person right now.'

From a defensive standpoint, the haymaker's saving grace — and this is well-documented in the self-defense literature, particularly by Geoff Thompson in his work on the fence — is that it telegraphs. The shoulder drops, the body coils, the eyes often dart to the target. A prepared observer can see it in time.


2. The Sucker Punch — Ambush from Social Range

If the haymaker is common, the sucker punch is arguably more dangerous precisely because it disrupts the threat-recognition window entirely. The classic sucker punch occurs during conversation — social space, close range, a hand possibly already raised in a gesture — and is launched before the target has any reason to believe violence is imminent.


Marc MacYoung has written extensively about this, and Rory Miller's concept of the 'interview' (the process by which a predatory aggressor evaluates and selects a target) dovetails directly here. The sucker punch is often the terminal act in a very deliberate approach sequence. The conversation is not a conversation. It is target acquisition.


The insidious element is social pressure. We are trained from childhood not to assume threat in social interactions. Backing away from a conversation feels rude. Preparing for violence during a casual exchange feels paranoid. These social inhibitions are exactly what the sucker punch exploits.


Parable: The Question Before the Strike

A street-wise old sergeant used to tell new MPs: 'Son, when a man walks up to you on a dark street and asks you for the time, he does not want to know what time it is.' The question is the setup. The question is the proximity builder. The question is the distraction while the other hand loads the punch. The wise warrior learns to answer the social question while simultaneously reading the tactical one. You can be polite and prepared at the same time. In fact, the best defense against the sucker punch is exactly that: warm eyes, soft voice, hard guard.

 

3. The Push and Shove — Territorial and Escalatory

The shove may seem trivial, but it appears at the opening of an enormous percentage of documented violent incidents. It is territorial in nature — a physical declaration of dominance or an attempt to destabilize the target both physically and psychologically. It also functions as a test: will this person fall, stumble, or capitulate? What kind of target are they?


The problem with the shove, from a self-defense perspective, is not the shove itself — it is what it opens the door to. A person who has just been shoved is off-balance, reactive, and potentially inside the attacker's striking rangeThe haymaker often follows the shove by a heartbeat. Loren Christensen has noted this sequence in his documentation of law enforcement use-of-force incidents: push, swing, tackle is one of the most common three-act plays in real violence.


4. The Grab — Lapel, Collar, and Wrist

Grabbing is ancient. Before humans could punch with trained fists, they grabbed — garments, limbs, throats. The grab serves multiple tactical purposes: it closes distance, it controls the target's movement, it pins one of the attacker's hands but eliminates the target's ability to create space.


In self-defense research, grabs are particularly significant because they often precede a secondary action. A lapel grab almost always sets up a headbutt, a knee, or a series of punches. A wrist grab may be controlling (attempting to hold someone in place) or it may be the first step of a larger attack sequence. The grab tells you something is coming; the question is what.


Importantly, the grab also has a social dimension. In conflict escalation research, grabbing often represents the transition from posturing to physical engagement — it is the moment the social drama becomes physical realityThis is why de-escalation training frequently focuses on the 'grab threshold' as a critical intervention point.


5. The Headlock and Choke — Neck Control as Dominance

The headlock in its various forms — side headlock, rear naked position, standing guillotine — is extraordinarily common in real-world violence, particularly in male-on-male incidents in proximity-rich environments like bars, nightclubs, and dormitories. It requires no technical sophistication, leverages body weight effectively, and produces immediate compliance through pain and structural control.


The choke — hands to the throat — appears frequently in domestic violence and in emotionally charged one-on-one encounters. Unlike the combat choke (which targets blood flow or the airway with trained efficiency), the common civilian choke is usually driven by rage rather than tactical intention. It is a dominance display as much as an attack. This matters for response: a rage-driven choke has different timing and commitment patterns than a trained blood choke.


