Cr i mi nol ogy, Cr i mi nalJust i ce, Law &Soci et y ATr ansdi sci pl i nar yJour nalof Schol ar l yI nqui r y,Pol i cy,Pr act i ce,&Pedagogy Fomer l yWest er nCr i mi nol ogyRevi ew, CCJLSi st heOf f i ci alJour nalofTheWest er nSoci et yofCr i mi nol ogy EI SSN2332886X ABOUT THE JOURNAL Criminology, Criminal Justice, Law & Society (CCJLS), formerly Western Criminology Review (WCR), is the official journal of the Western Society of Criminology. This peer-reviewed journal builds on the mission of its predecessor by promoting understanding of the causes of crime; the methods used to prevent and control crime; the institutions, principles, and actors involved in the apprehension, prosecution, punishment, and reintegration of offenders; and the legal and political framework under which the justice system and its primary actors operate. Historical and contemporary perspectives are encouraged, as are diverse theoretical and methodological approaches. CCJLS publishes theoretical and empirical research on criminology, criminal justice, and criminal law and society; practice-oriented papers (including those addressing teaching/pedagogical issues); essays and commentary on crime, law, and justice policy; replies and comments to articles previously published in CCJLS or WCR; book and film reviews; and scholarly article reviews. CO-EDITORS Henry F. Fradella, Arizona State University, School of Criminology and Criminal Justice Aili Malm, California State University, Long Beach, School of Criminology, Criminal Justice, and Emergency Management Christine S. Scott-Hayward, California State University, Long Beach, School of Criminology, Criminal Justice, and Emergency Management EDITORIAL STAFF Co-Managing Editor: Co-Managing Editor: Copy-Editor: Consulting Editor: Consulting Editor: Xochitl Escutia, California State University, Long Beach Chantal Fahmy, Arizona State University Vanessa Burrows, California State University, Long Beach Stuart Henry, San Diego State University Christine Curtis, San Diego State University EDITORIAL ADVISORY BOARD Martin A. Andresen, Simon Fraser University Hadar Aviram, University of California, Hastings Susan Bandes, De Paul University Gisela Bichler, California State University, San Bernardino Martin Bouchard, Simon Fraser University Kate Bowers, University College London Joel Caplan, Rutgers University Meda Chesney-Lind, University of Hawaii at Manoa Finn Esbensen, University of Missouri, St. Louis Patricia Ewick, Clark University Marcus Felson, Texas State University Ben Fleury-Steiner, University of Delaware Jona Goldschmidt, Loyola University Chicago Angela Gover, University of Colorado, Denver Michael R. Gottfredson, University of California, Irvine Marie Griffin, Arizona State University Craig Hemmens, Washington State University Stuart Henry, San Diego State University John Hipp, University of California, Irvine Anne Hobbs, University of Nebraska, Omaha Beth Huebner, University of Missouri, St. Louis Shane Johnson, University College London Delores Jones-Brown, John Jay College of Criminal Justice David Klinger, University of Missouri, St. Louis Mona Lynch, University of California, Irvine Daniel Macallair, Center on Juvenile and Criminal Justice Lisa Pasko, University of Denver Ray Paternoster, University of Maryland Kim Rossmo, Texas State University Jonathan Simon, University of California, Berkeley Michael R. Smith, University of Texas at El Paso Don Stemen, Loyola University Chicago Richard Tewksbury, University of Louisville Christopher Totten, Kennesaw State University Michael Townsley, Griffith University William C. Thompson, University of California, Irvine Bonita Veysey, Rutgers University Michael D. White, Arizona State University Kevin Wright, Arizona State University Frank Zimring, University of California, Berkeley COPYRIGHT CCJLS retains all copyrights to articles and materials published herein. All individuals and entities are required to apply the same principles of copyright fair use that apply to printed publications. CCJLS articles and materials may be read online and downloaded for strictly personal use. CCJLS articles and materials may not, however, be copied for or distributed to other individuals or organizations for either resale or profit. For further information, including permissions to reproduce or reuse any CCJLS articles and materials beyond those authorized by the fair use doctrine, email [email protected]. E-ISSN 2332-886X Copyright © 2014 by Criminology, Criminal Justice, Law & Society and The Western Society of Criminology Hosting by Scholastica. All rights reserved. i VOLUME 16, ISSUE 1 – APRIL 2015 TABLE OF CONTENTS Feature Articles Dark Network Resilience in a Hostile Environment: Optimizing Centralization and Density Sean F. Everton and Dan Cunningham ........................................................................................................... 1 Correlates of Violence within Washington State Prisons Kerryn E. Bell and Dale M. Lindekugel........................................................................................................ 21 Seeing Saw through the Criminological Lens: Popular Representations of Crime and Punishment J. C. Oleson and Tamara MacKinnon ........................................................................................................... 35 Help-Seeking Behavior among Same-Sex Intimate Partner Violence Victims: An Intersectional Argument Megan Marie Parry and Eryn Nicole O’Neal ................................................................................................ 51 ii CCJLS Acknowledgements This issue of CCJLS was supported by generous contributions from: iii VOLUME 16, ISSUE 1, PAGES 1–20 (2015) Criminology, Criminal Justice Law, & Society E-ISSN 2332-886X Available online at https://scholasticahq.com/criminology-criminal-justice-law-society/ Dark Network Resilience in a Hostile Environment: Optimizing Centralization and Density Sean F. Everton and Dan Cunningham Naval Postgraduate School ABSTRACT AND ARTICLE INFORMATION In recent years, the world has witnessed the emergence of violent extremists (VEs), and they have become an ongoing concern for countries around the globe. A great deal of effort has been expended examining their nature and structure in order to aid in the development of interventions to prevent further violence. Analysts and scholars have been particularly interested in identifying structural features that enhance (or diminish) VE resilience to exogenous and endogenous shocks. As many have noted, VEs typically seek to balance operational security and capacity/efficiency. Some argue that their desire for secrecy outweighs their desire for efficiency, which leads them to be less centralized with few internal connections. Others argue that centralization is necessary because security is more easily compromised and that internal density promotes solidarity and limits countervailing influences. Unsurprisingly, scholars have found evidence for both positions. In this paper, we analyze the Noordin Top terrorist network over time to examine the security-efficiency tradeoff from a new perspective. We find that the process by which they adopt various network structures is far more complex than much of the current literature suggests. The results of this analysis highlight implications for devising strategic options to monitor and disrupt dark networks. Article History: Keywords: Received 26 April 2014 Received in revised form 9 Sept 2014 Accepted 17 Sept 2014 dark networks, terrorism, social network analysis. © 2015 Criminology, Criminal Justice, Law & Society and The Western Society of Criminology Hosting by Scholastica. All rights reserved. Violent extremist networks (aka covert networks, dark networks) are an ongoing concern for countries around the globe. Their nature and structure have been examined for the purpose of developing interventions that destabilize, disrupt, or otherwise prevent further violence. Identifying structural features that enhance (or diminish) their resilience to exogenous and endogenous shocks is of particular interest. As many have noted, groups generally seek to balance operational security and capacity/efficiency (see e.g., Combatting Terrorism Center, 2006; Crossley, Edwards, Harries, & Stevenson, 2012; McCormick & Owen, 2000; Morselli, Giguère, & Petit, 2007). A consensus, however, has not been reached as to which features enhance the ability of dark networks to maintain such a balance. For example, existing literature offers two somewhat conflicting hypotheses about the relationship between network structure and operational security. Some argue that when the desire for secrecy outweighs the desire for efficiency, dark networks tend to be internally sparse and decentralized (Baker & Faulkner, 1993; Enders & Su, 2007; Raab & Milward, 2003). Others argue just the Corresponding author: Sean F. Everton, Naval Postgraduate School, 1 University Circle, Monterey, CA, 93943, USA. Email: [email protected] 2 EVERTON AND CUNNINGHAM opposite: the desire for secrecy leads dark networks toward high levels of centralization and density. Centralization is necessary because security can be compromised when transactions have to traverse long paths, and this can be overcome when a central hub coordinates activity (Lindelauf, Borm, & Hamers, 2009). They also contend that density is the norm among dark networks because it promotes solidarity and limits countervailing influences (Coleman, 1988), as well as the fact that they recruit primarily along lines of trust (Erickson, 1981). Evidence has been found for several points of view regarding the security-efficiency tradeoff (Crossley et al., 2012; Everton & Cunningham, 2013). One reason is because how one measures centralization and density profoundly affects one’s results and conclusions (Crossley et al., 2012). For example, centralization is often based on degree centrality (Freeman, 1979), but it is unclear whether this best captures the type of centralization found in dark networks. Measurement problems exist in terms of density as well. For example, because the standard density measure is inversely associated with network size, large and geographically dispersed networks will typically exhibit lower levels of density. A second factor contributing to the opposing views regarding the security-efficiency tradeoff is that most studies have not fully accounted for the multirelational nature of dark networks (Crossley et al., 2012) or have failed to outline the types of relationships under examination (Lindelauf et al., 2009). Most have focused on a single type of relation, usually communication ties, but dark network actors are embedded in a range of relationships. A final reason is that a majority of studies do not account for the environment in which these covert networks operate. Covert networks are hardly static. They not only change in response to their own operational goals but also to the strategic choices of their opponents. In this paper we consider how the structure of dark networks can vary in response to both its own goals and the strategies adopted by authorities. It proceeds as follows. We begin by examining the strategic tradeoffs that terrorists and other insurgent groups face. These groups generally seek (or at least should seek) to balance operational efficiency and security, which we operationalize in terms of network centralization and interconnectedness, respectively. This leads to a series of hypotheses as to what we might expect as we observe a dark network over time. Next, we turn to this paper’s empirical setting: namely, terrorism and insurgency in Indonesia and the strategic approaches adopted by the Indonesian authorities in their attempts to combat these dark networks. We then discuss the data and methods used in our analysis. We then present the results, which show that the process by which dark networks adopt various network structures is far more complex than much of the current literature suggests. We conclude by discussing various limitations of our study and suggestions for future research. Literature Review Network Centralization Operational efficiency is largely affected by the ability of insurgencies to mobilize people and resources (McCormick, 2005; McCormick & Owen, 2000). Some scholars suggest centralized networks are positively associated with operational efficiency (Baker & Faulkner, 1993; Morselli, 2009) and are more effective in mobilizing people and resources because they facilitate an efficient decision-making process (Enders & Jindapon, 2010), which enhances strategic planning and creates accountability and standards among network members (Tucker, 2008). They can also facilitate the transfer of resources due to shorter path lengths between leaders and other network actors (Lindelauf et al., 2009). Thus, it is not surprising that several relatively successful dark networks have been considered centralized networks built around charismatic leaders. Enders and Sandler (2006), for example, suggest that the centralized nature of Aum Shinrikyo in the 1990s facilitated its ability to successfully launch a sarin gas attack on the Tokyo subway, while the decentralized structure of Al Qaeda has reduced its ability to attain and launch a CBRN attack.1 To be sure, many of these characterizations have been largely qualitative in nature and lack standard social network analysis measures.2 Nevertheless, they do suggest that centralization is often positively associated with the command and control of dark networks. Centralization can be a mixed blessing, however. Research suggests that less centralized organizations are able to adapt more quickly to rapidly changing environments (Arquilla, 2009) and are less vulnerable to the removal of key members (Bakker, Raab, & Milward, 2011; Sageman, 2003, 2004). Many dark networks, in particular terrorist networks, are often assumed to adopt cellular and distributed forms of network structure (Carley, Dombroski, Tsvetovat, Reminga, & Kamneva, 2003). This allows small cells to operate relatively independently with lower operational costs, which in turn allows them to more easily adjust to a rapidly changing environment than can hierarchically-structured networks (Kenney, 2007). Moreover, less centralized networks are more likely to withstand shocks, such as the capture of a key member, because much of the remaining network Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT goes untouched and is capable of continuing operations. However, dark networks that are too decentralized may find it difficult to mobilize resources. Moreover, they run the risk of having individuals or small cells go “rogue” and conduct operations not aligned with their operational interests. This suggests that an optimal level of centralization exists for covert networks and it is likely to change over time. One could argue that dark networks will shift toward the centralized-side of the continuum when mobilization and the transfer of resources is its primary focus (e.g., just prior to an attack). On the other hand, they are more likely to decentralize when adaptability takes precedence, such as in the aftermath of an operation. In addition, network centralization is almost certainly a function of environmental context (Everton, 2012b). In relatively friendly environments where adaptability is less crucial and the risk for losing key actors is low, covert networks will probably be more centralized. However, if the environment becomes more hostile, they will move toward the decentralized end of the spectrum. For example, anecdotal evidence suggests that prior to 9/11 al Qaeda was somewhat centralized, but after it came under attack from coalition forces, it adopted a much more decentralized organizational structure (Sageman, 2008). In any case, these factors suggest that cross sectional analyses are ill equipped to fully understand network dynamics. Network Innerconnectedness There is little debate that groups recruit primarily through their social ties. For instance, Lofland and Stark’s (1965; see also, Stark, 1996) study of conversion to the Unification Church discovered that those who ultimately joined tended to be those whose ties to group members exceeded their ties to 3 nonmembers. Similarly, Stark and Bainbridge (1980) found that while the door-to-door efforts of Mormon missionaries were relatively unsuccessful, when missionaries met non-Mormons in the homes of Mormon friends, they enjoyed a success rate close to 50 percent. Why? Because such meetings occurred only after lay Mormons had built close personal ties with these non-Mormons and essentially brought them into their networks. A meta-analysis by Snow and his colleagues (Snow, Zurcher, & Ekland-Olson, 1980) and McAdam’s (1986; see also, McAdam & Paulsen, 1993) examination of the 1964 Freedom Summer campaign uncovered a similar dynamic: Successful social movements recruit primarily through their social ties (Snow et al., 1980, p.791). And finally, Sageman’s (2003, 2004) analysis of the global Salafi jihad (GSJ) discovered that 83% of members were recruited through friendship, kinship, or mentorship ties. Because security is of primary concern for dark networks, they tend to recruit along lines of trust (Passy, 2003). Not doing so can be dangerous, as Ramzi Yousef, one of the 1993 World Trade Center bombers, learned the hard way. As long as he recruited through strong ties, he successfully evaded the authorities, but when he enlisted an unfamiliar South African student, his luck ran out. After Yousef asked the student to take a suspicious package to a Shiite mosque, the student called the U.S. embassy, which led to Yousef’s arrest and later extradition to the U.S (Sageman, 2004, p.109-110). Recruitment through strong ties suggests that the networks will become increasingly dense over time as ties form between previously unlinked actors. This is due to the phenomenon that Granovetter (1973) referred to as the “forbidden triad” that eventually leads to an increase in group density (Figure 1). Figure 1: Granovetter’s Forbidden Triad Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 4 EVERTON AND CUNNINGHAM Dense networks consisting of numerous strong ties bring an important benefit to dark networks: They minimize defection because they are better able to monitor behavior (Finke & Stark, 1992, 2005; Granovetter, 2005), appropriate solidary incentives (McAdam, 1982, 1999; Smith, 1991), and solve coordination problems (Chwe, 2001). Dark networks that minimize defection are generally more successful than those that do not. In fact, they often “prefer” having members killed over having them defect because “if one activist decides to defect, the whole organization is vulnerable to the defector’s subsequent actions” (Hafez, 2004, p. 40), and they typically have to alter their plans and lie low for an unspecified amount of time (Berman, 2009, p. 29). Security concerns not only lead members of dark networks to recruit primarily through strong ties, but they also lead them to limit their ties with outsiders because it helps minimize the presence of ideas and other countervailing influences that could challenge a group’s worldview. However, while limiting external ties can improve a group’s security, dark networks that are entirely isolated from the outside world are unlikely to sustain their movement over the long term (Jackson, Petersen, Bull, Monsen, & Richmond, 1960) because they need links to other groups in order to gain access to important information and other material and nonmaterial resources (e.g., weapons, materials, new recruits). As others have noted, external ties are vital for any group or organization attempting to survive in a rapidly changing environment (Uzzi, 1996, 2008; Uzzi & Spiro, 2005), and this is simply more acute for insurgent groups because they face not only a constantly shifting environment, but one that is hostile at that. Hypotheses Because dark networks seek to maintain an optimal level of centralization as well as balance between internal and external ties, we should expect such levels to vary in light of operational goals and events on the ground. Of course, some changes in network structure occur not by design but unwittingly. An important insight of social network theory is that the individual choices that actors make (e.g., forming or dissolving a tie) can sometimes cause changes in network structure of which they did not intend or are even aware (Maoz, 2011). Nevertheless, as noted above, we expect dark networks to move toward the centralized-side of the continuum when mobilization of resources is the group’s primary focus, such as just prior to an attack, but are likely to decentralize when adaptability and flexibility take precedence, such as in the aftermath of an operation. This can be stated more formally as follows: Hypothesis 1a: Because of the need to mobilize resources for an operation, dark networks will become more centralized just prior to an attack. Hypothesis 1b: Because of a need to be adaptable after an operation, dark networks will seek to become less centralized after an attack. Pre- and post-operation considerations may also affect their relative number of external ties. In particular, just prior to an operation, they may increase the number of their external ties, while after an operation, they may seek to sever them: Hypothesis 2a: Because dark networks often need to access external resources in order to carry out operations, they will increase the relative number of their external ties prior to an attack. Hypothesis 2b: Because immediately after an operation dark networks have less need to access to resources, they will decrease the relative number of their external ties shortly after an attack. However, a dark network’s relative number of external ties and centralization level will not only adapt in order to meet its operational goals, but it will also adapt to its external environment, in particular the efforts of authorities to disrupt it. Counterinsurgents have a wide variety of strategies at their disposal for disrupting dark networks. Roberts and Everton (2011) have outlined a variety of strategic options available to those seeking to disrupt insurgencies and other types of dark networks. They divide strategies into two broad types: kinetic and non-kinetic. Kinetic strategies involve aggressive and offensive measures that seek to eliminate or capture network members and their supporters, while nonkinetic strategic approaches are more holistic and use a variety of non-coercive means, such as institution building, psychological operations (PsyOps), rehabilitation and reintegration programs, information operations (IO), and the tracking and monitoring of key network members (Everton, 2012a), in order to sever the ties between the local population and the insurgency, ultimately draining it of its material and nonmaterial resources. For different reasons we expect that (successful) kinetic and non-kinetic approaches lead dark networks to become increasingly isolated. Kinetic approaches accomplish this by causing the environment in which Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT dark networks operate to become more hostile, while non-kinetic approaches do so by cutting dark networks off from the local population: Hypothesis 3a: Because kinetic operations create a hostile environment, dark networks will become increasingly isolated in response to kinetic operations. Hypothesis 3b: Because non-kinetic operations seek to sever ties between dark networks and the local population, dark networks will become increasingly isolated in response to non-kinetic operations. It is less clear what effect kinetic and non-kinetic operations will have on the centralization level of dark networks, so at this time we offer no hypotheses regarding the effectiveness of each strategy, nor is it clear what is desirable. On the one hand, causing dark networks to become increasingly centralized may allow them to mobilize resources, but at the same time it will increase their vulnerability to targeted attacks. On the other, causing dark networks to become less centralized may diminish their ability to carry out attacks, but at the same time, it will make them more difficult to monitor and disrupt. We now turn to a brief overview of Indonesian militancy, which serves as the empirical setting for testing these hypotheses. Empirical Setting: Indonesia In the early 1950s, a series of rebellions against the newly independent Indonesian state began in several parts of the country (Conboy, 2006, p. 5). The establishment of an Islamic state, along with other motivations such as socio-economic reform, brought many of these rebellions together under the movement known as Darul Islam (DI), which was led by Soekarmadji Maridjan Kartosoewirjo until his capture in 1962. The movement subsequently faced many challenges through the 1960s, such as numerous defections, a leadership vacuum, and contentious debates regarding strategy, all of which inspired several efforts to reestablish a more cohesive movement in the 1970s and in the 1980s. The most well-known product of these efforts, Komando Jihad (KJ), consisted of several members of the old DIguard; it aimed to re-launch a revolution against the state despite its complicated relationship with the newly established Suharto regime (Conboy, 2006). DI’s influence and its early offshoots on today’s militant groups in Indonesia cannot be understated. Almost every jihadist organization in the country since the 1950s has its roots in DI, including the 5 majority of groups active over the last decade, such as Jemaah Islamiyah (JI) and Noordin Top’s network. Its influence, according to the International Crisis Group’s Sidney Jones (2009), stems from a host of factors, such as personal and kinship relations that stretch across generations and are deeply embedded in militant circles today, its employment of tactics such as the use of Fa’i,3 its strategy of developing a secure area of operation from which it could fight the state,4 and its leadership and involvement in conflicts, such as the Soviet-Afghan War (1979-1989), the communal conflict in Ambon and Poso, and the conflict on the island of Mindanao in the southern Philippines, which helped establish ties among militant organizations within Indonesia and across the region. The group from the DI-genealogy receiving the most attention since September 11th has been JI. Originally formed as a breakaway faction of DI, it has its roots in the Soviet war in Afghanistan. The organization’s founders, Abdullah Sungkar and Abu Bakar Ba’asyir, were prominent members of DI and among the first to send Indonesian fighters to Camp Sadda in Pakistan around 1985, where many future JI leaders learned skills they would eventually bring back with them. The organization, which was formally established in 1993, initially aimed to create an Indonesian Islamic state, a goal that was eventually expanded into the establishment of a regional caliphate. JI grew increasingly violent through its support and participation in Indonesian communal conflicts in late-1990s and early-2000s. It is best known for the October 2002 Bali bombings that resulted in 202 deaths and attracted headlines across the globe. Indonesian authorities severely cracked down on JI in the aftermath of the bombings and many of its key leaders were detained or killed. All this appears to have created a leadership vacuum into which Noordin Mohammed Top stepped. A member of JI, Noordin began to sever his ties from JI in 2003 after he acquired explosives leftover from the 2000 Christmas Eve bombings (Everton & Cunningham, 2012). Along with a core set of JI members, he used his newly acquired resources for his nascent network’s first operation: the 2003 JW Marriott attack. For the next two years his network, which would go by several names, launched several successful attacks against “Western targets” in Indonesia. He drew from a deeply embedded network of actors, many of whom were DI members or members of its offshoots, in order to continue operating in the face of increased counterterrorism operations. His success eventually landed him on the FBI’s Seeking Information-War on Terrorism List in 2006. After a three-year lull in attacks, he and his associates carried out Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 6 EVERTON AND CUNNINGHAM simultaneous bombings against the Ritz-Carlton and Marriott hotels in August 2009. These bombings led to further stepped-up police operations and his subsequent demise in the following month. Not long after Noordin and a few of his key associates were killed, his network essentially disintegrated (Everton & Cunningham, 2013). Noordin’s death should not be seen as an absence of a terrorist threat in Indonesia. In 2010, for example, a group of jihadists unsuccessfully tried to establish a safe haven in Aceh to launch attacks and to establish an Islamic state in the country (International Crisis Group, 2010). Moreover, a group established by Abu Bakar Ba’asyir in 2008, Jemaah Ansharut Tauhid (JAT), has joined JI as a powerhouse organization in Indonesia. In fact, many JI members and former Noordin associates joined JAT after its creation. The organization seeks the establishment of an Islamic state and largely operates above-ground; however, several of its members were implicated for participating in Noordin’s 2009 attack, for providing recruits for small-scale operations in the country, and for being directly involved in the 2010 Aceh project. Finally, it appears smaller groups of less experienced actors, often with the support of JI and JAT, have emerged as a serious terrorist threat in Indonesia although they have largely focused on carrying out local attacks against law enforcement (International Crisis Group, 2011). Indonesian authorities have responded to the rise of Islamic militancy in two primary ways, which provide us with something of a natural experiment for testing the effect that strategies have on a network: One was the formation of Detachment 88 (Det 88), the Indonesian counter-terrorism squad; the other was the establishment of the Jakarta Centre for Law Enforcement Cooperation (JCLEC), a joint initiative between the Indonesian and Australian governments. Det 88 was formed in July 2003 shortly after the first Bali bombing and is funded, equipped, and trained by the United States and Australia. Since its inception, it has achieved several notable successes, including the arrest or killing of hundreds of terrorist suspects, including Azhari Husin, Noordin Top’s close associate and primary bomb-maker, and Noordin Top himself in late-2009. However, Det 88’s tactics have increasingly come under attack from several influential Indonesian and international organizations for purportedly adopting a “shoot first” mentality and for possible human rights violations, such as the torture of suspected terrorists (Priamarizki, 2013; Roberts, 2013; “Elite Indonesian Police Unit,” 2013). The elite squad has reportedly killed 50 terrorism suspects since 2010, which has only further contributed to domestic and international skepticism regarding their rules of engagement. Indeed, it appears that Det 88 may have adopted the coercive practices of earlier Indonesian counterinsurgency efforts by the military, which were successful against DI in the 1950s but were misapplied in later counterinsurgency efforts (Kilcullen, 2010). Det 88 is in stark contrast with what is taught at the JCLEC, which was founded in 2004 and located in Semerang, Indonesia, and seeks to be a resource for Southeast Asian governments combatting transnational crime and terrorism. It provides a forum for academics and other experts to examine the Southeast Asian situation, as well as allow practitioners to keep up to date with the latest developments on combatting terrorism and transnational crime (Solomon, 2007). To this end, it offers a wide-range of training programs, seminars, and workshops on topics such as money laundering, human trafficking, cyber-crime, computer forensics, crisis negotiation, informant handling and interviewing techniques, organized crime, and Islamic law and politics (Jakarta Centre for Law Enforcement Cooperation, 2005-2010). The center also works closely with regional law enforcement agencies that are looking to enhance their enforcement capacity and approach (Ramakrishna, 2009). In short, it seeks to offer a more holistic approach to combatting the Indonesian terrorist threat, which is sorely needed in Indonesia (International Crisis Group, 2012). Data and Methods The Noordin Top network serves as the case study for exploring the relationships among dark network structure, resilience, and counter-terrorism strategies over time. His network, arguably more so than any other organization operating within Indonesia over the last few decades, demonstrated a remarkable ability to withstand both endogenous and exogenous shocks. We utilized relational data drawn from two International Crisis Group (ICG) reports: “Terrorism in Indonesia: Noordin’s Networks” (2006) and “Indonesia: Noordin Top’s Support Base” (2009). We supplement these with open source data in order to generate time codes by month from January 2001 through December 2010, which allows us to account for when actors entered the network and if and when individuals were arrested or killed. The ICG reports on Noordin contain rich one-mode and two-mode data on a variety of relations and affiliations (friendship, kinship, meetings, etc.) along with significant attribute data (education, group membership, physical status, etc.). From these we constructed five networks from several subnetworks each containing 237 individuals. Specifically, we Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT created a trust network, which is an aggregation of one-mode classmate, friendship, kinship, and coreligious subnetworks.5 We constructed a second network, which we call the operational network, from four one-mode networks that were derived from corresponding two-mode networks, namely logistics, meetings, operations, and training events. Our third network is a one-mode communication network, which captures the pattern of communications between Noordin’s network members. The fourth is Noordin’s business and finance network, a one-mode network that was derived from a two-mode network indicating the business and financial affiliations of the members of Noordin’s network.6 Finally, we created a combined network, which, as its name implies, combines the trust, operational, communication, and business and finance networks in order to obtain an overall picture of Noordin’s network. We consider all but the business and finance network in the descriptive portion of our analysis below,7 but focus only on the combined network for the confirmatory analysis portion.8 In order to analyze these networks longitudinally, we assigned time codes to each actor in the network that indicated when they entered and left Noordin’s combined network. In assigning these codes, we assumed that ties between actors were constant over time. That is, if two actors were coded as friends at one point in time, we assumed that they remained friends throughout their mutual presence in the networks. The one exception to this concerns the meetings subnetwork where, building on the work of Krebs (2001), we assumed that a meeting tie did not form until the meeting took place (unless, of course, a tie was previously formed along another relation such as friendship or kinship). We recognize the potential limitations of these assumptions and how they may affect the estimation of the various topographic metrics we utilize in this paper. Nevertheless, we believe that the approach taken here is reasonable and valid. Our dependent variables are various measures capturing the centralization and connectedness of Noordin’s network over time. Social network analysis calculates network centralization based on variation in actor centrality (Wasserman & Faust, 1994). More variation yields higher network centralization scores; less variation yields lower scores. Because the standard centralization score (Freeman, 1979) estimates variation by comparing each actor’s score to the score of the network’s most central actor, the larger the centralization index, the more likely it is that a single actor is central (Wasserman & Faust, 1994, p. 176). An alternative measure recommended by Coleman (1964), Hoivik and Gleditsch (1975), and Snijders (1981) is variance 7 of actor centrality scores found in the network. It compares each actor’s score to the average score, which means that the larger the centralization index, the more likely that a group of actors (rather than a single actor) are central. A similar measure, standard deviation, also uses the average score of all actors but is preferable to variance because it returns us to the original unit of measure. In our analysis below, we use both standard centralization and standard deviation scores, both of which can be calculated for any measure of centrality. We include two measures of centralization in this paper: degree and betweenness. Because degree centrality counts the number of ties of each individual actor, centralization measures based on degree capture the extent to which one or a handful of actors possess numerous ties while others do not. By contrast, because betweenness centrality estimates the extent to which actors in a position to control the flow of resources through a network, centralization measures based on betweenness indicate the level to which one or a handful of actors are in a position to broker the flow of resources in a network. Multiple measures are available for measuring a network’s innerconnectedness with density and average degree being the most common. As noted above, however, the standard density measure is problematic because it is inversely associated with network size, and while this limitation can be corrected by using average degree centrality (de Nooy, Mrvar, & Batagelj, 2011; Scott, 2000), if a network adopts a cell-like structure, it can be locally dense but globally sparse. We sidestep these issues by comparing the network’s external connectedness with its internal connectedness, using Krackhardt’s (1994) E-I Index, which measures the ratio of ties a group has to non-group members to group members: ܧെܫ ܧܫ (1) where ܧequals the number of external ties and ܫ equals the number of internal ties. Thus, if a group has all external ties, the index equals 1.0; if it has all internal ties, the index equals -1.0; and if there are an equal number of internal and external ties, the index equals 0.0. We expect a dark network’s E-I index to be less than those of light networks, all else being equal. Indeed, we expect it to always be negative. Of course, here we do not compare a dark with a light network but instead examine a particular dark network over time. Thus, we expect its E-I index to become increasingly negative as pressure is brought to bear on the network. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 8 EVERTON AND CUNNINGHAM We include two variables in order to capture the various strategies adopted by Indonesian authorities during the period under analysis: (1) one that measures the formation and continued existence of Det 88, and (2) one that measures the formation and continued existence of the JCLEC. Although Det 88 was formed in July 2003, it did not reach its operational capacity of 400 members until mid-2005; thus, we include a variable that grows at a rate of 16 members a month, beginning in July of 2003 until reaching 400 members in July of 2005. We rescaled the variable by dividing it by 100 in order to make interpreting the coefficients easier. The JCLEC was established in July 2004, but it took time for it to offer courses that attracted large numbers of students. Thus, drawing on course attendance data included in the JCLEC’s annual reports (Jakarta Centre for Law Enforcement Cooperation, 2005-2010), we created a variable that reflects the average number of students who attended JCLEC courses in the previous six months. In other words, although the center was established in July of 2004, the six-month moving average for that month was zero since no students attended a JCLEC course in the previous six months. However, because 49 students attended a course in July of 2004, the six-month moving average for August 2004 equaled 8.167. As we did with the Det 88 variable, we divided the moving average by 100 in order to make the variable’s effects easier to interpret. Examining network structure over time requires the inclusion of variables to account for important temporal and event effects. The model includes two variables to control for the curvilinear effect that time appears to have on the various centralization variables (but not the EI Index – see Figures 3 through 7): we have included both a month and a month-squared variable. For the EI index, we only included a month variable. Four additional variables control for critical events and periods. A dummy variable indicates the death of Noordin and his key operatives and their subsequent “absence” from the network from September 2009 through the end of our analysis. An additional dummy variable measures the effect of Noordin’s ability to acquire surplus explosives from the 2000 Christmas Eve Bombings in Indonesia. This explosives variable covers the time from which Noordin obtained the explosives in December 2002 to the time in which they were used for the network’s first attack in August 2003. We also have included a series of pre and post-operation dummy variables that capture the three-month period immediately preceding and following each of the five major operations: Bali I, the JW Marriott Hotel bombing, the Australian Embassy bombing, Bali II, and the Jakarta Hotel bombings. Because Noordin’s network was only directly involved in the bombings after the first Bali bombing, the pre and post operation dummy variables for all but the first Bali bombing are combined into one pre-operation variable and one post-operation variable, while the pre and post operation variables for the first Bali bombing are included separately. In order to tease out how the Noordin Top terrorist network adapted and changed from 2001 to 2010 in reaction to endogenous and exogenous factors, our analysis includes both descriptive methods and ordinary least squares (OLS) multivariate regression. Because social network assumptions differ from those of standard OLS approaches, we use bootstrapping methods to estimate standard errors, an approach commonly used with social network data (Borgatti, Everett, & Freeman, 2002; Prell, 2011). Results Figures 2 through 6 below present graphs of the centralization and E-I Index scores for Noordin’s alive and free trust, operational, communication, and combined networks. Specifically, the figures graph the centralization (degree and betweenness), normalized standard deviation (degree and betweenness), and E-I index for each of the various networks. Moving from left to right the vertical dark gray lines indicate key points in the life cycle of Noordin’s network: the first Bali bombings (October 2002), the Marriott Hotel bombing (August 2003), the Australian Embassy bombing (July 2004), the second Bali bombings (October 2005), the Jakarta Hotel bombings (July 2009), and the death of Noordin and other key operatives (September 2009). Comparing the degree centralization (Figure 2) and degree standard deviation (Figure 3) scores of the network yields some interesting insights. It appears that in terms of degree centralization, the network grew increasingly centralized early in its existence, and then after a slight dip in 2004, remained relatively constant, at least up until the point that Noordin was killed. This was not the case in terms of degree standard deviation, however. It appears there is a quick run up in centralization early in the network’s career, but then it drops back to where it began before climbing slightly in late-2006. The network then shifts back to a downward trend until around early-2007, recovers slightly, and then remains relatively constant until Noordin’s death in 2009. The comparison of these two sets of graphs suggests that while Noordin formed and maintained numerous ties to group members, thus driving up degree centralization (Figure 2), his inner circle did not, which could explain why except for the jump in Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT 2004, degree standard deviation remained relatively stable over the time period under examination (Figure 3). The coefficients for the time variable included in Table 1 below (“month”) are consistent with these results. In particular, the coefficient for standard (i.e., Freeman) degree centralization is positive and statistically significant, indicating that after 9 controlling for other factors, degree centralization increased over time. By contrast, the coefficient for standard deviation is negative but statistically insignificant, suggesting that after controlling for other factors, degree standard deviation remained relatively constant from 2001 to 2010. Figure 2: Degree Centralization of Alive and Free Noordin Top Network Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 10 EVERTON AND CUNNINGHAM Figure 3: Degree Standard Deviation of Alive and Free Noordin Top Network We do not see a similar relationship between betweenness centralization (Figure 4) and betweenness standard deviation (Figure 5). Here the two sets of scores display similar patterns, suggesting that both Noordin and his key operatives located themselves in brokerage positions within the network. The coefficients for the time variable included in Table 1 below are consistent with these results as well. The coefficients for both betweenness centralization and betweenness standard deviation are positive and statistically significant, suggesting that after controlling for other factors both increased over the time period under investigation. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT Figure 4: Degree Centralization of Alive and Free Noordin Top Network Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 11 12 EVERTON AND CUNNINGHAM Figure 5: Betweenness Standard Deviation of Alive and Free Noordin Top Network The E-I Index (Figure 6) shows that the combined network became increasingly inward for most of the period under consideration. Indeed, the network exhibited a pattern of establishing external ties prior to most of the Noordin-led attacks, excluding the 2005 Bali bombings. This trend likely reflects a need for information or other types of resources such as bomb-making materials and money. On the other hand, the network also turned increasingly inward, again with the exception of the 2005 attacks, following the Noordin-led attacks. These changes prior to and after the majority of the attacks highlight that network cohesion is likely to change immediately before and after an attack. What is especially interesting is how just before the July 2009 attacks, Noordin began forming ties to actors outside of his immediate circle because it raises the possibility that Noordin may have been careless in forming these ties, which may have contributed to his death two months after the July attacks. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT 13 Figure 6: E-I Index of Alive and Free Noordin Top Network Table 1 displays the results of our multivariate regression analysis. The tables contain models with and without the month and month squared variables due to high collinearity between the two time variables. Because our table contains five dependent variables for both sets of models, along with ten independent variables for the models with the month and month squared variables and eight independent variables for those without, it is impossible to discuss all of the nearly 100 coefficients. Thus, our comments will tend to focus on the models without the two month variables and we will concentrate on overall patterns and focus on those coefficients that are both substantively and statistically significant (McCloskey, 1995; Ziliak & McCloskey, 2008). The table presents many interesting findings. For example, the adjusted R2 for all of the models are extremely high and indicate that they account for a substantial amount of the variation in the dependent variables, as well as provide a sense of confidence that our models adequately explain the variability in our dependent variables.9 Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 -455.258*** 1.932*** -3.828*** 3.651*** -4.802*** Detachment 88 JCLEC Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 -1.430 -2.740** 1.964** 1.371* -10.923*** 118 447.024 477.502 94.16 -0.357 -0.311 1.934** 1.551** -11.922*** 118 468.354 490.519 92.77 Post Bali I (2002) Explosives Pre Ops Post Ops Key Deaths Observations AIC BIC Adjusted R2 54.24 209.447 187.350 117 -1.319*** 0.113 0.443* -1.090*** 0.188 0.018 62.04 199.667 169.283 117 -1.864*** 0.111 0.307 -1.135*** 0.160 -0.001 65.62 610.423 588.325 117 -9.999*** -0.197 -1.930* 0.083 1.341*** 1.456*** -2.474** 2.354*** 12.504*** 84.07 532.514 502.130 117 -4.648*** -0.203 -0.658 0.678 1.656** 1.700*** -0.002*** 1.462*** 5.476*** 3.212*** 67.48 -29.849 -51.878 116 -0.639*** -0.038 -0.174*** 0.003 0.038 0.031 -0.028 0.151*** 81.17 -81.184 -111.474 116 -0.269** -0.056 -0.098* -0.067 0.010 -0.014 -0.000*** 0.158*** 0.480*** 0.123*** -39.538*** Std. Deviation 1.341*** Betweenness -339.603** Freeman Note: Coefficients are unstandardized; bootstrap standard errors used to estimate significance * p < .05 ** p < .01 *** p < .001 (two-tailed) -2.628*** -1.241*** 0.000 -0.001*** Month2 Pre Bali I (2002) -0.164 -1.050*** -0.107 44.611 1.687*** -0.221 -0.029 4.523*** Std. Deviation Month Intercept 17.821*** Freeman Degree Centralization Table 1: Multivariate Regression Results for Noordin Top Combined Network (Alive and Free) 73.68 -354.311 -376.270 115 -0.066** 0.071*** 0.032* -0.089*** 0.056** 0.036*** -0.052* -0.032*** -0.302*** 78.73 -366.759 -396.953 115 0.018 0.076*** 0.025* -0.033 0.080*** 0.068*** 0.000*** -0.047*** -0.111*** 0.006 12.626*** EI Index 14 EVERTON AND CUNNINGHAM DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT Looking at the pre-operational and the postoperational behavior of the network, the network did become increasingly centralized prior to an attack in terms of the degree centralization measures but not in terms of the betweenness centralization measures, lending some support for hypothesis 1a. Given that the former measures capture the extent to which a network is centered around actors who possess numerous ties, while latter measures capture the extent to which it is centered around actors who are in positions of brokerage, this result suggests centralization occurs on some dimensions prior to an attack but not on others. Interestingly, the network did not decentralize like we predicted it would after attacks (Hypothesis 1b).10 In fact, it appears to have continued to centralize in the aftermath of its attacks. This may indicate that Noordin was incapable of adopting a less centralized and flexible structure immediately after an attack, which probably left his network vulnerable during those periods. Interestingly, the network did drift toward the external side of the E-I spectrum before attacks, which lends support Hypothesis 2a. His network followed the same behavior after attacks as well (Hypotheses 2b), which may have contributed to him being killed. Interestingly, the Post Bali I coefficient shows a similar result. That the Bali I network was essentially destroyed in the aftermath of the attack suggests that increasing external ties in a hostile environment could lead to disastrous results. An alternative explanation is that the apparent inability for Noordin to decentralize his network or halt the drift toward more external ties simply reflects an artifact of the way our data are coded. As noted above, we assumed that a tie continued to exist once it was formed, which means that we may not have captured whether some ties were severed (or at least went dormant) after an attack. As predicted (Hypotheses 3a and 3b) it appears that both Det 88 and the JCLEC caused Noordin’s network to become increasingly isolated as indicated by the E-I Index column in Table 1. The results indicate that they contributed to the network’s inward looking behavior, which suggests that the network felt the pressure being exerted by the two groups and consequently attempted to increase its security by focusing on establishing and maintaining internal ties while limiting external ones. While isolating an insurgency is generally a counterinsurgency goal, it can also lead to an increase in a group’s radicalism (Sunstein, 2009). However, in this case, it appears that Noordin and his followers were already highly radicalized (Griswold, 2010). The two groups appear to have affected the network’s centralization in different ways, however. Det 88 seems to have pushed it to become 15 increasingly centralized, thereby increasing Noordin’s command and control. However, by causing it to become more centralized, it led it to become more and more vulnerable to decapitationlike strategies, which, as we already noted, is exactly what befell Noordin’s network. After Noordin and a few of his key associates were killed in the Fall of 2009, the network essentially fell apart. The JCLEC’s effect on the network’s centralization is less clear. If we focus only on the models that do not include the two time variables, then it appears that the JCLEC’s efforts caused the network to become less centralized. This suggests that the JCLEC not only caused Noordin to attempt to limit his personal ties in order to reduce visibility but also to limit his role as a broker in order to create a relatively more flexible structure in terms of the brokerage of resources. Thus, the JCLEC may have helped to reduce Noordin’s command and control capabilities, but at the same time, it may have allowed the network to adopt a more flexible structure. The fact that the sign of the JCLEC coefficient flips in terms of the betweenness centralization measures when the time variables are included in the models raises the possibility that while the pressure brought to bear by the JCLEC did lead Noordin to reduce his visibility, it did not lead him to relinquish his position of brokerage. Discussion and Conclusion This article has explored the topic of dark network resilience by simultaneously considering the strategic tradeoffs that both dark networks and counter-insurgents face. It demonstrates that both sets of tradeoffs help shape a dark network’s structure, which in part affects its resiliency. As it was shown, a dark network’s adoption of a network structure is far more complex than what current literature suggests, namely that a network structure at either side of the cohesion and centralization continuums offers potential advantages and disadvantages in terms of network resilience. In the case of Noordin Top, it appears that his network’s focus on establishing external ties after its operations provided it possible access to resources but likely became a factor contributing to its exposure and eventual disruption. The network, much like its Bali I predecessors who also focused on establishing external ties after their operation, faced significant losses and needed to reconstitute itself immediately following each operation. This tendency, along with the general adoption of a centralized structure, suggests that Noordin’s network adopted a suboptimal structure that ultimately contributed to his demise. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 16 EVERTON AND CUNNINGHAM Similarly, the two somewhat contrasting strategic approaches (Det 88 and JCLEC) both appear to have played critical roles in disrupting the network by isolating it from the population. Together, these approaches appear to have placed significant pressure on the network by forcing it to turn inward only until it exposed itself when it needed resources and may have contributed to the network’s downfall. At the same time, they potentially provided some short-term advantages for the network. The JCLEC, for example, appears to have reduced Noordin’s command and control by making it less centralized; however, it may have improved the network’s resiliency by possibly making it more difficult to monitor. Certainly, it is unlikely that the effect of these strategies will be uniform across the various Noordin network aggregations. For example, Noordin’s communication network adopted a very different structure than the combined network and the effects of our independent variables on each aggregation (trust, operations, business and finance, etc.) are unclear at this point. Only after further analysis can we tease out how these strategies affected each network. Clearly, more work is needed with regards to the security-efficiency tradeoff in terms of dark network resilience. One limitation of this analysis was the inability to tease out specific policies and substrategies employed by Det 88 and the JCLEC against Noordin’s network. For instance, it is highly likely that Det 88 used alternative strategies against its targets, such as PSYOPs, but open-source data are limited in this regard. Future studies should continue to test various strategic options employed against dark networks and how they affect a network’s structure over time. An examination of these strategies to various network aggregations, much like the descriptive analysis in this paper, will certainly benefit the field. A second challenge facing this study, which is one many longitudinal studies of dark networks face, is it did not fully account for the endogenous effects and other internal processes that shaped Noordin’s network over time. For example, it is highly possible that some of the network’s trends toward internal density and greater centralization across time were due to Noordin’s personality and decision-making processes. Finally, one should not assume that the behavior of the Noordin Top terrorist network characterizes the behavior of all terrorist networks, let alone all dark networks. The results here simply suggest that it is desirable to see further inquiry into the security-efficiency tradeoff regarding network resilience within other contexts and that future studies should consider both the counterinsurgent and the dark network’s strategic point of view. Not only would these studies help researchers better understand dark network resilience, but they would also aid in the monitoring, disruption, and destabilization of dark networks. References Arquilla, J. (2009). Aspects of Netwar & the conflict with al Qaeda. Monterey, CA: Information Operations Center, Naval Postgraduate School. Baker, W. E. & Faulkner, R. R. (1993). The socialorganization of conspiracy: Illegal networks in the heavy electrical-equipment industry. American Sociological Review, 58(6), 837–860. doi:10.2307/2095954 Bakker, R. M., Raab, J., & Milward, H. B. (2011). A preliminary theory of dark network resilience. Journal of Policy Analysis and Management, 31(1), 33–62. doi:10.1002/pam.20619 Berman, E. (2009). Radical, religious, and violent: The new economics of terrorism. Cambridge, MA: The MIT Press. Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET for Windows: Software for social network analysis. Harvard, MA: Analytical Technologies. Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing terrorist networks. Paper presented at the 8th International Command and Control Research and Technology Symposium, National Defense War College, Washington DC. Chwe, M. S. (2001). Rational ritual: Culture, coordination, and common knowledge. Princeton, NJ: Princeton University Press. Coleman, J. S. (1964). Introduction to Mathematical Sociology. New York, NY: Free Press. Coleman, J. S. (1988). Free riders and zealots: The role of social networks. Sociological Theory, 6(1), 52–57. doi:10.2307/201913 Combatting Terrorism Center. (2006). Harmony and disharmony: Exploiting al-Qaida’s organizational vulnerabilities (pp. 55). West Point, NY: Combating Terrorism Center at West Point. Conboy, K. (2006). The second front. Jakarta, Indonesia: Equinox Press. Crossley, N., Edwards, G., Harries, E., & Stevenson, R. (2012). Covert social movement networks and the secrecy-efficiency trade off: The case of the UK suffragettes (1906–1914). Social Networks, 34, 634–644. doi:10.1016/j.socnet.2012.07.004 Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT de Nooy, W., Mrvar, A., & Batagelj, V. (2011). Exploratory social network analysis with Pajek (Revised and expanded ed.). Cambridge, UK: Cambridge University Press. Elite Indonesian police unity under fire over torture, unlawful killings (2013, March 30). South China Morning Post: Asia. Retrieved from http://www.scmp.com/news/asia/article/1202787 /elite-indonesian-police-unit-under-fire-overtorture-unlawful-killings Enders, W., & Jindapon, P. (2010). Network externalities and the structure of terror networks. Journal of Conflict Resolution, 54(2), 262–280. doi:10.1177/0022002709355439 Enders, W., & Sandler, T. (2006). The political economy of terrorism. Cambridge, UK: Cambridge University Press. Enders, W., & Su, X. (2007). Rational terrorists and optimal network structure. Journal of Conflict Resolution, 51(1), 33–57. doi: 10.1177/0022002706296155 Erickson, B. (1981). Secret societies and social structure. Social Forces, 60(1), 188–210. doi: 10.1093/sf/60.1.188 Everton, S. F. (2012a). Disrupting dark networks. Cambridge, UK: Cambridge University Press. Everton, S. F. (2012b). Network topography, key players and terrorist networks. Connections, 31(1), 12–19. Everton, S. F., & Cunningham, D. (2012). Detecting significant changes in dark networks. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 94–114. doi: 10.1080/19434472.2012.725225 Everton, S. F., & Cunningham, D. (2013). Terrorist network adaptation to a changing environment. In C. Morselli (Ed.), Crime and Networks (pp. 287–308). London, UK: Routledge. Finke, R., & Stark, R. (1992). The churching of America, 1776–1990: Winners and losers in our religious economy. New Brunswick, NJ: Rutgers University Press. Finke, R., & Stark, R. (2005). The churching of America, 1776–2005: Winners and losers in our religious economy (2nd ed.). New Brunswick, NJ: Rutgers University Press. 17 Granovetter, M. (1973). The strength of weak ties. American Journal of Sociology, 73(6), 1360– 1380. doi:10.2307/2776392 Granovetter, M. (2005). The impact of social structure on economic outcomes. Journal of Economic Perspectives, 19(1), 33–50. doi:10.1257/0895330053147958 Griswold, E. (2010). The tenth parallel: Dispatches from the fault line between Christianity and Islam. New York, NY: Farra, Staus, and Giroux. Hafez, M. M. (2004). From marginalization to massacres: A political process explanation of violence in Algeria. In Q. Wiktorowicz (Ed.), Islamic activism: A social movement theory approach (pp. 37–60). Bloomington, IN: Indiana University Press. Hoivik, T., & Gleditsch, N. P. (1975). Structural parameters of graphs: A theoretical investigation. In H. M. Blalock (Ed.), Quantitative sociology (pp. 203–222). New York: Academic Press. doi: 10.1007/BF00192487 International Crisis Group. (2006). Terrorism in Indonesia: Noordin's networks (Asia Report No. 114). Retrieved from http://www.crisisgroup.org/~/media/Files/asia/so uth-eastasia/indonesia/114_terrorism_in_indonesia_noor din_s_networks International Crisis Group. (2009). Indonesia: Noordin Top's support base (Asia Briefing No. 95). Retrieved from http://www.crisisgroup.org/~/media/Files/asia/so uth-eastasia/indonesia/b95_indonesia___noordin_tops_s upport_base.pdf International Crisis Group. (2010). Indonesia: Jihadi surprise in Aceh (Asia Report No. 189). Retrieved from http://www.crisisgroup.org/~/media/Files/asia/so uth-east-asia/indonesia/189%20Indonesia%20%20Jihadi%20Surprise%20in%20Aceh.pdf International Crisis Group. (2011). Indonesian jihadism: Small groups, big plans (Asia Report No. 204). Retrieved from http://www.crisisgroup.org/~/media/Files/asia/so uth-eastasia/indonesia/204%20Indonesian%20Jihadism %20%20Small%20Groups%20Big%20Plans.pdf Freeman, L. C. (1979). Centrality in social networks I: Conceptual clarification. Social Networks, 1, 215–239. doi:10.1016/0378-8733(78)90021-7 Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 18 EVERTON AND CUNNINGHAM International Crisis Group. (2012). Indonesia: The deadly cost of poor policing (Asia Report No. 218). Retrieved from http://www.crisisgroup.org/~/media/Files/asia/so uth-east-asia/indonesia/218%20Indonesia%20-%20The%20Deadly%20Cost%20of%20Poor%2 0Policing Jackson, M., Petersen, E., Bull, J., Monsen, S., & Richmond, P. (1960). The failure of an incipient social movement. Pacific Sociological Review, 3, 35–40. Jakarta Centre for Law Enforcement Cooperation. (2005-2010). Annual reports. Retrieved from http://www.jclec.com/index.php?option=com_do cman&task=cat_view&gid=113&Itemid=42 Jones, S. (2009). Noordin’s dangerous liaisons. Tempo. Retrieved from http://www.crisisgroup.org/en/regions/asia/south -east-asia/indonesia/op-eds/jones-noordinsdangerous-liaisons.aspx Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park, PA: Pennsylvania State University Press. Kilcullen, D. (2010). Counterinsurgency. Oxford, UK: Oxford University Press. Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict & Terrorism, 29, 559–575. doi: 10.1080/10576100600798418 Krackhardt, D. (1994). Graph theoretical dimensions of informal organizations. In K. M. Carley & M. J. Prietula (Eds.), Computational organization theory (pp. 89–111). Hillsdale, NJ: L. Erlbaum Associates. Krebs, V. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43–52. Lindelauf, R., Borm, P., & Hamers, H. (2009). The influence of secrecy on the communication structure of covert networks. Social Networks, 31, 126–137. doi: 10.2139/ssrn.1096057 Lofland, J., & Stark, R. (1965). Becoming a worldsaver: A theory of conversion to a deviant perspective. American Sociological Review, 30, 862–875. doi: 10.2307/2090965 Maoz, Z. (2011). Networks of nations: The evolution, structure, and impact of international networks, 1816–2001. Cambridge, UK: Cambridge University Press. McAdam, D. (1982). Political process and the development of Black insurgency, 1930–1970. Chicago, IL: University of Chicago Press. McAdam, D. (1986). Recruitment to high risk activism: The case of Freedom Summer. American Journal of Sociology, 92, 64–90. doi: 10.1086/228463 McAdam, D. (1999). Political process and the development of Black Insurgency, 1930-1970 (2nd ed.). Chicago, IL: University of Chicago Press. McAdam, D., & Paulsen, R.. (1993). Specifying the relationship between social ties and activism. American Journal of Sociology, 99, 640–667. doi:10.2307/2781286 McCloskey, D. (1995). The insignificance of statistical significance. Scientific American, April, 32–33. McCormick, G. (2005). The Diamond Insurgent/COIN Model. Department of Defense Analysis, Naval Postgraduate School. Monterey, CA. McCormick, G., & Owen, G. (2000). Security and coordination in a clandestine organization. Mathematical and Computer Modelling, 31, 175–192. doi:10.1016/S0895-7177(00)00050-9 Morselli, C. (2009). Inside criminal networks. New York, NY: Springer. Morselli, C., Giguère, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29, 71–98. doi:10.1016/j.socnet.2006.05.001 Passy, F. (2003). Social networks matter. But how? In M. Diani & D. McAdam (Eds.), Social movements and networks: Relational approaches to collective action (pp. 21–48). Oxford, UK: Oxford University Press. doi: 10.1093/0199251789.003.0002 Prell, C. (2011). Social network analysis: History, theory & methodology. Thousand Oaks, CA: SAGE Publications. Priamarizki, A. (2013). Counter-terrorism in Indonesia: The end of special detachment 88? RSIS Commentaries, 062/2013. Retrieved from http://www.rsis.edu.sg/publications/Perspective/ RSIS0622013.pdf Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 DARK NETWORK RESILIENCE IN A HOSTILE ENVIRONMENT Raab, J., & Milward, H. B. (2003). Dark networks as problems. Journal of Public Administration Research and Theory, 13(4), 413–439. doi: 10.1093/jpart/mug029 Ramakrishna, K. (2009). Governmental responses to extremism in Southeast Asia: 'Hard' versus 'soft' approaches. In A. de Borchgrave, T. Sanderson & D. Gordon (Eds.), Conflict, community, and criminality in Southeast Asia and Australia: Assessments from the field (pp. 31–36). Washington, DC: Center for Strategic and International Studies. Roberts, G. (2013). Indonesian anti-terror squad killings prompt revenge attacks. Retrieved from http://www.abc.net.au/am/content/2013/s368601 0.htm Roberts, N., & Everton, S. F. (2011). Strategies for combating dark networks. Journal of Social Structure, 12(2). Retrieved from http://www.cmu.edu/joss/content/articles/volume 12//RobertsEverton.pdf Sageman, M. (2003). Statement to the National Commission on Terrorist Attacks Upon the United States. Retrieved from http://www.911commission.gov/hearings/hearing3/witness_sa geman.htm Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of Pennsylvania Press. Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia, PA: University of Pennsylvania Press. Scott, J. (2000). Social network analysis: A handbook (2nd ed.). Thousand Oaks, CA: Sage Publications. Smith, C. S. (1991). The emergence of liberation theology: Radical religion and social movement theory. Chicago, IL: University of Chicago Press. Snijders, T. A. B. (1981). The degree variance: An index of graph heterogeneity. Social Networks, 3, 163–174. doi:10.1016/0378-8733(81)90014-9 Snow, D. A., Zurcher, L. A., & Ekland-Olson, S. (1980). Social networks and social movements: A microstructural approach to differential recruitment. American Sociological Review, 45, 787–801. doi:10.2307/2094895 19 Solomon, D. (2007). Pillars of power: Australia's institutions. Sydney, Australia: The Federation Press. Stark, R. (1996). The rise of Christianity: A sociologist reconsiders history. Princeton, NJ: Princeton University Press. Stark, R., & Bainbridge, W. S. (1980). Networks of faith: Interpersonal bonds and recruitment to cults and sects. American Journal of Sociology, 85(6), 1376–1395. Sunstein, C. R. (2009). Going to extremes: How like minds unite and divide. Oxford, UK: Oxford University Press. Tucker, D. (2008). Terrorism, networks and strategy: Why the conventional wisdom is wrong. Homeland Security Affairs, 4(2), 1–18. Uzzi, B. (1996). The sources and consequences of embeddedness for the economic performance of organizations: The network effect. American Sociological Review, 61(4), 674–698. doi: 10.2307/2096399 Uzzi, B. (2008). A social network’s changing statistical properties and the quality of human innovation. Journal of Physics A: Mathematical and Theoretical, 41, 1–12. doi: 10.1088/17518113/41/22/224023 Uzzi, B., & Spiro, J. (2005). Collaboration and creativity: The small world problem. American Journal of Sociology, 111(2), 447–504. doi: 10.1086/432782 Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge, UK: Cambridge University Press. Ziliak, S. T., & McCloskey, D. N. (2008). The cult of statistical significance. Ann Arbor, MI: The University of Michigan Press. About the Authors Sean F. Everton is an Assistant Professor in the Department of Defense Analysis and the Co-Director of the CORE Lab at the Naval Postgraduate School (NPS). Professor Everton earned his MA and PhD in Sociology at Stanford University (2007). He has published in the areas of social network analysis, sociology of religion, economic sociology, and political sociology, and he currently specializes in the use of social network analysis to track and disrupt dark networks (e.g., criminal and terrorist networks). Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 20 EVERTON AND CUNNINGHAM His monograph on using social network analysis for the crafting of strategies for the disruption of dark networks (Disrupting Dark Networks) was published by Cambridge University Press in late 2012. Daniel Cunningham is an Associate Faculty for Instruction in the Defense Analysis Department at the Naval Postgraduate School (NPS) in Monterey, CA, where he lectures on the visual analysis of dark networks. He is also a Research Associate in the Defense Analysis Department’s Common Operational Research Environment (CORE) Lab and he is the supervisor for the lab’s outreach efforts with practitioners. Dan earned his MA in International Policy Studies with a focus in Terrorism Studies at the Middlebury Institute of International Studies (MIIS) in 2009 and has published several articles on dark networks. Endnotes 1 Other examples of successful centralized covert networks include Pablo Escobar’s drug trafficking network and Peru’s Sendero Luminoso (Shining Path). 2 One notable exception is Koschade’s (2006) analysis of the first Bali Bombing network. 3 Fa’i is a method used by many groups to obtain money and resources from armed robberies 4 A tactic that was unsuccessfully attempted by the 2010 Dulmatin-led group in Aceh (International Crisis Group, 2010). 5 A one-mode network consists of a single set of actors and the relationships between them, which can be any type of ties, such as kinship, friendship, etc. 6 Two-mode networks either consist of two sets of different actors, such as people and businesses, or one set of actors and one set of events or affiliations. 7 The business and finance network is so sparse that it makes little sense to analyze it separately. 8 We could have analyzed these networks separately in the multivariate regression section, but the purpose of this analysis is to examine the overall behavior of the Noordin Top terrorist network in terms of network resiliency. The analysis of each sub-network would certainly provide insight into intricacies of the network’s resilience, however. 9 We used a variety of regression diagnostic plots (e.g., residual vs. fitted plots, proportional leverage plots, leverage vs. squared residual plots) to identify potentially influential cases that if removed substantially changed our regression results. For each model, we then estimated a regression equation that included all cases and one that removed potentially influential cases. Then, using the Akaike information criterion (AIC) and Bayesian information criterion (BIC) measures of fit, we compared the models to one another. The results from the models having the best fit are presented in Table 1. 10 Figures 2 through 5 appear to indicate that this does not hold for the operations network. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 VOLUME 16, ISSUE 1, PAGES 21–34 (2015) Criminology, Criminal Justice Law, & Society E-ISSN 2332-886X Available online at https://scholasticahq.com/criminology-criminal-justice-law-society/ Correlates of Violence within Washington State Prisons Kerryn E. Bell and Dale M. Lindekugel Eastern Washington University ABSTRACT AND ARTICLE INFORMATION The Washington State Department of Corrections indicates that there is a rise in prison violence for both men and women in their facilities. Using unique data on every inmate incarcerated in the state of Washington between 2009 and 2011, we correlate inmates’ prevalence of prison violence with background characteristics of inmates, their ties to the community, and the effects of prison classification and programming. We find that race/ethnicity, community ties, and education are significantly tied to prison violence. Further, prison classification identifies those inmates most likely to be violent while incarcerated. Surprisingly, no effect of gender on prison violence is seen. Implications for our findings are discussed. Article History: Keywords: Received 28 July 14 Received in revised form 14 October 14 Accepted 28 October 14 violence, prisons, gender, race/ethnicity © 2015 Criminology, Criminal Justice, Law & Society and The Western Society of Criminology Hosting by Scholastica. All rights reserved. Prisons are charged with maintaining custody and control of society’s most violent offenders. Despite the best efforts of prison administrators and staff, violence occurs. When attempting to identify predictors of prison violence, studies show inconsistent findings with the exception of age and criminal history (Steiner & Wooldredge, 2009). Not surprisingly, younger inmates with a criminal history of violence are most likely to engage in violence in prison. Other predictors intermittently determined to correlate with violence include the background characteristics of inmates, their ties (or lack of) to the community, the dynamics of life inside the prison, characteristics of the prison environment including administration, and state and federal policies and funding (Arbach-Lucioni, Martinez-Garcia, & Andres-Pueyo, 2012; Walters & Crawford, 2013). Another consideration with researching prison violence is the issue of measurement. Studies on prison violence include those that examine violence as part of more inclusive measures of prison misconduct in general (see Camp, Gaes, Langan, & Saylor, 2003; Cochran, 2012; Siennick, Mears, & Bales, 2012; Wooldredge, Griffin, & Pratt, 2001) and those that focus specifically on violence (see Berg & DeLisi, 2006; Cunningham, Sorenson, & Ready, 2005; DeLisi, Berg, & Hochstetler, 2004; Hardyman, Austin, & Tulloch, 2002). It is also likely that selfreport data may have important measurement differences as compared to official data (Steiner & Wooldredge, 2013). We focus explicitly on prison violence using official data. Largely unexamined in existing research is the effect of regional differences. It is well established that patterns of violent offending in the country vary by region with the South having the highest rates of violence (Crime in the United States, 2011). It is likely that patterns of prison violence may vary Corresponding author: Kerryn E. Bell, Assistant Professor, Department of Sociology and Criminal Justice, Eastern Washington University, 329 Patterson Hall, Cheney, WA 99004, USA. Email: [email protected] 22 BELL & LINDEKUGEL correspondingly. Studies include national, federal, and state samples with little specific testing for regional differences and numerous samples from various regions of the country, albeit few from the Northwest. Wooldredge et al. (2001) evaluated samples from New York, Vermont, and Washington when considering the efficacy of different models of prison classification in predicting prison misconduct. They find significant regional variation across the three samples. The present research examines contemporary data from the state of Washington and focuses specifically on prison violence as separate from other infractions. Research also examines factors related to inmates’ connection (or lack of) to the community, which could be anti-social connections such as gang membership (see Cunningham & Sorenson, 2007; DeLisi, 2003; DeLisi et al., 2004; Gaes, Wallace, Gilman, Klein-Saffran,& Suppa, 2002; Griffin & Hepburn, 2006; Sorenson & Cunningham, 2010) or pro-social connections including visitation (see Cochran, 2012; Siennick et al., 2012) and marriage (see Huebner, 2003; Toch, Adams, & Grant, 1989; Wooldredge, 1994; Wooldredge et al., 2001). Unexamined in existing research as an indicator of ties to the community is prior homelessness, a measure included in the current study. Other factors intermittently discovered to predict prison violence represent the dynamics of life in the prison and the prison administration. Those include the heterogeneity of the inmate population and the staff (see Camp et al., 2003; Irwin, 2005; Jacobs, 1977; Steiner & Wooldredge, 2009b), whether the inmate has a job inside the prison (Steiner & Wooldredge, 2009b), programming and counseling (see French & Gendreau, 2006; Keyes, 1996; Morgan & Flora, 2002 for meta-analyses that include educational, vocational and mental health programs), and classification (see Austin, 2003; Byrne & Hummer, 2007). Research is mixed in its assessment of the institution’s capacity for control and the usefulness of prison classification such as programming (Griffin & Hepburn, 2013; Sandler, Freeman, Farrell, & Seto, 2013). Programming is understudied in prison research, and it may be useful as a predictor of institutional misconduct (Sandler et al., 2013). By examining official data from the state of Washington in the present study, we sample indicators from each of the previous general categories, specifically the background characteristics of inmates (gender, race/ethnicity, and education), their ties to the community (visitation and prior homelessness), and factors related to the effects of administration of the prison on inmates (classification and programming). It is our intention that an investigation of these indicators in a largely unexamined region will contribute to a literature that shows predictors of prison violence to be regionally variable and that inmate involvement in prison programming in particular will be a significant contribution of our research to the literature on correlates of prison violence. Literature Review Gender Gender is a demographic variable that is infrequently studied in the prison violence literature. Research is mixed on gender and general prison misconduct. Some research suggests that institutional misconduct is lower for females than males (Cunningham, Sorenson, & Ready, 2011; Drury & DeLisi, 2010; Harer & Langan, 2001). However, other studies have found no difference between gender and institutional misconduct (Camp et al., 2003; Steiner & Wooldredge, 2014). Celinska and Sung (2014) find that some predictors of prison rule violations (prior victimization, diagnosed mental disorders, and contact with family) are gender specific, while Chen, Lai, & Lin (2014) suggest that institutional misconduct for women varies by type of offense committed. What is more consistent with gender and the prison literature is that there is less prison misconduct among women when the focus is specifically on violence. However, as serious violence is much less common in women’s prisons, it is often not examined (Craddock, 1996; Wulf-Ludden, 2013). Studies that reflect on gender and prison violence find that men are more violent in prison than women (see Austin, 2003; Berg & DeLisi, 2006; Sorensen & Cunningham, 2010; Wulf-Ludden, 2013). Further, some scholars suggest that female inmates’ interpersonal relationship may become more volatile than previously thought (Greer, 2000). This interpersonal relationship volatility could lead to an increase in prison violence among women. Such literature would suggest that more research on gender and violence in prison is necessary. Race/Ethnicity An intermittent predictor of prison violence is race/ethnicity. Schenk and Fremouw (2012) determined race generally to be a strong predictor of violence, with racial minorities tending to be more violent than White inmates. Wooldredge and Steiner (2012) recognized that victimization rates for White inmates were slightly higher than for Blacks with reference to physical assaults. However, the authors noted the difficulty in reaching such conclusions Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CORRELATES OF VIOLENCE because so many studies were limited to one geographical area with often unique demographic characteristics. This was also examined by Steiner (2009) who studied 512 state-operated prisons and showed that those with higher proportions of Black inmates had higher levels of assaults but concluded that heterogeneity in the composition of the inmate population contributed to the inmate violence. Harer and Steffensmeier (1996) evaluated violent misconduct in 58 federal prisons from several geographic areas in the 1980s. They determined race to be a significant predictor, with Black inmates twice as likely to be found guilty of a violent infraction as White inmates. In a large southwestern state, DeLisi (2003) used a dichotomous sample of white or non-white and established that non-whites were more likely to engage in serious violent misconduct than whites. Later in the same region, Berg and DeLisi (2006) divided race/ethnicity into White, Black, Latino, Native American, and Asian American. They showed that Latino males were the most likely to engage in violent infractions. In fact, being a Latino male was the strongest predictor of violent infractions in their study. Native American males were the second most likely to be involved in violent infractions, while Black male involvement was not significantly different than White male involvement in prison violence. Yet, in Rhode Island, Rocheleau (2011) discovered that Latino inmates were the least likely to engage in prison violence. In contradiction, Griffin and Hepburn’s (2006) study of inmates in Arizona observed that White inmates were more likely to be guilty of assault than either Black or Latino inmates, and they noted that White inmates were a racial majority both in the prison and in the larger community. Finally, several studies have established no significant relationship between race/ethnicity and prison violence (see Baskin, Sommers, & Steadman, 1991; Camp et al., 2003; Wright, 1989). While it appears that a relationship between race/ethnicity and prison violence is generally accepted in the literature, there is variation in terms of which racial/ethnic minorities are more involved in violence. Schenk & Fremouw (2012) did note the unique demographic composition in different geographic locations as confounding the generalizability of findings. However, Steiner and Wooldredge (2009) argue that parallels between disadvantaged minority communities and prison environments are very relevant for understanding inmate violence in particular. Thus, a consideration of race/ethnicity and prison violence is important, but the regional variation must be considered. 23 Education Education has consistently, but not uniformly, been shown to predict prison misconduct and violence. In a sample from the state of Washington (along with New York and Vermont), Wooldredge et al. (2001) found education to be a predictor of prison misconduct. Less education has also been found to be a strong predictor of violent misconduct in studies conducted in Arizona, Florida, and Missouri (see Berg & DeLisi, 2006; Cunningham et al. 2005; Cunningham & Sorenson, 2006; DeLisi et al., 2004). Despite the consistency of findings that level of education predicted prison violence, the research findings were not uniform. In a study of victimization, Wooldredge and Steiner (2012) found background and lifestyle factors, including education, to be conditioned by race. Specifically, education was a strong predictor of the odds of victimization for property offenses for Whites but not for violent offenses, and education was not a strong predictor of victimization for African American inmates for either property or violent offenses. However, in a critical review of the literature of individual characteristics related to prison violence, Schenk and Fremouw (2012) examined a sample of over 500 studies and found that, while examining education was not a primary goal in any of the studies, it was a consistently strong predictor of prison violence. They expressed encouragement in education as an individual level variable that was dynamic and could be enhanced during incarceration. Community Ties While there is much research on the effects of residence and residency ties on post-prison reintegration into the community (Latessa, 2004; Metraux & Culhane, 2004, 2006; Roman, 2004), there are few on the potential effects of these on prison misconduct and, specifically, violence. By residence we mean whether or not an inmate was homeless prior to incarceration (and presumably without a home to return to upon release), and residency ties refers to visitation and social support from outside the prison. Again, we find that the literature focuses primarily on general prison misconduct rather than specific indicators of violence. Visitation has been associated with lower misconduct generally, but consistency in visitation had a much stronger effect (Cochran 2012). Siennick et al. (2012) examined visitation and disciplinary infractions (including contraband) and determined that the probability of infractions decreased in anticipation of visits and substantially increased immediately after, then eventually leveled off. They Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 24 BELL & LINDEKUGEL attributed the increase to spousal visits and infractions for contraband. The Minnesota Department of Corrections (2011) investigated the impact of visitation on recidivism (both new offenses and technical revocations). They observed that visits from siblings, in-laws, and fathers were most beneficial but visits from spouses increased the risk of recidivism. Social ties and family support have been associated with a lower likelihood of serious misconduct, which included primarily violent behaviors (along with escape and possession of a weapon; Berg & DeLisi, 2006; DeLisi et al., 2004). While not specifically examining prison misconduct or violence, Warren, Hurt, Loper, & Chauhan (2004) determined that close ties to the outside (having a spouse and supportive family and visits from children) predicted better adjustment to prison for women. There seems to be ample support in the research that visitation and social support do have an impact on prison adjustment and the likelihood of misconduct including violent misconduct. However, the potential impact of prior homelessness is absent and is a factor that the current research considers. As homelessness appears to impact post-prison reintegration, it could also impact prison integration as seen through violent infractions. Effects of Classification and Programming on Inmates Research suggests that while individual-level factors are powerful influences on prison violence, administrative prison-level factors may influence prison violence as well (Cunningham et al., 2011). In a review of the empirical research over the previous two decades, Byrne and Hummer (2007) assessed whether a subgroup of high risk inmates who would likely be involved in prison violence could be identified and whether such evidence would support the idea that current classification systems reduced the risk to others. They concluded that current classification systems neither predicted prison violence very accurately nor reduced that violence. They argued for a shift in emphasis toward classifying inmates on the basis of changing them (programming/treatment) more so than identifying them for increased levels of control. Byrne and Hummer (2007) further lamented that very little quality research had been conducted (they reviewed 14 studies from a 20 year period) and that research specifically linking classification, program placement, and in-prison behavior had not been conducted. Classification systems in prisons were more focused on external classification (custody level and where the prisoner was sent) than on internal classification (which housing units and which facility programs; Austin, 2003). Austin (2003) also showed that classification and other risk assessment instruments were commonly implemented without proper design and testing and that sufficient staff training and monitoring was lacking. Additionally, classification and risk assessment instruments were often very complicated, and Austin identified a direct relationship between how complicated the classification process was and how reliable it would be. Makarios and Latessa (2013) saw substantial differences between risks and needs assessment instruments used in prisons and argued that the two types should be separated. Much of the research on classification is focused on the broader and more common dependent variable of prisoner misconduct rather than violence. When studying dangerous misconduct (assault, robbery, and drug trafficking) in the California prison system, Berk, Kriegler, & Beck (2006) concluded that dangerous misconduct was a rare event (3% of inmates). They further determined that for every true positive prediction of the classification scheme, there were ten false positives. This was deemed an acceptable cost as the false positives were “almost a sure bet to engage in one of the less serious forms of misconduct” (Berk et al., 2006, p. 9). They observed that inmates at the highest risk for misconduct were young, had long criminal records and sentences, and were gang affiliated both on the street and in the prison. Austin (2003) also established that prisoners likely to be involved in misconduct were young men with a history of violence and/or mental illness, those who were gang affiliated, and those who had recent disciplinary actions and were not involved in prison programming. Likewise, Camp et al. (2003) discovered that age and prior misconduct were the strongest predictors of misconduct in the federal prison system. Correctional treatment is another important factor pertaining to prison misconduct. In a metaanalysis reviewing 68 studies, French and Gendreau (2006) found that behavioral treatment programs (rather than non-behavioral such as educational or vocational programs) had the strongest effects and that programs associated with the most reductions in misconduct were also associated with larger reductions in recidivism. These findings were consistent with previous meta-analyses conducted by Keyes (1996) and Morgan and Flora (2002). French and Gendreau (2006) also recognized large gaps in the research literature and called for additional research that specifically defined prison context and criterion variables, employed longer follow-up periods, and specified offender characteristics Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CORRELATES OF VIOLENCE (especially risk level). This finding coincided with Byrne and Hummer’s (2007) argument that little research linking classification and program placement to prison misconduct had been done. Our research builds on this omission and specifically examines the impact of internal programming on inmates’ prevalence of prison violence. Hypotheses While the research on gender and prison misconduct is mixed, we hypothesize that men will commit more violence in prison, as women are less likely to be associated with violence than men. We also hypothesize that minorities will commit more violence in prison than Whites in the state of Washington and that those with a high school diploma or GED will be less likely to engage in prison violence. Using homelessness in particular, we expect that such individuals will be associated with greater prison violence, as the homeless will have fewer ties to the community. Finally, while few studies have considered the influence of internal administrative-level factors on prison violence, we hypothesize that those in behavioral programming will be associated with less violence. Methods Data and Cases The current study uses data from the Washington Department of Corrections (DOC). All inmates incarcerated for a twenty-month period between January 1, 2009 and August 31, 2011 were included with a sample breakdown of 6,674 females (17.3%) and 31,842 males (82.7%). Data were collected on demographic information such as gender, race, type of offense, sentence length, and repeat incarceration. The data also include such factors as residency prior to incarceration, as well as internal programming and prison visitation. Dependent Measure As we are simply interested in prevalence of committing a violent infraction in prison, the dependent measure is a dichotomous “yes” or “no” dummy variable.1 Using official report data on infractions for the entire cohort (N=38,516), the Washington State DOC recognizes approximately 309 types of misconduct infractions of which 58 (18.77%) are coded as violent (See Appendix).2 A strength of our dependent measure is that previous studies including sex in prison have not differentiated between consensual and violent sexual acts, even though consensual sex is less of a threat to inmate and institutional security (Saum, Surratt, & Inciardi, 25 1995; Wolff, Blitz, Shi, Bachman, & Siegel, 2006). However, our dependent measure does make this distinction and only focuses on violent sexual acts. Independent Measures Gender. Gender is a dummy variable with male as the reference category. Race/Ethnicity. Race/ethnicity is measured with six dummy variables for Asian/Pacific Islander, Black, Latino, Native American, Other, with White as the reference category. The state of Washington has a comparatively large percentage of Latinos and Native Americans in the general and prison population. These data allow for a robust consideration of race. Education. Inmates who do not have a high school diploma can obtain a GED in prison. All inmates who successfully pass their GED exam while incarcerated are noted by the DOC and thus documented as someone who did not have a high school degree before entering prison. Our education dummy variable compares those with a high school degree before incarceration to those who did not have one. Residence. The state of Washington documents whether inmates had a place of residence before incarceration or whether they were homeless. Previous research has considered residency ties to prison infractions, but none has specifically looked at homelessness. This dummy variable compares those who were homeless before incarceration to those who were not. Residency ties. We use visitation as a proxy for residency ties and social support from outside prison. Each prison facility in the state of Washington has different regulations on the number of visitors per visit. However, the maximum number of visitors per visit in any facility is ten. This research uses overall number of visitors as a proxy for visitation. Much research on visitation examines ties to recidivism and suggests that greater frequency of visitation is most important to reduce recidivism (see Bales & Mears, 2008; Minnesota Department of Corrections, 2011). Thus, rather than just considering whether an inmate has a visitor or not, we consider how many visitors they had. Based on the frequency distribution for visitation, four categories of coding were created for those with fewer than ten visitors, eleven to one hundred, one hundred one to five hundred, and over five hundred visitors. However, an inmate who has served a shorter sentence and has the same number of visitors as one with a longer sentence arguably has more social ties. Thus, the number of visitors is standardized by sentence length through the creation of z scores to make comparisons between these different groups. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 26 BELL & LINDEKUGEL Programs. Initial classification in the state of Washington puts inmates into internal programs that are deemed necessary to help each individual become a law-abiding citizen upon release. An inmates’ involvement in three prison programs are documented: Family relations, offender change, and chemical treatment.3 The family relations program focuses on improving the inmates’ relationship with their families and children in particular. The offender change program has many components, most notably moral reconation therapy (MRT) and stress and anger management (SAM). The goal of MRT is to improve pro-social reasoning and behaviors among inmates, while SAM creates an understanding of anger and stress triggers and provides tools to channel this anger/stress in non-violent ways. The chemical treatment program focuses on an inmate’s addiction to alcohol and/or drugs. Control Variables Control variables include offense type, sentence length, and repeat incarceration. All offenses for which the inmate is currently incarcerated are classified into one of three categories: violent offense, property offense, or drug offense. Thus, we take into account and control for a criminal history of violence (see Sorensen & Davis, 2011). Previous research on prison general misconduct and violence has specifically suggested that sentence length can exert an influence, with prison violence more likely to occur during the early part of incarceration and/or among those with shorter sentences (see Berg & DeLisi, 2006; Camp et al., 2003; Cunningham & Sorensen, 2007; Wooldredge et al., 2001). Once again, based on the frequency distribution of sentences in the state of Washington during the 20month period, we classify sentence length into five categories: less than one year, one to one and onehalf years, one and one-half to two years, two to three years, and more than three years. Inmates with simple repeat incarceration have also been shown to display increased general misconduct and/or specifically violence within prison (see Berg & DeLisi, 2006; Cunningham et al., 2005; Hardyman et al, 2002; Kuanliang & Sorensen, 2008; Steiner & Wooldredge, 2008). To control for this possibility, we include a “yes” or “no” dummy variable whether this was the individual’s first admission to prison or a readmission.4 Analytical Strategy To test whether gender, race/ethnicity, education, residence, residency ties, and programming were associated with violent infractions within prison, binomial logistic regression was employed due to the dichotomous nature of the dependent variable. Initial descriptive and bivariate analyses were conducted before regressions were run. This initial analysis considered frequency and percentage of offending as well as relative odds of offending.5 Analysis Descriptive and Bivariate Analysis Table 1 presents initial descriptive and bivariate analysis of gender, race, residence, residency ties, and programming association with violent infractions in prison. Descriptive percentages for gender indicate that the majority of both males and females do not commit violent infractions within prison. Bivariate results for race show that while most inmates do not commit violent infractions, Latinos commit the most violent infractions followed by Native Americans. In fact, using Whites as the reference category, Latinos are 3.20 times more likely to commit a violent infraction while incarcerated followed by Native Americans at 2.20 times more likely. Descriptive and bivariate analyses also indicate that those without a high school degree before entering prison are four times more likely to commit violent infractions in prison than those with a high school degree. Further, having a place to live prior to incarceration suggests that the bivariate odds of the inmate committing a violent infraction are only approximately half (0.55) that of being homeless prior to incarceration. Finally, descriptive and bivariate results show that those inmates involved in each of the various forms of prison programs (family relations, offender change, and chemical treatment) commit more violent infractions than those not in such programs. Also, most inmates do not receive visitors and those inmates with visitors commit more violent infractions than those without visitors. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CORRELATES OF VIOLENCE 27 Table 1 - Descriptive and Bivariate Analysis of Gender, Race/Ethnicity, Education, Residency, Programming, and Visitation on Violent Infractions in Prison (N=38,516)a Gender (Male Reference) Male Female Race (White Reference) White Asian/Pacific Islander Black Latino Native American Other Education (Yes Reference) High School Degree - Yes High School Degree - No Homelessness (Yes Reference) Homeless - Yes Homeless - No Visitors (Zero Reference)c Zero Less than Ten Eleven to One Hundred One Hundred One to Five Hundred Programming (Family Relations Reference)d Family Relations Offender Change Chemical Treatment Control Variables Sentence Type (Violent Offense Reference) Violent Offense Property Offense Drug Offense Sentence Length (Less than One Year Ref.) Less than One Year One to One Half Years One Half to Two Years Two to Three Years More than Three Years Repeat Incarceration (Yes Reference) Repeat Incarceration - Yes Repeat Incarceration - No No Violent Infraction Yes Violent Infraction Total Relative Odds b 29,826 (93.7) 6,388 (95.7) 2,016 (6.3) 286 (4.3) 31,842 (82.7) 6,674 (17.3) 1.00 0.66 26,218 (95.2) 1,149 (95.0) 5,466 (91.5) 1,544 (86.3) 1,141 (90.1) 696 (96.0) 1,334 (4.8) 60 (5.0) 509 (8.5) 245 (13.7) 125 (9.9) 29 (4.0) 27,552 (71.5) 1,209 (3.1) 5,975 (15.5) 1,789 (4.6) 1,266 (3.3) 725 (1.9) 1.00 1.00 1.80 3.20 2.20 0.80 34,665 (94.7) 1,549 (80.5) 1,927 (5.3) 375 (19.5) 36,592 (95.0) 1,924 (5.0) 1.00 4.00 2,814 (90.0) 33,400 (94.4) 311 (10.0) 1,991 (5.6) 3,125 (8.1) 35,391 (91.9) 1.00 0.55 30,324 (96.0) 5,890 (85.1) 3,135 (85.3) 421 (85.2) 1,270 (4.0) 1,032 (14.9) 540 (14.7) 73 (14.8) 31,594 (74.0) 6,922 (16.2) 3,675 (8.6) 494 (1.2) 1.0 4.25 4.25 4.25 5,081 (86.5) 13,611 (87.7) 8,331(90.0) 794 (13.5) 1,908 (12.3) 921 (10.0) 5,875 (19.2) 15,519 (50.6) 9,252 (30.2) 1.00 0.88 0.69 10,701 (93.6) 12,769 (94.5) 12,644 (96.2) 727 (6.4) 746 (5.5) 499 (3.8) 11,428 (30.0) 13,515 (35.5) 13,143 (34.5) 1.00 0.86 0.57 26,156 (95.2) 2,951 (81.8) 6,323 (96.1) 2,887 (89.9) 869 (95.0) 1,333 (4.8) 657 (18.2) 255 (3.9) 326 (10.1) 46 (5.0) 27,489 (65.8) 3,608 (8.6) 6,578 (15.7) 3,213 (7.7) 915 (2.2) 1.00 4.40 0.80 2.20 1.00 5,689 (83.2) 30,525 (96.3) 1,145 (16.8) 1,157 (3.7) 6,834 (17.7) 31,682 (82.3) 1.00 0.20 a Percentages are shown in parentheses Reference categories used to calculate relative odds c Those with more than five hundred visitors were too small d The programming total does not equal 100% as not all inmates were enrolled in these 3 programs b Multivariate Analysis The results of multivariate analysis are presented in Table 2. Using logistic regression, Blacks, Latinos, and Native Americans have greater odds of committing a violent infraction within prison than Whites. Supportive of the bivariate results above, Latinos are 2.09 times more likely to commit a violent infraction within prison than not. Further, those inmates without a high school degree and who are homeless before entering prison have greater odds of committing a violent infraction in prison. The results of the multivariate analysis also further clarify the bivariate results as they show specifically those inmates who have fewer than ten visitors have greater odds of committing a violent infraction in prison. However, while not significant, those with more than ten visitors actually engage in less prison violence. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 28 BELL & LINDEKUGEL This is consistent with previous literature on the influence of visitation. All inmate programs are significantly tied to violence within prison. Interestingly, those inmates in chemical treatment have lower odds of committing a violent infraction within prison, while those inmates in the family relations and offender change program have much higher odds of committing a violent infraction in prison. Finally, those inmates incarcerated for a violent offense have greater odds of committing another violent offense in prison, and those inmates who have been previously incarcerated have greater odds of committing a violent infraction in prison. Surprisingly, no significant difference is observed between the odds of males and females committing violent infractions within prison. Both are equally likely to be involved in prison violence. Table 2 - Logistic Regression of Gender, Race/Ethnicity, Education, Residency, Programming, and Visitation on Violent Infractions in Prison (N=38,516) Female Racec Asian/Pacific Islander Black Latino Native American Other No High School Degree Homelessnessd Visitors Less than Ten Eleven to One Hundred One Hundred One to Five Hundred More than Five Hundred Programming Family Relations Offender Change Chemical Treatment Control Variables Violent Offense Property Offense Drug Offense Less than One Year One to One Half Years One Half to Two Years Two to Three Years More than Three Years Repeat Incarceration Intercept Ba 0.03 (0.07) Odds b 1.03 (0.90, 1.18) 0.08 (0.14) 0.30***(0.06) 0.74***(0.08) 0.44***(0.11) 0.36 (0.20) 0.86***(0.07) -0.47***(0.07) 1.08 (0.82, 1.43) 1.35 (1.20, 1.51) 2.10 (1.80, 2.45) 1.55 (1.26, 1.90) 1.44 (0.97, 2.14) 2.36 (2.07, 2.70) 0.63 (0.55, 0.72) 0.22***(0.02) -0.01 (0.02) -0.01 (0.02) 0.00 (0.02) 1.24 (1.19, 1.30) 0.99 (0.95, 1.03) 0.99 (0.96, 1.03) 1.00 (0.97, 1.04) 0.12*(0.05) 1.28***(0.07) -0.12*(0.05) 1.13 (1.02, 1.26) 3.58 (3.14, 4.08) 0.89 (0.80, 0.98) 0.30***(0.05) 0.06 (0.05) -0.22***(0.06) 0.01(0.08) 0.82***(0.08) -0.12 (0.09) 0.21*(0.09) -0.26 (0.17) 0.92***(0.05) -3.99***(0.11) 1.35 (1.22, 1.50) 1.06 (0.96, 1.17) 0.80 (0.71, 0.90) 1.01 (0.87, 1.18) 2.28 (1.95, 2.66) 0.89 (0.75, 1.05) 1.24 (1.04, 1.47) 0.77 (0.56, 1.07) 2.51 (2.27, 2.78) a Standard Errors in Parentheses 95% Confidence Intervals in Parentheses c White Reference Category d Yes Homeless Reference Category * p < .05, ** p < .01, *** p < .001 b Discussion Overall, our research provides some important and surprising findings on indicators representing the background characteristics of inmates, their ties to the community, and the effects of classification and programming on prison violence. We hypothesized that minorities would commit more violent infractions than whites, but found that while there were more violent infractions among Latinos, Black involvement was similar to Whites. It appears that dynamics other than minority status are involved in Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CORRELATES OF VIOLENCE predicting violence in Washington state prisons. We suggest that this represents regional variability with prison violence and race/ethnicity that can be explored in future research on other regions of the country. Surprisingly, and in notable opposition to our hypothesis, no significant difference in prison violence is determined by gender. This is contrary to previous research (see Austin, 2003; Berg & DeLisi, 2006; Sorensen & Cunningham, 2010; Wulf-Ludden, 2013). While the dynamics of interpersonal relationships among female inmates are quite different from men, perhaps this indicates some support for increased volatility and thus more prison violence among women than previously seen (Greer, 2000). This would suggest that more research on gender and prison violence is necessary to determine if rates of men’s and women’s involvement in prison violence are converging. No studies have assessed the impact of homelessness prior to incarceration on prison violence. Using homelessness as a proxy for residence and community ties, we find that such individuals are more likely to be involved in prison violence. This could have implications for recidivism. If the inmate was homeless prior to incarceration (and presumably without a home to return to upon release), then they may be more likely to repeat offend. Dyb (2009) finds that incarceration increases homelessness post release, so homelessness and incarceration can also be seen as mutually reinforcing. Interestingly, in our study, visitation is a weak predictor of prison violence. Our findings on the effects of classification and programming are mixed. Specifically, those inmates in chemical dependency programming show lesser prison violence. However, those inmates involved in the offender change programming are much more likely to be involved in prison violence. This shows support for internal prison classification in the state of Washington as the DOC decides which program(s) are appropriate for each inmate upon entry into the prison system. As the offender change program includes stress and anger management, perhaps this indicates that the state is correctly identifying those inmates that truly need to be in the offender change program and appropriately placing them. This contradicts Byrne and Hummer’s (2007) finding that current classification systems are not effective in identifying a subgroup of high risk inmates who are likely to be involved in prison violence. Limitations 29 system would exert a lesser effect as these more serious types of infractions would be documented no matter who the offender or facility security level. We also do not have access to age or marital status as a predictor of prison violence. However, we do include a new indicator – namely homelessness – that has not been previously considered when researching community ties. Further, no causal time ordering can be drawn from our findings. As such, our findings on the effects of internal prison programming are difficult to assess. It would be necessary to know whether the incidence of violence occurred prior to, during, or after participation in the offender change program for the state of Washington to truly know whether its behavioral programming is working. Current pilot projects at two Washington state prisons are considering such before and after offender change programming variability in prison violence. Initial results distributed in a 2013 Washington State DOC news release show a dramatic decrease in violence after just a nine-month involvement in the offender change program (Washington DOC, 2013). Further, until recently, prison gangs have not been a problem and thus not recognized in the Washington State DOC, so prison gangs are not assessed here. However, research suggests that gangs are tied to prison violence among males (see Gaes et al., 2002; Griffin & Hepburn, 2006; Worrall & Morris, 2012).6 Only in the last few years has the Washington State DOC segregated inmates based on gang membership, specifically those claiming affiliation with the Nortenos and Surenos (predominantly Latino gangs). Future Research Further research should be done to assess whether the findings on race/ethnicity are regionally specific and if they are tied to gang crime in central Washington. Central Washington has a high concentration of Latino citizens including migrant laborers involved in the agricultural industry. Unfortunately, many of these communities struggle with high levels of illegal gang activity (Moreno, 2006). Future research should also test for regional variation in race/ethnicity in national samples. Finally, future research should include gang activity and also see if the finding of no significant difference in prison violence between men and women can be seen in other states. This could indicate a trend where women are becoming as violent as men in prison. Our research is limited to official report data. However, as our focus is violent infractions in prison, it can be assumed that potential bias within the Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 30 BELL & LINDEKUGEL References Arbach-Lucioni, K., Martinez-Garcia, M., & AndresPueyo, A. (2012). Risk factors for violent behavior in prison inmates: A cross-cultural contribution. Criminal Justice and Behavior, 39(9), 1219–1239. doi: 10.1177/0093854812445875 Austin, J. (2003). Findings in prison classification and risk assessment. Washington, DC: US Department of Justice, National Institute of Corrections. Bales, W. D., & Mears, D. P. (2008). Inmate social ties and the transition to society: Does visitation reduce recidivism? Journal of Research in Crime and Delinquency, 45, 287–321. doi:10.1177/0022427808317574 Baskin, D. R., Sommers, I., & Steadman, H. J. (1991). Assessing the impact of psychiatric impairment on prison violence. Journal of Criminal Justice, 19, 271–280. doi:10.1016/0047-2352(91)90006-H Berg, M. T., & DeLisi, M. (2006). The correctional melting pot: Race, ethnicity, citizenship, and prison violence. Journal of Criminal Justice, 34, 631–642. doi:10.1016/j.jcrimjus.2006.09.016 Berk, R. A., Kriegler, B., & Beck, J. (2006). Forecasting dangerous inmate misconduct: An application of ensemble statistical procedures. Journal of Quantitative Criminology, 22, 131– 145. doi: 10.1007/s10940-006-9005-z Byrne, J., & Hummer, D. (2007). In search of the “Tossed Salad Man” (and others involved in prison violence): New strategies for predicting and controlling violence in prison. Aggression and Violent Behavior, 12, 531–541. doi:10.1016/j.avb.2007.02.001 Camp, S., Gaes, G., Langan, N., & Saylor, W. (2003). The influence of prisons on inmate misconduct: A multilevel investigation. Justice Quarterly, 20, 501–534. doi: 10.1080/07418820300095601 Celinska, K., & Sung, H. E. (2014). Gender differences in the determinants of prison rule violations. The Prison Journal, 94(2), 220–241. doi:10.1177/0032885514524882 Chen, Y. S., Lai, Y. L., & Lin, C. Y. (2014). The impact of prison adjustment among women offenders: A Taiwanese perspective. The Prison Journal, 94(1), 7–29. doi:10.1177/0032885513512083 Cochran, C. (2012). The ties that bind or the ties that break: Examining the relationship between visitation and prisoner misconduct. Journal of Criminal Justice, 40, 433–440. doi:10.1016/j.jcrimjus.2012.06.001 Craddock, A. (1996). A comparative study of male and female prison misconduct careers. The Prison Journal, 76(1), 60–80. doi:10.1177/0032855596076001004 Cunningham, M., & Sorensen, J. R. (2006). Actual models for assessing prison violence risk: Revisions and extensions of the risk assessment scale for prison. Assessment, 13(3), 253–265. doi:10.1177/1073191106287791 Cunningham, M., & Sorensen, J. R. (2007). Predictive factors for violent misconduct in close custody. The Prison Journal, 87(2), 241–253. doi:10.1177/0032885507303752 Cunningham, M., Sorenson, J. R., & Ready, T. J. (2005). An actuarial model for assessment of prison violence risk among maximum security inmates. Assessment, 12, 40–49. doi:10.1177/1073191104272815 Cunningham, M., Sorensen, J., Vigen, M., & Woods, S. (2011). Correlates and actuarial models of assaultive prison misconduct among violencepredicted capital offenders. Criminal Justice and Behavior, 38(1), 5–25. doi:10.1177/0093854810384830 DeLisi, M. (2003). Criminal careers behind bars. Behavioral Sciences and the Law, 21, 653–669. doi: 10.1002/bsl.531 DeLisi, M., Berg, M. T., & Hochstetler, A. (2004). Gang members, career criminals and prison violence: Further specification of the importation model of inmate behavior. Criminal Justice Studies, 17, 369–383. doi:10.1080/1478601042000314883 Drury, A., & DeLisi, M. (2010). The past is prologue: Prior adjustment to prison and institutional misconduct. The Prison Journal, 90(3), 331– 352. doi:10.1177/0032885510375676 Dyb, E. (2009). Imprisonment: A major gateway to homelessness. Housing Studies, 24(6), 809–824. doi:10.1080/02673030903203676 Federal Bureau of Investigation, Uniform Crime Reports. (2011). Crime in the United States. Retrieved from www.fbi.gov/aboutus/cjis/ucr/crime-in-the-u.s/2010/crime-in-theu.s.-2010/crime-map Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CORRELATES OF VIOLENCE 31 French, S. A., & Gendreau, P. (2006). Reducing prison misconducts: What works! Criminal Justice and Behavior, 33(2), 185–218. doi:10.1177/0093854805284406 Keyes, D. (1996). Preventing prison misconduct behavior: A quantitative review of the literature. (Unpublished honor’s thesis). University of New Brunswick, Saint John, Canada. Gaes, G., Wallace, S., Gilman, E., Klein-Saffran, J., & Suppa, S. (2002). The influence of prison gang affiliation on violence and other prison misconduct. The Prison Journal, 82(3), 359– 385. doi:10.1177/003288550208200304 Kuanliang, A., & Sorensen, J. (2008). Predictors of self-reported prison misconduct. Criminal Justice Studies, 21, 27–35. doi:10.1080/14786010801972662 Greer, K. (2000). The changing nature of interpersonal relationships in a women’s prison. The Prison Journal, 80(4), 442–468. doi:10.1177/0032885500080004009 Griffin, M. L., & Hepburn, J. R. (2006). The effect of gang affiliation on violent misconduct among inmates during the early years of confinement. Criminal Justice and Behavior, 33(4), 419–448. doi:10.1177/0093854806288038 Griffin, M. L., & Hepburn, J. R. (2013). Inmate misconduct and the institutional capacity for control. Criminal Justice and Behavior, 40(3), 270–288. doi:10.1177/0093854812457920 Hardyman, P. L., Austin, J., & Tulloch, O. C. (2002). Revalidating external prison classification systems: The experience of ten states and model for classification reform. Washington, DC: U.S. Department of Justice, National Institute of Corrections. Harer, M. D., & Langan, N. P. (2001). Gender differences in predictors of prison violence: assessing the predictive validity of a risk classification system. Crime and Delinquency, 47, 513–536. doi:10.1177/0011128701047004002 Harer, M. D., & Steffensmeier, D. J. (1996). Race and prison violence. Criminology, 34(3), 323– 355. doi: 10.1111/j.1745-9125.1996.tb01210.x Huebner, B. (2003). Administrative determinants of inmate violence: A multilevel analysis. Journal of Criminal Justice, 31, 107–117. doi:10.1016/S0047-2352(02)00218-0 Irwin, J. (2005). The warehouse prison: Disposal of the new dangerous class. Los Angeles, CA: Roxbury Press. Jacobs, J. (1977). Stateville: The penitentiary in mass society. Chicago, IL: University of Chicago Press. Latessa, E. J. (2004). Homelessness and reincarceration. Criminology and Public Policy, 3(2), 137–138. doi: 10.1111/j.17459133.2004.tb00030.x Makarios, M., & Latessa, E. J. (2013). Developing a risk and needs assessment instrument for prison inmates: The issue of outcome. Criminal Justice and Behavior, 40(12), 1449–1471. doi:10.1177/0093854813496240 Metraux, S., & Culhane, D. (2004). Homeless shelter use and reincarceration following prison release. Criminology and Public Policy, 3(2), 136–160. doi: 10.1111/j.1745-9133.2004.tb00031.x Metraux, S., & Culhane, D. (2006). Recent incarceration history among a sheltered homeless population. Crime & Delinquency, 52(3), 504– 517. doi:10.1177/0011128705283565 Minnesota Department of Corrections. (2011). The effects of prison visitation on offender recidivism. Retrieved from http://www.doc.state.mn.us/pages/files/largefiles/Publications/1111MNPrisonVisitationStudy.pdf Moreno, M. (2006). Mexican American street gangs, migration, and violence in the Yakima Valley. The Pacific Northwest Quarterly, 97(3), 131– 138. Morgan, R. D., & Flora, D. B. (2002). Group psychotherapy with incarcerated offenders: A research synthesis. Group Dynamics, 6, 203– 218. http://dx.doi.org/10.1037/10892699.6.3.203 Rocheleau, A. (2011). Prisoners’ coping skills and involvement in serious prison misconduct and violence. (Unpublished Dissertation). Northeastern University, Boston, MA. Roman, C. (2004). A roof is not enough: Successful prisoner reintegration requires experimentation and collaboration. Criminology and Public Policy, 3(2), 161–167. doi: 10.1111/j.17459133.2004.tb00032.x Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 32 BELL & LINDEKUGEL Sandler, J. C., Freeman, N. J., Farrell, P., & Seto, M. C. (2013). Predicting institutional sexual misconduct by adult male sex offenders. Criminal Justice and Behavior, 40(10), 1131– 1148. doi:10.1177/0093854813485574 Saum, C. A., Surratt, H. L., & Inciardi, J. A. (1995). Sex in prison: Exploring the myths and realities. The Prison Journal, 75(4), 413–430. doi:10.1177/0032855595075004002 Schenk, A. M. & Fremouw, W. J. (2012). Individual characteristics related to prison violence: A critical review of the literature. Aggression and Violent Behavior, 17, 430–442. doi:10.1016/j.avb.2012.05.005 Siennick, S., Mears, D., & Bales, W. (2013). Here and gone: Anticipation and separation effects of prison visits on inmate infractions. Journal of Research in Crime and Delinquency, 50(3), 417– 444. doi: 10.1177/0022427812449470 Sorensen, J., & Cunningham, M. (2010). Conviction offense and prison violence: A comparative study of murderers and other offenders. Crime & Delinquency, 56(1), 103–125. doi:10.1177/0011128707307175 Sorensen, J., & Davis, J. (2011). Violent criminals locked up: Examining the effect of incarceration on behavioral continuity. Journal of Criminal Justice, 39(2), 151–158. doi:10.1016/j.jcrimjus.2011.01.003 Steiner, B. (2009). Assessing static and dynamic influences on inmate violence levels. Crime & Delinquency, 55(1), 134–161. doi:10.1177/0011128707307218 Steiner, B., & Wooldredge, J. D. (2008). Inmate versus environmental effects on prison rule violations. Criminal Justice and Behavior, 35, 438–456. doi:10.1177/0093854807312787 Steiner, B., & Wooldredge, J. D. (2009). The relevance of inmate race/ethnicity versus population composition for understanding prison rule violations. Punishment & Society, 11(4), 459–489. doi:10.1177/1462474509341143 Steiner, B., & Wooldredge, J. D. (2013). Implications of different outcome measures for an understanding of inmate misconduct. Crime & Delinquency, 59(8), 1234–1262. doi:10.1177/0011128709335151 Toch, H., Adams, K., & Grant, J. D. (1989). Coping: Maladaptation in prisons. New Brunswick, NJ: Transaction Publishers. Walters, G. D., & Crawford, G. (2013). In and out of prison: Do importation factors predict all forms of misconduct or just the more serious ones? Journal of Criminal Justice, 41(6), 407–413. doi:10.1016/j.jcrimjus.2013.08.001 Warren, J., Hurt, S., Loper, A., & Chauhan, P. (2004). Exploring prison adjustment among female inmates. Criminal Justice and Behavior, 31(5), 624–645. doi:10.1177/0093854804267096 Washington Department of Corrections. (2013). Prison pilot projects show dramatic decrease in violence. Retrieved from http://offenderchange.org/prison-pilots-seefewer-violent-infractions/ Wolff, N., Blitz, C., Shi, J., Bachman, R., & Siegel, J. (2006). Sexual violence inside prisons: Rates of victimization. Journal of Urban Health, 83(5), 835–848. doi: 10.1007/s11524-006-9065-2 Wooldredge, J. (1994). Inmate crime and victimization in a southwestern correctional facility. Journal of Criminal Justice, 22(4), 367– 381. doi:10.1016/0047-2352(94)90083-3 Wooldredge, J., Griffin, T., & Pratt, T. (2001). Considering hierarchical models for research on inmate behavior: Predicting misconduct with multilevel data. Justice Quarterly, 18(1), 203– 231. doi: 10.1080/07418820100094871 Wooldredge, J., & Steiner, B. (2012). Race group differences in prison victimization experiences. Journal of Criminal Justice, 40, 358–369. doi:10.1016/j.jcrimjus.2012.06.011 Worrall, J., & Morris, R. G. (2012). Prison gang integration and inmate violence. Journal of Criminal Justice, 40(5), 425–432. doi:10.1016/j.jcrimjus.2012.06.002 Wright, K. (1989). Race and economic marginality in explaining prison adjustment. Journal of Research in Crime and Delinquency, 26(1), 67– 89. doi:10.1177/0022427889026001004 Wulf-Ludden, T. (2013). Interpersonal relationships among inmates and prison violence. Journal of Crime and Justice, 36(1), 116–136. doi: 10.1080/0735648X.2012.755467 Steiner, B., & Wooldredge, J. D. (2014). Sex differences in the predictors of prison misconduct. Criminal Justice and Behavior, 41(4), 433–452. doi:10.1177/0093854813504404 Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CORRELATES OF VIOLENCE 33 About the Authors Kerryn E. Bell is an Assistant Professor of Sociology and Criminal Justice at Eastern Washington University. Her research interests include prison violence and recidivism as well as the intersectionality of gender and race/ethnicity with criminal offending. Dale M. Lindekugel is Professor of Sociology and Criminal Justice at Eastern Washington University. His research interests include deviance and prison violence. Endnotes 1 As the study includes everyone incarcerated in the state of Washington over a 20-month period, data are available to look at incidence of prison violence. However, for the purpose of this study, we were only interested in prevalence of prison violence as we are looking at correlates of prison violence generally and not the number of times an individual inmate engages in prison violence. 2 Using the accepted Uniform Crime Report (UCR) definition of violent crime, all infractions that involved murder, rape or sexual assault, robbery, and aggravated assault were coded as violent. 3 We do not have information on how long the individual was in a program, just whether they were enrolled. This is further discussed in the limitations section. 4 As the focus is violence committed while incarcerated, no other type of sentence (i.e., probation and community corrections) are considered in the repeat incarceration variable. 5 Before conducting analyses, a variance inflation factor (VIF) test was run on all variables to check for multicollinearity. No VIF above 4 was found, indicating that multicollinearity was not a problem in this study. Further, scatterplots tested for heteroscedasticity in the data. Normal distributions show that very little variance is left after accounting for the independent variables and heteroscedasticity is not present. 6 As gangs are not a recognized problem among female inmates, their prison violence must be attributed to something other than gangs. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 34 BELL & LINDEKUGEL Appendix - Operationalization of Dependent Measure Violent Infraction Description Homicide Aggravated Assault/Inmate Fighting Threatening Aggravated Assault/Visitor Holding Hostage Disease Transfer Cause Inmate Injury Aggravated Assault/Staff Sexual Assault Staff Attempted Sexual Assault/Staff Abusive Sexual Contact/Staff Assault/Inmate Assault/Offender Sexual Assault/Offender Attempted Sexual Assault/Offender Abusive Sexual Contact/Offender Rioting Inciting Riot Strong Arming/Intimidation Cause Staff Injury Assault/Non Hospital Assault/Staff Assault/Visitor Attempted Suicide Attempted Self-Mutilation/Harm Refuse w/ Staff Injury Resist Order w/ Staff Injury Injure a Visitor Assault/Hospital Assault Holding Hostage Refuse Medical Order/Injury Violent Infraction Code 89,90 91,92 97,98,310 99,100,311 108,109 113,114 146 147 156,157 173,174,175 176,177 178,179 182 183 184,185 186,187,188 189,190 191,192,362 193,194,363 216,217 221 227 228 242,243 245,246 247,248 300 301 304 306 307 333 382 Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 VOLUME 16, ISSUE 1, PAGES 35–50 (2015) Criminology, Criminal Justice Law & Society E-ISSN 2332-886X Available online at https://scholasticahq.com/criminology-criminal-justice-law-society/ Seeing Saw through the Criminological Lens: Popular Representations of Crime and Punishment J. C. Oleson and Tamara MacKinnon University of Auckland ABSTRACT AND ARTICLE INFORMATION Crime is a staple of the media, and violent crimes such as murder are overrepresented in both news and entertainment. Although cases of serial homicide are exceptionally rare, stories about serial killers are terrifically popular. Indeed, while the seven Saw feature films, recounting the crimes of serial killer John “Jigsaw” Kramer, have been derided as mere “torture porn” by some critics, they constitute the most successful horror franchise in the world. Certainly, the Saw franchise entertains, allowing viewers to vicariously explore their fears of the serial killer in a safe, controlled manner. The Saw films both inform and misinform viewers about crime and punishment—employing parasocial experiences of violent criminal events to prompt viewers to wrestle with fundamental questions of law, morality, and purpose. Viewed through lenses of crime and punishment, the Saw franchise offers both a critique of and commentary on crime in present society. The fictional character of John Kramer can be analyzed through real homicide typologies, and Kramer’s crimes can prompt discussion about the four cardinal philosophies of punishment: retribution, deterrence, incapacitation, and rehabilitation. Article History: Keywords: Received 18 August 2014 Received in revised form 19 January 2015 Accepted 24 February 2015 Saw, Jigsaw, John Kramer, serial killer, media, crime, punishment © 2015 Criminology, Criminal Justice, Law & Society and The Western Society of Criminology Hosting by Scholastica. All rights reserved. The public is fascinated by crime. Crime figures prominently in both news (e.g., Barak, 1994; Potter & Kappeler, 2006) and entertainment media. Approximately 20% of feature films are crime films, and approximately 50% “have significant crime content” (Reiner, 2007, p. 312). Some criminals become celebrities (Duncan, 1996; Kooistra, 1989; Schmid, 2005) and enjoy an infamous species of fame (Oleson, 2003). Serial killers, in particular, have been elevated into a prominent place in society’s pantheon of criminals (Jenkins, 1994; Tithecott, 1997): “The serial killer constitutes a mythical, almost supernatural, embodiment of American society’s deepest darkest fears” (Beckman, 2001, p. 62). Additionally, because they have the power to make us feel alive in our benumbed “wound culture,” a strange kind of adoration is heaped upon contemporary serial killers, the monsters of our cynical age. “Our society is obsessed with serial killers,” suggests Bruno. Similarly, Hawker quips, “All the world loves a serial killer.” (Oleson, 2005b, p. 187, citations in original omitted) Corresponding author: James C. Oleson, University of Auckland, Department of Sociology, Level 9, HSB Building, 10 Symonds Street, Private Bag 92019, Auckland 1142, New Zealand. Email: [email protected] 36 OLESON & MACKINNON Murder is entertainment, and it is also big business (Fuhrman, 2009). Society’s fascination with serial killers has fueled a robust true-crime market (Egger, 1998) and created an audience for a host of crime biography documentaries. The writing of serial killers is widely available to interested readers (Brady, 2001; Philbin, 2011), and the artwork of serial killers is sought out by a vibrant market of collectors of murderabilia (Scouller, 2010). People can buy serial killer trading cards (Jones & Collier, 1993) and serial killer action figures (Schmid, 2005). The serial killer is the quintessential modern monster (Picart & Greek, 2003). Although the names of notorious serial killers may be more familiar to the public than the names of world-renowned scientists (Oleson, 2005b), it may not be the real-life serial killer who shapes the public’s view, but the fictional one: the character drawn from literature, television, and film. The influence of popular film on the public understanding of crime and criminals dwarfs that of all academic criminological scholarship (Rafter & Brown, 2011). Indeed, author Thomas Harris’ fictional serial killer Dr. Hannibal “the Cannibal” Lecter was “arguably… the most publicized and recognizable personality (real or not) in America during February 1991” (Skal, 1993, p. 383, italics added). In the 1960s, serial killer films began to replace traditional horror narratives involving werewolves, aliens, or vampires (Tudor, 1989). Although these traditional supernatural horror themes have enjoyed a resurgence in recent years, serial killers remain a central focus of dramatic narratives as illustrated by the characters of Joe Carroll on the Fox network’s The Following (Williamson & Siega, 2013) and Dexter Morgan on Showtime’s Dexter (Cerone et al., 2006). This paper will examine the seven serial killer films that constitute the Saw franchise: Saw (Hoffman, Burg, Koules, & Wan, 2004), Saw II (Hoffman, Burg, Koules, & Bousman, 2005), Saw III (Hoffman et al., 2006), Saw IV (Hoffman et al., 2007), Saw V (Hoffman, Burg, Koules, & Hackl, 2008), Saw VI (Hoffman, Burg, Koules, & Greutert, 2009), and Saw 3D (Hoffman, Burg, Koules, & Greutert, 2010). Released across seven years and netting approximately $877 million USD in global receipts (Numbers, 2014), the Saw films are the most successful horror franchise in the world (Kit, 2010). The franchise has earned numerous critical awards, but it is the franchise’s commercial success that is most noteworthy: The films have been adapted into comic books (Lieb & Oprisko, 2005), video games (Wingfield, 2007), toy and costume merchandise (NECA, 2014)—even theme park attractions (Thorpe Park, 2014). Each of the seven films currently appears in the Internet Movie Database’s top 400 horror movies, as selected by the voting public (Internet Movie Database, 2014). Created by writer Leigh Whannell and director James Wan, the Saw films describe the activities of serial killer John “Jigsaw” Kramer. Like other fictional serial killer protagonists—Hannibal Lecter (Harris, 1981, 1988, 1999, 2006, 2013), Dexter Morgan (Lindsay, 2004, 2005, 2007, 2009, 2010, 2011, 2013), or Seven’s John Doe (Kopelson, Carlyle, & Fincher, 1995)—Kramer’s victims are selected because they have engaged in crimes or immoral acts that have gone unpunished. Unlike Lecter and Morgan, however, Kramer does not actually want his victims to die; rather, he wants them to survive and to be “reborn” (with an understanding of their past wrongs and a new appreciation for life). His modus operandi involves kidnapping victims and locking them in one of his “torture warehouses.” When the victims regain consciousness, audio or video tapes are played for them, outlining their transgressions and explaining the rules of their punishments. Kramer subjects his victims to “tests” or “games” that inflict extreme psychological and physical pain, often involving complex mechanical traps. If the victims die, Kramer removes a jigsaw puzzle-shaped piece of flesh from their skin, symbolizing their missing survival instincts. This trophy-taking earns Kramer the media moniker “Jigsaw.” If the victims survive the tests, according to Kramer’s understanding of the world, they are instantly rehabilitated. The Saw films have been dismissed as derivative facsimiles of other—superior—serial killer films (Gleiberman, 2004), and they have been denounced by Edelstein (2006) and others as mere “torture porn” – movies in the same vein as The Devil’s Rejects (Elliot, Gould, Mehlitz, Ohoven, & Zombie, 2005), the Hostel trilogy (Briggs, Fleiss, & Spiegel, 2011; Roth, 2005; Spiegel, Yakin, Fleiss, Tarantino, & Roth, 2007), or Wolf Creek (Lightfoot & Mclean, 2005). But other scholars have identified meaningful elements in the Saw films and have produced a modest body of scholarship on these works (e.g., Aston & Walliss, 2013; Fore, 2009; Huntley, 2009; Jones, 2010). The extant scholarship on Saw has adopted a media studies perspective, but the Saw franchise also can be studied through a criminological lens, as has been done with the Hannibal Lecter franchise (Oleson, 2005a, 2005b, 2006a, 2006b). For example, analysis of the character of John Kramer can reveal to what extent film depictions do—or do not—accurately depict the realities of crime and criminals (Leistedt & Linkowski, 2014; Oleson, 2005b), and Jigsaw’s crimes can be employed as a lens to understand traditional theories of punishment. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CRIME AND PUNISHMENT IN SAW This article is organized in four parts. Part one examines the linkages between crime and popular culture and discusses some of their implications for society. Part two analyzes the crimes of John “Jigsaw” Kramer using several serial killer typologies. Part three analyzes the crimes of Saw films, employing traditional theories of punishment. Finally, part four analyzes the social functions of the Saw series. Crime and the Media Popular films entertain, but they also influence audience beliefs and attitudes. Like representations on television, film portrayals communicate a great deal to audiences “about social norms and relationships, about goals and means, about winners and losers, about the risks of life and the price for transgressions of society’s rules” (Gerbner & Gross, 1976, p. 178). Crime films simultaneously “allow viewers to experience the vicarious thrills of criminal behavior while leaving them free to condemn this behavior, whoever is practicing it, as immoral” (Leitch, 2002, p. 06). These “parasocial experiences” (Giles, 2002) allow audiences to vicariously learn about crime and punishment. In Shots in the Mirror, Rafter notes that crime films provide viewers with rich material that can be used to “interpret the world and develop our meaning systems … in the construction of personal identity and in bridging the gap between ourselves and our social situations” (2006, p. 14). On the other hand, films often misrepresent the reality of what they purport to display. For example, in their analysis of 400 feature films, Leistedt and Linkowski (2014) found that cinematic depictions of psychopaths usually deviated from clinical realities. Similarly, Surette (2015) describes the distortion of crime and punishment. While violent crime and predator criminals are statistically rare, they constitute a staple of the popular media: “Whatever the truth about crime and the criminal justice system in America, the entertainment, news, and infotainment media seem determined to project the opposite” (Surette, 2015, p. 205). This is important, since audiences who view inaccurate representations of crime can be influenced and adopt social attitudes that are not grounded in reality. Individuals may misunderstand the workings of the criminal justice system, have reduced empathy towards certain types of victims, and learn harmful stereotypes about offenders. Such portrayals of violence can increase social fear of crime (Heath & Gilbert, 1996) and increase punitive attitudes as a means to mediate anxiety (Cheliotis, 2010; Mason, 2006). Thus, audience members who are frightened by the 37 spectacle of Saw may become more supportive of punitive legislation (e.g., Pratt, 2007), increasingly willing to incarcerate more people, for longer periods of time, under penal conditions that may strain the very boundaries of human endurance (e.g., Haney, 2006). Of course, not all audience members will react to the Saw films in the same way. For some viewers, Saw might evoke shock and wonder, instead of fear. In this case, the Saw films might reinforce moral and social norms in society. This is reminiscent of Emile Durkheim’s functional view of crime and punishment. Crime, in Durkheim’s view, is necessary for society to evolve: According to Athenian law, Socrates was a criminal, and his condemnation was no more than just. However, his crime, namely the independence of his thought ... served to prepare a new morality and faith which the Athenians needed since the traditions by which they had lived until then were no longer in harmony with the current conditions of life. (Durkheim, 1895/1958, p. 71) In Durkheim’s view, punishment is functional, as well; it restores normative equilibrium within the community. Through punishment, a criminal who has victimized the community through his offense, is in turn punished—made victim—and moral equilibrium is thereby restored. Punishments safeguard the public order. Members of the community are reassured of their safety and in seeing the offender punished for his crimes, are reassured that they were doing the right thing by following the laws (Durkheim, 1895/1958). Similarly, viewing the fictional crimes of John “Jigsaw” Kramer (as well as the otherwiseunpunished crimes of Kramer’s victims), Saw viewers may find their moral intuitions reaffirmed. The Saw films might enhance social solidarity, confirm ideals of good and evil, and help define the outer bounds of acceptable behavior. In addition to driving penal populism or reinforcing social solidarity, the Saw films mirror society. After all, some crime movies are inspired by real offenders and real criminal events. Art imitates life. For example, both the original (Brooks, 1967) and the remake (Rowe & Kaplan, 1996) of In Cold Blood were based on the brutal 1959 killing of the Clutter family in Holcomb, Kansas, as recounted by Truman Capote (1966). The character of Dr. Hannibal Lecter, portrayed in Manhunter (Roth & Mann, 1986), The Silence of the Lambs (Utt, Saxon, Bozman, & Demme, 1991), Hannibal (Scott, Laurentiis, & Laurentiis, 2001), Red Dragon Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 38 OLESON & MACKINNON (Laurentiis, Laurentiis, & Ratner, 2002), and Hannibal Rising (Laurentiis, Laurentiis, Ammar, & Webber, 2007), was based principally upon one “Dr. Salazar,” an imprisoned Mexican physician (Harris, 2013). The 1924 murder of Bobby Franks by genius aristocrats Nathan Leopold and Richard Loeb (Higdon, 1999) has been made into three feature films: Compulsion (Zanuck & Fleischer, 1959), Rope (Hitchcock & Bernstein, 1948), and Swoon (Vachon & Kalin, 1992). It may have also influenced both iterations of Funny Games (Heiduschka & Haneke, 1997; McAlpine et al., 2007). The 1958 real-life murder spree of Charles Starkweather and his girlfriend Caril Ann Fugate inspired the film, Badlands (Malick, 1973). Although the writers of the Saw franchise have never identified their inspiration for John “Jigsaw” Kramer, there are compelling parallels between the character and the real-life “ToyBox Killer” David Parker Ray. Ray was apprehended in 1999 for the kidnapping, rape, torture, and murder of as many as 60 women (Fielder, 2003). Like Kramer, Ray constructed his own torture chamber, equipped with special pain-inflicting instruments, and—like Kramer—Ray used tape recorded messages to communicate with his victims when they regained consciousness. Police also found Ray’s detailed drawings of torture devices, akin to those that Kramer employed in his torture warehouse. Furthermore, Ray operated with accomplices, just as Kramer has “apprentices.” Finally and coincidentally, Ray’s crimes were committed in the town of Truth or Consequences, New Mexico. Truth or Consequences echoes the principles of truth and consequence that motivate John “Jigsaw” Kramer’s traps and tests. Specifically, Kramer selects victims who refuse to tell the truth, and he employs punishments that mirror his victims’ offenses so that they might understand the consequences of their actions. Sometimes, in what might be characterized as a “strange loop” (Hofstadter, 1999), fictionalized representations of crime drawn from life can inspire a second generation of copycat crime. Life imitates art. For example, Natural Born Killers (Hamsher, Murphy, Townsend, & Stone, 1994) draws upon the Starkweather and Fugate killings. This movie, recounting the story of fictional lovers, Mickey and Mallory Knox, and satirizing the media for its celebration of crime, has been linked to at least fourteen real-life killings (Ruddock, 2001). Copycat crime is uncommon, but it is not unheard of. In one study, Surette (2002) found that more than a quarter (26.5%) of a sample of 68 incarcerated serious and violent juvenile offenders reported committing a copycat offence (i.e., answered yes to the question, “Can you recall ever having tried to commit the same crime that you had seen, read, or heard about in the media?”). The Saw franchise has been implicated in copycat violence as well. In the U.K., 15-year-old Daniel Bartlam killed his mother with a claw hammer shortly after watching Saw (Dolan & Reilly, 2012). John Kramer the Offender: Serial Killer Typologies Film characters are especially compelling when they present audiences with an enigma, a paradox, or a puzzle to be solved (Oleson, 2005b). In particular, the presence of incomplete or incongruous pieces of information may lead to a state of “kennetic strain” (Sarbin, 1972) and—as in the resolution of metaphor (Brownell, Simpson, Bihrle, Potter, & Gardner, 1990) or humor (Johnson, 1990)—require the viewer to actively engage the material in order to make sense of it. Kennetic strain may help to explain the allure of John “Jigsaw” Kramer. He is, after all, a serial killer who wants his victims to live and who does not kill his victims directly, but only through the construction of tests and games. In Saw, one of the characters remarks, “Technically speaking, he’s not really a murderer—he never killed anyone. He finds ways for his victims to kill themselves” (Hoffman et al., 2004, 17:44). Of course, this distinction is not legally meaningful. When Jigsaw affixes a “reverse bear trap mask” onto a victim, his knowledge of a serious risk of death is criminally culpable. His subjective hope that his victim will pass the test and survive is legally irrelevant. The combination of Kramer’s attaching the trap (a criminal action) and his knowledge of a serious risk of death (a criminal state of mind) is sufficient to constitute murder (Dressler, 2012). Murder, the unlawful killing of another human being with “malice aforethought,” is sometimes classified by number and the presence or absence of cool-down periods. The Federal Bureau of Investigation (FBI) distinguishes five different categories: a single homicide involves one victim in one homicidal event, a double homicide involves two victims in one homicidal event, and a triple homicide involves three victims in one homicidal event. Four or more victims killed during a single homicidal event constitute a mass homicide. A spree murder involves two or more victims in two or more locations without a cooling-off period, while serial murder involves three or more separate homicidal events with cooling-off periods between events (Douglas, Ressler, Burgess, & Hartman, 1986). While Egger (1998) suggests that a second murder is sufficient to qualify as serial murder, Fox and Levin (1998) suggest that the threshold for “serial murder” should be four victims. Jenkins (1994) also identifies four as a minimum threshold. Hickey summarizes the Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CRIME AND PUNISHMENT IN SAW literature by writing, “Most researchers agree that serial killers have a minimum of 3–4 victims” (1991, p. 8). Under any of these definitions, the character of John “Jigsaw” Kramer is a serial killer. After seven films, Kramer is responsible for the deaths of 52 people. If Kramer were a real offender, his death toll would far exceed the 7–11 average victims attributed to identified serial killers (Hickey, 1991). As a serial killer, John “Jigsaw” Kramer can be further categorized using two additional typologies. First, under the FBI’s organized/disorganized dichotomy (Ressler, Burgess, Douglas, Hartman, & D’Agostino, 1986), Kramer neatly fits the paradigm of the organized offender. According to the FBI (1985), organized offenders typically exhibit 14 characteristics: (1) average to above-average intelligence, (2) social competence, (3) preference for skilled work, (4) sexual competence, (5) high birth order status, (6) father had stable work, (7) inconsistent childhood discipline, (8) controlled mood during crimes, (9) use of alcohol during crimes, (10) precipitating situational stress, (11) living with a partner, (12) mobility with a car in good condition, (13) follows crime in news media, and (14) may change jobs or leave town after commission of crimes. John “Jigsaw” Kramer fits most of these categories. As a former civil engineer, he is both intelligent and methodical. Belinkie describes him as “possessing a nearly superhuman intellect” (2010, para. 33). Kramer intricately plans the deaths of his carefully-selected victims, drawing figures of intricate mechanical traps and constructing models to test them. His crimes exhibit planning, intelligence, and logic. Kramer is socially competent and actually attracts followers (“apprentices”). He maintains a controlled mood during his crimes, is mobile, and follows the media coverage of the Jigsaw crimes. Holmes and DeBurger’s (1988) identified four categories of serial killers: (1) visionary types who kill because they are commanded to do so by voices or visions; (2) mission-oriented types who kill because they believe it is their duty to eliminate certain classes of undesirable people from society; (3) hedonistic types who derive satisfaction from killing (including thrill-oriented, comfort-oriented, and lustoriented sub-types); and (4) control-oriented types who kill to assert power and dominion over others. Under this taxonomy, Kramer is a mission-oriented killer. He believes that he is cleansing society of two undesirable groups. First, people who are guilty of crimes for which they have been neither caught nor punished. In Kramer’s mind, he is doing society a favor by succeeding where the criminal justice system has failed. He assumes responsibility for apprehending, punishing, and either rehabilitating or incapacitating those who violate the social contract 39 (c.f., Hobbes, 1651/1991; Rousseau, 1762/1997). In Saw V (Hoffman et al., 2008), Kramer illustrates his mission-oriented status when he tells an apprentice who has just killed someone, “You and I both know the statistics for repeat offenders in this city...so you might look at what you did…as a kind of public service” (Hoffman et al., 2009, 45:44). The second group that Kramer seeks to eliminate from society is those who lack the instinct for survival. For Kramer, this is an essential human element. In the first Saw film (Hoffman et al., 2004), after Kramer was diagnosed with an inoperable brain tumor, he attempted suicide by driving off a cliff. The man who crawled from the wreckage was changed, and cherished life. In Saw II, Kramer explains, “Darwin's theory of evolution and survival of the fittest...no longer applies on this planet. We have a human race that doesn't have the edge or the will to survive” (Hoffman et al., 2005, 43:14). The mission to dispense vigilante justice and the mission to cull those without the will to live converge in Kramer’s mind: In Saw V, he explains, “You can dispense justice and give people a chance to value their lives in the same moment” (Hoffman et al., 2008, 45:11). Kramer’s mission-oriented killings are designed to ensure a society in which there is justice for crime, value for life, and a universal human determination to survive. Kramer’s crimes are attempts to achieve these three goals through the mechanism of punishment. John Kramer the Punisher: Theories of Punishment Some theorists suggest that punishment serves an expressive function (e.g., Feinberg, 1965), but most commentators agree that there are four “cardinal philosophies of punishment—retribution, deterrence, incapacitation, and rehabilitation” (Oleson, 2011, p. 696). Through his series of elaborate traps and tests, John “Jigsaw” Kramer subjects his victims to harrowing experiences that draw upon all four bases of punishment. Retribution (or “just deserts”) is a deontological, non-consequentialist form of punishment (Oleson, 2007). Thus, retributivism is neither justified by the advantages it produces for society, nor does it attempt to reduce the number of future crimes; rather, retributivism punishes crimes that have already taken place, and it punishes them because it is morally correct to do so. Under some formulations of retributivism, society has an affirmative moral duty to punish the criminal. For example, Immanuel Kant (1796/1887) famously wrote that, Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 40 OLESON & MACKINNON Even if a Civil Society resolved to dissolve itself with the consent of all its members— as might be supposed in the case of a People inhabiting an island resolving to separate and scatter themselves throughout the whole world—the last Murderer lying in the prison ought to be executed before the resolution was carried out. This ought to be done in order that every one may realize the desert of his deeds, and that blood guiltiness may not remain upon the people; for otherwise they might all be regarded as participators in the murder as a public violation of Justice. (p. 198) As a mission-oriented killer, John “Jigsaw” Kramer may be compelled by retributive duty of this kind. Belinkie (2010) relates Kramer’s traps to medieval purification rituals, designed to cleanse victims of their sins and grant them redemption through suffering. Retributivism rests upon a foundation of fairness. Employing an elegant logical twist, the philosopher Georg Hegel explained that when a criminal violates the law, his crime is the negation of the right of society. Punishment, however, is the negation of that negation, and thus an affirmation of right, solicited and brought upon the criminal by himself (Ezorsky, 1972). This idea of an inflicted harm to redress an unfair advantage is central to retributivism and is closely related to the doctrine of lex talionis, the principle that the punishment should be identical to the offense (“an eye for an eye”). Reminiscent of lex talionis, many of Kramer’s tests are designed to punish his victims in ways that explicitly echo or mirror their crimes. For example, in Saw II, one of Kramer’s victims is told that he has “burned those around you with your lies, cons, and deceits” (Hoffman et al., 2005, 36:48). His test is to retrieve an antidote for nerve gas from the back of a furnace, but when the furnace door locks, a fire ignites and he burns to death. Although Kramer’s tests and games frequently symbolize the crimes that are being punished, his punishments are often disproportionately severe. Proportionality in punishment is one of the key principles of any rational system of penalties (Bentham, 1948), and Kramer’s excesses suggest that he may be more concerned with eliminating wrongdoers who lack a survival instinct than with imposing proportional harms to social wrongs. The Saw films also imply that deterrence plays a role in Kramer’s punishments. Unlike retributivism, which is non-consequentialist, retrospective, and intrinsicalist in nature, deterrence-based punishments are consequentialist (utilitarian), prospective, and instrumentalist. In Plato’s Protagoras (1963), he noted that authorities do not punish a man for past wrongs unless they are wreaking blind vengeance; rather, rational men inflict punishment to prevent future offending. Cesare Beccaria shared this view. In On Crimes and Punishments (1764/1963), Beccaria argued that the end of punishment is to prevent the criminal from inflicting additional harm and to prevent others from committing like offenses. Kramer makes use of both specific and general deterrence. The theory of specific deterrence suggests that if an offender commits a crime and is punished for it, the experience of punishment will make the offender less likely to reoffend in the future. The theory of general deterrence suggests that the lessons of punishment are learned vicariously – it is not only the punished offender who is less likely to offend, but everyone who knows of the punishment. Empirical research has demonstrated modest deterrent effects (Pratt, Cullen, Blevins, Daigle, & Madensen, 2009), but Paternoster cautions that faith in deterrence must be tempered with “a healthy dose of caution and skepticism” (2010, p. 765). Although certainty of police apprehension appears to exercise a strong deterrent effect, the severity of the punishment appears to have little influence on offending (Nagin, 2013). Members of the public often dramatically underestimate the severity of punishments (Hough & Roberts, 1998). In fact, some evidence suggests that the experience of prison (specific deterrence) may be criminogenic (Cullen, Jonson, & Nagin, 2011; Spohn & Holleran, 2002), affirmatively increasing recidivism. More than half (approximately 67.5%) of those who are released from U.S. state prison custody are rearrested for a new offense within three years, and approximately 51.8% are returned to prison (Langan & Levin, 2002). The evidence for general deterrence fares little better. Even the ultimate penalty (death) may not deter crimes (Radelet & Lacock, 2009). Although Ehrlich (1975) calculated that each U.S. execution prevented (deterred) approximately eight murders, the economic literature on the deterrent effect of capital punishment is highly contentious (Fagan, 2006). Through modest manipulations of the analytical techniques, Donohue and Wolfers (2006) used a data set to produce highly variable results, ranging from 429 lives saved per execution to 86 lives lost! Indeed, most deterrence research suggests that it is not the severity of punishment that deters, but its celerity and its certainty (Nagin & Pogarsky, 2001; von Hirsch, Bottoms, Burney, & Wikstrom, 1999). Kramer’s philosophy of punishment is based on utilitarian ideals, as exemplified in the function of his traps. Kramer’s traps are multifunctional; while they test an individual’s will to survive, they also require Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CRIME AND PUNISHMENT IN SAW participants to recognize their obligations to other persons. For example, Kramer’s group trap requires the “fatal five,” a group of five seemingly unrelated victims, to cooperate. Ignoring Kramer’s clue as to the altruistic nature of the tests, three of the players are killed. When only two survivors remain, they finally understand their connection: collectively, the members of the fatal five were responsible for the deaths of innocent people in a fire. The two survivors also realize that the deaths of the others were unnecessary: Jigsaw’s traps had been designed so that each of the five could survive if they worked together. For example, in the final trap, ten pints of blood are required to win; if five players had lived, they would have each sacrificed only two pints; instead, the two survivors must each sacrifice five pints of blood – half of the blood in their bodies. John Kramer employs both general and specific deterrence in his games of punishment. In Saw (Hoffman et al., 2004), images of newspaper articles with headlines reading “Psychopath Teaches Sick Life Lessons” and “Victim Survived Maniac’s Game” demonstrate significant media attention to the Jigsaw crimes. Accordingly, under a theory of general deterrence, newspaper readers should be deterred from the behaviors that Kramer punishes. Knowledge that a vigilante killer is at large and administering “sick life lessons” should, theoretically, deter criminal conduct. Similarly, under the theory of specific deterrence, survivors of Kramer’s traps should be less likely to commit further crimes. But Kramer’s punishments do not deter effectively: Although his games are severe, they are neither proportionate, nor swift, nor certain. Consequently, although Kramer threatens offenders with the ultimate penalty of death, even this threat cannot deter all offenders. It does not even deter all those who experience his traps: For example, after surviving Kramer’s tests in Saw (Hoffman et al., 2004), drug addict Amanda Young recidivates. She does not use drugs, but she does return to crime. In Saw II (Hoffman et al., 2005), she joins forces with Jigsaw, and becomes a sadistic punisher. The infliction of suffering becomes her new drug. John Kramer also employs techniques of incapacitation. Like deterrence, the incapacitative theory of punishment is consequentialist (utilitarian), prospective, and instrumentalist. Incapacitation can involve spatially removing the offender from society (e.g., prison) and/or physically eliminating the capacity to offend (e.g., cutting off the hand of a thief or chemically castrating a sex offender to blunt the sex drive). Death is the ultimate incapacitant: It eliminates all possibility of recidivism (McCord, 1998). John Kramer’s tests incapacitate his victims in two ways. First, as soon as they are kidnapped and 41 imprisoned in Kramer’s torture warehouse, they are removed from the general population, and no longer able to engage in their crimes. From the moment they are seized, Jigsaw’s victims are incapacitated (at least vis-à-vis the general population). Of course, just as incapacitated prisoners can offend against other prisoners, Kramer’s victims can turn against one another. In Saw V (Hoffman et al., 2008), his victims are tested on this basis: In order to survive, they must cooperate. Kramer also uses incapacitation in a second way: Victims who do not demonstrate the will and resilience to escape his traps are killed. Just as pioneering criminologist Raffaele Garofalo (1968) suggested that criminals lacked the fundamental human quality of altruism, viewing their deaths as enhancing society’s survival (Barnes, 1930), so, too, John Kramer understands the death of unsuccessful victims as a means of increasing the continuing viability of the human gene pool. Although Kramer considers the act of killing “distasteful” (Hoffman et al., 2008, 46:11), he does not regret culling from society those individuals who lack an instinct to survive. Although John Kramer’s treatment of his victims invokes diverse elements of retribution, deterrence, and incapacitation, his traps, tests, and games are related ultimately to the theme of rehabilitation. Rehabilitation—along with deterrence and incapacitation—is consequentialist, prospective, and instrumentalist in its orientation: “If people commit crimes because of inherent defects, one straightforward way to reduce future crime is to simply correct the defect, regardless of whether the defect is physical (e.g., a chemical imbalance), psychological (e.g., criminal thinking patterns), or social (e.g., association with criminal peers)” (Oleson, 2007, p. 365). Based on notions of crime-asdisease, rehabilitation involves treating an offender to restore him or her to a state of non-criminal social health. Meta-analyses suggest that rehabilitation works (e.g., Andrews, et al., 1990; Dowden & Andrews, 1999; Manchak & Cullen, 2015). John Kramer believes that, after kidnapping and confronting his victims with the moral consequences of their wrongdoing (elements of retribution), his devices and tests force victims to choose—and to choose immediately—between death (incapacitation) and rehabilitation. In Saw V, Kramer explains, “[T]here is a better, more efficient, way [than killing] .... It’s a different method that I’m talking about. If a subject survives my method, he is instantly rehabilitated” (Hoffman et al., 2008, 46:21). Some of Kramer’s victims share his vision of the experience. For example, Amanda Young, a self-harming drug addict who survives a potentially lethal test in Saw (Hoffman et al., 2004), describes her ordeal in the Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 42 OLESON & MACKINNON language of a therapeutic intervention. She says, “My life was saved that day” (Hoffman et al., 2005, 1:26:13). Kramer cites the conversion of Amanda Young as proof that his method works. But Kramer does not see Young’s life as saved; rather, he sees it as reclaimed. In explaining her challenge, Kramer characterizes it as a rebirth: “You must meet death in order to be reborn” (Hoffman et al., 2005, 1:26:25). In Saw II (Hoffman et al., 2005), however, Kramer’s method is cast into question, as it is revealed that Amanda Young has returned to her old habits. She is a recidivist. For her new offenses, she is punished again; again, she survives Kramer’s testing. Yet even after two rounds of Kramer’s short, sharp, shocking treatments, Young remains unrehabilitated. In Saw III, she states, “It’s bullshit. Nobody changes. It’s all a lie…. Nobody is reborn” (Hoffman et al., 2006, 1:37:56). The unfulfilled promise of Amanda Young epitomizes the flaws of rehabilitative theory in the wider field of corrections. While from the 1940s into the 1970s, many experts believed that crime was a social problem that could be successfully treated, Robert Martinson’s (1974) article, “What Works? - Questions and Answers about Prison Reform” precipitated the wholesale rejection of rehabilitation as a legitimate basis of punishment in the United States. Rehabilitation very nearly died (Cullen, 2005), and in its place, a retributivist penology emerged and dominated for decades (Pillsbury, 1989). Determinate sentencing replaced indeterminate systems of parole, sentence lengths increased, and prison populations soared. According to the Pew Center on the States (2009), when the populations from jails, probation, and parole systems are added to the 1.5 million people in U.S. prisons, the number of people under U.S. correctional control increases to more than 7.3 million (or 1 in 31 people). Only in recent years has genuine interest in rehabilitation reemerged within mainstream policy circles, in the form of offender reentry (e.g., Petersilia, 2003). The creators of the Saw films may not have intended to create a franchise that recapitulates the larger penological debates of the late twentieth century, but that is what they produced. John “Jigsaw” Kramer’s mission-oriented killings are represented in the films as acts of punishment, and it is therefore hardly surprising that his actions should reflect macro-sociological debates about the appropriate forms of punishment: retribution, deterrence, incapacitation, and rehabilitation. The Social Functions of the Saw Franchise As the most successful horror franchise in the world (Kit, 2010), the Saw films obviously resonate with audiences, providing them with thrills and narratives about a serial killer who does not want to see his victims die, but the series may do more than provide an escape from the ennui of viewers’ daily existence. In addition to entertaining, the Saw films inform. Of course, the Saw films distort the very phenomenon of serial murder that they depict (c.f., Surette, 2015), but while John “Jigsaw” Kramer possesses a constellation of characteristics unlikely to co-occur in real offenders, his crimes do resemble those of known offender David Parker Ray (Fielder, 2003). The films reveal the inner workings of a serial killer to viewers, including his origins, his motives, and his modus operandi. Similarly, through watching Kramer’s acts of punishment, viewers of Saw can glean something about retribution, deterrence, incapacitation, and—especially—rehabilitation. Unwittingly, viewers might even emerge from the theater with a sense of the penological debates about rehabilitation and retributivism. Thus, while the Saw franchise distorts the phenomenon of serial homicide, it exposes viewers to elements of crime, punishment, and conceptions of justice. Morality tales are an ancient teaching device to help society discern between right and wrong. Classics include Aesop’s fables (Gibbs, 2008) and Grimm’s fairy tales (Hunt, 1944). Like the Saw franchise, these classics were often scary and gruesome, but as Patton (2013) notes, it is precisely their grisly imagery that made them so memorable. The Saw franchise operates as a contemporary morality tale: the moral is not to become a vigilante and do as Kramer did, but to cherish one’s life and those of others: “The movies put both their fictional subjects and their real-life viewers in uncomfortable situations in order to teach morality, but if the traps become real and people died in them, the value of the good messages would be lost” (Patton, 2013, p. 82). On the films and morality, Gregg Hoffman, one of the producers observed, “That’s one of the things that attracted us to the film immediately, that it was trying to say something and it did have a theme, that it did have a moral message despite...the smears of blood throughout the bathroom and everywhere else” ("Hacking Away at Saw," 2005). The Saw films establish a celluloid universe in which notions of good and evil, crime and punishment, justice and redemption can be explored by viewers. Some commentators suggest that Saw (and other films like it) afford audience members a safe environment to confront and explore their fears (e.g., Apter, 1992). Although it may be dangerous—quite possibly lethal—to meet a serial killer in real life, it is possible for the audience member viewing the Saw films to safely witness—even to vicariously engage with—a killer known to be responsible for the deaths Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CRIME AND PUNISHMENT IN SAW of 52 people. Seeing John Kramer at work, the audience member might feel some of the fear and terror that a real encounter with a serial killer would trigger, but he or she can walk away from the theater unscathed (Rafter, 2006). This experience of catharsis may allow viewers to exercise control over their fears and to experience feelings of satisfaction when John Kramer’s vigilante killings mete out a kind of justice that seems to elude the American criminal justice system (Exline, Worthington, Hill, & McCullough, 2003). Of course, it is precisely this ability to safely indulge in cinematic experiences of screen violence, vicarious torture, and simulated death that so alarms the critics of “torture porn” (e.g., Edelstein, 2006). In On Photography (1977) and Regarding the Pain of Others (2003), Susan Sontag argues that the proliferation of images—especially difficult images, such as war photographs—cheapen underlying experiences, desensitize viewers, and inhibit the willingness of viewers to act in the face of real atrocity. Viewing the Saw films might fatigue the compassion of audience members; if confronted with real violence, real murders, and real death, they may equate it with the film representation and fail to feel the horror of real experience. Although the empirical research on exposure to media violence and desensitization is contested and equivocal, some researchers have reported a significant association between the viewing of violent content and physiological desensitization (Krahé, et al., 2011). Other commentators, however, argue that media images invigorate. They suggest that photographs are “so valuable: by refusing to tell us what to feel, and allowing us to feel things we don’t quite understand, they make us dig, and even think, a little deeper” (Linfield, 2010, p. 30). In this view, the Saw films might enrich the experience of audience members, allowing audience members to appreciate violence and murder at a deeper level. Furthermore, the films may reinforce prevailing norms and enhance social solidarity in the manner suggested by Durkheim (1895/1958). After all, Kramer operates as an avenging angel, persecuting those who have transgressed and taking the lives of those who do not value them. Kramer does not want to kill his victims; rather, he wants to redeem them. Audience members may interpret Saw as a vindication of existing social values, a condemnation of crime and immorality, and a collective affirmation of the belief that wrongdoing does not go unpunished. Finally, the Saw films might also provide audiences with a modern expression of an ancient ceremony: human sacrifice (Pizzato, 2005). They 43 might allow anomic, heterogeneous audiences to engage in a shared understanding about the nature of justice and the corrective of punishment (Oleson, 2015). For most of human history, punishment was corporal, brutal, and public: “[P]reindustrial people were familiar with the existence of public executions. These were part of life for them and on the whole were not considered as objectionable” (Spierenburg, 1984, p. 87). Justice was enacted as a public spectacle, in a theatre of vengeance and redemption (Madow, 1995). Through these rituals, the offender was publicly transformed from a citizen into a criminal and was denounced for his or her transgressions. Following the logic of Hegel (Ezorsky, 1972), the criminal (who victimized the community through his or her offense) was in turn punished—made victim—and moral equilibrium was thereby restored. Public punishments safeguarded the public order. Members of the community were reassured of their safety and in seeing the offender punished for his or her crimes, were reassured that they were doing the right thing by following the laws (Durkheim, 1895/1958). In cases of non-lethal punishment (e.g., flogging or the pillory), the ritual of public punishment allowed for the possibility of redemption and reintegration (e.g., Braithwaite, 1989). In the early 1800s, however, criminal executions began to be sequestered, occluded from the public gaze. By the end of the twentieth century, through the removal of executions from the public sphere and the introduction of new techniques such as the electric chair, condemned criminals were transformed from “the central actor in a public theatre of justice” to “simply the object of medico-bureaucratic technique” (Madow, 1995, p. 466). The media devotes a great deal of attention to crime (Reiner, 2007; Surette, 2015), but it focuses on the front end of the criminal justice system (e.g. victims and arrests) and devotes little attention to issues of punishment (Katz, 1987). To the extent that earlier public displays of punishment had operated as cathartic rituals (Duncan, 1996), providing moral instruction and affirming social solidarity (Durkheim, 1895/1958), the removal of these displays created a moral vacuum. In films such as Saw, however, audiences are able to witness the apprehension and execution of guilty offenders; they can see the redemption of worthy survivors, creating new meaning for what Madow calls the “public theatre of justice” (1995, p. 466). Thus, the Saw films may provide audiences with an experience of vicarious punishment that affirms notions of right and wrong, reinforces conventional mores and norms, and cements social solidarity (Oleson, 2015). Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 44 OLESON & MACKINNON Conclusion Revolving around the crimes of fictional serial killer John “Jigsaw” Kramer, the Saw franchise has been enormously successful. In addition to generating box office revenue and merchandising, the seven Saw films have even spawned theme park attractions (Thorpe Park, 2014). Indeed, Saw has been named the most commercially successful horror franchise in the world (Kit, 2010). The public’s fascination with Saw may say as much about the public as it does about the films. Indeed, study of the series might reveal something about the kind of society that both produces serial killers and that remains transfixed by them. Although some critics (e.g., Edelstein, 2006) have denounced the Saw films as mere “torture porn,” the franchise does far more than titillate audiences’ sadistic impulses with glib dialogue, lethal traps, and sadism. The franchise does so in at least four ways. First, in addition to entertaining, the Saw films breathe life into taxonomies of serial homicide, revealing John “Jigsaw” Kramer as an organized, mission-oriented (Holmes & DeBurger, 1986) serial killer who is responsible for the deaths of 52 persons. Although Kramer is a fictional figure, in several respects, he resembles the real-life offender David Parker Ray (Fielder, 2003). The Saw films simultaneously inform and disinform, shaping the public’s vision of the serial killer. They present some elements of serial homicide that correspond faithfully to criminological research, but they distort other elements (c.f., Oleson, 2005b). Second, the Saw films also illustrate the cardinal bases of punishment: retribution, deterrence, incapacitation, and— particularly—rehabilitation. Kramer’s traps are designed to immediately rehabilitate those who survive them, instilling survivors with a newfound capacity to cherish their lives. Although the Saw films present a distorted view of crime and punishment, they have meaningful roots in criminal justice theories of crime and punishment (Oleson, 2007). Third, the Saw films operate as contemporary morality plays, illustrating normative concepts of good, evil, virtue, and responsibility (Patton, 2013). Film villains are effective mechanisms for such matters: Film provides an opportunity for dialogue; in that sense, it has always been an interactive medium. If David Lynch or Martin Scorsese displays the human face of evil in Frank or Max Cady, that is only half of the conversation. The other half is ours. It’s our responsibility to mull over our feelings about these characters, understand them (or not) and, in the process, define our own moral boundaries. (Hinson, 1993) Fourth and finally, the Saw films shape public attitudes. Because popular representations disproportionately shape public understandings of crime and punishment (Rafter & Brown, 2011), crime films in general (and the popular Saw franchise, in particular) have the potential to influence public attitudes. Cinematic portrayals of violence can increase the fear of crime (Heath & Gilbert, 1996) and thus fuel penal populism to mediate anxiety (Cheliotis, 2010; Mason, 2006). Crime films are therefore important objects of criminological study (Frauley, 2011; Rafter, 2006). While the Saw franchise’s representations of vigilantism and serial murder could desensitize viewers to violence, sadism, and torture (Krahé et al., 2011; Sontag, 1977, 2003), the films—alternatively—could prompt viewers to think more deeply about pain, justice, and suffering (Linfield, 2010). The Saw films have precipitated copycat violence (Dolan & Reilly, 2012), but they can also operate as a vicarious form of public punishment (Pizzato, 2005), reinforcing social solidarity (Durkehim, 1958; Oleson, 2015) and strengthening prevailing norms. A careful examination of Saw might increase our understanding of the mechanisms through which popular film shape attitudes, beliefs, and behaviors related to crime and punishment. References Andrews, D. A., Zinger, I., Hoge, R. D., Bonta, J., Gendreau, P., & Cullen, F. T. (1990). Does correctional treatment work? A clinically relevant and psychologically informed metaanalysis. Criminology, 28(3), 369–404. doi:10.1111/j.1745-9125.1990.tb01330.x Apter, M. (1992). The dangerous edge: The psychology of excitement. New York, NY: Free Press. Aston, J., & Walliss, J. (2013). To see the Saw movies: Essays on torture porn and post-9/11 horror. Jefferson, NC: McFarland & Co. Barak, G. (1994). Media, process and the social construction of crime: Studies in newsmaking criminology. New York, NY: Garland. Barnes, H. E. (1930). Criminology. In E. R. A. Seligmann (Ed.), Encyclopedia of the social sciences (Vol. 4). New York, NY: Macmillan. Beccaria, C. (1963). On crimes and punishments (H. Paolucci, Trans.). Englewood Cliffs, N.J.: Prentice Hall. (Original work published 1764) Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CRIME AND PUNISHMENT IN SAW Beckman, K. (2001). [Review of the book Psycho paths: Tracking the serial killer through contemporary American film and fiction] [Electronic version]. Journal of Criminal Justice and Popular Culture, 8(1), 61–65. Belinkie, M. (2010). The shocking complexity of the Saw movies. Retrieved from http://www.overthinkingit.com/2010/10/26/sawmovies Bentham, J. (1948). The principles of morals and legislation. New York, NY: Hafner Press. Brady, I. (2001). The gates of Janus: Serial killing and its analysis. Los Angeles, CA: Feral House. Braithwaite, J. (1989). Crime, shame and reintegration. New York, NY: Cambridge University Press. Briggs, C., Fleiss, M., Spiegel, S. (Producers), & Spiegel, S. (Director). (2011). Hostel: Part III [Motion picture]. USA: Sony Pictures Home Entertainment. Brooks, R. (Producer/Director). (1967). In cold blood [Motion picture]. USA: Columbia Pictures. Brownell, H. H., Simpson, T., Bihrle, A. M., Potter, H. H., & Gardner, H. (1990). Appreciation of metaphoric alternative word meanings by left and right brain-damaged patients. Neuropsychologia, 28, 375–383. doi:10.1016/0028-3932(90)90063-T Capote, T. (1966). In cold blood. New York, NY: Random House. Cerone, D., Colleton, S., Eglee, C. H., Goldwyn, J., Hall, M. C., Johannessen, C., Phillips, C., Jr, J. M., Coto, M., West, W., Schlattmann, T., Rosenberg, M., Richdale, J., Buck, S. (Producers). (2006). Dexter [Television series]. Miami, FL, Long Beach, CA: Showtime. Cheliotis, L. (2010). The ambivalent consequences of visibility: Crime and prisons in the mass media. Crime, Media, Culture, 6, 169–184. doi:10.1177/1741659010378629 Cullen, F. T. (2005). The twelve people who saved rehabilitation: How the science of criminology made a difference. Criminology, 43(1), 1–42. doi:10.1111/j.0011-1348.2005.00001.x Cullen, F. T., Jonson, C. L., & Nagin, D. S. (2011). Prisons do not reduce recidivism: The high cost of ignoring science. The Prison Journal, 9(3), 48S–65S. doi:10.1177/0032885511415224 45 Dolan, A., & Reilly, J. (2012). Coronation Street killer was "fascinated by horror DVDs and violent games from age eight and it was all too easy for him to get hold of them", says victim’s former partner. The Daily Mail [online] 2 April. Retrieved from www.dailymail.co.uk Donohue, J. J., & Wolfers, J. (2006). The death penalty: No evidence for deterrence. Economists' Voice (April), 1–6. Retrieved from http://www.deathpenaltyinfo.org/DonohueDeter. pdf Douglas, J. E., Ressler, R. K., Burgess, A. W., & Hartman, C. R. (1986). Criminal profiling from crime scene analysis. Behavioral Sciences and the Law, 4(4), 401–421. doi:10.1002/bsl.2370040405 Dowden, C., & Andrews, D. A. (1999, May). What works in young offender treatment: A metaanalysis. In Forum on Corrections Research, 11(2), 21–24. Dressler, J. (2012). Understanding criminal law (6th ed.). Danvers, MA: Matthew Bender & Company. Duncan, M. G. (1996). Romantic outlaws, beloved prisons. New York, NY: New York University Press. Durkheim, E. (1958). The rules of sociological method (S. A. Solovay & J. H. Mueller, Trans., G. E. G. Catlin, Ed.). Glencoe, IL: Free Press. (Original work published 1895) Edelstein, D. (2006). Now playing at your local multiplex: Torture porn. New York Magazine. Retrieved from http://nymag.com/movies/features/15622/ Egger, S. A. (1998). The killers among us: An examination of serial murder and its investigation. Upper Saddle River, NJ: Prentice Hall. Ehrlich, I. (1975). The deterrent effect of capital punishment: A question of life and death. American Economic Review, 65, 397–417. doi:10.4324/9780203930885.ch16 Elliot, M., Gould, A., Mehlitz, M., Ohoven, M., Zombie, R. (Producers), & Zombie, R. (Director). (2005). The devils reject’s [Motion picture]. USA: Lionsgate. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 46 OLESON & MACKINNON Exline, J. J., Worthington, E. L., Hill, P., & McCullough, M. E. (2003). Forgiveness and justice: A research agenda for social and personality psychology. Personality and Social Psychology Review, 7, 337–348. doi:10.1207/S15327957PSPR0704_06 Ezorsky, G. (Ed.) (1972). Philosophical perspectives on punishment. Albany, NY: State University of New York Press. Fagan, J. (2006). Death and deterrence redux: Science, law and causal reasoning on capital punishment. Ohio State Journal of Criminal Law, 4(1), 255–320. FBI (1985). Crime scene and profile characteristics of organized and disorganized murderers. F.B.I. Law Enforcement Bulletin, 54, 18–25. Feinberg, J. (1965). The expressive theory of punishment. The Monist, 49, 397–423. Fielder, J. (2003). Slow death. New York, NY: Pinnacle Books. Fore, D. (2009). "Oh yes. There will be blood.”: Sacrificial power and disability in Saw and Saw 2. Journal of Religion and Monsters, 3, 27–36. Fox, J. A. & Levin, J. (1998). Multiple homicide: Patterns of serial and mass murder. Crime and Justice, 23, 407–455. doi:10.1086/449274 Frauley, J. (2011). Criminology, deviance, and the silver screen: The fictional reality and the criminological imagination. New York, NY: Palgrave Macmillan. Fuhrman, M. (2009). The murder business: How the media turns crime into entertainment and subverts justice. Washington, DC: Regnery Publishing. Garafolo, R. (1968). Criminology. Montclair, NJ: Patterson Smith. Gerbner, G., & Gross, L. (1976). Living with television: The violence profile. Journal of Communication, 26(2), 172–199. doi:10.1111/j.1460-2466.1976.tb01397.x Gibbs, L. (2008). Aesop's fables. New York, NY: Oxford University Press. Giles, D. C. (2002). Parasocial interaction: A review of the literature and a model for future research. Media Psychology, 4(3), 279–305. doi:10.1207/S1532785XMEP0403_04 Gleiberman, O. (2004, Nov. 5). Saw review. Entertainment Weekly, 791. Hacking away at Saw. 36-min featurette for Saw [DVD]. (2005). In Hoffman, Burg, Koules, & Wan: Lions Gate. Hamsher, J., Murphy, D., Townsend, C. (Producers), & Stone, O. (Director). (1994). Natural born killers [Motion picture]. USA: Warner Bros. Haney, C. (2006). Reforming punishment: Psychological limits to the pains of imprisonment. Washington, DC: American Psychological Association. Harris, T. (1981). Red dragon. New York, NY: G.P. Putnam’s Sons. Harris, T. (1988). The silence of the lambs. New York, NY: St. Martin’s Press. Harris, T. (1999). Hannibal. New York, NY: Delacorte Press. Harris, T. (2006). Hannibal rising. New York, NY: Delacorte Press. Harris, T. (2013). The silence of the lambs (25th anniversary ed.). New York, NY: St. Martin's. Heath, L., & Gilbert, K. (1996). Mass media and fear of crime. American Behavioral Scientist, 39, 379–386. doi:10.1177/0002764296039004003 Heiduschka, V. (Producer), & Haneke, M. (Director). (1997). Funny games [Motion picture]. Austria: Madman Entertainment. Hickey, E. W. (1991). Serial murderers and their victims. Pacific Grove, CA: Brooks/Cole. Higdon, H. (1999). Leopold & Loeb: The crime of the century. Chicago, IL: University of Illinois Press. Hinson, H. (1993, May 23). In defense of violence: Why movie murder and mayhem may not be so bad. The Washington Post, p. G1. Hitchcock, A., Bernstein, S. (Producers), & Hitchcock, A. (Director). (1948). Rope [Motion picture]. USA: Warner Bros. Hobbes, T. (1991). Leviathan (R. Tuck, Ed.). New York, NY: Cambridge University Press. (Original work published 1651) Hoffman, G., Burg, M., Koules, O. (Producers), & Wan, J. (Director). (2004). Saw [Motion picture]. USA: Lionsgate. Hoffman, G., Burg, M., Koules, O. (Producers), & Bousman, D.L. (Director). (2005). Saw II [Motion picture]. USA: Lionsgate. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CRIME AND PUNISHMENT IN SAW Hoffman, G., Burg, M., Koules, O. (Producers), & Bousman, D.L. (Director). (2006). Saw III [Motion picture]. USA: Lionsgate. Hoffman, G., Burg, M., Koules, O. (Producers), & Bousman, D.L. (Director). (2007). Saw IV [Motion picture]. USA: Lionsgate. Hoffman, G., Burg, M., Koules, O. (Producers), & Hackl, D. (Director). (2008). Saw V [Motion picture]. USA: Lionsgate. Hoffman, G., Burg, M., Koules, O. (Producers), & Greutert, K. (Director). (2009). Saw VI [Motion picture]. USA: Lionsgate. Hoffman, G., Burg, M., Koules, O. (Producers), & Greutert, K. (Director). (2010). Saw 3D [Motion picture]. USA: Lionsgate. Hofstadter, D. R. (1999). Gödel, Escher, Bach (20th anniversary ed.) New York, NY: Basic Books. Holmes, R., & DeBurger, J. (1988). Serial murder. Newbury Park: Sage. Hough, M., & Roberts, J. (1998). Attitudes to punishment: Findings from the British Crime Survey. London: HMSO. Hunt, M. (1944). The complete Grimm's fairy tales. New York, NY: Pantheon Books. Huntley, J. (2009). "I want to play a game": How to see Saw. Irish Joural of Gothic and Horror Studies. Retrieved from http://irishgothichorrorjournal.homestead.com/Sa wHuntley.html Internet Movie Database. (2014). Most voted horror feature films. Retrieved April 24, 2014, from http://www.imdb.com/search/title?at=0&genres= horror&sort=num_votes&title_type=feature Jenkins, P. (1994). Using murder: The social construction of serial homicide. New York, NY: Aldine de Gruyter. Johnson, A. M. (1990). A study of humor and the right hemisphere. Perceptual and Motor Skills, 70, 995–1002. doi:10.2466/PMS.70.3.995-1002 Jones, S. (2010). Time is wasting: Con/sequence and s/pace in the Saw series. Horror Studies, 1, 225239. Jones, V., & Collier, P. (1993). Serial killers and mass murderers. Forestville, CA: Eclipse Books. 47 Kant, I. (1887). The philosophy of law: An exposition of the fundamental principles of jurisprudence as the science of right (W. Hastie, Trans.). Edinburgh, UK: T. & T. Clark. (Original work published 1796) Katz, J. (1987). What makes crime news. Media, Culture and Society, 9, 47–75. doi:10.1177/016344387009001004 Kit, Z. (2010). "Saw" movie franchise to get Guinness world record. Retrieved from www.reuters.com/article/2010/07/23/film-sawidUSN2215375420100723 Kooistra, P. (1989). Criminals as heroes: Structure, power & identity. Bowling Green, OH: Bowling Green State University Popular Press. Kopelson, A., Carlyle, P. (Producers), & Fincher, D. (Director). (1995). Seven [Motion picture]. USA: New Line Cinema. Krahé, B., Möller, I., Huesmann, L. R., Kirwil, L., Felber, J., & Berger, A. (2011). Desensitization to media violence: Links with habitual media violence exposure, aggressive cognitions, and aggressive behavior. Journal of Personality and Social Psychology, 100(4), 630–646. doi:10.1037/a0021711 Langan, P. A., & Levin, D. J. (2002). Recidivism of prisoners released in 1994. Retrieved from Bureau of Justice Statistics website: http://www.bjs.gov/content/pub/pdf/rpr94.pdf Laurentiis, D. D., Laurentiis, M. D. (Producers), & Ratner, B. (Director). (2002). Red dragon [Motion picture]. USA: Universal Pictures. Laurentiis, D. D., Laurentiis, M. D., Ammar, T. B. (Producers), & Webber, P. (Director). (2007) Hannibal rising [Motion picture]. UK: Momentum Pictures. Lightfoot, D., McLean, G. (Producers), & McLean, G. (Director). (2005). Wolf creek [Motion picture]. Australia: Roadshow Entertainment. Leistedt, S. J., & Linkowski, P. (2014). Psychopathy and the cinema: Fact or fiction? Journal of Forensic Sciences, 59(1), 167–174. doi:10.1111/1556-4029.12359 Lieb, R. E., & Oprisko, K. (2005). Saw: Rebirth. IDW Publishing. Leitch, T. (2002). Crime films. New York, NY: Cambridge University Press. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 48 OLESON & MACKINNON Lindsay, J. (2004). Darkly dreaming Dexter. New York, NY: Doubleday. Lindsay, J. (2005). Dearly devoted Dexter. New York, NY: Doubleday. Lindsay, J. (2007). Dexter in the dark. New York, NY: Doubleday. Lindsay, J. (2009). Dexter by design. New York, NY: Doubleday. Lindsay, J. (2010). Dexter is delicious. New York, NY: Doubleday. Lindsay, J. (2011). Double Dexter. New York, NY: Doubleday. Lindsay, J. (2013). Dexter's final cut. New York, NY: Doubleday. Nagin, D., & Pogarsky, G. (2001). Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence. Criminology, 39, 865–892. doi:10.1111/j.1745-9125.2001.tb00943.x NECA (2014). Saw - 12" action figure - Billy with sound. Retrieved from http://necaonline.com/28108/products/toys/largescale-figures/saw-12-action-figure-puppet Numbers (2014). Box office history for Saw movies. Retrieved from www.thenumbers.com/movies/franchise/Saw Oleson, J. C. (2003). The celebrity of infamy: A review essay of five autobiographies by three criminal geniuses. Crime, Law, and Social Change, 40, 409–416. Linfield, S. (2010). The cruel radiance: Photography and political violence. Chicago, IL: University of Chicago Press. Oleson, J. C. (2005a). Foreword to the Hannibal Lecter trilogy. Journal of Criminal Justice and Popular Culture, 12(3), 185. Madow, M. (1995). Forbidden spectacle: Executions, the public and the press in nineteenth century New York. Buffalo Law Review, 43, 461–562. Oleson, J. C. (2005b). King of killers: The criminological theories of Dr. Hannibal Lecter, part one. Journal of Criminal Justice and Popular Culture, 12(3), 186–210. Malick, T. (Producer), & Malick, T. (Director). (1973). Badlands [Motion picture]. USA: Warner Bros. Manchak, S. M., & Cullen, F. T. (2015). Intervening effectively with juvenile offenders: Answers from meta-analysis. In J. Morizot & L. Kazemian (Eds.), The development of criminal and antisocial behavior (pp. 477–490). Switzerland: Springer International Publishing. Martinson, R. (1974). What works? Questions and answers about prison reform. The Public Interest, 35, 22–54. Mason, P. (2006). Prison decayed: Cinematic penal discourse and populism 1995–2005. Social Semiotics, 16, 607–626. doi:10.1080/10350330601019975 McAlpine, H., Baute, C., Coen, C., Steinborn, A., Watts, N. (Producers), & Haneke, M. (Director). (2007). Funny games [Motion picture]. USA: Warner Bros. Oleson, J. C. (2006a). Contemporary demonology: The criminological theories of Hannibal Lecter, part two. Journal of Criminal Justice and Popular Culture, 13(1), 29–49. Oleson, J. C. (2006b). The devil made me do it: The criminological theories of Hannibal Lecter, part three. Journal of Criminal Justice and Popular Culture, 13(2), 117–133. Oleson, J. C. (2007). Punishment. In S. BartonBellessa (Ed.) Encyclopedia of community corrections (pp. 362–368). Thousand Oaks, CA: Sage. Oleson, J. C. (2011). Blowing out all the candles: Some thoughts on the twenty-fifth anniversary of the Sentencing Reform Act of 1984. University of Richmond Law Review, 45(2), 693–763. Oleson, J. C. (in press). Rituals upon celluloid: The need for crime and punishment in contemporary film. Cleveland State Law Review. McCord, D. (1998). Imagining a retributivist alternative to capital punishment. Florida Law Review, 50, 1–143. Paternoster, R. (2010). How much do we really know about criminal deterrence? Journal of Criminal Law and Criminology, 100(3), 765–824. Nagin, D. S. (2013). Deterrence in the twenty-first century. Crime and Justice, 42(1), 199–263. doi:10.1086/670398 Patton, C. J. (2013). The cutting edge: Philosophy of the Saw films [Adobe Digital Editions version]. Retrieved from http://Amazon.com. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 CRIME AND PUNISHMENT IN SAW Petersilia, J. (2003). When prisoners come home: Parole and prisoner reentry. New York, NY: Oxford University Press. Pew Center on the States (2009). One in 31: The long reach of American corrections. Washington, DC: Pew Charitable Trusts. Philbin, T. (2011). I, Monster: Serial killers in their own chilling words. Amherst, NY: Prometheus Books. Picart, C. J., & Greek, C. (2003). The compulsion of real/reel serial killers and vampires: Toward a gothic criminology. Journal of Criminal Justice and Popular Culture, 10, 39–68. Pillsbury, S. H. (1989). Criminal law: Understanding penal reform: The dynamic of change. Journal of Criminal Law & Criminology, 80, 726–780. Pizzato, M. (2005). Theatres of human sacrifice: From ancient ritual to screen violence. Albany, NY: State University of New York Press. Plato (1963). Protagoras (W. K. C. Guthrie, Trans.). In E. Hamilton & H. Cairns (Eds.), Plato: The collected dialogues (pp. 308–352). Princeton, NJ: Princeton University Press. Potter, G., & Kappeler, V. E. (2006). Constructing crime: Perspectives on making news and social problems (2nd ed.). Long Grove, IL: Waveland Press. Pratt, J. (2007). Penal populism. New York, NY: Routledge. Pratt, T. C., Cullen, F. T., Blevins, K. R., Daigle, L. E., & Madensen, T. D. (2009). The empirical status of deterrence theory: A meta-analysis. In F. T. Cullen, J. P. Wright, & K. R. Blevins (Eds.), Taking stock: The status of criminological theory (pp. 367–395). New Brunswick, NJ: Transaction Publishers. Radelet, J. M. L., & Lacock, T. (2009). Do executions lower homicide rates? The views of leading criminologists. Journal of Criminal Law & Criminology, 99(2), 489–508. Rafter, N. (2006). Shots in the mirror: Crime films and society (2nd ed.). New York, NY: Oxford University Press. Rafter, N., & Brown, M. (2011). Criminology goes to the movies: Crime theory and popular culture. New York, NY: New York University Press. 49 Reiner, R. (2007). Media-made criminality: The representation of crime in the mass-media. In M. McGuire, R. Morgan, & R. Reiner (Eds.), The Oxford handbook of criminology (pp. 302–337). New York, NY: Oxford University Press. Ressler, R. K., Burgess, A. W., Douglas, J. E., Hartman, C. R., & D’Agostino, R. B. (1986). Sexual killers and their victims: Identifying patterns through crime scene analysis. Journal of Interpersonal Violence, 1, 288–308. doi:10.1177/088626086001003003 Roth, E. (Producer), & Roth, E. (Director). (2005). Hostel [Motion picture]. USA: Screen Gems, Lions Gate. Roth, R. A. (Producer), & Mann, M. (Director). (1986). Manhunter [Motion picture]. USA: De Laurentiis Entertainment Group. Rousseau, J. J. (1997). The social contract and other later political writings (V. Gourevtich, Ed.). New York, NY: Cambridge University Press. (Original work published 1762) Rowe, T. (Producer), & Kaplan, J. (Director). (1996). In cold blood [Motion picture]. USA: Columbia Broadcasting System. Ruddock, A. (2001). Understanding audiences: Theory and method. Thousand Oaks, CA: Sage. Sarbin, T. R. (1972). Schizophrenia: From metaphor to myth. Psychology Today, 6, 18–27. Schmid, D. (2005). Natural born celebrities: Serial killers in American culture. Chicago, IL: University of Chicago Press. Scott, R., Laurentiis, D. D., Laurentiis, M.D. (Producers), & Scott, R. (Director). (2001). Hannibal [Motion picture]. USA: MGM, Universal Pictures. Scouller, S. F. (2010). Murderabilia and true crime collecting. Milton Keynes, UK: AuthorHouse. Skal, D. (1993). The monster show: A cultural history of horror. New York, NY: W.W. Norton and Co. Sontag, S. (1977). On photography. New York, NY: Farrar, Straus and Giroux. Sontag, S. (2003). Regarding the pain of others. New York, NY: Farrar, Straus and Giroux. Spiegel, S., Yakin, B., Fleiss, M., Tarantino, Q. (Producers), & Roth, E. (Director). (2007). Hostel: Part II [Motion picture]. USA: Screen Gems, Lions Gate. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 50 OLESON & MACKINNON Spierenburg, P. (1984). The spectacle of suffering, New York, NY: Cambridge University Press. About the Authors Spohn, C., & Holleran, D. (2002). The effect of imprisonment on recidivism rates of felony offenders: A focus on drug offenders. Criminology, 40(2), 329–358. James C. Oleson earned his B.A. in psychology and anthropology from St. Mary’s College of California, his M.Phil. and Ph.D. in criminology from the University of Cambridge, and his J.D. from the law school at the University of California, Berkeley (Boalt Hall). Between 2001 and 2004, he taught criminology and sociology at Old Dominion University in Norfolk, Virginia. In 2004, he was selected as one of the four U.S. Supreme Court Fellows for the 2004-05 year. In 2005, he was appointed as Chief Counsel to the newly-formed Criminal Law Policy Staff of the Administrative Office of the U.S. Courts, and served in that capacity between 2005 and 2010. He moved to New Zealand and joined the University of Auckland in 2010, and teaches courses on penology, the criminal justice system, and psychological criminology. He is working on a forthcoming monograph about high-IQ crime for the University of California Press. Surette, R. (2002). Self-reported copycat crime among a population of serious and violent juvenile offenders. Crime & Delinquency, 48(1), 46–49. doi:10.1177/0011128702048001002 Surette, R. (2015). Media, crime, and criminal justice: Images, realities and policies (5th ed). Stamford, CT: Cengage. Thorpe Park. (2014). Saw-The Ride. Retrieved from https://www.thorpepark.com/rides/saw-theride.aspx Tithecott, R. (1997). Of men and monsters: Jeffrey Dahmer and the construction of the serial killer. Madison, WI: University of Wisconsin Press. Tudor, A. (1989). Monsters and mad scientists: A cultural history of the horror movie. Oxford: Basil Blackwell. Utt, K., Saxon, E., Bozman, R. (Producers), & Demme, J. (Director). (1991). The silence of the lambs [Motion picture]. USA: Orion Pictures. Vachon, C. (Producer), & Kalin, T. (Director). (1992). Swoon [Motion picture]. USA: Fine Line Features. von Hirsch, A., Bottoms, A., Burney, E., & Wikstrom, P. O. (1999). Criminal deterrence and sentence severity: An analysis of recent research. Oxford, UK: Hart Publishing. Tamara MacKinnon completed a B.A. in psychology and criminology, B.A. (Honours) with First Class Honours and a M.A. in criminology from the University of Auckland. Her recent M.A. thesis was titled ‘Presentations of Crime and Punishment in the Saw Franchise’. She is interested in portrayals of crime in popular culture, criminal psychology, and policing. Acknowledgements The authors wish to thank Henry F. Fradella, Chantal Fahmy, and the anonymous reviewers for Criminology, Criminal Justice, Law & Society for their assistance in developing the manuscript. Walker, A. K. (1995). Seven & 8 mm. New York, NY: Faber & Faber. Williamson, K., Siega, M. (Producers). (2013). The Following [Television series]. New York City, NY: Fox. Wingfield, N. (2007). A start-up's risky niche: Movie-based videogames. Wall Street Journal. Retrieved from http://online.wsj.com/news/articles/SB11809276 8266523504 Zanuck, R. D. (Producer), & Fleischer, R. (Director). (1959). Compulsion [Motion picture]. USA: 20th Century Fox. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 VOLUME 16, ISSUE 1, PAGES 51–67 (2015) Criminology, Criminal Justice Law & Society E-ISSN 2332-886X Available online at https://scholasticahq.com/criminology-criminal-justice-law-society/ Help-Seeking Behavior among Same-Sex Intimate Partner Violence Victims: An Intersectional Argument Megan Marie Parry and Eryn Nicole O’Neal Arizona State University ABSTRACT AND ARTICLE INFORMATION Few studies have examined the barriers that lesbian and gay male IPV victims face when attempting to access social services which has resulted in an area of theorizing that remains underdeveloped. The paucity of research on this topic is problematic, as extant inquiry indicates that these victims encounter several barriers when engaging in help-seeking. Moreover, a small number of studies have used intersectional thinking to guide analyses of IPV help-seeking behavior in the lesbian and gay community. The current theoretical paper identifies the barriers that lesbian and gay IPV victims encounter when attempting to access social services because prior work has failed to synthesize what is known about their experiences using an intersectional approach. We identify help-seeking obstacles that are specific—and often unique—to lesbian and gay IPV victims with the goal of providing synthesized information useful for future research and theory development. In the first section, we discuss relationship barriers (e.g. threats of outing). Section II describes structural and institutional barriers (e.g., gender norms, minority stress). In Section III we examine legal barriers (e.g., justice system, anti-homosexual beliefs). The last section offers recommendations for practitioners and future research based on prior literature. Article History: Keywords: Received 13 October 2014 Received in revised form 27 January 2015 Accepted 2 February 2015 intersectionality, intimate partner violence, barriers to service, same-sex, gay, lesbian © 2015 Criminology, Criminal Justice, Law & Society and The Western Society of Criminology Hosting by Scholastica. All rights reserved. "Based on how the incident started, there's very little to justify such extreme action [by a police officer] other than homophobia." Cynthia Conti-Cook, lawyer (as quoted in Rayman, 2013) Research on intimate partner violence (IPV) victims has historically focused on the experiences of heterosexual women. Considerable progress has been made by feminist scholars in examining the social support, intervention, prevalence, risk factors, consequences, and justice responses associated with opposite-sex IPV (i.e., men battering women; see Belknap, Hartman, & Lippen, 2010; Kimmel, 2010; Tellis, 2010; Tjaden & Thoennes, 2009). An Corresponding author: Megan Marie Parry, School of Criminology & Criminal Justice, Arizona State University, 411 North Central Ave., Suite 600, Phoenix, AZ 85004, USA. Email: [email protected] 52 PARRY & O’NEAL underdeveloped area of inquiry, however, includes the IPV experiences of victims in same-sex relationships (see Ard & Makadon, 2011; Chan, 2005; Merrill & Wolfe, 2000; Simpson & Helfrich, 2007; for review, see Ball & Hayes, 2010). This oversight is problematic because research indicates that IPV between same-sex partners occurs at higher rates when compared to similarly situated oppositesex couples (Strasser, Smith, Pendrick-Denney, Boos-Beddington, Chen, & McCarty, 2012). Overall, prevalence estimates for same-sex IPV vary widely; studies report that between 11% and 73% of these couples experience abuse (for review, see Klostermann, Kelley, Milletich, & Mignone, 2011). In their recent study examining multiple types of abuse (e.g. physical and physiological), Kelly, Izienicki, Bimbi, & Parsons (2011) found that approximately half of same-sex partnerships involve IPV. The dearth of inquiry surrounding the experiences of same-sex IPV victims is arguably due to their marginalization and historical reluctance to report violence (Blosnic & Bossarte, 2009). Furthermore, in instances when IPV victims in samesex relationships are studied, examinations often ignore the experiences of males and/or lack a theoretical basis (Ball, 2011; Valentine, Bankoff, & Pantalone, 2013; for review of male same-sex IPV, see Jeffries & Ball, 2008). This limited approach is likely due to the fact that one research paradigm— feminist theory—has traditionally dominated IPV research (see Yllo & Bograd, 1988). This approach is questionable, however, because feminist theory is limited in its ability to provide insight into the experiences of sexual minority victims (Ball, 2011; Bell & Naugle, 2008; Marrujo & Kreger, 1996). Feminist theory fundamentally posits that IPV occurs as a consequence of gender power differentials maintained by a patriarchal society (Burgess-Proctor, 2006; Renzetti, Edleson, & Bergen, 2001). Power dynamics, however, are often difficult to assess in same-sex relationships, as most models assume that power and gender/sex are inextricably linked (Renzetti, 1998; Ristock, 2003). Bell and Naugle (2008) have argued that the principles of feminist theory would have to be drastically altered in order to be applied to same-sex IPV. Overall, feminist theory’s application to same-sex IPV is challenging. Neglecting to focus on individual experiences independently from sexual orientation, gender, ethnicity, class, race, and other aspects of identity creates a distinct voice that often ignores the experiences of those on the margins (e.g., lesbian and gay individuals; Harris, 1990). Extant IPV research approaches have resulted in theory development that offers few answers for gay and lesbian individuals. Instead, acknowledging the ways societal and cultural categories—sexual orientation, race, ethnicity, gender—work together results in a more comprehensive investigation of the contextual dynamics that influence experiences (Crenshaw, 1989, 1991). Using an intersectional framework and integrating the analysis of sexual orientation into IPV research will move discourse beyond heteronormativity toward a deeper understanding, where all aspects of identity are equally considered. Indeed, a recent Institute of Medicine (IOM; 2011) report suggested that scholars employ cross-cutting— linking the traditionally separated—perspectives to examine the experiences of same-sex IPV victims. Sexual orientation interacts with gender, ethnicity, race, socioeconomic status, and relationship status to influence power relations between partners as well as propensities for IPV (see Anderson, 1999; Lockhart, White, Causby, & Isaac, 1994). Therefore, forcing gay and lesbian individuals to exclusively identify with one category or another results in an incomplete view of the oppression they encounter. For example, lesbian Latinas who seek out law enforcement assistance may encounter officers who are neither bilingual nor bicultural (Rivera, 1994) as well as homophobic (Little 2008; Potoczniak, Mourot, Crosbie-Burnett, & Potoczniak, 2003). As a means of acknowledging these complex facets of identity, intersectional framing can offer a theoretical approach that considers the entirety of an individual’s multiple circumstances. This approach considers the social construction of power hierarchies while examining the complex ways numerous inequalities intersect to shape experiences (Crenshaw, 1989, 1991). The intersectional approach was initially developed in response to the idea that women of color were often forced to choose one status over the other—to either shape their identity around being a woman or a person of color. Conceptualizing one social category as dominant over another ignores context and the fact that that identity is rarely static and always socially mediated (Crenshaw 1989; Harris, 1990). Focusing on the intersections of sexual orientation, race, class, and gender will facilitate the production of a universal language that criticizes the hegemonic culture while concurrently creating the foundation for unified activity against discrimination (Crenshaw, 1989). Synthesizing prior literature on the experiences of same-sex IPV victims through the lens of intersectionality will enhance understanding regarding IPV, victimization, and justice processes. Few studies have examined the barriers same-sex IPV victims face when attempting to access social services, resulting in an underdeveloped area of theorizing (Guadalupe-Diaz, 2013). The current theoretical paper identifies the barriers that same-sex Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 SAME-SEX IPV BARRIERS TO SERVICE IPV victims encounter when attempting to access social services since no one has synthesized what is known about their experiences using an intersectional approach. Using an intersectional lens, we identify service barriers specific to same-sex IPV victims with the goal of providing synthesized information useful for future research and theory development. In the first section, we discuss relationship barriers (e.g., threats of outing). Section II describes structural and institutional barriers (e.g., gender norms, minority stress). In Section III, we examine legal barriers (e.g., justice system, anti-homosexual beliefs). The last section offers recommendations for service providers and future research based on prior literature. Placing historically ignored victims, such as sexual minorities, at the center of service barriers discussion will facilitate the formation of knowledge (see O’Neal & Beckman, in press). Doing so is necessary for relevant theory and intervention development because mainstream inquiry has generally ignored the interests of those on the margins. Intimate Partner Violence and Barriers to Social Services Relationship and Individual Barriers to HelpSeeking The cycle of violence. The cycle of violence, a term first coined by Lenore Walker (1979) to describe the progression of violence in abusive relationships, has been found in both abusive opposite-sex and same-sex relationships (Burke & Owen, 2006). Both types of relationships experience a tension building phase, followed by abusive behavior, and a cooling down phase--often referred to as the “honeymoon” stage (Walker, 1979). The abuse present in the second phase takes many forms, ranging from physical and sexual violence to emotional and psychological abuse, and is not limited to any single type of abuse (Lundy, 1993). The honeymoon stage of IPV is a period of resolution that can take place immediately after or a few days following a severe incident (Walker, 1979). Throughout this period, the abuser appears remorseful and caring, promising not to assault their partner in the future. This behavior can result in the victim placing blame on themselves, deciding not to report the incident or dropping any legal charges, or actually believing that the history of abuse has come to an end (Kovach, 2004). Given the nature of the cycle of violence and the manipulation that occurs during the honeymoon phase, it is no surprise that most IPV incidents go unreported (Kay & Jefferies, 2010; Lundy, 1993; Wolf, Ly, Hobart, & Kernic, 2003). It is estimated 53 that almost half of all IPV incidents remain unreported to the police (Wolf et al., 2003), making it one of the lowest reported crimes (McCart, Smith, & Sawyer 2010; Wolf et al., 2003). Victims detail a number of reasons as to why they decide to not report IPV victimization. For example, Wolf and colleagues (2003) compiled an extensive list that included apprehensions about law enforcement personnel as well as emotional barriers such as fear, shame, and embarrassment. Moreover, victims report avoiding contact with the police due to feelings of privacy and the belief that IPV is not a matter serious enough to warrant professional intervention (McCart et al., 2010; Wolf et al., 2003). Another reason preventing individuals from reporting and seeking help for IPV victimization includes fears that their abuser may harm or even kill family pets. In fact, Ascione and colleagues (2007) reported that concern for the wellbeing of pets and companion animals factored into victims’ decision to leave. This may be due to the fact that most IPV shelters do not have the proper facilities to provide shelter and protection for the pets of IPV victims. (Ascione et al., 2007), complicating the help-seeking process. Fear of outing. Threats of outing, or exposing an individual’s previously private sexual orientation to others, create a unique barrier to social services for same-sex IPV victims (Chan, 2005). Outing can be used by perpetrators as a tool for abuse, creating a barrier to help-seeking. In circumstances where victims hide their outward expression of sexuality— in fear of societal stigma or other repercussions—the perpetrator may exploit this decision by threats of forced outing. This can result in the manipulation of victims, where they remain in abusive relationships due to fears of isolation and rejection from the community (for a discussion of gay male relationships and threats of outing see Ashton, 2008). Additionally, closeted individuals may be reluctant to seek help from family, friends, and formal service providers due to anticipated discrimination or rejection (Hammond, 1988; Kulkin, Williams, Borne, de la Bretonne, & Laurendine, 2007). For example, Hardesty, Oswald, Khaw, and Fonseca (2008) found that closeted lesbian IPV victims often modified their help-seeking efforts due to foreseen stigmatizing responses. It is clear that IPV help-seeking by samesex victims is complicated by the unique stressors they encounter regarding outing. Turell and Herrmann (2008) found that lesbians’ biggest concerns were to maintain anonymity regarding this victimization within the lesbian and gay community as well as avoiding homophobic and heterosexist responses when seeking out services. Until societal attitudes become more positive and tolerant, threats of outing will continue to be a tool used by Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 54 PARRY & O’NEAL perpetrators of violence in sexual minority relationships (see Burke, Jordan, & Owen, 2002). Fears of outing are complicated when considering the economic consequences that can result when an individual’s previously private sexual orientation is involuntarily made public. Research suggests that employers are willing to discriminate against gay and lesbian individuals and that their willingness translates into actual discriminatory practices in areas such as hiring and promotion (for reviews, see Levine, 1979; Levine & Leonard, 1984; Pizer, Sears, Mallory, & Hunter, 2011). The inability to gain or maintain viable employment can directly influence experiences of IPV and help-seeking practices which can lead to reciprocal effects; individuals who have less access to economic resources are more likely to be severely battered and suffer prolonged IPV (Alcade, 2006). In addition, Guadalupe-Diaz (2013) found that lesbian and gay male IPV victims were less likely to seek out help if they were of lower economic class. The multifaceted relationship between outing and financial consequences indicates that it is insufficient to examine IPV help-seeking without considering the fact that sexual orientation can influence the distribution of economic resources through workplace discrimination. Misinterpretation that abuse is mutual. Misguided beliefs that same-sex IPV perpetration is shared or equal between partners (Kulkin et al., 2007) cause another help-seeking barrier that is relatively unique to same-sex victims. Turell and Herrmann (2008), in their qualitative study of lesbian IPV victims, found that participants were concerned that the violence would be perceived as mutual. These concerns are not unwarranted. Research indicates that service providers often assume that same-sex IPV is mutual, which influences agency responses (Simpson & Helfrich, 2007). This results in lesbian and gay male victims being turned away by helping professionals due to beliefs that genuine IPV does not occur in same-sex relationships (McClennen, 2005). The police, for example, have been found to dismiss same-sex IPV reports due to misconceptions regarding mutual combat (Letellier, 1994). In addition, gay men report negative perceptions of police helpfulness due to learned expectations of officer rejection. These learned expectations are often fueled by heteronormative views that women, not men, are the sole victims of IPV (Finneran & Stephenson, 2013). Unfortunately, this troubling type of response does not end with the police. Hammond (1988) found that judicial system members often (mis)interpreted lesbian battering as mutual, despite their general sympathy toward battered women. Inappropriate responses have real-life consequences; when police cannot identify the true abuser, due to lack of training and/or institutionalized homophobia, both parties are either arrested or left to remedy the problem on their own (Hodges, 2000). It must be noted that, despite the myth that same-sex relationships are teemed with mutual abuse, research suggests that bilateral battering is not common. Merrill and Wolfe (2000) found that, similar to IPV between opposite-sex couples, violence in same-sex relationships is not mutual. Misconceptions may arise due to the fact that that gay males are more likely to physically defend themselves from assaults by their intimate partner; however, this should not be conceptualized or understood as mutual combat (Letellier, 1994). Accepting the notion of mutual battering in same-sex IPV can result in the victim self-identifying as a batterer due to efforts aimed at self-defense; this further complicates help-seeking behavior (for a discussion of lesbian IPV, see Renzetti, 1992). Homophobia and racism. The small body of literature exploring the attitudes of racial/ethnic minority groups toward gay men and lesbians indicates that many have negative views of sexual minorities (Greene, 1994; Herek & Capitanio, 1995). This causes gay and lesbian people of color to feel isolated within their racial and ethnic communities (Greene, 1994) while racism often prevents them from fully identifying with the lesbian and gay community (Kanuha, 1990). This can result in conflicting loyalties between the two communities of identity (Greene, 1994; Kanuha, 1990). In addition, minority stress—the negative life events that result from living in a racist and heterosexist society—is twofold due to their double minority status (Brooks, 1981). Minority stress can result from visible incidents of discrimination, including hate crimes, but may also result from covert incidents of prejudice (Balsam, Molina, Beadnell, Simoni, & Walters, 2011) including denied access to social services. Because of their double minority status and the negative attitudes present in both communities of identity, gay and lesbian people of color are at an increased risk for experiencing negative responses when attempting to access social services. These deleterious responses can include loss of employment or custody of children as well as anti-gay/race-based discrimination (Loiacano, 1993). This research suggests the salience of considering the connection between both racial-ethnic and sexual identities in terms of help-seeking (Crawford, Allison, Zamboni, & Soto, 2002). Institutional Barriers to Social Services Gender norms and the preservation of hegemonic masculinity. “Hegemonic masculinity" is Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 SAME-SEX IPV BARRIERS TO SERVICE a form of gender practice constructed in relation to other subordinated or less dominant masculinities as well as in relation to women (Carrigan, Connell, & Lee, 1985; Connell, 1995). Hegemonic masculinity is the term used to describe the criteria for ideal maleness within certain societies: “There is only one complete unblushing male in America: a young, married, white, urban, northern, heterosexual, Protestant, father [….] Any male who fails to qualify in any one of these ways is likely to view himself– during moments at least– as unworthy, incomplete and inferior” (Kimmel & Aronson, 2008, p. 4). Although numerous multifaceted performances of masculinity exist that inform gay male masculinities, help-seeking is likely to be hindered by dominant societal beliefs surrounding the ways in which men “should” act. Therefore, a discussion of traditional gender norms surrounding hegemonic masculinity is most relevant here. Traditional gender norms surrounding masculinity often shape the way male same-sex IPV victims seek out social services (Ball, 2011). Western society imposes strict gender norms on men that require them to be heterosexual and homophobic (Cruz, 2000). When men deviate from this hegemonic ideal, they are in danger of facing social stigma and even violent retaliation (Kay & Jeffries, 2010). Gay men are sometimes vulnerable to IPV because their relationships necessarily involve two men; this may result in heightened levels of dominance, power, and control (Landolt & Dutton, 1997). First, gender norms surrounding masculinity that emphasize independence and self-efficacy can influence the way gay men seek out social services. Research indicates that gay men are more likely to solve personal problems independently than seek informal or formal help (Cruz, 2003; GuadalupeDiaz, 2013; Meyer, 2008; Turell, 2000; for review, see Ball, 2011). Second, hegemonic ideals surrounding toughness--beliefs that men should be tough and strong--may be particularly salient in the discussion of barriers to help-seeking. Gay male victims may be less likely to reach out for help due to general belief systems regarding strength; research suggests that attitudes toward traditional male toughness are correlated with negative attitudes toward gay men (Davies, 2004). These two examples are by no means exhaustive, but they provide illustrations of the barriers gay men may encounter when seeking IPV help. Generally, when gay male victims do reach out for formal help they are often met with adversity due to violations of hegemonic masculinity and violations of rigid gender expressions (Barbour, 2011). Female gender norms also shape lesbian helpseeking as societal beliefs can result in lesbian IPV 55 being viewed as less severe. Indeed, some lesbian IPV victims have reported that they feared violence would not be taken seriously (Turell & Herrmann, 2008). Societal beliefs surrounding gender norms posit that women are less violent and aggressive than their male counterparts. Because of this, when violence occurs within a relationship, the male is typically assumed to be the perpetrator (Brown, 2008). This assumption is sometimes applied to lesbian IPV incidents. Typically, the perpetrator is often presumed to be masculine or “butch” individual while the victim is expected to be the feminine partner (Brown, 2008). This heterosexist way of thinking may result in individuals avoiding reporting if they present a gender or role that deviates from what is labeled “ideal” for the victim. The abovementioned gender roles are frequently reinforced by numerous sectors of society including families, communities, and the media. In the community context, norms of nonintervention (i.e. the failure to intervene or offer help) in cases of IPV can impart messages about how to respond—or ignore— violence (Miller, 2008). The following section discusses how community can act as barrier to IPV help seeking. Isolation: Denial in the lesbian and gay community. Social networks are defined as the structure of personal ties that serve various functions including emotional, social, and economic support (Barrera, 1986). Numerous studies have examined the link between lack of support networks—or social isolation—and violence against women (Bauer, Rodriques, Quiroga, & Flores-Ortiz, 2000; Heise, 1998; Menjivar & Salcido, 2002). This research, which overwhelmingly examines the experiences of heterosexual women and the racially marginalized, indicates that fewer social networks prevent IPV victims from gaining access to social services. Helpseeking researchers, however, fail to consider the unique ways isolation affects gay and lesbian individuals. For example, “family” is a term used by gay and lesbian individuals to designate members of the community. Unfortunately, despite the underlying assumption that this community is a cohesive one, gay men and lesbians often ignore IPV within the family and can respond in unsupportive ways (Istar, 1996; Turell & Hermann, 2008). Research indicates that friends of lesbian and gay male victims sometime minimize violence, convince victims to stay in abusive relationships, or outright deny IPV incidents to evade marginalizing stereotypes (Fahmy & Fradella, 2014; Ristock, 2003). The widespread denial of IPV in this community is complicated by the fact that lesbians often feel the need to hide abuse in efforts of maintaining intact images of lesbian relationships, or what has been coined “lesbian Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 56 PARRY & O’NEAL utopia” (Turell & Herrmann, 2008). Denial of the problem is even more ubiquitous and problematic when discussing the experiences of gay men. Due to the overall invisibility of male victims, lack of recognition results in feelings of isolation by victims who have experienced and continue to experience IPV in their relationships (Barbour, 2011). Denial within the community is twofold for gay and lesbian racial/ethnic minorities, making a discussion of this intersection particularly relevant. Miller (2008), in her study of gendered violence, found that nonintervention was common in areas characterized by urban inequality (Miller's work focused on the experiences of African American girls). She found that bystanders often justified their neutralization and reluctance to intervene by denying the victim. The problem of nonintervention is also perpetuated in the Latina/o community through assertions that IPV is a “private matter” where exposure can result in the division of community (Rivera, 1994, pg. 255). This is problematic, as norms of nonintervention are linked to an increased prevalence of severe nonlethal partner violence (Browning, 2002). Therefore, it is important to recognize how norms of nonintervention (among gay/lesbian and racial/ethnic communities) and gender norms shape violence against gay and lesbian individuals. For example, Agoff and colleagues (2007) found that Latina/o family members often justified IPV by blaming the victim for not fulfilling gendered family duties. In order to understand the role of social isolation as it applies to gay and lesbian IPV victimization, it is necessary to move discussion beyond one community and explore the problematic norms of nonintervention that can be present in multiple communities of identity. Reaching a deeper understanding of the ways social isolation and support networks affect gay and lesbian victims of IPV is necessary for comprehensive service efforts. Using an intersectional approach, where various aspects of identity are considered, can aid in gaining insight into the unique experiences of these individuals. For example, the discussion of social isolation and IPV is complicated when considering the many spaces gays and lesbians are denied access (e.g. see employment discussion above). This intersection of isolation and denied access results in exclusion that fosters abusive situations by making gay and lesbian individuals more vulnerable. For example, Renzetti (1996) found that, although the majority of IPV shelters reported that they accepted lesbian clients, only 10% offered services or educational material specifically designed for lesbian victims. Moreover, research suggests that IPV service providers are least likely to provide services to sexual minority males (for a review, see Hines & Douglas, 2011). According to Knauer (1999), “[f]or abused men, there are simply no shelters” (p. 346). The lack of appropriate resources, due to the overall lack of recognition, can perpetuate feelings of isolation among gay male victims (Burke, 1998). Due to the unequal distribution of social support prescribed by sexual orientation, social isolation must be examined using an intersectional approach, where various aspects of identity are considered. In other words, it is necessary to consider the unique ways same-sex IPV victims are isolated through denial in the lesbian and gay community, nonintervention in racial/ethnic communities, as well rejection in traditional shelter settings. This can aid in gaining insight into the unique experiences and barriers facing same-sex IPV victims. Legal Barriers to Social Services Inappropriate law enforcement response. The justice system has historically used legal criteria to avoid formal responses to IPV incidents (Phillips & Sobol, 2010). Government-sanctioned homonegativity continues to shape the experiences of gays and lesbians who attempt to access justice system services (Murray, Mobley, Buford, & Seaman-DeJohn, 2007). Existing literature on the legal issues facing gay and lesbian IPV victims has primarily, and narrowly, focused on whether lesbians have legal rights to interventions (Aulivola, 2005). In terms of legal social services, gay and lesbian individuals often cite fear of homophobia as a barrier to help-seeking (Balsam, 2001). Legal help-seeking among this group is complicated by the fact that openly gay and lesbian individuals were once branded criminals because of their sexual activity and their refusal to comply with gender norms (that is currently no longer the case; however, the stigma and cultural memory remain; Merrill & Wolfe, 2000). Discrimination based on sexual orientation and gender has affected how law enforcement officials respond to victims of same-sex IPV (Little, 2008; Potoczniak et al., 2003). Gay and lesbian victims report fear and mistrust of justice system personnel due to issues of past conflict, a culture of heterosexism, and institutionalized homophobia and homonegativity (Eaton et al., 2008; Hammond, 1988; Murray et al., 2007). Sexual minority crime victims often report inadequate and inappropriate police response in the forms of mocking, blaming, and laughing (Wolff & Cokely, 2007). Renzetti (1992) reported that police are less likely to intervene in same-sex IPV situations due to prejudice and attachment to gender norms and stereotypes (e.g., beliefs that men are the only IPV perpetrators). Likewise, Seelau and Seelau (2005) found that sexual Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 SAME-SEX IPV BARRIERS TO SERVICE orientation affected law enforcement response as well as other legal interventions. This is demonstrated by the gay and lesbian individuals who have long reported both verbal and physical abuse at the hands of police (Renzetti, 1992; Wolff & Cokely, 2007). These types of abusive law enforcement activity influence help-seeking behaviors. Sexism and homophobia can prevent lesbians from reporting incidents of abuse because prejudice “disempowers” them from seeking formal assistance (Potoczniak et al., 2003). In addition, research indicates that helpseeking gay men are often met with homophobic attitudes from law enforcement officials (Cruz, 2003; Merrill & Wolfe, 2000). Police responses to IPV between gay men are further complicated due to beliefs about the male body and its inability to be victimized in the domestic sphere. Consider Barbour’s (2011) relevant scenario: police officers respond to an IPV call and assess the situation as a fair fight between two men and, as a result, do nothing to assist the male victim. These reasons may prevent an individual from reaching out for help when victimized. Police responses to complaints of IPV must also be contextualized through the historical relations between racial/ethnic minorities and law enforcement officers. Despite positive reforms surrounding the police response to IPV—resulting from outcries made by feminists, advocates, and the overall community regarding inappropriate tactics (see Sherman, 1992; Smith, 2001)—legal changes have often been called narrow-minded for failing to consider the experiences of racial and ethnic minorities (Rivera, 1994). For example, research indicates that people of color often avoid contact with law enforcement officials due to feelings of fear, frustration, and distrust, coupled with perceptions of ineffectiveness (Erez, 2000; Miller, 2008). Avoidance may be the result of the long history of discrimination towards ethnic and racial minorities by law enforcement officials (Rivera, 1994). Overall, stereotypes based on racism, ethnic discrimination, homophobia, and sexism create unique experiences for victims of IPV. Therefore, in order to understand the role law enforcement play in preventing sexual minority victims from accessing social services, it is important to also recognize how experiences are shaped by race/ethnic relations. Anti-gay/lesbian beliefs and laws. Stereotypes, which are fundamental to the construction of sexual orientation-based discrimination, result in the differential treatment of gay and lesbian individuals in social service settings. Law enforcement officials, for instance, sometimes believe that lesbians and/or gay men are promiscuous or dissolute; they view same-sex partnerships as illegitimate and ephemeral, 57 rather than valid relationships where IPV can happen (Hill, 2000). In addition to the police, research suggests that therapist trainees hold negative stereotypes about gay men in relation to their mental health (Boysen, Vogel, Madon, & Wester, 2006) resulting in the differential treatment of same-sex IPV victims in healthcare settings. Wise and Bowman (1997) found that graduate-level counseling students categorized lesbian IPV incidents as less violent compared to heterosexual incidents; they were also less likely to suggest charges be pressed against lesbian batterers. These findings suggest the importance of examining help-seeking using an intersectional framework, as gay and lesbian victims encounter unique barriers when attempting to access competent law enforcement and mental health services. Anti-LGBTQ legal policies, like stereotypes, also create barriers to social services. When laws are created that burden gays and lesbians, they result in collateral consequences, where individuals become victim to not only the impact of law, but their intimate partners as well (for a discussion of race, anti-immigration laws, and IPV, see Crenshaw, 1991). States have historically adopted laws and measures that explicitly excluded same-sex IPV victims and perpetrators from the legal interventions that opposite-sex victims and perpetrators receive (Hardesty et al., 2011; National Gay and Lesbian Task Force, 2005). Barbour (2012) argues that these types of laws demonstrate that “power and recognition to homosexual men by society is much less than that given to heterosexual men” (p. 4). Overall, when laws are passed that exclude same-sex IPV victims from accessing services, such as legal intervention, they are prevented from using services that directly impact their experiences of IPV. Although the legal landscape for gay and lesbian couples has become more favorable (e.g., the majority of states grant same-sex couples the right to marry; National Conference of State Legislators [NCSL], 2014), several states are currently challenging the laws that allow gay men and lesbians to marry. Additionally, because these laws are in their infancy, it is unclear how changes will affect laws governing other legal spheres such as tax- and inheritance-related issues as well as those surrounding IPV. It is salient to discuss anti-LGBTQ laws and policies in relation to the laws that prevent racial and ethnic minority IPV victims from help-seeking. Like anti-LGBTQ laws and policies, anti-immigration laws create obstacles to social services that primarily burden individuals of color. For example, Dugan and Apel (2003) theorized that immigrant individuals may be hesitant to disclose victimization if the Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 58 PARRY & O’NEAL offender is undocumented, fearing deportation of their significant other. In addition, when antiimmigration laws are passed that prohibit undocumented immigrants from accessing services such as health care and public education, undocumented victims are prevented from using institutions that directly impact their experiences. For example, Bauer and colleagues (2000), in their study of health care barriers encountered by battered minority women, found that some respondents feared deportation. Participants believed that simply entering the health care system presented a risk for deportation. If undocumented immigrant individuals are unable to seek medical attention (due to either real or perceived policy-based barriers) for the violence experienced in their relationships, they are further prevented from exiting the partnership. In order to understand the role anti-LGBTQ laws and policies play in preventing sexual minority victims from accessing social services, it is important to also recognize how race-based laws shape the helpseeking of racial/ethnic minorities. Gay and lesbian IPV victims of color may encounter laws that burden both of their communities of identity by systematically preventing them from seeking formal help. Directions for Service Providers and Future Research The general refusal to recognize IPV in the context of same-sex relationships—coupled with the barriers identified above—suggests that gay and lesbian victims may feel that their experiences of abuse are not legitimate. This can result in assumptions that their help-seeking will not be taken seriously. Lesbians often believe that community services are solely available to serve heterosexual women (Renzetti, 1996), and research suggests that IPV agencies are least likely to provide services to sexual minority males (for review, see Hines & Douglas, 2011). Therefore—similar to the movement to improve the response to heterosexual IPV—police training, legal changes to afford more protections, and increased community services appear critical in providing same-sex IPV victims avenues for exiting abusive relationships. Based on the literature review above, we now offer recommendations for service providers and future research.1 Recommendation I: Law Enforcement Individuals receive subtle, yet powerful, messages regarding their social standing as citizens through their interactions with legal authorities (Tyler 1989; Tyler, Degoey, & Smith, 1996). These interactions are significant because they provide individuals information about their relative worthiness in the community and in relation to authorities (Tyler et al., 1996). When an individual is treated fairly, messages of respect and value are communicated whereas unfair treatment communicates disrespect and reinforces marginalization (Tyler et al., 1996). Due to their contentious history with law enforcement and other governmental institutions, gay and lesbian individuals may avoid reporting IPV victimization or minimize the seriousness of an incident when police are called (Little, 2008; Potoczniak et al., 2003). Underreporting may be a result of prior ubiquitous negative treatment resulting in anticipated unfavorable treatment (Tesch, Bekerian, English, & Harrington, 2010). Conversely, research suggests that citizens are more likely to reach out when they feel supported and valued by authorities (Tyler, 1989). To this end, it is our recommendation that law enforcement personnel receive adequate training to better understand the historical mistreatment of gay and lesbian individuals to encourage empathizing with the population. In efforts to reduce real and potential police-community problems between officers and sexual minority complainants, some police departments (e.g., Atlanta Police Department, Metropolitan Police Department of the District of Columbia, Phoenix Police Department, Salem Police Department, Dallas Police Department ) have developed programs that include gay and lesbian liaisons, specialized units that respond to hate crimes aimed at minorities (racial/ethnic, gender), and special outreach teams that work to strengthen the relationship between sexual minorities and officers. These programs represent first steps in addressing service accessibility problems as they work to create an atmosphere that acknowledges intersections and the variety of factors that shape IPV experiences. Although more research is required to identify the most effective types of outreach programs, it makes sense that communities with growing lesbian and gay male populations should develop specific programs to address their needs. Recommendation II: Shelters Gay and lesbian shelter services are limited and even non-existent in some areas, resulting in the invisibility of sexual minorities in this setting (Hammond, 1988; Pattavina, Hirschel, Buzawa, Faggiani, & Bentley, 2007). As mentioned above, Renzetti (1996) surveyed United States IPV shelters and found that only 10% offered services or educational material specifically designed for lesbian victims. This could be due to the fact that some state laws expressly exclude gay individuals from receiving state funded assistance (Knauer, 1999; Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 SAME-SEX IPV BARRIERS TO SERVICE Murray et al., 2007). Extant research should guide shelter services. For example, Turell and Herrmann (2008) found that lesbian help-seeking IPV victims wanted their first contact to be with a trained IPV advocate sexual minority woman. In addition, crisis hotline workers often assume that the perpetrator is male and the victim is female, sending subtle marginalizing messages to gay individuals when they call for service (for a discussion on lesbians’ crisis line experiences, see Turell & Herrman, 2008). Furthermore, although shelters now admit lesbian women, many shelters have historically either turned away lesbian victims or made them feel unwelcome (Lundy, 1993). Shelters that provide services for gay males are even more lacking, resulting in hundreds of thousands of male victims remaining in abusive homes because they have limited formal options when seeking safety (Letellier, 1994). Most shelters devote their resources to assisting female victims of IPV (Ashton, 2008). The lack of formal protection for gay males stems from the misconception that females are the sole victims of IPV (Burke, 1998; Merrill & Wolfe, 2000; Turell, 2000); women’s shelters often turn away male help-seekers due to safety concerns for the women present (Island & Letellier, 1991; Merrill & Wolfe, 2000). As a result, gay male victims are typically forced to rely on HIV/AIDS treatment centers or homeless shelters— an environment that can foster hate-based violence— when attempting to flee violent relationships (Barbour, 2011). Even more disheartening, women’s shelters often report that serving gay men is not a priority (Short, 1996 as cited in Merrill & Wolfe, 2000). It is no wonder that men who seek help from shelters report that the services they receive are not very helpful (McClennen, Summers, & Vaughan, 2002). These findings suggest that IPV shelters should work to overcome this marginalizing history and mend relations. It might prove helpful for shelters to draw inspiration from the various anti-violence campaigns that outline best practices for stopping violence in the lesbian and gay community (e.g., Anti-Violence Project, “Lifting the Mask off of Domestic Violence,” Jane Doe, Inc., Aids Council of New South Wales). One way to achieve this goal is to develop trainings that help service professionals understand the factors that shape the experiences of same-sex IPV victims. For example, research suggests that closeted lesbian IPV victims often modify their help-seeking attempts in fear of stigmatizing responses (Hardesty et al., 2011). Shelters can encourage help-seeking through campaigns targeted at same-sex victims. Educational public service announcements that communicate 59 welcoming atmosphere may promote help-seeking. In addition, Ard and Makadon (2011) have suggested several steps that providers can take to address IPV among lesbian and gay male clients including adapting institutional IPV pamphlets, posters, and visual material to include same-sex relationships. Recommendation III: Support Networks Research has established a link between the lack of support networks and interpersonal violence (Heise, 1998; Menjivar & Salcido, 2002). IPV between gay and lesbian partners is more invisible compared to abuse occurring in heterosexual relationships; this has resulted in a lack of support systems (Ashton, 2008). According to GuadalupeDiaz (2013), gay men may not have the supportive networks that are critical to exiting abusive relationships. In addition, Turell and Herrmann (2008) found that lesbian and bisexual women rarely used services provided by the general community. This suggests that agencies should help same-sex IPV victims form support networks through unconventional approaches. Service providers could assist sexual minority victims in joining community groups through local organizations. By joining such groups, individuals would have access to social and emotional support while creating networks of opportunity. Building strong support networks is a salient service technique for all IPV victims. More important still, is creating partnerships between official services and the victim’s social support networks (Goodman & Smyth, 2011). Using intersectional thinking and recognizing the unique factors that prevent same-sex IPV victims from forming strong support networks will result in services that are more responsive to their specific needs. For example, coordinated projects that work to establish community networks and strengthen organized efforts include projects such as National Lesbian and Gay Health Association and The Domestic Violence Program of the Gay and Lesbian Community Action Council. These organizations advocate change by drawing on established community resources and educating the public about same-sex partner violence. Recognizing the unique barriers that sexual minority IPV victims encounter coupled with using joint approaches through community collaboration can help distribute problem-solving efforts more evenly throughout the community. This signals to victims that stopping violence within the community is a cooperative and unified effort. It also communicates to victims that support networks are more evenly distributed throughout their residential community. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 60 PARRY & O’NEAL Recommendation IV: Future Research Future research that examines the experiences of lesbian and gay male IPV victims using an intersectional framework can increase meaningful discussion regarding barriers to service. Specifically, future inquiry should aim to (1) uncover the ways sexual minority IPV victims reach out for formal and informal assistance (e.g., non-profit organizations, traditional IPV service providers, LGBTQ service providers, friends, family), (2) identify the unique barriers that sexual minority IPV victims face when help-seeking (e.g., homophobia, disbelief, fears of outing), (3) gain knowledge surrounding their overall experiences (e.g., ease of service attainment, assessments of service helpfulness), and (4) understand the barriers to help-seeking that transgender and bisexual IPV victims encounter when reaching out for assistance. Gaining insight into these areas will help inform the development of antiviolence strategies that cater to the specific needs of sexual minority IPV victims. To point number four, the dearth of research examining the help-seeking behavior and experiences of transgender IPV victims is particularly problematic as research indicates that these individuals may experience increased risk of IPV compared to other sexual minorities (Landers & Gilsanz, 2009). Transgender respondents have reported a lifetime IPV rate of 34.6%, versus 14.0% for gay and lesbian individuals (Landers & Gilsanz, 2009). Additionally, transgender individuals experience unique barriers to service not experienced by other sexual minorities. For example, individuals that identify as female but were born male may encounter barriers when attempting to access women’s shelters (Hines & Douglas, 2011; Pattavina et al., 2007). A recent study of IPV service professionals in Los Angeles found that non-LGBT affiliates reported feeling inadequately prepared to assist transgender persons (Ford, Slavin, Hilton, & Holt, 2012). The higher prevalence rate of IPV found in transgender relationships coupled with underdeveloped service provisions signal the need for increased scholarly attention investigating the unique experiences of this historically understudied group. Another area of particular concern is the lack of research directed at understanding the specific needs of bisexual victims of IPV. This research neglect may be due in part to the fact that bisexuals run the risk of being defined based on their current relationship or, more specifically, their partner’s gender. For example, a bisexual woman who is dating a woman may be labeled as a lesbian whereas if she were dating a man she may be classified as straight by outsiders (James, 1996). The lack of focus on bisexuals is particularly troublesome given that the limited research on bisexual women and IPV has shown that they represent a particularly at-risk population. They are more likely to experience IPV victimization than their lesbian or gay counterparts; however, this victimization most often occurs in the context of their opposite-sex relationships (Messinger, 2011). The unique status that bisexuals occupy may present additional barriers for IPV victims, as they may not be welcomed or feel comfortable accessing resources designed specifically for opposite-sex or same-sex victims. In addition, bisexuality has a history of being completely disregarded or unacknowledged by service providers (for a discussion on the dismissal of bisexuals and the overall denial of bisexuality see James, 1996). Overall, further research should address the specific needs, as well as the potential risk factors, associated with bisexual men and women in relation to IPV victimization. Integrating qualitative methodologies, such as focus groups, may prove useful in the study of IPV in sexual minority relationships as these approaches allow individuals to assign meaning to their experiences (Adler & Adler, 1987) while extensively examining the topic under discussion (Gerbert, Caspers, Bronstone, Moe, & Abercrombie, 1999). Focus-group methodology can tap into shared experiences of marginalization and help develop a structural examination of individual experiences (Pollack, 2003). Feminist scholars have long advocated the use of focus-group methodology for researchers interested in investigating context-driven gendered processes and experiences (Pollack, 2003). This methodology is particularly salient with interviews of sexual minority victims because it has the ability to transfer power from the researcher to the interviewees (Madriz, 2001), which is appropriate for work with oppressed, marginalized, and previously ignored research subjects. From a feminist perspective, qualitative approaches are significant in IPV research as they offer a voice for marginalized groups (Davis, Taylor, & Furniss, 2001). Qualitative methods help to uncover the unique ways individuals function in dynamic social situations and are better equipped to draw on the numerous factors that shape individual experiences (Tewksbury, 2009), which is especially salient for intersectionality-driven work. Certainly, qualitative methodologies often do not result in generalizable findings. This limitation, however, is balanced by gaining in-depth knowledge (Tewksbury, 2009). Qualitative methods tap into the aspects of identity that shape the experiences of victims. Overall, further research on this historically ignored group—possibly with a focus on gay men Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 SAME-SEX IPV BARRIERS TO SERVICE and transgender/sexual individuals given the scant literature—is necessary to inform service providers regarding their needs, perceptions, and experiences. Conclusion This paper should be used to guide future research on gay and lesbian help-seeking behaviors and inform the development of IPV interventions. Intersectional thinking can reframe our understanding regarding IPV, victimization, and justice processes by offering insight into the experiences of sexualminority IPV victims (see O’Neal & Beckman, in press). The interests of lesbian and gay IPV victims have traditionally been overlooked in mainstream inquiry—although this body of work is growing. Further research is essential to establish a more comprehensive knowledge base and to examine cultural and subjective differences between sexual minorities and heterosexuals. Indeed, approaches that focus on multiple elements of experience will result in a body of knowledge that can facilitate the development of theory and policy (Simpson, 1989). Alternatively, theory will continue to be relatively uninformed as to the nature of barriers to service if scholars continue to ignore the numerous aspects of identity that shape the experiences of IPV victims. References Adler, P. A. & Adler, P. (1987). Membership roles in field research. Newbury Park, CA: Sage. Agoff, C., Herrera, C., & Castro, R. (2007). The weakness of family ties and their perpetuating effects on gender violence: A qualitative study in Mexico. Violence Against Women, 13(11), 1206– 1220. doi: 10.1177/1077801207307800 Alcalde, C. M. (2006). Migration and class and constraints in battered women’s attempts to escape violence in Lima, Peru. Latin American Perspectives, 33, 147–164. doi: 10.1177/0094582X06294140 Anderson, E. (2000). Code of the street: Decency, violence, and the moral life of the inner city. New York, NY: W.W. Norton & Company. Ard, K. L., & Makadon, H. J. (2011). Addressing intimate partner violence in lesbian, gay, bisexual, and transgender patients. Journal of General Internal Medicine, 26, 630–633. doi: 10.1007/s11606-011-1697-6 61 Ashton, P. (2008). “How did it get to this?” Gay male intimate partner violence and victim characteristics. (Doctoral dissertation). Retrieved from ProQuest, UMI Dissertations Publishing. (1460137). Ascione, F. R., Weber, C. V., Thompson, T. M., Heath, J., Maruyama, M., & Hayashi, K. (2007). Battered pets and domestic violence animal abuse reported by women experiencing intimate violence and by nonabused women. Violence Against Women, 13(4), 354–373. doi: 10.1177/1077801207299201 Aulivola, M. (2005). Outing domestic violence: Affording appropriate protections to gay and lesbian victims. Family Court Review, 42, 162– 177. doi: 10.1177/1531244504421012 Ball, M. J. (2011). Gay men, intimate partner violence, and help-seeking: The incomprehensibility of being a victim. In B. Scherer & M. J. Ball (Eds.) Queering paradigms II: Interrogating agendas (pp. 161–180). Oxford, England: Peter Lang. Ball, M. J., & Hayes, S. (2010). Same-sex intimate partner violence: Exploring the parameters. In S. Burkhard (Ed.) Queering paradigms (pp. 313– 330). Bern, Switzerland: Peter Lang. Balsam, K. (2001). Nowhere to hide: Lesbian battering, homophobia, and minority stress. Women and Therapy, 23, 25–37. doi: 10.1300/J015v23n03_03 Balsam, K., Molina, Y., Beadnell, B., Simoni, J., & Walters, K. (2011). Measuring multiple minority stress: The LGBT People of Color Microaggressions Scale. Cultural Diversity & Ethnic Minority Psychology, 17, 163–174. doi: 10.1037/a0023244 Barbour, E. (2011). An ecological analysis of samesex domestic violence between gay men. Kaleidoscope, 10, 2–9. Barrera, M. (1986). Distinctions between social support concepts, measures, and models. American Journal of Community Psychology, 14, 413–445. doi: 10.1007/BF00922627 Bauer, H. M., Rodrigues, M. A., Quiroga, S. S., & Flores-Ortiz, Y. G., (2000). Barriers to health care for abused Latina and Asian women. Journal of Health Care for the Poor and Underserved, 11, 33–44. doi: 10.1353/hpu.2010.0590 Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 62 PARRY & O’NEAL Belknap, J., Hartman, J. L., & Lippen, V. L. (2010). Misdemeanor domestic violence cases in the courts: A detailed description of the cases. In V. Garcia and J. Clifford (Eds.), Female victims of crime: Reality reconsidered (pp. 259–78). Columbus, OH: Prentice Hall. Bell, K. M., & Naugle, A. E. (2008). Intimate partner violence theoretical considerations: Moving towards a contextual framework. Clinical Psychology Review, 28, 1096–1107. doi: 10.1016/j.cpr.2008.03.003 Blosnich, J. R. & Bossarte, R. M. (2009). Comparisons of intimate partner violence among partners in same-sex and opposite-sex relationships in the United States. American Journal of Public Health, 99, 2182–2184. doi: 10.2105/AJPH.2008.139535 Boysen, G. A., Vogel, D. L., Madon, S., & Wester, S. R. (2006). Mental health stereotypes about gay men. Sex Roles, 54, 69–82. doi: 10.1007/s11199006-8870-0 Brooks, V. R. (1981). Minority stress and lesbian women. Lexington, MA: D.C. Heath. Brown, C. (2008). Gender role implications of samesex intimate partner abuse. Journal of Family Violence, 23, 457–462. doi: 10.1007/s10896008-9172-9 Browning, C. R. (2002). The span of collective efficacy: Extending social disorganization theory to partner violence. Journal of Marriage and Family, 64(4), 833–850. doi: 10.1111/j.1741-3737.2002.00833.x Burgess-Proctor, A. (2006). Intersections of race, class, gender, and crime: Future directions for feminist criminology. Feminist Criminology, 1, 27–47. doi: 10.1177/1557085105282899 Burke, T. W. (1998). Male-to-male gay domestic violence: The dark closet. In N. A. Jackson & G. C. Oates (Eds.), Violence in intimate relationships: Examining sociological and psychological issues (pp. 161–179). Woburn, MA: Butterworth-Heinemann. Burke, T. W., Jordan, M. L., & Owen, S. S. (2002). A cross-national comparison of gay and lesbian domestic violence. Journal of Contemporary Criminal Justice, 18, 231–257. doi: 10.1177/1043986202018003003 Burke, T., & Owen, S. (2006). Same-sex domestic violence: Is anyone listening? Gay and Lesbian Review Worldwide, 13(1), 6–7. Carrigan, T., Connell, R. W., & Lee, J. (1985). Towards a new sociology of Masculinity. Theory and Society, 14, 551–604. doi: 10.1007/BF00160017 Chan, C. (2005). Domestic violence in gay and lesbian relationships. Retrieved from Domestic and Family Violence Clearinghouse website: http://www.adfvc.unsw.edu.au/PDF%20files/Ga y_Lesbian.pdf Connell, R. W. (1995). Masculinities. Cambridge, MA: Polity. Crawford, I., Allison, K. W., Zamboni, B. D., & Soto, T. (2002). The influence of dual-identity development on the psychosocial functioning of African-American Gay and Bisexual Men. The Journal of Sex Research, 39, 179–189. doi: 10.1080/00224490209552140 Crenshaw, K. (1989). Demarginalizing the intersection of race and sex: A Black feminist critique of antidiscrimination doctrine, feminist theory, and antiracist politics. The University of Chicago Legal Forum, (1989), 139–167. Crenshaw, K. (1991). Mapping the margins: Intersectionality, identity politics, and violence against women of color. Stanford Law Review, 43, 1241–1299. doi: 10.2307/1229039 Cruz, M. J. (2000). Gay male domestic violence and the pursuit of masculinity. In P. Nardi (Ed.), Gay masculinities: Research on men and masculinities (pp. 66–82). Thousand Oaks, CA: Sage. Cruz, J. M. (2003). Why doesn’t he just leave? Gay male domestic violence and the reasons victims stay. Journal of Men’s Studies, 11, 309–319. doi: 10.3149/jms.1103.309 Davies, M. (2004). Correlates of negative attitudes toward gay men: Sexism, male role norms, and male sexuality. Journal of Sex Research, 41, 259–266. doi: 10.1080/00224490409552233 Davis, K., Taylor, B., & Furniss, D. (2001). Narrative accounts of tracking the rural domestic violence survivors’ journey: A feminist approach. Health Care for Women International, 22, 333–347. doi: 10.1080/07399330152398882 Dugan, L., & Apel, R. (2003). An exploratory study of the violent victimization of women: Race/ethnicity and situational context. Criminology, 41, 959–979. doi: 10.1111/j.17459125.2003.tb01010.x Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 SAME-SEX IPV BARRIERS TO SERVICE Eaton, L., Kaufman, M., Fuhrel, A., Cain, D., Cherry, C., Pope, H., & Kalichman, S. (2008). Examining factors co-existing with interpersonal violence in lesbian relationships. Journal of Family Violence, 23, 697–705. doi: 10.1007/s10896-008-9194-3 Erez, E. (2000). Immigration, culture conflict and domestic violence/woman battering. Crime Prevention & Community Safety, 2(1), 27–36. doi: 10.1057/palgrave.cpcs.8140043 Fahmy, C. & Fradella, H. F. (2014, March 26). Same-sex intimate partner violence. The Encyclopedia of Theoretical Criminology. Hoboken, NJ: Wiley–Blackwell. doi: 10.1002/9781118517390.wbetc044 Finneran, C., & Stephenson, R. (2013). Gay and bisexual men's perceptions of police helpfulness in response to male-male intimate partner violence. The Western Journal of Emergency Medicine, 14, 354–362. doi: 10.5811/westjem.2013.3.15639 Ford, C. L., Slavin, T., Hilton, K. L., & Holt, S. L. (2012). Intimate partner violence prevention services and resources in Los Angeles: Issues, needs, and challenges for assisting lesbian, gay, bisexual, and transgender clients. Health Promotion Practice, 6, 841–849. doi: 10.1177/1524839912467645 Gerbert B., Caspers, N., Bronstone, A., Moe, J., & Abercrombie, P. (1999). A qualitative analysis of how physicians with expertise in domestic violence approach the identification of victims. Annals of Internal Medicine, 131, 578–584. doi: 10.7326/0003-4819-131-8-19991019000005 Goodman, L. A., & Smyth, K. F. (2011). A call for a social network-oriented approach to services for survivors of intimate partner violence. Psychology of Violence, 1, 79–92. doi: 10.1037/a0022977 Greene, B. (1994). Ethnic minority lesbians and gay men: Mental health and treatment issues. Journal of Clinical and Consulting Psychology, 62, 243– 251. doi: 10.1037//0022-006X.62.2.243 Guadalupe-Diaz, X. (2013). An exploration of differences in the help-seeking of LGBQ victims of violence by race, economic class, and gender. Gay & Lesbian Issues and Psychology Review, 9, 15–33. 63 Hammond, N. (1988). Lesbian victims of relationship violence. Women and Therapy, 5, 89–105. doi: 10.1300/J015v08n01_08 Hardesty, J. L., Oswald, R. F., Khaw, L., Fonseca, C., & Chung, G. H. (2008). Lesbian mothering in the context of intimate partner violence. Journal of Lesbian Studies, 12, 191–210. doi: 10.1080/10894160802161364 Hardesty, J. L., Oswald, R. F., Khaw, L., & Fonseca, C. (2011). Lesbian/bisexual mothers and intimate partner violence: Help seeking in the context of social and legal vulnerability. Violence Against Women, 17, 28–46. doi: 10.1177/1077801209347636 Harris, A. P. (1990). Race and essentialism in feminist legal theory. Stanford Law Review, 42, 581–616. doi: 10.2307/1228886 Heise, L. (1998). Violence against women: An integrated, ecological framework. Violence Against Women, 4, 262–291. doi: 10.1177/1077801298004003002 Herek, G. M., & Capitanio, J. (1995). Black heterosexuals' attitudes towards lesbians and gay men in the United States. The Journal of Sex Research, 32, 95–105. doi: 10.1080/00224499509551780 Hill, J. M. (2000). The effects of sexual orientation in the courtroom. Journal of Homosexuality, 39, 93–111. doi: 10.1300/J082v39n02_05 Hines, D., & Douglas, E. M. (2011). The reported availability of U.S. domestic violence services to victims who vary by age, sexual orientation, and gender. Partner Abuse, 2, 3–30. doi: 10.1891/1946-6560.2.1.3 Hodges, K. (2000). Trouble in paradise: Barriers to addressing domestic violence in lesbian relationships. Law and Sexuality, 9, 311–329. Island, D., & Letellier, P. (1991). Men who beat men who love them. Binghamton, NY: Haworth Press. Institute of Medicine. (2011). The health of lesbian, gay, bisexual, and transgender people: Building a foundation for better understanding. Retrieved from http://www.iom.edu/~/media/Files/Report%20Fil es/2011/The-Health-of-Lesbian-Gay-Bisexualand-TransgenderPeople/LGBT%20Health%202011%20Report% 20Brief.pdf Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 64 PARRY & O’NEAL Istar, A. (1996). Couple assessment: Identifying and intervening in domestic violence in lesbian relationships. Journal of Gay and Lesbian Social Services, 4, 93–106. doi: 10.1300/J041v04n01_10 James, C. (1996). Denying complexity: The dismissal and appropriation of bisexuality in queer, lesbian, and gay theory. In B. Beemyn and M. Eliason (Eds.), Queer studies: A lesbian, gay, bisexual, and transgender anthology (pp. 217– 240). New York, NY: New York University Press. Jeffries, S., & Ball, M. J. (2008). Male same-sex intimate partner violence: A descriptive review and call for further research. Murdoch e-Law Review, 15, 134–179. Kanuha, V. (1990). Compounding the triple jeopardy: Battering in lesbian of color relationships. Women and Therapy, 9, 169–184. doi: 10.1300/J015v09n01_10 Kay, M., & Jeffries, S. (2010). Homophobia, heteronormativism and hegemonic masculinity: Male same-sex intimate violence from the perspective of Brisbane service providers. Psychiatry, Psychology and Law, 17, 412–423. doi: 10.1080/13218710903566953 Kelly, B. C., Izienicki, H., Bimbi, D. S., & Parsons, J. T. (2011). The intersection of mutual partner violence and substance use among urban gays, lesbians, and bisexuals. Deviant Behavior, 32(5), 379–404. doi: 10.1080/01639621003800158 Kimmel, M. (2010). Misframing men: The politics of contemporary masculinities (pp. 99–121). Piscataway, NJ: Rutgers University Press. Kimmel, M. S., & Aronson, A. (2008). The gendered society reader (3rd ed.). New York, NY: Oxford University Press. Klostermann, K., Kelley, M. L., Milletich, R. J., & Mignone, T. (2011). Alcoholism and partner aggression among gay and lesbian couples. Aggression and violent behavior, 16(2), 115– 119. doi: 10.1016/j.avb.2011.01.002 Knauer, N.J. (1999). Same-sex domestic violence: Claiming a domestic sphere while risking negative stereotypes. Temple Political and Civil Rights Law Review, 8, 325–350. Kovach, K. (2004). Trauma nursing: Intimate partner violence. RN Magazine, 67(8), 38–43. Kulkin H. S., Williams J., Borne H. F., de la Bretonne, D., & Laurendine J. (2007). A review of research on violence in same-gender couples: a resource for clinicians. Journal of Homosexuality, 53, 71–87. doi: 10.1080/00918360802101385 Landers, S, & Gilsanz, P. (2009). The health of lesbian, gay, bisexual, and transgender (LGBT) persons in Massachusetts. Retrieved from: http://www.mass.gov/eohhs/docs/dph/commissio ner/lgbt-health-report.pdf Landolt, M. A., & Dutton, D. G. (1997). Power and personality: An analysis of gay male intimate abuse. Sex Roles, 37, 335–359. doi: 10.1023/A:1025649306193 Letellier, P. (1994). Gay and bisexual male domestic violence victimization: Challenges to feminist theory and responses to violence. Violence and Victims, 9, 95–105. Levine, M. P. (1979). Employment discrimination against gay men. International Review of Modern Sociology, 9, 151–163. Levine, M. P., & Leonard, R. (1984). Discrimination against lesbians in the workforce. Signs, 9, 700– 710. Little, S. (2008). Challenging changing legal definitions of family in same-sex domestic violence. Hastings Women's Law Journal, 19, 259–279. Lockhart, L. L., White, B. W., Causby, V., & Isaac, A. (1994). Letting out the secret: Violence in lesbian relationships. Journal of Interpersonal Violence, 9, 469–492. doi: 10.1177/088626094009004003 Loiacano, D. (1993). Gay identity issues among Black Americans: Racism, homophobia, and the need for validation. In L. Garnets & D. Kimmel (Eds.), Psychological perspectives on lesbian and gay male experiences (pp. 364–375). New York, NY: Columbia University Press. Lundy, S. E. (1993). Abuse that dare not speak its name: Assisting victims of lesbian and gay domestic violence in Massachusetts. New England Law Review, 28, 273–311. Madriz, E. (2001). Focus groups in feminist research. In N. Denzin & Y. Lincoln (Eds.), Handbook of qualitative research (2nd ed., pp. 835–850). Thousand Oaks, CA: Sage. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 SAME-SEX IPV BARRIERS TO SERVICE 65 Marrujo, B., & Kreger, M. (1996). Definition of roles in abusive lesbian relationships. Journal of Gay and Lesbian Social Services, 4, 23−33. doi: 10.1300/J041v04n01_03 National Conference of State Legislatures. (2014). Same-Sex Marriage Laws. Retrieved from http://www.ncsl.org/research/humanservices/same-sex-marriage-laws.aspx McCart, M. R., Smith, D. W., & Sawyer, G. K. (2010). Help seeking among victims of crime: A review of the empirical literature. Journal of traumatic stress, 23(2), 198–206. doi: 10.1002/jts.20509 O’Neal, E. N., Beckman, L. O. (in press). Intersections of race, ethnicity, and gender: Reframing knowledge surrounding barriers to social services among Latina intimate partner violence victims. Violence Against Women. McClennen, J. C. (2005). Domestic violence between same-gender partners: Recent findings and future research. Journal of Interpersonal Violence, 20, 149–154. doi: 10.1177/0886260504268762 Overstreet, N. M., & Quinn, D. M. (2013). The intimate partner violence stigmatization model and barriers to help-seeking. Basic and Applied Social Psychology, 35, 109–122. doi: 10.1080/01973533.2012.746599 McClennen, J. C., Summers, A. B., & Vaughan, C. (2002). Gay men’s domestic violence. Journal of Gay and Lesbian Social Services, 14, 23–49. doi: 10.1300/J041v14n01_02 Menjivar, C. & Salicido, O. (2002). Immigrant women and domestic violence: Common experiences in different countries. Gender and Society, 16, 898–920. doi: 10.1177/089124302237894 Messinger, A. M. (2011). Invisible victims: Same-sex IPV in the national violence against women survey. Journal of Interpersonal Violence, 26(11), 2228–2243. doi: 10.1177/0886260510383023 Merrill, G. S., & Wolfe, V. A. (2000). Battered gay men: An exploration of abuse, help seeking and why they stay. Journal of Homosexuality, 39, 1– 30. doi: 10.1300/J082v39n02_01 Miller, J. (2008). Getting played: African American girls, urban inequality, and gendered violence. New York, NY: New York University Press. Meyer, D. (2008). Interpreting and experiencing antiqueer violence: Race, class, and gender differences among LGBT hate crime victims. Race, Gender & Class, 15, 262–282. Murray, C. E., Mobley, A. K., Buford, A. P., & Seaman-DeJohn, M. M. (2007). Same-sex intimate partner violence: Dynamics, social context, and counseling implications. The Journal of LGBT Issues in Counseling, 1, 7–30. doi: 10.1300/J462v01n04_03 National Gay and Lesbian Task Force. (2005). Domestic violence laws in the U.S. Retrieved from http://thetaskforce.org/reports_and_research/dom estic_violence_laws Pattavina, A., Hirschel, D., Buzawa, E., Faggiani, D., Bentley, H. (2007). A comparison of the policeresponse to heterosexual versus same-sex intimate partner violence. Violence Against Women, 13, 374–94. doi: 10.1177/1077801207299206 Phillips, S. W., & Sobol, J. J. (2010). Twenty years of mandatory arrest: Police decision making in the face of legal requirements. Criminal Justice Policy Review, 21, 98–118. doi: 10.1177/0887403408322962 Pizer, J. C., Sears, B., Mallory, C., & Hunter, N. D. (2011). Evidence of persistent and pervasive workplace discrimination against LGBT people: The need for federal legislation prohibiting discrimination and providing for equal employment benefits. Loyola of Los Angeles Law Review, 45, 715–779. Price, B. J., & Rosenbaum, A. (2009). Batterer intervention programs: A report from the field. Violence and victims, 24(6), 757–770. doi: 10.1891/0886-6708.24.6.757 Pollack, S. (2003). Focus group methodology in research with incarcerated women: Race, power, and collective experience. Affilia, 18, 461–472. doi: 10.1177/0886109903257550 Potoczniak, M. J., Mourot, J. E., Crosbie-Burnett, M., & Potoczniak, D. J. (2003). Legal and psychological perspectives on sex-same domestic violence: A multisystemic approach. Journal of Family Psychology, 17, 252–259. doi: 10.1037/0893-3200.17.2.252 Rayman, G. (2013, June 10). Brooklyn police beat gay man and use homophobic slurs, victim and friends say. The Village Voice. Retrieved from http://blogs.villagevoice.com/runninscared/2013/ 06/nypd_assault.php Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 66 PARRY & O’NEAL Renzetti, C. M. (1992). Violent betrayal: Partner abuse in lesbian relationships. Newbury Park, CA: Sage. Renzetti, C. M. (1996). The poverty of services for battered lesbians. Journal of Gay & Lesbian Social Services, 4, 61–68. doi: 10.1300/J041v04n01_07 Renzetti, C. M. (1998). Violence and abuse in lesbian relationships: Theoretical and empirical issues. In R. K. Bergen (Ed.), Issues in intimate violence (pp. 117–127). Thousand Oaks, CA: Sage. Renzetti, C. M., Edleson, J. L., & Bergen, R. K. (Eds.). (2001) Sourcebook on violence against women. Thousand Oaks, CA: Sage Publications. Ristock, J. L. (2003). Exploring dynamics of abusive lesbian relationships: Preliminary analysis of a multisite, qualitative study. American Journal of Community Psychology, 31, 329–341. doi: 10.1023/A:1023971006882 Rivera, J. (1994). Domestic violence against Latinas by Latino males: An analysis of race, national origin, and gender differentials. Boston College Third World Law Journal, 14, 231–257. Robinson, A. (2002). "There's a stranger in this house": African American lesbians and domestic violence. Women & Therapy, 25, 125–132. doi: 10.1300/J015v25n03_09 Seelau, S. M., & Seelau, E. P. (2005). Gender-role stereotypes and perceptions of heterosexual, gay and lesbian domestic violence. Journal of Family Violence, 20, 363–371. doi: 10.1007/s10896-005-7798-4 Sherman, L. (1992). Policing domestic violence: Experiments and dilemmas. New York, NY: Free Press. Simpson, S. S. (1989). Feminist theory, crime, and justice. Criminology, 27, 605–631. doi: 10.1111/j.1745-9125.1989.tb01048.x Simpson, E. K., & Helfrich, C. A. (2007). Lesbian survivors of intimate partner violence: Provider perspectives on barriers to accessing services. Journal of Gay & Lesbian Social Services, 18, 39–59. doi: 10.1300/J041v18n02_03 Smith, A. (2001). Domestic violence laws: The voices of battered women. Violence and Victims, 16, 91–110. Strasser, S. M., Smith, M., Pendrick-Denney, D., Boos-Beddington, S., Chen, K., & McCarty, F. (2012). Feasibility study of social media to reduce intimate partner violence among gay men in metro Atlanta, Georgia. Western Journal of Emergency Medicine, 13(3), 298–304. doi: 10.5811/westjem.2012.3.11783 Tellis, K. (2010). Rape as a part of domestic violence: A qualitative analysis of case narratives and official reports. El Paso, TX: LFB Scholarly Publishing, LLC. Tesch, B., Bekerian, D., English, P., & Harrington, E. (2010) Same-sex domestic violence: Why victims are more at risk. International Journal of Police Science and Management, 12, 526–535. doi: 10.1350/ijps.2010.12.4.204 Tewksbury, R. (2009). Qualitative versus quantitative methods: Understanding why qualitative methods are superior for criminology and criminal justice. Journal of Theoretical and Philosophical Criminology, 1, 38–58. doi: 10.5811/westjem.2012.3.11783 Tjaden, P., & Thoennes, N. (2009). Extent, nature, and consequences of intimate partner violence: Findings from the National Violence Against Women Survey, 2000. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/181867.pdf Turell, S. C. (2000). A descriptive analysis of samesex relationship violence in an ethnically diverse sample. Journal of Family Violence, 15, 281– 293. doi: 10.1023/A:1007505619577 Turell, S. C., & Herrmann, M. M. (2008). “Family” support for family violence: Exploring community support systems for lesbian women who have experiences abuse. Journal of Lesbian Studies, 12, 211–224. doi: 10.1080/10894160802161372 Tyler, T. R. (1989). The psychology of procedural justice: A test of the group-value model. Journal of Personality and Social Psychology, 57, 830. doi: 10.1037//0022-3514.57.5.830 Tyler, T. R., Degoey, P., & Smith, H. (1996). Understanding why the justice of group procedures matters: A test of the psychological dynamics of the group-value model. Journal of Personality and Social Psychology, 70, 913–930. doi: 10.1037//0022-3514.70.5.913 Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1 SAME-SEX IPV BARRIERS TO SERVICE 67 Valentine, S. E., Bankoff, S. M., & Pantalone, D. W. (2013). Finding meaning after partner abuse: A content analysis of experiences of men with HIV. Violence and Victims, 28, 161–177. doi: 10.1891/0886-6708.28.1.161 Yllo, K., & Bograd, M. (1988). Feminist perspectives on wife abuse. Thousand Oaks, CA: Sage Publications, Inc. Walker, L. (1979). The battered woman. New York, NY: Harper & Row. About the Authors Wise, A. J., & Bowman, S. L. (1997). Comparison of beginning counselors’ responses to lesbian vs. heterosexual partner abuse. Violence and Victims, 12, 127–135. Megan Marie Parry is a doctoral student and research assistant at Arizona State University in the School of Criminology and Criminal Justice. Her research interests include cultural criminology, police legitimacy, and police officer stress, as well as the systemic responses to and treatment of marginalized populations. Wolff, K. B., & Cokely, C. L. (2007) “To Protect and Serve?”: An exploration of police conduct in relation to the gay, lesbian, bisexual, and transgender community. Sexuality and Culture, 11, 1–23. doi: 10.1007/s12119-007-9000-z Wolf, M., Ly, U., Hobart, M., & Kernic, M. (2003). Barriers to seeking police help for intimate partner violence. Journal of Family Violence, 18, doi: 10.1023/A:1022893231951 Eryn Nicole O’Neal is a doctoral student and research assistant in the School of Criminology and Criminal Justice at Arizona State University. Her research interests include intimate partner sexual assault (IPSA), arrest and charging decisions in sexual assault and intimate partner violence cases, poststructural approaches in feminist theory, and qualitative methods. Endnotes 1 Because this review highlights the unique barriers that sexual minority IPV victims encounter when engaging in help-seeking, this section is aimed at providing recommendations regarding victim services. A discussion of batterers’ interventions is outside the scope of this paper; however, we acknowledge that the topic warrants future discussion. See Price and Rosenbaum (2009) for an assessment of American batterers’ intervention across 45 states. Criminology, Criminal Justice, Law & Society – Volume 16, Issue 1
© Copyright 2026 Paperzz