Email: Training@cp-journal.com

Call: (646) 470-7885

April 17, 2017

Three Situations That Should Cause Protection Specialists to Transition to the Deliberate Search

Threat recognition is a game of speed. For executive protection specialists, delays or hesitations in decision-making upon recognizing a threat can be the difference between success and failure while working on protection detail. Because there are some behavioral observations that need to be made immediately upon entering an area and some assessments that can wait until an initial level of safety has been established before being turned to, it is important for a protector (especially one just entering the field) to know which assessment needs to be made and in what order. Improving the method for establishing a baseline in operational settings has been one of our greatest focuses over the last few years. The recent release of our flow charts for how to conduct a hasty search and a deliberate search represents the most current techniques that we use to ensure both speed and accuracy in establishing baselines and searching for anomalies, but what the diagrams don’t show is when a person should begin the deliberate search.

The primary reason why we divide the establishment of a baseline into two phases (hasty and deliberate) is because a full and complete baseline (the result of the deliberate search) is not always needed. There might be situations where you aren’t in the area long enough to even complete both searches. There might be times when you are walking or driving and to try and complete both searches would completely overwhelm you mentally. There might be times when your brain has to be focused on things besides your safety, so you might not be able to dedicate all of your cognitive resources to establishing baselines and looking for anomalies with 100% of your attention. The division between the hasty search and deliberate search exists so that you know the minimum you should be doing (the hasty search) and you know how to conduct the deliberate search when that level of depth in the baseline is needed. But that distinction also creates the question of when a protection specialist should make the transition from the hasty search and begin to conduct the deliberate search.

This question became apparent to me during a recent conversation with Chris Pendas. Chris is a security professional, the owner of the Staying Safe – Self Defense website and a graduate of our Tactical Analysis program. Chris recently recorded a video of himself conducting a hasty search while walking from his apartment building to the subway station, a task that many people can relate to as they commute to work each day. To set the stage for our discussion about transitioning from the hasty search into the deliberate search, start by watching the video he made and think about the steps that go into each search.

..

As you watched the video, you may have noticed that he begins to make some assessments about the environment as he identifies habitual areas and anchor points (a deliberate search task), even though he is intentionally trying to limit himself to the hasty search. During our conversation, Chris asked about the times when he should make the transition into the deliberate search. Because answering questions in a way that implies you will “know it when you see it,” or that it is “situationally dependent” is a lazy form of instruction, I provided Chris with three situations when we advise our students and clients to make the transition from the hasty search and begin the deliberate search to heighten their level of situational awareness. Since Chris’ video is of him walking, each of these situations is focused on

March 29, 2017

Making the Deli Experience Deliberate

At The CP Journal we teach the process of determining the baseline for any given area and situation to improve people’s situational awareness. The process involves two primary steps for any area that you operate in – the hasty search and the deliberate search. Last month, in various blog posts, we outlined the hasty search and used some scenarios that occur in daily life to explain how to best to practice it and make it your own.   As a reminder, the hasty search is the first step that anyone can take to set his or her baseline for the area. It involves assessing the collective mood as positive or negative and then confirming that assessment by observing the individual people in the area. This month we are continuing to expand on the baselining process by highlighting the deliberate search. The purpose of this post is to describe the deliberate search process using an environment that many people are accustomed to, the grocery store deli counter.

Before we begin, it is worth noting that the deliberate search is more detailed than the hasty search. The goal of the deliberate search is to identify the underlying patterns that present themselves in any given situation that you find yourself in, which makes it easier to identify anomalies. Because pattern recognition takes patience, the deliberate search requires time and practice.   Once you build your deliberate search skills, they can be repeated over and over again everywhere you go.

The grocery store or supermarket is familiar territory for most people. They are familiar with how the store operates and understand the layout of the deli area in relation to the rest of the store. The process at the deli counter is pretty cut and dry. People approach the area to order meats, cheeses, cold cuts, and salads. People form a queue and wait for attention from someone behind the counter to take their order. Customers then add those items to their carts and continue shopping in other areas of the store. The deli area within the grocery store is usually uniform and offers a repeatable setting that exists in most areas of the country, which makes it a great place to practice the deliberate search because you can consistently see the same interaction over and over again.

The steps to the deliberate search that I will outline here are as follows:

March 22, 2017

Just Tell Me What To Do: The Instructor’s Dilemma

 

“What would you do in this situation?

This seemingly simple question coming from a student is one of the most challenging and difficult questions for an instructor to answer. Especially when considering the consequences of failing to recognize a threat left of bang, it is understandable why someone would want to know what cues and what behaviors would reveal a potential threat for every single scenario they might face. There is, of course, the drive to answer the question in the best way possible too. It’s the people who truly want to learn how to protect themselves, protect their family or be better at their job that ask this question. They are looking for a way to get the process started. But for any instructor who has ever been asked what they would do in a particular situation, you are probably well aware of the challenge it poses because it often forces the instructor to choose from two equally unattractive options when deciding how to respond.

