Upcoming Training: Situational Awareness For Women

May 31, 2013 in Updates

Ensuring your safety in public places, at work, and at home requires that you can quickly identify those around you who have violent intentions. Learn to read behavior and recognize threats the same way that we train the men and women of our nation’s military and police forces. Criminals and attackers will stand out from the crowd they hide amongst and are recognizable by the way their behavior reveals their intentions.

In this 6-hour seminar, women will learn to recognize and read behavioral cues to determine if anyone around them has violent intentions.  In addition to learning how to identify threats and read nonverbal communication, women learn how to take control of their safety during their daily lives.

On Saturday June 22nd, attend this course in Carmel, NY. Visit The CP Journal for more information and registration details.

Upcoming Training: Preventing The Active Shooter

May 31, 2013 in Updates

“I came to the (Preventing The Active Shooter) course expecting a speech about how to secure doors, add cameras and security gaurds and was looking to argue that doesn’t work. But I was presented with a course that actually provided a tool to prevent someone from committing an act of violence or a crime. It was a great class.”

– Team Commander, Special Operations Group, a NYS Sheriffs Department

On Wednesday June 26th, we are running a Preventing The Active Shooter seminar (a Tactical Analysis Level I class) at the Paladin Center in Carmel, NY, which is just a short drive north of New York City.  This one-day seminar teaches students how to analyze human behavior and recognize those who intend to harm others before they commit an attack.

 

Upcoming Webinar on School Safety

May 31, 2013 in Updates

On Thursday, June 13th at 1:30 pm (EST), Active Analysis Consulting CEO Patrick Van Horne host a webinar that discusses school safety and how behavioral analysis can empower schools to get beyond a perception of security and create truly secure learning environments.

This webinar will discuss the two types of threats that schools face: the insider and the outsider threats. Expanding on this framework, we will show how behavioral analysis can help school officials recognize those individuals who intend to harm others and provide the time needed to prevent attacks from occurring. While often times the discussion of behavior and violence is focused around mental health issues, this webinar discusses the nonverbal behavior of a person who has committed to a path of violence. This allows a school’s staff to confidently identify threatening individuals before they conduct their attack.

To register for the event, visit our Webinars page and fill out the sign up form in the player.

What’s With A Name?

May 29, 2013 in Background Information

Our site has moved.  Maybe you noticed, maybe you didn’t, but it was time to make the change.  When we first launched the site, we had a pretty narrow focus for the articles we were writing.  Our audience consisted of primarily the Marines who had already come through a Combat Hunter course and were looking for follow on resources to keep learning before they deployed.  With that audience, the name Combat Profiling made sense.  To a Marine who had already learned the basics of behavioral analysis, the words “Combat Profiling” were synonymous with getting left of bang and identifying an enemy who was hiding in plain clothes.

It didn’t take long though for us to realize that there were professionals from other fields spending time on the site.  Soldiers attending the Army’s ASAT training were finding us through search, police officers were getting referred to us by colleagues, corporate security officers were signing up for subscriptions to our Journal and numerous other people interested in learning about behavior were reading our articles.  As I transitioned out of the Marines and stepped into the business world and began talking with potential customers, I began to see that the words “Combat” and “Profiling” didn’t project the same image as it did to Marines.  The negative connotation of the words began to detract from the purpose of the site and limit the learning opportunities that we could provide our readers.

The goal for our site has always been very clear to us: provide the best available resources to our nation’s protectors so they have the ability to recognize a threat before the attack occurs.  That primary goal has always been the most important to us; increase a person’s survivability by providing the ability to separate the enemy from the crowd he hides amongst.  As we look to build partnerships with other experts in the field, companies, online training sites and writers, the need to rename the site became more and more apparent.

The big change is complete – moving the site to the new URL.  We are continuing to test and check the site for any errors, but if you notice anything wrong with any of our articles, images or videos, please contact us so we can fix it right away.  The rest of the cosmetic changes will be minor and hopefully won’t be noticeable to you, but feel free to get in touch with us if you have any questions.

With the new site address comes new opportunities to learn the benefit that behavioral analysis can provide.  For our Journal subscribers, you will see weekly development videos added to our Journal pages beginning this coming Monday (6/3).  These will offer the chance to practice your ability to observe and communicate what you are seeing in real world environments.  If you experience any problems logging in to your account, please let me know as soon as possible so we can get the issue fixed.

For more free resources, visit our new Webinars page to sign up for our free monthly webinars.  On Thursday June 13th, we will be hosting a webinar about school safety and active shooters. Register today.