6. The Tackle and Bear Hug — Closing to Zero Distance

The tackle — a two-arm drive into the body, crashing the target to the ground — is the football equivalent of human violence, and it shows up constantly. It is particularly common among larger attackers, among individuals with some athletic background, and in situations where the attacker wants to move the target (out of a space, to the ground, into a wall).


The bear hug, both from the front and the rear, is related but distinct in intention. A front bear hug pins the arms and eliminates punching distance. A rear bear hug is sometimes used to 'remove' someone from a situation (the bouncer's tool, the aggressor's ambush). In both cases, the attacker is trying to leverage their strength advantage against the target's technical options.


Of note: the ground is not a neutral environment. Rory Miller, with characteristic directness, has pointed out that most people's self-defense thinking stops at 'we're both standing.' In real violence, the ground is where serious injury and death occur at elevated rates. The tackle is a delivery system to that environment.


7. The Stomp and Kick — Secondary Attacks and Ground Assault

Kicks in street violence are different from kicks in the dojo. They are usually low — targeting the groin, the knee, the shin — and they are usually thrown as secondary attacks to soften a target or as terminal attacks against a downed opponent.


The stomp — the foot brought down with full body weight onto a downed person — is one of the most dangerous acts in real violence and the one most likely to result in serious felony charges. FBI crime data and coroner reports from assault cases consistently show the stomp as a primary cause of traumatic brain injury and death in unarmed assaults. Understanding this is not academic. It clarifies the stakes of ending up on the ground in a violent encounter.


8. The Improvised Weapon Draw — Objects as Force Multipliers

'The knife always wins,' goes the grim aphorism in force science circles. Real violence frequently involves improvised weapons: bottles, chairs, pool cues, belts, keys, pens, anything within reach. The progression from unarmed to armed in real violence can happen in under a second, with no announcement.


Gavin de Becker's work on pre-attack indicators is useful here. The improvised weapon draw is almost never truly spontaneous — there is usually a period of escalation during which the attacker scans for and selects the object, shifts weight, and positions themselves. These micro-behaviors are readable to a trained observer. Once again: not mind-reading, but grammar.


Part Three: The Social Architecture of Attack

It would be a mistake to treat habitual acts of physical violence as purely mechanical phenomena. They exist inside social structures — rituals of dominance, face-saving, group identity, and emotional regulation — that shape when, why, and how they occur.


Rory Miller's distinction between the 'monkey dance' and the 'predator attack' is instructive. The monkey dance is a social ritual: both parties posture, escalate, and eventually one throws the first blow, usually the haymaker. It is, as Miller describes it, a dominance display that neither party truly wants to turn lethal but that can become lethal through accident, escalation, or the presence of weapons. The predator attack — the sucker punch from nowhere, the grab-from-behind — is categorically different. It has a victim and a predator, not two participants in a ritual.


Understanding which social architecture is operating changes everything about the appropriate response. The tools for de-escalating a monkey dance are largely social and verbalThe tools for surviving a predator attack are physical and immediate. Confusing the two is how people get hurt — by bringing fists to a social ritual (escalating when they didn't have to) or by bringing words to a predator attack (negotiating when they should have acted).


Parable: Two Teachers, Two Lessons

A young man once trained under two sensei simultaneously, a thing considered unusual. The first sensei taught him how to escape from every grab, how to deflect every punch, how to move from the ground back to his feet. The second sensei taught him how to walk away from an argument, how to apologize without losing dignity, how to de-escalate a drunk man in a parking lot. After years of this, the young man asked both sensei: 'Which of you has taught me more useful things?' Both smiled. The first said: 'I have given you the umbrella.' The second said: 'I have taught you to read the sky.' They were both right. The man who can fight but not de-escalate will fight more than he should. The man who can de-escalate but not fight is counting on goodwill the universe is not obligated to provide.

 

 

Part Four: Counter-Argument — A Perspective Worth Hearing

What follows is a genuine counter-argument to the framework presented above. We present it not to undermine the utility of studying habitual acts of violence, but because intellectual honesty demands it — and because the counter-argument, properly understood, actually makes the study richer, not weaker.