Option #1: The Decisive Answer

The first option for the instructor when asked, “What would you do?” is to simply answer the question and explain what you would do in the specific situation being discussed. Your first response to this option might be, “How is answering the question a bad thing?” On its own, providing clear and decisive answers that students can take with them from the classroom to the job is a great thing and, whenever possible, should be the standard.

The problem, however, with answering the question and stating what you would do, and in turn telling someone what they should do, is that it

March 17, 2017

The Deliberate Search: A Visual Guide

Once an observer has completed their Hasty Search of the area, they are able to turn their attention to completing an in-depth look at the processes, patterns and behaviors that make up the baseline for the area they are in.  That comprehensive baseline is the result of the Deliberate Search.

The Deliberate Search Flowchart was initially created at the request of one of our online students who was looking for some clarification on the steps and, we’ve refined our initial design using feedback from students and advisors as well as through use in the field during our one-on-one practical application sessions with students.

While the process outlined in the flowchart was designed to be a standalone guide, these concepts can be best implemented by also completing our training programs here at The CP Journal to develop a deeper understanding of each piece of the process.

You can download the Deliberate Search Flowchart in our library by clicking here.


 

March 3, 2017

Choosing Your Conversational Style

 

Since getting to present at the 2015 WINx Conference, I’ve really come to appreciate the amount of time and effort that Roy Bethge and Brian Willis put into creating this excellent event each year in Lisle, Illinois. With the goal of helping police officers continually elevate their performance and achieve excellence in their field, the 18-minute long videos on the WINx site are certainly worth the time and attention of law enforcement professionals looking to be inspired. While the 2017 conference is just over a month away, I was recently re-watching the talk above by Chelly Seibert that she gave at the 2016 conference.

In this talk, Seibert highlights the need for police officers to adopt different conversational styles while responding to calls depending on the type of situation they find themselves in. Referring to the different conversational styles as characters to be played, she showed how officers might find themselves portraying one of three characters in any given situation. They might take on the behaviors of “The Enforcer,” “The Compassionate Consoler” or “The Composed Stabilizer” in order to get to a successful outcome in the encounter. By taking the time to consider and develop the ability to display the type of body language, tone of voice, facial expression and other non-verbal and verbal styles of communication to fit your character’s behavior and the situation, you can begin to take control over the way that other people see you.

Before I talk about how these three main characters listed above tie in with our approach to situational awareness, threat recognition and behavior-based conversations, here is how

February 14, 2017

The Hasty Search: A Visual Guide

In our video Stop Looking For Threats that we posted last week, I outlined the process that goes into the way we conduct a hasty search. I wanted to share this information in an alternative format to visually show the sequence of observations that go into this process.

The Hasty Search Flowchart was initially created at the request of one of our online students who was looking for some clarification on the steps and, in the last few weeks, we’ve refined our initial design using feedback from students and advisors as well as through use in the field during our one-on-one practical application sessions with students.

While the process outlined in the flowchart was designed to be a standalone guide, these concepts can be best implemented by also completing our training programs here at The CP Journal to develop a deeper understanding of each piece of the process.

You can download the Hasty Search Flowchart in our company library by clicking here.


 

February 8, 2017

Everyone Can Search Hastily

While chatting with my mother-in-law recently, we got to talking about The CP Journal and the work that we do.  She is a great supporter of us and is always interested in what we are working on. In our conversation, she said that our content is very interesting but she sometimes has trouble taking our writing and using it herself because she is a civilian and doesn’t work in security or law enforcement.  Because we spend a significant amount of time training professionals that are already well versed in the basics of observation and threat recognition, we tend to gloss over how everyday people can put these same skills to work for themselves.  Based on themes we’ve noticed in student questions through our online training platform, we are spending the month of February digging into a particular step in our observational process called the “hasty search”.  The purpose of this post will be to frame what the hasty search is for civilians and put some simple steps into your hands to be able to conduct a hasty search everywhere you go.

The hasty search does not have to be complicated.  In plain English, the hasty search is the first thing people do when they walk into any environment. Everyone already does it, they just might not realize it. Everyday civilians probably spend about one to two seconds subconsciously conducting their own hasty search when they step foot into a new environment. The first step is to ask yourself when you walk in to a place, in terms of your personal safety and security, are you

February 2, 2017

3 Reasons Why Assessing Individuals Is Taught First, But Observed Last

The first observable behaviors that we teach in our Tactical Analysis program are those needed to make assessments about individual people. Yet when you observe an area, establish a baseline, and hunt for anomalies, individual people get observed last. Why we have structured our class this way is a question that we often get from our students. If alert observers should start the observation process by looking at the fourth pillar of behavior (how we assess the collective mood), why don’t we teach the observable behaviors in the order they are going to be observed and used when we operate? There are three reasons why we made the decision to teach the class with the last observations taught first.