Thank you for reading and if we can help in any way, please get in touch with us. Get Left Of Bang And Stay There.

Patrick Van Horne

From The Bottom Up – Profiling Like Sherlock Holmes

May 24, 2013 in Books and Resources

There are two ways that people become aware of a threat.  The first, which is referred to as top-down processing, is when a person intuitively realizes that there is something wrong and makes a decision without needing to observe the details and cues that caused them to make that realization.  The second method, the bottom-up approach, is certainly the more difficult of the two, as it requires that a person can recognize a series of subtle anomalies before making a decision.  To identify patterns of behavior through intense attention to detail, focus, and strong deductive reasoning, are inherently more challenging than when an anomaly presents itself right in front of us.  As the challenge becomes greater, so does the reward for making an accurate and correct prediction.  It is the reward for continuous study and learning the subtle  details of crimes or attacks that have occurred in the past. This is where we can recognize the patterns that the less aware would have missed.

That challenge is why I always enjoy reading Sir Arthur Conan Doyle’s stories about Sherlock Holmes when I need a break from reading anything scientific and am looking for something with a narrative.  Sherlock is the ultimate bottom-up processor as he sees the subtle cues in people, their clothing, their statements, and their behaviors, and then ties those indicators together to recognize patterns that no one else in the story can see.  He uses his deductive reasoning to identify Continue reading »

Stop Trying To Look At Everything – Using The Search Principle

May 21, 2013 in Applying The Observations

After James Holmes opened fire during the screening of Batman – The Dark Knight Rises last July, a lot of people (including me) were nervous about going to see the movie. This probably due to the fact that following an attack, there is always the risk of copycats or someone becoming inspired to take action similar to what occurred in Colorado, which causes us to become more alert when we are out in public.  As we go into a heightened state of awareness and begin attempting to consciously scan each and every person in our vicinity, we can quickly become overwhelmed by the amount of gestures, postures, expressions, walking styles, clothing choices, and every other observable facet that is available to us.  If there isn’t a mental framework that allows an observer to structure what they are seeing and quickly make sense of what they are looking at, increased situational awareness could lead to an observer becoming frustrated in the endeavor.  This leads to security professionals either giving up their search for criminal behavior or becoming too slow in the decision making cycle to be effective at preventing violent acts from happening.  But this doesn’t have to be the case.

Continue reading »

Being Faster Than Your Enemy

May 16, 2013 in Learning About Learning

In security, the goal is for the good guys to be faster than the bad guys in every way.  That is how we prevent violence and crime from happening, by making observations, making decisions and taking action faster than the criminal can.  This concept of operational speed is often summed up with the guidance to execute the OODA loop more quickly than the insurgents, terrorists and criminals we are hunting.  I’ve found that, while this advice to be faster has become fairly common, the understanding of how to actually speed up the OODA loop is not as well understood.

Being able to complete all four steps in the “Observe, Orient, Decide, and Act” cycle before the enemy can complete those same steps is easier said than done.  We want to reach the act stage before the criminal does so that we can have the upper hand and force our enemy to begin reacting to us. Every time we do this, we cause the criminal to reset his planning cycle and go back to step one.  While the action is the ultimate goal, it isn’t something that we can just jump to without first going through the entire process.

If we spend too long trying to become 100% certain that we have oriented on specific people, we can’t begin deciding which action to take.  If we don’t know what to look for or what makes someone a threat other than visually seeing a weapon, we will never proceed past step one.  To make decisions and take action more quickly, we have to become better at the orient step of the OODA loop.  Observation and orientation, in simple terms, allow for the ability to transition from looking at the crowd as a whole to being able to focus on a specific person or group of people.

Because speed is a relative term (how fast good guys can do this compared to bad guys) we have to reflect on the fact that the enemy has a much easier job at orienting on us because we constantly stand out from the crowd.  Marines, Soldiers and police officers are wearing a uniform, which makes it easy for the enemy to figure out exactly who and where we are.  Executive protection teams have to defend well-known public figures, making it easy to identify them. A criminal does not have to strain himself to identify the corporate security officers who not only has to wear a uniform but are also standing at the building entrance near what is a clearly marked security desk.  The enemy can orient on us with much less effort, providing him with opportunities to take the initiative and develop detailed plans of attack.

This issue of the CP Journal is focused on how to negate the enemy’s inherent advantage and how we can use behavior to execute this OODA loop process more quickly than the criminal can.  The four categories of observable behavior (looking at individuals, groups, the environment, and the collective) are situational and can’t all be observed all of the time.  Which domains are going to provide you with the highest quality of information is going to depend on what information you are trying to collect.  The articles inside this issue highlight these skills and observations in situations that you are likely to find yourself in.