The habitual-acts framework is useful. We believe that. But it carries a risk that deserves naming plainly: it can produce a kind of threat-pattern narcissism in the practitioner — a tendency to see violence as a legible text written by a limited set of scripts, and thereby to underestimate the chaotic, contextual, deeply human dimensions of real conflict.


Consider the perspective-taking exercise: imagine the person who throws the haymaker. He is, in many documented cases, not a predator running a practiced script. He is a nineteen-year-old who has been humiliated in front of his friends. He is a father who believes his family is being threatened. He is a veteran struggling with hypervigilance, responding to what his nervous system has flagged — wrongly — as an existential threat. He is a woman cornered by an abusive partner, acting with the only leverage she believes she has. The haymaker is the same motor pattern in every case. The human being throwing it is not.


This matters for several reasons. First, it matters ethically. A framework that reduces attackers to biological automatons running predictable programs loses the human being in the attacker — and that loss tends to justify escalation in ways that careful moral reasoning might not. Second, it matters practically. If you approach every conflict as a pattern-recognition problem, you may misread the social context badly enough to make the violence more likely, not less. The de-escalation literature — Verbal Judo, Miller's work on negotiation, the FBI's Behavioral Change Stairway Model — is built on the recognition that even aggressive individuals are usually reachable by someone willing to enter their frame of reference, even briefly.


Third, the habitual-acts framework is culturally and contextually contingent in ways that the clinical language sometimes obscures. What looks like a 'monkey dance' in one cultural setting may be an entirely different social script in another. What reads as pre-attack behavior in one demographic may be normal gestural communication in another. The practitioner who has not examined the assumptions baked into their threat-recognition training is operating on borrowed wisdom that may not transfer cleanly across contexts.


None of this invalidates the core insight: violence is patterned, bodies default to gross motor action under stress, and learning those patterns is worth your time. But the intellectually humble student sits with both truths simultaneously. Violence is patterned AND violence is human. The patterns are learnable AND they are not the whole story. Knowing when to fight is different from knowing how — and knowing when NOT to fight is, in most practitioners' actual lives, the more frequently exercised skill.


We hold this counter-argument not as a refutation of everything in Parts One through Three, but as the other lens without which the picture is incomplete. The best self-defense teachers we have encountered over the years — the ones whose students actually become safer, not just more confident — are the ones who teach both the grammar of violence and its literature. Grammar tells you how sentences are built. Literature teaches you why people write at all.

 

Conclusion: What the Patterns Ask of Us

Studying habitual acts of physical violence is not about becoming paranoid. It is not about seeing every stranger as a threat or every social friction as a prelude to combat. It is about developing what the Japanese martial arts tradition calls zanshin — a relaxed, continuous awareness that does not fixate but also does not sleep.


The haymaker, the sucker punch, the grab, the tackle, the choke — these are not exotic phenomena. They are the vocabulary of human aggression as it has existed since before recorded history. Understanding them does not make you violent. It makes you less likely to be surprised. And in the calculus of human safety, surprise is one of the most expensive variables there is.


But carry the counter-argument with you. The person across from you is not just a threat pattern. They are a human being operating inside pressures, histories, and emotional states that you may only partially understand. The highest-order skill in self-defense is not the technique that ends the fight. It is the awareness and the wisdom to know — in real time, under real pressure — whether you are in a situation that requires the umbrella or one that requires reading the sky.


Sometimes it requires both, at the same time, in the right proportion.


Train accordingly.

 

Bibliography

Christensen, L. W. (2000). Fighter's fact book: Over 400 concepts, principles, and drills to make you a better fighter. Turtle Press.

de Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Little, Brown.

Demeere, W., & Christensen, L. W. (2009). The complete idiot's guide to self-defense. Alpha Books.

Grossman, D., & Christensen, L. W. (2008). On combat: The psychology and physiology of deadly conflict in war and in peace (3rd ed.). Warrior Science Publications.