1. Assessing individuals is the most important pillar of behavior.

Even though a parent shouldn’t show preference to one of their children over the others, the reality is, not all of the pillars that we teach are equal. While each of the pillars (you can view them all here) provides value in its own unique way, it is the learning of the first pillar, how we assess individual people, that should be nurtured and developed more than its three siblings. It is this first pillar that you want to spend more time with because it will provide

January 30, 2017

Stop Looking For “Threats”

When it comes to being able to recognize violent people or criminals, saying that you are looking for “threats” isn’t a good enough definition.  Being able to explain, very specifically, what will make someone stand out from the baseline and being able to recognize those behaviors is the mark of a true professional and someone on the path to mastery.

..

Additions to the video:

  • Download the cluster cards mentioned in the video to see a list of the indicators that make up each assessment.  You can find them here.
  • Take a look at the book Mastery, by Robert Greene in Amazon by clicking here.
  • One note: One question that we often receive is why are we looking for only high intensity cues during the hasty search when it comes to recognizing the anomaly.  The answer to this question that areas will often have people displaying dominance, submissiveness, discomfort, and comfort in order to accomplish their goal and fulfill their need for being in the area.  As the goal of the hasty search is to simply identify if there is anyone who poses a risk before going into a more detailed search, we begin the process by searching for high intensity displays, and will focus on more subtle displays during the deliberate search.

Transcript Of Video:

December 12, 2016

See What? And Say It How?

While traveling in New York City recently I noticed signs for the “See Something, Say Something” campaign around town.  For those who haven’t yet seen a sign or poster in their neighborhood, the slogan is intended to remind people that, when they see something that is out of the ordinary or suspicious, they should say something to someone of authority to raise awareness of the potential issue.  The program was originally implemented by the New York City Metropolitan Transportation Authority in 2001 and is now licensed to the U.S. Department of Homeland Security (DHS) as a nationwide campaign.  You can get more info on the campaign and ways to help drive the message here.

This campaign is a crucial step for getting the public involved in the process of stopping potentially dangerous events from occurring.  It also raises awareness and reminds people of their role in keeping themselves and those around them safe. While the concept itself is broad enough in scope to serve as a great reminder, the purpose of this post will be to expand on details of the program that also align with the work that we do here at The CP Journal. Together, this campaign and the work that we do, both serve as helpful tools to help build community involvement in threat recognition and this post will expand on a prior writing that outlined the three pieces to the threat prevention puzzle.

Many of the types of suspicious activity outlined in training programs and literature for the “See Something, Say Something” campaign revolve around physical actions, like stealing information, data acquisition, and weapon discovery.  These are all obviously important suspicious activities to report that have been gathered based on the study of prior threatening events, but the truth is that they don’t tend to

November 21, 2016

Building a Culture of Trust

Wells Fargo has been in the news recently regarding their internal cross-selling culture and the opening of accounts without their customer’s knowledge. Wells Fargo is not the only business that has a culture built around cross selling products, and they will probably not be the last to be found to violate customer trust in some way. These recent news articles have caused us to reflect on the role ethics and trust play in building and managing a business and we thought we would share a recent article that was shared with us.

In alignment with the recent news of trust at Wells Fargo, we were also recently sent a link from September 26, 2014, where Ignazio Angeloni, a member of the Supervisory Board of the European Central Bank, spoke on ethics in finance.

In the above link, Angeloni poses a series of questions that financial institutions can ask themselves when building their internal procedures and policies for helping customers. We found these questions to be helpful for us at The CP Journal and thought they might also be

November 14, 2016

Working Together to Prevent Threats

Events involving people occur at every moment of every day. In just one day alone you may say hello to a neighbor, meet a friend for coffee, make small talk with the teller at the grocery store, or sit in a movie theater with people that you don’t know. Throughout all of these interactions, it is highly unlikely that any will result in a threatening event or violence of any kind. With that in mind, however, Chapman University recently released their 2016 study of American Fears, which reveals that the threat of violence is something that the public pretty actively fears.

One fear that is prevalent for the American public that stood out to us at The CP Journal is the public’s fear of terrorism and their role in thwarting it. Based on the report, 38.5% of the American public is either afraid or very afraid of being a victim of a terrorist attack.[1] While the fear of terrorism currently sits at the top of the mind for many people, it is important to note that most interactions between people do not result in terrorism or violence of any kind. By working together to observe, actively and accurately, we can improve our ability to prevent violence between people, including terrorist acts. Using a recent event from the news as a framework, I will outline the three primary parties involved in threat prevention and how we can better work together, as an engaged public, to observe and report suspicious activity.

To serve as context for this post, we will share some recent articles that reported a recent situation that took place in Canada. The situation involved a person operating outside of what was normal for the area, a local resident calling the authorities, and law enforcement responding. In this example there was