As you read the articles in this issue, keep the OODA loop in mind and the perspective of steps that you can take to make decisions more quickly than our enemy can and maintain control of the fight.  As military, law enforcement, and security professionals, we often spend our time training and practicing the skills needed during the action phase of the OODA loop and gloss over the crucial observation skills that allow us to take action on our terms.

However, without informed observations and intelligent analysis, decisions can’t be made and action can’t be taken to defeat the criminal, insurgent and terrorist networks.  The difference between making observed arrests and waiting for dispatch to let you know where a crime occurred comes down to your ability to orient on specific people after recognizing the often subtle cues that attract your attention.  This ability is what will allow you to shift from scanning the crowd to analyzing a specific person.  For those looking to excel in their chosen profession, that is where speed comes from.

Thanks for reading and welcome to the CP Journal.

.Patrick Van Horne

@PatrickVanHorne

This Article Has Become Part Of An E-Book, You Can Download It Here

Observing On The Fly

May 16, 2013 in Applying The Observations

The Cues To Look For While On The Move

Making assessments about people while walking is a challenging exercise, as the amount of time that you have to make decisions is extremely limited.  As the distance between you and others decreases, the consequences of making incorrect assessments go up dramatically.  Think about a time when you were walking down the sidewalk or through the mall and because you are on the same level as everyone else, you aren’t able to observe many of the people around you.  Take a look at this video clip. How many people are you able to actually observe and assign to a cluster?  At what point are you able to actually assess each person?

Considering the fact that proximity negates skill, the limitations of being on the ground level make the need for informed judgments even more important. To overcome the challenges of being so close to so many potential threats, we need to understand which observations are the most important when observing on the fly, and which observations can be reserved for situations where you have time for more detailed analysis.

We don’t have time to do a detailed search while walking because by systematically scanning the area in overlapping layers, we would quickly become overwhelmed as people moved rapidly through our view.  Even attempting to analyze each and every person in a detailed way would ultimately cause us to miss most people.  Instead, we have to rely on a series of continuous hasty searches to ensure our safety.  A hasty search is conducted by doing quick scans of the area and look for a limited number of cues to determine if a person is an anomaly or not.  The number of potential observations is intentionally limited so that the number of people nearby doesn’t overwhelm us, facilitating quick decision-making.  This supports a yes/no decision based on this very restricted amount of information.  We do this because our baseline is constantly changing with every step and every corner that we turn.  The brain will naturally look for easily confirmed indicators that have proven to be effective in the past to overcome the complexity of this rapidly changing baseline. This can prevent the subtle indicators and the anomalies below the baseline from revealing themselves. While on the move or profiling at very close range, you are going to have to rely on the anomalies above the baseline, the extra indicators that are present, to alert you to a person requiring further attention.

While on the move and observing at close range, I begin by relying on indicators such as mission focus and dominance as two of the cues in my hasty observations.  These indicators allow me to focus on those moving with a purpose or those whose body is preparing the fight response.  Once I am done searching for those who have made their intentions clear, I begin looking for quick indicators of a person trying to conceal their violent intentions.  Factors such as situational awareness, extreme discomfort, and patting or touching of areas are the cues that I am continuously cycling through as I am looking to orient on anomalies as quickly as I can.

The reason these five observations (mission focus, dominance, discomfort, patting, and situational awareness) are the ones that we rely on is due to the fact that they are anomalies in most areas and for most people.  This is because recognizing these observations are a good enough reason for us to focus our attention on specific people while at close range. While there may be culturally specific situations where dominance and discomfort are common, these five behaviors reflect typical fight or flight responses, making them reliable regardless of where I am.  When there isn’t enough time to develop a thorough baseline, these five observations are reliable to bridge the gap until that norm can be established.

Watch the video above one more time, and determine how deep in the screen you were able to focus.  Often times, people are focused on those people closest to them.  While this is a dangerous range as your ability to respond would be limited, it is common when learning a new skill.  Think about where brand new drivers often focus their attention their first few times on the highway. More often than not, they are focused on the cars that are right in front of them and aren’t yet able to look far enough down the road to steer clear of bad drivers or objects in the road until it is too late.  However, with more time and more experience behind the wheel, drivers become comfortable assessing the intentions of other drivers that are both nearby and those further ahead.  This is no different when learning to consciously analyze the behavior of those around us. By continuously practicing these five reliable observations and making them a habit, your ability to quickly recognize them will improve, allowing you to shift your focus further back in the video, ultimately gaining the time needed to take proactive action.

This video is taken on the ground level (directly below the point) from where the video used in this issue’s Video Training section was shot from.  If you watch the baseline video, notice the difference in how far out you are able to observe when in an elevated position compared to when on the ground.  In a situation where there is a high quantity of traffic and people can only be observed for a few seconds at a time, whether you are on the ground or elevated, the observations are still limited to these five basic behaviors.  It is for this reason that Marines, Soldiers, Police Officers and security professionals should always employ the Guardian Angel concept, keeping a team of observers in an elevated position to observe further out than the patrol on the ground can.  When you have the comfort of time and space, each additional domain of behavior observed will provide additional insight. However, since more time will be spent on patrol or walking a city’s streets, begin by ensuring that these five reliable cues are ones that you can make in any situation to improve your ability to orient on anomalies despite the inherent difficulty.

This Article Has Become Part Of An E-Book, You Can Download It Here

One For Contact – One For Cover

May 16, 2013 in Applying The Observations

Observing and Orienting In Conversation

The basic principle of “contact and cover” has been a mainstay of law enforcement training for decades.  The idea of one officer initiating the contact with a person and another officer(s) providing the cover for the contact officer has served law enforcement well in regard to force protection.  Savvy officers however, those trained in the art and science of behavior analysis and threat recognition, know that the cover officer’s role goes far beyond a simple show of force.  A properly trained cover officer can be a tremendous asset in observing the cues that are often indicative of a threat.

The purpose of the contact and cover approach is simple in nature.  While one officer (the contact officer) is conducting questioning, a pat-down or search, evidence collection, such as a breathalyzer, or taking a suspect into custody, the cover officer is positioned to view the suspect and take appropriate action as necessary to aid and protect the contact officer.  A suspect is less likely to launch an offensive attack on an officer when outnumbered.  In the event that a suspect does go on the offensive, either in an attempt to escape or do harm to the contact officer, the immediate presence of another officer keeps the odds on the side of law enforcement.  This, however, is only one dimension of the cover officer role and responsibility.

Experienced officers acting in the cover role realize that aiding and protecting the contact officer is more than simply standing by in the event that a physical confrontation develops, then providing the necessary use of force to overcome the resistance.  While that role is certainly important and should not be understated, that is only a part of the cover officer’s duties.  The contact officer, while concerned with a number of tasks such as questioning the subject, recording information, handling radio traffic, and a host of other duties, is not always capable of making the shrewd observations necessary to determine the subject’s true intentions.  The cover officer, while being offset from the contact officer and not bridled with the same responsibilities, can more closely observe the subject for critical cues associated with threat.  The cover officer can observe and assess subtle behaviors of the subject that the contact officer many times simply cannot.  A good cover officer recognizes their role in threat recognition based on the profiling domains of Kinesics, Biometrics, Proxemics and Iconography.

Many law enforcement contacts involve mere questioning of persons with no preconceived intent on the part of officers to take the subject into custody.  During this process, however, a skilled, well-trained cover officer will often times observe those biometric cues triggered by the limbic system associated with “flight or fight.”  With the rush of hormones such as adrenaline (epinephrine) norepinephrine and cortisol, the body displays visible signs of stress and prepares itself for action.  This may include increased heart rate, respiration, sweating, shaking, pupil dilation and blushing or paling.

These Biometric Cues are important observations for the cover officer to make.  Something has triggered a fight or flight response in the subject that calls for further examination.  Perhaps it was a “hot button” question or questions posed to the subject.  A careful review and follow-up of the questions asked (and the subject’s response) would clearly be in order.  The subject may have answered untruthfully, heightening his consciousness of guilt.  It may also mean the subject is preparing to launch a physical attack against the officers, or perhaps the subject is preparing to flee.

By continuing to view the subject through the remaining lenses of Kinesics, Proxemics and Iconography simultaneously, a clearer picture begins to emerge as to the subject’s true intentions.  Is the subject displaying Kinesic cues associated with flight or fight?  Are the feet oriented toward the officer, or facing slightly away, as if prepared to flee?  Is the subject attempting to pacify himself through the rubbing of his hands, running his hands through his hair, rubbing his neck or forehead, or engaged in repetitive movements such as bouncing his leg(s) or tapping his feet?  Is the subject slowly closing the distance with the contact officer, knowing that proximity negates skill?  Or perhaps he is slowing moving beyond the prescribed “arms length plus a foot” distance, hoping to advance his lead should he decide to run.  Has the subject taken on a look of “mission focus,” or is the subject looking past the officer as he scans for a likely escape route?  Finally, are there any signs, symbols, emblems, icons, tattoos or other markings that may give an indication of the subject’s affiliation, social standing, political, or religious views that may be consistent with anti-government, anti-law enforcement and/or general criminal behavior?

An astute cover officer who is properly trained can make these observations and far more, and can make the correct assessment of the subject’s intentions.  This allows for proper action on the officers part before the contact turns physical or the subject flees.   The aforementioned cues sometimes manifest themselves in very overt ways, thus not requiring special training to notice.  However, many more times the cues are far more subtle and varied, and must be viewed in the proper context only after a baseline of behavior has been established.

While it is always reassuring to have a cover officer present who has the physical strength and skill to overcome resistance or give foot chase when necessary, in my own experience, I always wanted more in a cover officer.  I’ll take the street savvy officer, well-trained, with all the accouterments of patrol work, including solid profiling skills.  Give me the cover officer who can keep me left of bang.

This Article Has Become Part Of An E-Book, You Can Download It Here

The Transparency Of Familiarity

May 16, 2013 in Assessing The Collective, Assessing The Environment

Getting Oriented Post-Attack

Not every attack is going to be prevented.  While the ultimate goal of the Journal and our training is for every citizen to become a trained observer, and for everyday people to become aware enough of their surroundings to take preventative action, this will not happen overnight. As the number of people aware of those around them increases, the opportunity still exists for terrorists to conduct attacks.  However, when those attacks do occur, trained observers can use the same principles and behavioral cues that we use to get left of bang to quickly orient on those responsible for a crime after the fact.  Regardless of where we are on the attack timeline (left or right of bang,) using the domains of observable behavior will allow us to quickly identify who stands out.  April’s terrorist attack in Boston shows just how important the concept of assessing behavior post-attack is, as law enforcement officers need to be able to quickly regain the initiative after an attack and focus their investigative attention on those responsible.

Following the attack at the Boston Marathon, officers were able to isolate the bombers from the crowd they hid amongst so quickly by establishing the baseline behavior in the video footage and recognizing that the bombers were anomalies. According to a 60 Minutes report, in the chaos that ensued immediately following the two explosions, an FBI agent noticed that suspect number two’s behavior was in stark contrast to everyone around him.  As you might expect, the explosion surprised, shocked, scared, disoriented, and caused a sense of fear in the people around the explosion.  For the area and the crowd at the finish line, this immediately became the new baseline. The crowd was forced to scramble as each person had to go through the OODA loop cycle and figure out what happened, what areas to avoid, which direction to head, where their family and friends were, and how to get away. This new baseline is what caused suspect number two to stand out, as his behavior did not show any of that surprise, fear, panic or disorientation. He was simply going from one phase of the attack to another.  He was moving along a pre-determined egress route and, because he had known the explosions were coming, he didn’t have the same emotional response as the rest of the crowd.

What makes this observation so impressive is that the FBI agent recognized an anomaly below the baseline – something that should have been there but wasn’t.  Identifying the absence of fear (or any emotion or behavior) is typically a harder observation to make than it is to identify an anomaly above the baseline.  It is easier to confidently recognize behavior that is above the baseline, because the additional presence of something, such as excessive dominance or excessive discomfort, is tangible and quantifiable.  On the other hand, recognizing when something should be there but isn’t, has the potential to cause observers to doubt themselves, question their judgment, and second-guess their assessments.

In the instance of the Boston attack, the post-attack observations and baseline are grounded in what we refer to as the collective assessment of the crowd – the Atmospherics of the area.  Atmospherics reveal how people perceive their own safety.  Following a terrorist attack, the lack of security would convey a negative Atmosphere.  The collective mood following an attack is likely to be fairly standard from situation to situation, as unknowing bystanders in Afghanistan would likely react similarly to an IED detonation as the people at the Boston marathon did to the explosions near the finish line. The intensity of the reaction might vary, as the likelihood and previous exposure to explosions is higher in Afghanistan that it is in Boston, but the sense of fear and the immediate emotional response would be common.

Keeping It In Context

The observation that the bombers did not react the way we would expect innocent bystanders to after an explosion needs to be considered within the context of the situation.  To do this, we need to consider the bomber’s behavior preceding the attack.  The eyewitness testimony and photos of the two bombers indicate that the bombers were likely very calm as they approached their target and dropped their bombs.  There are two potential causes for this level of comfort.  The first is that these two are true psychopaths and were incapable of recognizing that what they doing was wrong. The other potential (and more probable) option is that these two planned and rehearsed the attack so well that nothing caused them to become uncomfortable during the attack.  If they were confident enough in their plan, that the bombs were sufficiently concealed and that there wouldn’t be any police checkpoints to disrupt their plans, they in fact could have been completely comfortable without any external stressors. While this apparent comfort comes from familiarity with their surroundings and their plan, it also caused suspect number two to be identified because he was unaffected by the explosion, causing him to stand out from the baseline.

Other Potential Scenarios

The way that we are identifying the two terrorists in the case of the Boston attack will not be the way that all terrorists will behave as no two attacks are exactly the same.   Because of this, we should consider other observations that could be made right of bang in order to facilitate the speed at which you can orient on the criminals responsible after an attack. One scenario might include terrorists who did not plan out the attack as thoroughly as the terrorists did in Boston.  If they failed to establish and rehearse their escape route, you might expect them to give off the same uncomfortable cues as the other bystanders because they are now at risk of getting caught.  In this situation though, due to the perceived threat of getting captured, they may continuously “check their six” to see if they were being followed.  These terrorists would be in contrast to the innocent civilians who would likely keep their attention to the direct front as they look to get to safety.  If this were the case, though, I would expect that attacker to stand out from the baseline before the attack and to display uncomfortable cues as they would recognize the limitations of their current plan.

Another potential scenario might include a bomber who is unsure of what affect the bomb detonation will have on people.  Whereas the expected reaction would be for people to focus their attention away from the blast so they could escape, an inexperienced bomber might continue to keep his interest focused on the blast and the first responders.  These cues from the Interested vs. Uninterested cluster would help focus first responder attention on the anomaly for this reason.  These are considerations that military and law enforcement officers could discuss to train their responders on what to look for.

Regaining The Initiative

By identifying the anomaly below the baseline and finding the person who was missing the elements of surprise, fear and panic, the FBI was able to release the terrorists’ photos to the public and regain the upper hand by forcing the criminals into a reactive mode.  Whether your battlefield is on the streets of any city here in America or in a combat zone overseas, analyzing the baseline behavior for the crowd following an attack can allow you to orient on the criminal very quickly and take back the initiative.  While the environments that our military deploy to are not likely to produce the same amount of video coverage used in Boston, squads and platoons can be trained to search for anomalous behavior during their response and immediate action drills.  As the first priority is to establish security on the scene of IED strike, training to the Marines and Soldiers to assess the comfort and interest of the bystanders can help to rapidly identify any potential follow on threats.

For investigators here in America, the Boston attack was perhaps the first time that crime scene footage was crowd-sourced so extensively. With the abundance of social media and quick and easy transferring of information and media, it certainly won’t be the last.  As this will likely become more commonplace, becoming efficient at classifying the behavior of those in the footage will allow for a timely response during attacks.  How quickly we can orient on the criminal following an attack could very well be the difference between success or failure in catching him, the difference between that person escaping or getting caught, the difference between a single attack or multiple follow-on attacks, and the difference between few or many people hurt of killed.

This Article Has Become Part Of An E-Book, You Can Download It Here

Burnout

May 16, 2013 in Learning About Learning

The Impact Of Disillusionment

“ Once he thought he had concluded that it would be better to get killed directly and end his troubles. Regarding death thus out of the corner of his eye, he conceived it to be nothing but rest. His mind was undergoing a subtle change. It took moments for it to cast off its battleful ways and resume its accustomed course of thought. Gradually his brain emerged from the clogged clouds, and at last he was enabled to more closely comprehend himself and circumstance”

– Red Badge of Courage, Stephen Crane

Stephen Crane, in his novel, the Red Badge of Courage, shows Henry Fleming, the protagonist, suffering the effects of stress and burnout. Henry finds himself reflecting on whether it would be better to be dead than carry on for another day. Henry has surrendered his identity to the war and decides that death is preferable to the daily turmoil he faces. This situation may sound eerily familiar to those serving in the armed forces or public protection. Several have faced this dilemma. Their days are fraught with intense pressure and personal risk. This leaves them drained at the end of the day and often leaves them debating whether they can continue.  Those individuals employed in security, law enforcement, or military positions, observe the most perverse and evil parts of the human psyche. They are constantly bombarded by images of cruelty, conflict, and death. Yet during this despondency and conflict they are supposed to remain unperturbed and make sure they do not “Dishonor the Uniform.” The sheer energy it takes to stay calm and in control in the face of such behavior is a major drain on their psychological and physical resources. The need for effective mental conditioning training in the military and in public safety has never been greater than at this time.

Many enter the security professions because they are enticed by the prospect of protecting and helping others. During their initial training a symbiotic identity emerges between their personal and professional life. These individuals accept the hazards of the profession because of the personal rewards it affords them. The work becomes interesting, personally rewarding and professionally satisfying. However, over time, the luster fades and the individual undergoes a metamorphosis. This metamorphosis results in burnout.  Burnout is a psychological term that refers to the long-term exhaustion and diminished interest in work. Often the first sign one will notice is that they have great difficulty in calming down once they are home. Activities that once provided enjoyment are now replaced with passive activities such as watching TV or listening to music. When questioned about the job, a simple, “It was fine,” becomes the answer, instead of a detailed summary of the day. This person is demonstrating a biologically encapsulated coping mechanism to protect them from their daily environment.

Offered a glimpse into the most inhumane levels of humanity, military and public safety employees keep a vigilant eye on personal fallout. This self-monitoring is done to protect family and friends from their professional life. Rules and Standard Operating Procedures along with strong peer support regulate conduct during the working hours. All day long one must suppress their statements and discipline their actions. Once home, when they come through the door, this pressure is dumped on those around them. Fearful that families will suffer the emotional fallout that they themselves are experiencing, they choose to withdraw from their once safe environment.

Coworkers and individuals must become attuned to certain behaviors that indicate an increased level of stress leading to burnout. The signs of burnout, according to the American Psychological Association, include:  sleep disruption, excuse making, agitation or argumentative behavior, and increasingly hazardous behavior.[1]  Maintaining effective and honest communication with your coworker is paramount. Even if you know the person is tactically proficient, their presence of mind has placed them in a “clog of clouds,” as Stephen Crane states in the Red Badge of Courage. In a security situation, this could result in death or dismemberment for either you or them.

The factors that contribute to burnout are numerous. There are the power struggles that go on behind the scenes at work such as conflict with peers and supervisors. Disillusionment with the organization swamps the good intentions that once dedicated employees brought to the organization.  Another factor is the feeling of impotence. Once they wished to save the world, now they just want get through the day. Work has become routine and predictable with little stimulation and no visible impact on the criminal situation. Another factor leading to burnout is the required administrative tasks. Report writing, training and planning are viewed as interruptions to doing one’s “real work.” These administrative duties, often completed after working hours, prohibit the individual from having a life outside of the work environment.

The impact of burnout is not only detrimental to the individual, but also to those around them. Burnout strikes at the professional identity of the military or public safety personnel, which results in loss of innocence and compassion. The individual suffering from burnout may have an identity crisis as they try to reconcile their current state with past performance. They may see themselves as not up to the demands of the job and impotent. The impact of viewing oneself as impotent could result in hazardous behaviors. First the individual takes short cuts, because in their mind, they have seen this situation before and know how it will end. This results in them not being mentally prepared to address an unforeseen situation. An example of this would be a corrections officer stabbed serving an inmate a meal. On the other end of the spectrum, the individual may become reckless and unnecessarily take risk. An example of this could be not calling for back up or support because you want to push the envelope for the thrill.

The employing agency will also be impacted by burnout. As the individual’s behavior deteriorates, they become a civil or criminal liability to the parent organization. The battle for hearts and minds is one fight military or public safety agencies can lose in a minute and take years to regain that credibility.

Burnout Treatment

There are many ways to counteract the angst of burnout and manage the transformations that are part of the burnout faced by military and public safety personnel.  Lt. Colonel Grossman, in On Killing espoused the need to address and recognize when a person is denying their emotions.[2]  If you are frustrated, angry or depressed, admit it to yourself and those around you. This does not make you weak. This self-disclosure provides a needed catharsis.  Another way to control for burnout is to get some sleep. Psychologist F.C. Bartlett found that there is no general condition which is more likely to produce nervous or mental disorders than a state of prolonged fatigue. The need for military and public safety employees to constantly remain in a state of arousal of “fight or flight” drains them of needed energy reserves. These reserves can only be replenished with adequate rest and proper nutrition. Exercise is another proven method to elevate burnout. When selecting an exercise, select one that is not career-related. For example, there is a direct transference of skills between engaging in mixed martial arts or weight lifting to your professional career. However these activities do not allow your mind to escape your work environment. Instead try Yoga, bike riding, or rowing, as this will allow your mind to take a break from the rigors of the day. When confronting burnout look for a small victory each day. This victory is whatever objective you set for yourself that day.


[1] Bailey, D.S. (2006). Burnout harms workers’ physical health through many pathways. 37(6), 11. Retrieved from http://www.apa.org/monitor/jun06/burnout.aspx

[2] Grossman, D. (1996). On Killing. New York: Little, Brown and Company.

This Article Has Become Part Of An E-Book, You Can Download It Here

Were the Boston Bombers Acting As Terrorists or Active Shooters?

May 13, 2013 in Veterans, Business, and Security

Is the distinction between a terrorist act and an active shooter scenario an irrelevant distinction?  I asked this question to a group of graduate students at John Jay College last week during a presentation that I was giving about violence prevention in the public sector.  All but one student raised their hands to say that the Boston bombers were terrorists, while none raised their hands indicating that they thought they were active shooters. One student raised his hand saying that it didn’t matter.  My guess is that many people would respond in a similar fashion. Would your answer be different though if the Boston bombers chose to use a different weapon in their attack instead of using IEDs?

Personally, I’m with Continue reading »

Improving The Search – Pulling From Iconography

May 1, 2013 in Assessing The Environment

Often when Marines or Soldiers are taught how to search a house while deployed, the focus is on finding weapons or contraband that ties them to the insurgency. It’s the sure-fire way to providing a clear link to the fighting and ensuring that the subsequent arrest doesn’t get thrown out for a lack of evidence.  As criminals, both at home and overseas, make this search more challenging; our military needs to continue learning how to pull good information and intelligence from each encounter.  A search though is naturally confrontational where the searching party has assumed a dominant role. This dominance makes it difficult to establish rapport and makes collecting that intelligence a challenge.

Iconography can help you find the information needed to find common ground with the suspects and get them to begin talking.  Iconography reveals what a person’s beliefs and affiliations are.  For the person tasked with questioning the suspects while the house is searched, a quick look to find the pictures, images, symbols, art, graffiti, flags, colors, and other indicators that reveal the suspect’s beliefs and affiliations can make it easier to find common ground and get the person talking Continue reading »

Reducing The Risk of Transition And Capitalizing On Opportunities

April 26, 2013 in Veterans, Business, and Security

As members of the military, law enforcement officers and security providers decide to leave their industry, there are always going to be questions about how their experience relates to success in the business world.  This translation of experiences isn’t always clear to a human resources manager who is comparing your resume to that of someone with years of business specific skills.  Because leaving a career in the military or law enforcement for the private sector isn’t like going from a sales job in one company to a similar position in another, the job search can appear to be riskier than it really is.

A few weeks ago I was reading an article written by Reid Hoffman, one of the founders of LinkedIn, about assessing risk when it comes it comes to your career. Continue reading »

Threats Inside The Wire E-Book Now Available

April 24, 2013 in Veterans, Business, and Security

Last December, I wrote a series of posts that discussed the Green-on-Blue threat that our servicemen and women face while overseas. I wrote those posts after losing a friend in an insider attack and wanted to provide methods to identify the Afghans seeking to attack their American partners. Those articles quickly became our most read series.

After deciding to consolidate the articles into a single e-book, we took the time to not only do some much needed editing, but also to expand upon on the topics and provide additional examples of how these concepts can be used to reduce the risk posed by insider attacks.  The goal of this to book is to prevent violence from occurring through early recognition.

I once heard former Chairman of the Joint Chiefs, Marine General Peter Pace say that if you don’t like your environment, you can either change it or learn to operate better within it.  The Green-on-Blue threat that our nation’s military faces requires that we do a little of both.  While we can’t completely eliminate the threat our military faces when they are outside the wire, learning to work within the constraints inherent when collaborating across cultures can help us reduce the threats inside the wire.  This e-book is designed to tell you how you can set the conditions needed to reduce the risk of these attacks and the observations you can make to take charge of your own safety.

These concepts are not limited solely to military life overseas either. Our nation’s law enforcement officers, corporate security directors, and those responsible for protecting our neighborhoods, schools, office buildings, and malls can apply the concepts and principles discussed in this book to improve the quality of safety they provide. Understanding what type of behavior causes people to stand out from the crowd, how to observe and communicate those cues, understanding what might cause a person to respond that way and techniques to bring that behavior to the forefront are applicable across the security industry.

To download a copy of the “Threats Inside The Wire – Preventing Green On Blue Attacks” e-book, visit the CP Journal Library