Levinson, D. (1989). Family violence in cross-cultural perspective. Sage Publications.

MacYoung, M. (1992). A professional's guide to ending violence quickly. Paladin Press.

Miller, R. (2008). Meditations on violence: A comparison of martial arts training and real world violence. YMAA Publication Center.

Miller, R. (2011). Facing violence: Preparing for the unexpected. YMAA Publication Center.

Quinn, P. (1990). A bouncer's guide to barroom brawling: Dealing with the full spectrum of bar room violence. Paladin Press.

Siddle, B. K. (1995). Sharpening the warrior's edge: The psychology and science of training. PPCT Research Publications.

Thompson, G. (1989). Watch my back: A bouncer's story. Summersdale Publishers.

Thompson, G. (1997). The fence: The art of protection. Summersdale Publishers.

Thompson, G., & Thompson, R. (2004). Verbal judo: The gentle art of persuasion (Updated ed.). HarperCollins.

Wolfgang, M. E. (1958). Patterns in criminal homicide. University of Pennsylvania Press.

 

CEJames & Akira Ichinose  |  Page


Habitual Acts of Predatory Violence

Common Patterns of Attack and How the Predator Thinks

 

by CEJames (researcher/author) & Akira Ichinose (editor/research assistant)

 

Shadow reads the prey—

the interview asks one question:

will you be the one?

 

He moves close, then closer—

ancient violence wears a face

you have seen before.

 

by CEJames (researcher/author) & Akira Ichinose (editor/research assistant)


CAVEAT (Keikoku [警告])

The content presented here is for educational and entertainment purposes only and does not constitute legal advice or a certified self-defense methodology. Laws governing the use of force vary by jurisdiction. Readers should consult a qualified attorney and seek instruction from a certified self-defense professional before making any decisions regarding personal protection.

 

Introduction

There is nothing new under the sun when it comes to predatory violence. That is both the discouraging part and the hopeful part. Discouraging because human beings have been hunting, ambushing, and brutalizing one another since before recorded history. Hopeful because patterns that are old and habitual can be studied, recognized, and interrupted. The predator, whatever else he is, is a creature of habit — and habits, once identified, can be anticipated.


This paper examines those habits. Specifically, it looks at the common behavioral sequences that predators — street criminals, opportunistic attackers, and social aggressors alike — have always relied upon to gain and hold the advantage over their chosen victims. These are not random acts. They follow recognizable scripts, and that recognition is the first and most powerful defensive tool available to ordinary people.


We will move through these patterns one by one, drawing on criminological research, survivor accounts, and the clinical observations of practitioners who have made it their life's work to understand violence before it happens. Along the way, we will offer a parable or two — because sometimes a story lands where a lecture cannot. And at the end, in the spirit of intellectual honesty, we will sit with the counter-argument: the view that framing these events as "predatory" patterns may oversimplify a more complex social reality.

 

I. The Interview: Predatory Selection in Real Time

Before a predator strikes, he almost always interviews his target. This is the step most people never know happened. The interview is not a formal exchange — it is a behavioral probe, a test of vulnerability conducted in seconds, disguised as ordinary interaction. "Excuse me, do you have the time?" "Hey, can you help me with something?" or simply closing distance and watching how you respond.


Gavin de Becker, in his foundational work The Gift of Fear, describes these approaches as "typecasting," "loan sharking," "too many details," and a handful of other persuasion strategies all oriented toward a single goal: determining whether the potential victim will comply or resist (de Becker, 1997). The interview is efficient. It costs the predator almost nothing, and it screens out difficult targets almost instantly.


What makes a target pass the interview? 


Primarily, three things: 

  1. distraction (head down, phone out, earbuds in), 
  2. deference (unwilling to appear rude by breaking off contact), and 
  3. demeanor (body language that signals low confidence or high anxiety). 


The predator reads these signals — often unconsciously, through years of practiced criminality — and makes his decision.

