Behavioural Detection
How it can help prevent violence against women A
re there elements of the Behavioural Detection approach that can keep our people and places safer?
Shortly before departing the Metropolitan Police Service in May 2022, and while leading the force’s Behavioural Detection (BD) programme (Protective Security Operations), I
began to explore the relevance of the key strands of BD and suspect mapping, in relation to the predatory activity of the suspect/threat in relation to all female threat.
The principle remains very straightforward: potential suspects not only place themselves in the hostile reconnaissance zoning (best seat in the house), but also then exhibit the strong behavioural indicators.
For this to have relevance though, we must believe in two key points. We understand how to protect our buildings for those that use and work in them, however, we often only lightly consider the easy opportunity for the ‘threat’ to watch, identify and target potential female victims as they depart the sites we protect. In addition, all criminal threat (especially the predator threat) has to watch and then place themselves into easy identifiable locations to carry out their targeted hostile reconnaissance against the potential victim – in order to be successful in their attempt.
Putting the theory to test
Theory is one thing, reality is a true area of expertise and test. If we look at the mindset of all criminals, the majority’s desire is to be successful and therefore not get caught or be identified. Therefore, we should have a confidence that the ‘sexual threat’ (and all threat), operates like a professional, and clearly thinks about how and what it wants to achieve.
This is uncomfortable for many, as it merely promotes the threat as an opposition, rather than a highly reprehensible set of individuals. If we don’t place ourselves into at least the planning mindset of the threat, then we fail to provide the best form of proactive protection and considerations for the people we care for and about. Whether we are considering a sexually motivated attack, theft or harassment of women, the mindset (and understanding) of the hostile individual is key.
© CITY SECURITY MAGAZINE – SPRING 2023 How does this look in the security space?
Women that work within secure buildings and/or use the associated social infrastructure of our sites (restaurants, bars and other venues), immediately become an identifiable target from source. An organised and determined offender will place themselves in a position on site (seated/standing/parked) where they can best identify potential victims as they depart our sites AND then make a decision about that person’s vulnerability and whether they provide a relatively risk-free opportunity.
It means that we see suspicious persons follow off individually, numerous ‘targets’ and if that person then proves themselves to be situationally aware and not quite as vulnerable as first thought, then the suspect will return to the original site (and specific location) and begin the process of victim identification again, Why? Because they don’t want to be caught – so choosing the right victim is key.
We see examples of this in relation to our office space, socialising space and general area. The whole process of identification of threat within the ‘watching’ phase is incredibly straightforward, as the individuals will naturally be showing significant amounts of the behavioural indicators (due to fear of capture/paranoia/stress of the ‘task’).
We readily understand the nuanced mapping of our sites in relation to terrorist threat, but I suspect we have placed less emphasis on the relevance of mapping in regard to all threat – specifically, violence towards women. From a hostile replication skill set, I understand the concept of ‘Life Styling’ through much of my governmental and private sector work, that to identify, target and follow another person is both stressful and pressure inducing – and that if the pattern of my activity (as the replicated threat) on the ground was truly observed, I would be identifiable very quickly.
Violence against women takes many forms, including threatening behaviour, sexual threat and theft targeting; however, we can really re- balance this advantage (which currently exists in the favour of the threat) and genuinely
www.citysecuritymagazine.com
balance the scales in the favour of the women we should look to protect. From a security perspective, if we look in the right places, dismiss no one (heuristics and biases) and apply nuanced usage of the BD skill – indicators and conversation skills – then we truly target harden our sites for everyone’s benefit.
How does this look in the reality?
Our security managers would have a full understanding of the mapped threat that exists within their sites and this would then be understood by the security teams on the ground, as they observe, patrol and actively engage. In addition, they would have the relevant BD skills to apply a targeted approach to the suspicious persons – regardless of the appearance of the threat. In addition, we can significantly empower women with the same imparted knowledge around threat type, behaviour, own awareness and key self- responses. This two-fold targeting of the threat would make considerable leaps in progress to keep our sites and our people safe.
If we look closely at the right public seating areas, the right cafes, the right places to just stand and watch, then the threat can’t hide in plain sight.
Criminals are professionals, they wish to avoid identification and they wish to be successful. In my opinion, we still struggle to accept this. We see their activity as the outcome – the crime/offence. We never think of the build-up and their planning. Until we do, we fail to offer the protection that our friends, family and colleagues deserve. Criminals are an opposition – they should be targeted in such a way.
Simon Riley
CIS Behavioural Detection Specialist Trainer Governmental Behavioural Detection Avoidance, Detection and Threat Replication SME
www.cis-security.co.uk
>
22
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36