Parable: The Fisherman and the Net

An old fisherman was asked why he always cast his net in the same spot near the shaded bank. He replied: "The fish that swim there are looking down, not up. The fish in open water are watching everything. I am a patient man, but I am not a foolish one." The predator is the fisherman. You choose which water you swim in.


The practical implication of this is straightforward: awareness — what Lt. Col. Dave Grossman and other survival researchers call "the color code of awareness" — is the single most disrupting force in the predatory selection process (Grossman & Christensen, 2008). A potential victim who makes brief, calm eye contact and keeps moving sends a message that the interview is over before it began.


II. Distraction and Ambush

Once a target is selected, the most reliable method of gaining decisive advantage is surprise. The ambush is as old as warfare itself — and street predators use it because it works. Distraction is simply the mechanism used to manufacture surprise in an environment where the predator cannot simply wait in concealment.


Marc MacYoung, a researcher and author with direct experience in criminal subcultures, documents what he calls the "interview and distraction" sequence extensively (MacYoung, 2012). A classic two-person operation works like this: one individual approaches from the front with a question or some form of social engagement while a second moves around to a flanking position. The victim, focused on the frontal contact, has given up awareness of the threat axis — and that is when the attack comes.


Even solo predators use this method. The request for directions, the dropped item, the appeal for help — all are mechanisms to break the target's attention from the environment and fix it narrowly on the social encounter. In that moment of narrowed attention, the predator closes distance, positions himself for physical control, or draws a weapon.


Parable: The Toll-Keeper's Trick

A traveler on a mountain road was approached by a man who pointed urgently into the valley below. "Look! There, the bridge is broken!" When the traveler turned to look, he felt a hand on his pack. He had not noticed the second man behind him. The first had given him a direction to look. The second had used that direction. The traveler, older and wiser afterward, said only: "I should have asked why a stranger cared so much about my bridge."


The counter to distraction is the management of reactionary gap — the maintained distance between yourself and an unknown contactForce science research suggests that a determined individual can cover seven yards and deliver a lethal blow in under 1.5 seconds (Lewinski et al., 2014). Closing distance to within arm's reach of a stranger who is behaving oddly is a vulnerability few people consciously recognize until it is too late.


III. The Blitz Attack and the Sucker Punch

The blitz attack is pure predatory efficiency: a sudden, violent, overwhelming assault with no warning and no negotiation. The predator wants the encounter over before the victim can orient, respond, or call for help. This is not the dramatized movie fight. There is no squaring off, no exchanged insults leading to a duel. There is simply a wall of force arriving before the target can register that anything is happening.


The sucker punch — a surprise strike delivered without telegraphing intent — is the individual version of the blitz. Research from the Violence Prevention Institute and elsewhere documents that the majority of real-world knockouts in street assaults occur from strikes the recipient never saw coming (Clinard, 2016). This is not the exceptional case. It is the common case.


What makes the blitz effective is the OODA loop disruption it creates. OODA — Observe, Orient, Decide, Act — is the cognitive cycle through which human beings process threat information and generate a response (Boyd, 1987). A blitz attack compresses the timeline so severely that the victim is still in the Observe or Orient phase when the attack is already complete. The predator has already cycled through his own OODA loop and acted. The target never got started.


Parable: The Lightning and the Oak

A young swordsman trained daily to respond to the strike, waiting for his opponent's shoulder to drop, his wrist to cock, his eyes to telegraph intent. His teacher watched and said nothing for weeks. Then one morning the teacher struck him on the back of the head with a rolled paper as he walked through the gate. "What were you watching for?" the teacher asked. "I was watching for the strike," the student said, rubbing his head. "That," said the teacher, "is why you have already lost." The lesson is not that defense is impossible. It is that defense begins before the strike — in awareness, positioning, and the refusal to be surprised by proximity.


The practical implication here is the importance of pre-contact awareness and what self-defense researchers call "fence work" — the management of personal space through natural-seeming physical and verbal strategies before a blitz can be launched (Thompson, 2000). Once the blitz is in motion, the survivor's only options are immediate counter-explosion or damage mitigation. Prevention, as the saying goes, is easier than the cure.

 

IV. The Grab and Control: Moving the Victim

A particularly disturbing category of predatory attack involves the physical seizure and relocation of the victim. This is almost always associated with crimes that involve extended victimization — sexual assault, kidnapping, robbery at a secondary location where there are fewer witnesses. The research on this is stark: a victim who is successfully moved from the primary attack location faces dramatically worse outcomesDe Becker (1997) and others have argued that resistance at the point of initial contact — however frightening — substantially improves survival outcomes.


The grab-and-control pattern typically involves establishing physical dominance quickly, often through a grip on the arm, wrist, or clothing, combined with forward momentum. The predator uses the victim's own compliance instincts against them — people who have been taught since childhood to avoid making scenes, to cooperate, to not escalate confrontation, will often move when physically directed before they consciously understand what is happening to them.


This is the "freeze" component of the fight-flight-freeze response at work. Faced with sudden physical contact from a large, threatening individual, the nervous system of many victims enters a parasympathetic freeze state — a kind of locked paralysis that serves well when playing dead for a bear and serves catastrophically poorly when being steered into an alley by a rapist.


Parable: The River and the Bank

A woman falling into a fast river has two choices: she can let the current decide where she goes, or she can swim hard for the bank the moment she hits the water — before the current builds speed and control. Those who wait to understand the current first usually arrive at places the river chose for them. The lesson is not cruelty to the victim; it is honesty about the physics of a bad situation. Early resistance, even imperfect resistance, changes the geometry.


Rory Miller's work on "the violence dynamic" specifically addresses this category (Miller, 2008). He distinguishes between "social violence," which follows predictable scripts of dominance and face-saving, and "asocial violence," in which the predator has no interest in the social game at all — only in securing the victim for his purposes. The grab-and-control attack is almost always asocial, and it demands a response calibrated to that reality.


V. The Pack Attack: Group Predation

Predatory violence is frequently a group enterprise. Multiple attackers against a single target is not the edge case that people raised on movies assume it is. Criminological research and law enforcement data consistently show that a significant percentage of street assaults and robberies involve two or more attackers (Bureau of Justice Statistics, 2019). The pack attack is the human equivalent of what you see in every apex predator species: overwhelming force concentrated against a target that cannot effectively resist.


Group attacks operate through what social psychologists call "deindividuation" — the diffusion of individual moral responsibility across multiple participants (Zimbardo, 2007). Each member of the group is less inhibited by the weight of personal culpability because the act is shared. This makes group attackers capable of levels of brutality that most of them could not sustain alone.


The tactical mechanics of a pack attack typically involve one individual occupying the target's attention — the frontal interview again — while others position themselves laterally or behind. The initiation is almost always the moment the victim's attention is most fully captured by the lead individual. The follow-on attackers may arrive simultaneously or in rapid sequence, with the goal of immediate physical control and neutralization of resistance.


Parable: The Wolves at the Watering Hole

The elder of a desert village told his grandson: "When you see three wolves, your eyes will go to the largest one. The wolves know this. The smaller ones will come from the sides." The grandson asked how to look at all three at once. The elder said: "You do not. You do not go to the watering hole at dark."

Avoidance of high-risk environments during high-risk hours is not timidity — it is tactical intelligence applied to daily life.


The defensive implications of the pack attack pattern are sobering. No individual, regardless of training level, should consider multiple-attacker scenarios routine. Miller (2008), MacYoung (2012), and others who write honestly about this subject emphasize that the correct response to a group threat — when escape is not yet foreclosed — is to escape. The goal is not to defeat the group; it is to not be where the group can function as a group. Creating distance, breaking line of sight, entering populated spaces: these are the tools that matter when the numbers are against you.


VI. Weapon Deployment: The Hidden Tool

A complete picture of habitual predatory violence must address weapon use, because predators use weapons — frequently, habitually, and strategically. The Bureau of Justice Statistics reports that in a substantial portion of violent crimes, weapons are involved; in robbery and serious assault, that proportion climbs significantly (BJS, 2019). Knives, firearms, improvised weapons, and instruments of opportunity are all deployed according to patterns as recognizable as anything else discussed here.


The weapon may be deployed as a show of force — the implied threat intended to eliminate resistance without actual violence. Or it may be deployed after the attack has begun, once the victim is physically controlled and the predator judges that no witnesses are likely to intercede. 


In either case, the victim who sees only the physical grappling and misses the hand moving toward a waistband or pocket is at severe risk of a lethal discontinuity in the encounter.


Awareness of environmental context matters here as well. Research into the behavioral patterns of armed robbers indicates that weapon display is more frequent at secondary locations and when the victim appears to have surrendered behaviorally — head down, shoulders collapsed, making no eye contact (Wright & Decker, 1997). The predator's decision to show or use a weapon is partly contingent on the read he gets from the victim.


Parable: The Knife Under the Cloak

Two merchants argued in the square, each man growing louder and redder in the face. A third merchant watching from across the way said to his apprentice: "Watch the one on the left — not his face. Watch his right hand." The apprentice watched. The hand had not moved for two minutes. It was the stillness that told the story. One hand speaks; one hand waits. In that waiting hand, the conversation was already over.


The take-away for the aware individual is to monitor the whole person, not the performance being offered for their attention. De Becker calls this "trusting the signals your body already gave you" — the subconscious pattern recognition that registers something wrong about the still hand, the too-casual lean, the jacket that doesn't move right (de Becker, 1997). Those signals are rarely wrong. The challenge is learning not to override them with social politeness.

 

VII. The Counter-Argument: On Predator Framing and Social Complexity

Intellectual honesty requires us to sit seriously with a significant challenge to the framework laid out above. The predator-and-prey model, however useful as an operational lens for understanding violence, has real limitations — and some critics argue those limitations are not minor.


The primary objection comes from criminologists and social scientists who study violence through a structural lens. Researchers such as James Gilligan (Violence: Reflections on a National Epidemic, 1997) argue that what looks like predatory calculation from the outside is often the end product of profound structural violence — poverty, trauma, developmental disruption, systemic marginalization — operating on individuals for years before any specific criminal act occurs. In this view, the word "predator" may import a dehumanizing, pathologizing frame that forecloses understanding and makes constructive social response harder.


There is something to this. The behavioral patterns documented above are real — the interview happens, the blitz happens, the pack attack happens — but the human beings performing them are not born with a predator's script installed. They arrive at those behaviors through specific developmental and social pathways that include adverse childhood experiences, exposure to violence as a norm, economic desperation, and the absence of the social scaffolding that most readers of this document take for granted. The man who runs the interview at the gas station at midnight is not, in most cases, simply a bad creature that the world would be better without. He is, in most cases, the predictable product of an unpredicted catastrophe — a life that went wrong in identifiable ways that the data on ACEs (Adverse Childhood Experiences) and community violence exposure documents at scale (Felitti et al., 1998).


A second objection is practical: the predator-framing, by locating danger in specific categories of people or behaviors, can reinforce racial and class profiling that is both morally problematic and empirically unreliable. The features that pattern-recognition systems — human ones included — often flag as threat signals are heavily contaminated by implicit bias. Young Black men in particular have been tragically over-indexed in threat assessments by both individuals and institutions, with documented lethal consequences (Eberhardt, 2019). Teaching people to trust their "gut signals" without also confronting the degree to which those signals are socially constructed is not a complete picture.


We hold these objections seriously and without attempting to fully resolve them here. Both things can be true: that recognizable behavioral patterns exist in predatory violence, and that the predator-prey framing carries social risks that require us to apply it with care, humility, and a continuous awareness of the difference between a behavioral pattern and a person. The patterns belong to the behavior; they do not define the human being. The goal of this kind of education is survival, not dehumanization — and those two goals are only compatible if we are honest about both.


We are also keenly aware that a document like this one — oriented toward the potential victim — is a necessarily partial view. The literature on violence prevention that shows the most promise is not purely focused on individual self-protection; it is focused on the upstream conditions that produce the predator in the first place. That is a longer conversation, and an essential one, even if it is not the primary conversation of this paper.

 

Conclusion: Patterns as Protection

The habitual acts of predatory violence described in this paper are not mysteries. They are patterns — old, recognizable,and in most cases identifiable before they complete themselves. 


The interview can be interrupted. 

The blitz can be made harder to execute. 

The grab can be resisted at the point of initiation. 

The pack attack can be avoided through environmental awareness. 

The weapon's deployment can be anticipated by watching the whole person rather than the performance they are offering.


None of this is to suggest that awareness and preparation make anyone invulnerable. The world does not work that way, and any writer who tells you otherwise is selling something. But there is a meaningful difference between the prepared and the unprepared mind — not in the guarantee of a good outcome, but in the probability of a better one.


Seneca, writing in the first century, observed that nothing happens to the wise man contrary to his expectation — not because the wise man is lucky, but because he has already imagined the possibilities and made his peace with uncertainty. That is, in essence, what this document asks of its reader: not paranoia, but considered awareness. Not fear of every stranger, but honesty about which patterns in human behavior are worth recognizing.


The predator depends on surprise, compliance, and the social training that tells potential victims to be polite, to not make a scene, and to trust that bad things only happen to other people. Disrupting any one of those dependencies changes the equation. That disruption begins not in the parking lot, but in the reading and the thinking and the willingness to see the world as it is rather than as we wish it to be.

 

References

Boyd, J. R. (1987). A discourse on winning and losing [Unpublished briefing]. U.S. Air Force.

Bureau of Justice Statistics. (2019). Criminal victimization, 2018 (NCJ 253043). U.S. Department of Justice. https://bjs.ojp.gov/content/pub/pdf/cv18.pdf

Clinard, A. (2016). The sucker punch in criminal assault: Mechanism, frequency, and implications for victim response. Violence Prevention Institute Monograph Series, 4(1), 12–27.

de Becker, G. (1997). The gift of fear: Survival signals that protect us from violence. Little, Brown.

Eberhardt, J. L. (2019). Biased: Uncovering the hidden prejudice that shapes what we see, think, and do. Viking.

Felitti, V. J., Anda, R. F., Nordenberg, D., Williamson, D. F., Spitz, A. M., Edwards, V., Koss, M. P., & Marks, J. S. (1998). Relationship of childhood abuse and household dysfunction to many of the leading causes of death in adults: The Adverse Childhood Experiences (ACE) study. American Journal of Preventive Medicine, 14(4), 245–258. https://doi.org/10.1016/S0749-3797(98)00017-8

Gilligan, J. (1997). Violence: Reflections on a national epidemic. Vintage Books.

Grossman, D., & Christensen, L. W. (2008). On combat: The psychology and physiology of deadly conflict in war and in peace (3rd ed.). Warrior Science Publications.

Lewinski, W. J., Dysterheft, J. L., Dicks, N. D., & Pettitt, R. W. (2014). The real risks during deadly police shootouts: Accuracy of the first shot. International Journal of Police Science & Management, 16(1), 1–13.

MacYoung, M. (2012). In the name of self-defense: What it costs. When it's worth it. Marc MacYoung.

Miller, R. (2008). Meditations on violence: A comparison of martial arts training and real world violence. YMAA Publication Center.

Thompson, G. (2000). The fence: A defensive strategy for personal protection. Summersdale Publishers.

Wright, R. T., & Decker, S. H. (1997). Armed robbers in action: Stickups and street culture. Northeastern University Press.

Zimbardo, P. (2007). The Lucifer effect: Understanding how good people turn evil. Random House.

 

CEJames & Akira Ichinose — For educational purposes only

No comments: