SlideShare une entreprise Scribd logo
1  sur  98
Télécharger pour lire hors ligne
A Research & Analysis Services Company
Risk
The elements where a person has a certain level of control,
such as social contacts, and how these elements may expose
him/her to unforeseen dangers.

Threat
The broader elements that affect a person and are beyond
his/her control; traveling, business position, politics, the
weather, etc.


                 Copyright (c) 2011. SOA. All Rights Reserved.   4
Categories of Risks/Threats

 Against a Person’s Safety / Security
 Against a Person’s immediate Family
 Against a Person’s psychological well-being
 Against a Person’s Privacy




               Copyright (c) 2011. SOA. All Rights Reserved.   5
 Wealth
 Social Status
 Celebrity / Public Exposure
 Political Views
 Symbolic Status
 Personal / Business Travel




                  Copyright (c) 2011. SOA. All Rights Reserved.   6
Types of Threats

   Verbal Assault
   Physical Assault
   Use of Blunt Objects
   Edged Weapons
   Firearms
   Explosives
   Kidnapping
   Severe Weather
   Natural Disasters


                 Copyright (c) 2011. SOA. All Rights Reserved.   7
Types of Potential Attackers

   The Deranged Individual
   Former Intimate Stalker
   Unknown Stalker
   Disgruntled Employees / Co-Workers
   Personal Vendetta / Revenge
   Criminals
   Professional Assassins / Contract Killers
   Terrorists




                  Copyright (c) 2011. SOA. All Rights Reserved.   8
Types of Health Risks

   Heart Problems
   Allergic Reactions
   Diabetes
   Previous Injuries
   Communicable Diseases
   Previous Surgeries




               Copyright (c) 2011. SOA. All Rights Reserved.   9
Types of Personal Risks/Threats

 Sexual Encounters
 Association with known criminals
 Excessive Drinking
 Drug Use
 Financial Problems




              Copyright (c) 2011. SOA. All Rights Reserved.   10
Daily Transit Activity
When you are in transit, from Point A to Point B, you
automatically have less control over the environment
     and are open to many Risks and Threats.



 You must learn to keep a Mental Snapshot of your
        Surroundings throughout your day.


            Copyright (c) 2011. SOA. All Rights Reserved.   12
Exercise

Draw a map from Point A to Point B identified by the
                 course Instructor.



What Risks or Threats can you identify along the route
                    that you took?


             Copyright (c) 2011. SOA. All Rights Reserved.   13
Situational Awareness
 Being Aware of your environment and of any Potential
 or Real Risks or Threats that might be present is the
 first and most important key of Personal Safety and
 Security.

 You should apply the Concepts while at Home, Work,
 School, In Transit, etc.



              Copyright (c) 2011. SOA. All Rights Reserved.   15
Situational Awareness
   Being Aware of your Surroundings will help you
    Avoid hostile actions and violent confrontations.

   Do you have a Safety and Security Plan to address
    any Potential or Real Risks or Threats you might
    face?




              Copyright (c) 2011. SOA. All Rights Reserved.   16
Situational Awareness

    It is always better to EVADE any hostile and
      dangerous situation by any means possible.

There is nothing wrong with running from a Risk or
                  Threat if possible.




             Copyright (c) 2011. SOA. All Rights Reserved.   17
4 Levels of Personal Safety
                              UNAWARE

 A State of Mind in which you are not Alert to your
 immediate surroundings.

 This would include while you sleep, watch TV, cook a
 meal, being at home, etc.




               Copyright (c) 2011. SOA. All Rights Reserved.   18
4 Levels of Personal Safety
                                   Aware

 The State of Mind in which you are Aware of your
  environment.

 At this level, you have not yet identified any Potential
  or Real Risk or Threat that may be present.




               Copyright (c) 2011. SOA. All Rights Reserved.   19
4 Levels of Personal Safety
                              Aware

Awareness involves the use of your Five Senses:

                               Sight
                              Sound
                              Smell
                              Touch
                               Taste
          Copyright (c) 2011. SOA. All Rights Reserved.   20
4 Levels of Personal Safety
During conditions where a Potential or Real Risk or
Threat is Present, you should avoid using items that will
impair your Vision and Sound.

Example: Avoid using headphones while jogging or
walking, especially at Night and Alone.



               Copyright (c) 2011. SOA. All Rights Reserved.   21
4 Levels of Personal Safety
                                    Alert

 In this State of Mind, you have identified a Potential or
  Real Risk or Threat within your environment.

 Your spider sense is going nuts…




               Copyright (c) 2011. SOA. All Rights Reserved.   22
4 Levels of Personal Safety
                                Alert

                       General Rule

Any person not known to you or your family can
  constitute a Potential or Real Risk or Threat.




           Copyright (c) 2011. SOA. All Rights Reserved.   23
4 Levels of Personal Safety
                                   Alarm

 In this State of Mind, the Potential Risk or Threat has
 now become a Real and your Personal Safety and
 Security has been compromised.

   A high level of FEAR and ANXIETY takes over.


               Copyright (c) 2011. SOA. All Rights Reserved.   24
Alarm




                         Alert




                        Aware




                      Unaware




Copyright (c) 2011. SOA. All Rights Reserved.   25
The Defensive Mindset

The values, mental techniques, and attitude that
maximizes the effectiveness of how you respond to a
                  Risk or Threat.




           Copyright (c) 2011. SOA. All Rights Reserved.   26
Defensive Mindset Concepts
                     Ability to Defend

  Do you have the ability and willingness to defend
        yourself and not become a VICTIM?

Be wary of self-defense instructors that claim they can
  train to defend yourself…their systems are untested
                 and are more for sport.

             Copyright (c) 2011. SOA. All Rights Reserved.   27
Defensive Mindset Concepts
                    Ability to Defend

The State of Texas’ new Self-Defense Castle Doctrine
         Statute effective September 1, 2007.




            Copyright (c) 2011. SOA. All Rights Reserved.   28
Defensive Mindset Concepts
                       Never Give Up

A person becomes a VICTIM because he / she gives up
         and is overpowered by the Offender.

 You must be determined to persevere by all means
            necessary and never give up.


            Copyright (c) 2011. SOA. All Rights Reserved.   29
Defensive Mindset Concepts
                     Develop A Plan

 Planning is an important component of Personal
                     Survival.

 Are you laying the foundation to be Victimized?



           Copyright (c) 2011. SOA. All Rights Reserved.   30
Defensive Mindset Concepts
                      Develop A Plan

A Plan is a Pre-Determined Course of Action used to
 respond to specific situations you might encounter.

A Threat Assessment and Risk Analysis complement
       your Personal Safety and Security Plan.



            Copyright (c) 2011. SOA. All Rights Reserved.   31
Defensive Mindset Concepts
2 Steps To Take After Identifying A Potential Or Real
                     Risk or Threat:

1.    Formulate a Hypothetical Plan of Action to deal
      with the Risk or Threat.

2.    Establish Barriers that will initiate your Plan of
      Action. An Aggressive Gesture, entering your
      Personal Space, etc.

                 Copyright (c) 2011. SOA. All Rights Reserved.   32
Defensive Mindset Concepts
            Situational Visualization

This is the formation of a mental image for handling
                 different Situations.

It is also a major component of Developing A Plan.



            Copyright (c) 2011. SOA. All Rights Reserved.   33
Defensive Mindset Concepts
                    Remember




Panic = Victimization

      Copyright (c) 2011. SOA. All Rights Reserved.   34
Fear

 Fear is good…it is your body telling you that you are in
 some type of Danger.

 If Fear becomes paralyzing, it can’t help you fight
 harder or run faster.




               Copyright (c) 2011. SOA. All Rights Reserved.   36
Fear

 Fear = Release of Adrenaline into the bloodstream.



  Adrenaline dictates the Fight or Flight Concept.




            Copyright (c) 2011. SOA. All Rights Reserved.   37
4 Types of Reactions to Fear
1. Tachypsychia


The perception from people under stress that describes
             time moving in slow motion.




             Copyright (c) 2011. SOA. All Rights Reserved.   38
4 Types of Reactions to Fear
1. Tachypsychia

The brain is processing very quickly to allow for a faster
                   defensive response.

This is a positive side effect that can enhance defensive
                           abilities.


              Copyright (c) 2011. SOA. All Rights Reserved.   39
4 Types of Reactions to Fear
2. Auditory Exclusion

 The brain’s ability to block sound while focused on a
                          Threat.




             Copyright (c) 2011. SOA. All Rights Reserved.   40
4 Types of Reactions to Fear
2. Auditory Exclusion

 The brain blocks auditory input to allow you to focus
               completely on the Threat.

     This has both a positive and negative effects.



              Copyright (c) 2011. SOA. All Rights Reserved.   41
4 Types of Reactions to Fear
2. Auditory Exclusion

 You get an increased ability to focus (positive) while it
      also keeps you from noticing or hearing other
   potential risks or threats coming at you (negative).




               Copyright (c) 2011. SOA. All Rights Reserved.   42
4 Types of Reactions to Fear
3. Tunnel Vision

This is the narrowing of your field of vision as you focus
              on a particular Risk or Threat.




              Copyright (c) 2011. SOA. All Rights Reserved.   43
4 Types of Reactions to Fear
3. Tunnel Vision

 You loose peripheral vision, which prevents you from
     identifying other Risks or Threats that may be
        approaching you from your left or right.




             Copyright (c) 2011. SOA. All Rights Reserved.   44
4 Types of Reactions to Fear
3. Tunnel Vision

To avoid Tunnel Vision, SCAN the immediate area Left
       and Right after engaging a Risk or Threat.




             Copyright (c) 2011. SOA. All Rights Reserved.   45
4 Types of Reactions to Fear
4. Cognitive Dissonance

 This is a Disassociation with the actual events as they
                          occur.




              Copyright (c) 2011. SOA. All Rights Reserved.   46
4 Types of Reactions to Fear
4. Cognitive Dissonance

A Disassociated Mind is the most dangerous reaction to
   Fear because it is rejecting the idea that something
                  terrible is happening.




              Copyright (c) 2011. SOA. All Rights Reserved.   47
4 Types of Reactions to Fear
4. Cognitive Dissonance

When this happens, the Victim is negating the ability to
            effectively fight back or retreat.




              Copyright (c) 2011. SOA. All Rights Reserved.   48
The “6 P’s Principle”

Proper
   Prior
       Planning
           Prevents
                Poor
                   Performance
        Copyright (c) 2011. SOA. All Rights Reserved.   50
Victimization / Targeting
Victimization / Targeting
        3 Elements of a Potential Criminal Act

1. Desire

The criminal (s) must have a desire and / or motivation to
justify the actions or receive some type of tangible /
intangible benefit from the criminal act.




                Copyright (c) 2011. SOA. All Rights Reserved.   52
Victimization / Targeting
       3 Elements of a Potential Criminal Act

2. Ability

The criminal (s) need to recognize his ability, physical
skills, knowledge, available assets, etc. to commit the
criminal act.



               Copyright (c) 2011. SOA. All Rights Reserved.   53
Victimization / Targeting
       3 Elements of a Potential Criminal Act

3. Opportunity

The criminal (s) selects his target based on vulnerability
and accessibility.




               Copyright (c) 2011. SOA. All Rights Reserved.   54
3 Elements of a Potential Criminal Act
                                      Desire




   Ability                                                   Opportunity




             Copyright (c) 2011. SOA. All Rights Reserved.                 55
Victimization / Targeting
         3 Elements of a Potential Victim

1. Suitability

Are you a Suitable Target?

Would coming after you further the criminal’s Goals,
Desires, or Motivations?

What do you possess that the criminal wants?
                 Copyright (c) 2011. SOA. All Rights Reserved.   56
Victimization / Targeting
          3 Elements of a Potential Victim

2. Vulnerability

What type of security measures do you have in place to
protect yourself and your family?




              Copyright (c) 2011. SOA. All Rights Reserved.   57
Victimization / Targeting
           3 Elements of a Potential Victim

2. Vulnerability
 Personal Behaviors
 Physical Security (Alarms, Lights, Fences)
 Information Security (Denying Access)
 Computer Security (Passwords, Locks)



               Copyright (c) 2011. SOA. All Rights Reserved.   58
Victimization / Targeting
          3 Elements of a Potential Victim

2. Vulnerability

       Some Vulnerabilities can be very obvious
       and can be detected without much effort.




              Copyright (c) 2011. SOA. All Rights Reserved.   59
Victimization / Targeting
          3 Elements of a Potential Victim

2. Vulnerability

   A measure of your Attractiveness to a criminal or
                       terrorist.

            What are your Vulnerabilities?



              Copyright (c) 2011. SOA. All Rights Reserved.   60
Victimization / Targeting
             3 Elements of a Potential Victim

3. Probability of Success

What is the probability that if the criminal comes after you,
he will be successful?

Keep in mind that by the time the criminal comes after you,
he has already studied you and determined the Risks and
Threats to himself.

                Copyright (c) 2011. SOA. All Rights Reserved.   61
3 Elements of a Potential Victim
                                 Suitability




       Vulnerability                                      Success




          Copyright (c) 2011. SOA. All Rights Reserved.             62
Victimization / Targeting

  Victim Selection + Victim Behavior =


     VICTIMIZATION


      Copyright (c) 2011. SOA. All Rights Reserved.   63
Observation Skills
 The eyes provide the visual information, which is sent
  to the brain for processing, and causes a person to
  respond to a particular situation.

 Since you were a child, you have been trained using
  your eyes.

 You need to further develop this skill.


                Copyright (c) 2011. SOA. All Rights Reserved.   65
Observation Skills
 Your eyes are trained to SCAN an area within your
  sight from LEFT to RIGHT.

 This is the skill you use to read a book.

 You are also trained to SCAN an area within your
  sight from LEFT to RIGHT to LEFT.

 This is the skill you use when driving a vehicle.

              Copyright (c) 2011. SOA. All Rights Reserved.   66
Observation Skills

  By SCANNING Left / Right / Left, the
 retention of what you observe increases,
and gives you a better picture of what you
                have seen.




       Copyright (c) 2011. SOA. All Rights Reserved.   67
Observation Skills
SCANNING and GLANCING at something or someone
 that has caught your attention are a more relaxing and
             effective ways of observation.

  Do not stare because this action tires your eyes and
    causes your vision to become unclear and fuzzy.




              Copyright (c) 2011. SOA. All Rights Reserved.   68
Observation Skills

One day, you might get the feeling or intuition that you
         are being followed by another vehicle.

This is your mind warning you of a Potential or Real Risk
                       or Threat.




              Copyright (c) 2011. SOA. All Rights Reserved.   69
Observation Skills
                Surveillance Indicators

 Multiple sightings of same suspicious individuals , a
 vehicle, or other activity separated by:


      Date  Time  Location

               Copyright (c) 2011. SOA. All Rights Reserved.   70
Observation Skills
               Surveillance Indicators


TEDD
Time
Environment
Distance
Deportment

              Copyright (c) 2011. SOA. All Rights Reserved.   71
Observation Skills
                   What To Look For:

 A vehicle that slows down when you slow down,
  but keeps its distance.
 A vehicle that does not pass you; this goes beyond
  driving behavior.
 A vehicle that turns a corner when you do.
 A vehicle that stops at a distance when you stop at
  your destination.
              Copyright (c) 2011. SOA. All Rights Reserved.   72
Observation Skills
                        How To Respond:

 Pull your vehicle over and try to get a license plate.


 Keep driving but do not go directly to your destination;
  go somewhere else.

 Request police assistance.

                Copyright (c) 2011. SOA. All Rights Reserved.   73
Auditory Skills
The most important rule for maximizing your Hearing
                     accuracy is:


         Breathing Control



            Copyright (c) 2011. SOA. All Rights Reserved.   74
Auditory Skills
   During a dangerous situation, the pace of your
  Breathing increases, and so does your Heart Rate.

Take deep, slow breaths to control your heart rate and
             increase your Auditory Skills.




             Copyright (c) 2011. SOA. All Rights Reserved.   75
Smelling Skills
You are programmed to React to scents that are pleasing
                    or unpleasant.



A particular odor will trigger your sensory memories that
            will correspond to your past events.




              Copyright (c) 2011. SOA. All Rights Reserved.   76
Smelling Skills
To improve your sense of smell, practice these steps:

                      Close your eyes

                  Take a deep breath

 Let your mind instead of your eyes determine
                   the scent

             Copyright (c) 2011. SOA. All Rights Reserved.   77
Basic Criminal Warning Signs
 A person intent on committing a Crime will put on a
  “FALSE FACE”.

 The criminal’s intent is to deceive the Target (Victim).


 Everything that the criminal says and does will most
  likely be LIES.




               Copyright (c) 2011. SOA. All Rights Reserved.   79
Basic Criminal Warning Signs

The criminal will be extremely Charming and Friendly.

     Alert: These behaviors are Warning Signs.




             Copyright (c) 2011. SOA. All Rights Reserved.   80
The Victimization Process
1. Pre-Victimization

  At this point, the criminal will be searching for his
                           Victim.

 This victim selection process is called “TROLLING”.



              Copyright (c) 2011. SOA. All Rights Reserved.   82
The Victimization Process
1. Pre-Victimization

      The criminal will Troll for his Targets at:

                         Malls
                 Colleges / Universities
                      Nightclubs
                     Grocery Stores

             Copyright (c) 2011. SOA. All Rights Reserved.   83
The Victimization Process
2. Initial Contact

Once the criminal selects a Target, he will do all he can
                    to initiate contact.

 At this point, the selected Target is unaware about the
                  Initial Contact’s intentions.


              Copyright (c) 2011. SOA. All Rights Reserved.   84
The Victimization Process
2. Initial Contact

The criminal will attempt to make contact with his target
                      in some manner.

      The criminal will get close enough to begin a
              conversation with the Target.


               Copyright (c) 2011. SOA. All Rights Reserved.   85
The Victimization Process
2. Initial Contact

   The Initial Contact is to lower the selected Victim’s
                          defenses.

The conversation will be prepped in order to take control
                     of the situation.


               Copyright (c) 2011. SOA. All Rights Reserved.   86
The Victimization Process
2. Initial Contact

 The Initial Contact can be made days or weeks before
              the Target becomes a Victim.

   The Initial Contact is part of the victim selection
                         process.


              Copyright (c) 2011. SOA. All Rights Reserved.   87
The Victimization Process
2. Initial Contact

 The Initial Contact is to commit the Target into some
           type of obligation and to gain trust.

The criminal might do a favor or task in which the Target
                becomes in Debt to him.


              Copyright (c) 2011. SOA. All Rights Reserved.   88
The Victimization Process
2. Initial Contact

  The favor might be one that is ongoing and one that
  makes the Target accompany the criminal into a more
             private and secluded location.




             Copyright (c) 2011. SOA. All Rights Reserved.   89
The Victimization Process
3. Follow-Up Contact

 The criminal sets-up the situation in which the Target
        runs into him to do a follow-up contact.

By this point, the criminal has already studied his Target
         and has decided to Victimized the Target.



               Copyright (c) 2011. SOA. All Rights Reserved.   90
The Victimization Process
4. Target Isolation

       The objective now is to Isolate the Target.

If the criminal has previously gained the trust, it will be
       easier to Isolate the Target from other people.



               Copyright (c) 2011. SOA. All Rights Reserved.   91
The Victimization Process
4. Target Isolation

 The Target must be prepared to refuse to be alone
                 with the criminal.

   Ask yourself…Why should I go alone with this
                     person?

                        Be Inquisitive.

             Copyright (c) 2011. SOA. All Rights Reserved.   92
The Victimization Process

5. Target Victimization


 Once the Target is completely Isolated,
        the criminal will attack.


           Copyright (c) 2011. SOA. All Rights Reserved.   93
The Victimization Process

6. Post-Victimization


Once the criminal completes the attack,
 he has to decide whether to release or
            kill the Victim.

          Copyright (c) 2011. SOA. All Rights Reserved.   94
The Victimization Process
6. Post-Victimization


  More likely, the Victim will be killed.

 The criminal will then attempt to cover
   up the crime by destroying evidence
   and disposing of the Victim’s body.
           Copyright (c) 2011. SOA. All Rights Reserved.   95
The Victimization Process
6. Post-Victimization

 The criminal will then depart the crime scene without
                       being seen.

 Keep in mind that the seasoned, career criminal has
  more experience and Situational Awareness that a
                beginner and Victims.



              Copyright (c) 2011. SOA. All Rights Reserved.   96
The Victimization Process

                         Alert

The criminal will make his move
when it is most convenient to him
and the Target is most Vulnerable.

       Copyright (c) 2011. SOA. All Rights Reserved.   97
Sergio Olivares, MPA
   President & General Manager
          (361) 694 - 2385
research_and_analysis@yahoo.com

Contenu connexe

Tendances

Mind Your Head Booklet 2010
Mind Your Head Booklet 2010Mind Your Head Booklet 2010
Mind Your Head Booklet 2010
SERCSU
 
Safety education -swimming pool
Safety education -swimming poolSafety education -swimming pool
Safety education -swimming pool
Saba Alias
 
Promoting positive-mental-health-ppt
Promoting positive-mental-health-pptPromoting positive-mental-health-ppt
Promoting positive-mental-health-ppt
Ramanand Kalathingal
 

Tendances (20)

Mental Health Awareness Training Courses
Mental Health Awareness Training Courses Mental Health Awareness Training Courses
Mental Health Awareness Training Courses
 
Mental Health 101
Mental Health 101Mental Health 101
Mental Health 101
 
Home safety awareness
Home safety awarenessHome safety awareness
Home safety awareness
 
Personal safety
Personal safetyPersonal safety
Personal safety
 
NEBOSH Unit IG1
NEBOSH Unit IG1NEBOSH Unit IG1
NEBOSH Unit IG1
 
Industrial hygiene
Industrial hygieneIndustrial hygiene
Industrial hygiene
 
Mind Your Head Booklet 2010
Mind Your Head Booklet 2010Mind Your Head Booklet 2010
Mind Your Head Booklet 2010
 
Safety Culture
Safety CultureSafety Culture
Safety Culture
 
Mental health and stress
Mental health and stressMental health and stress
Mental health and stress
 
IG1 Element 1.pptx
IG1 Element 1.pptxIG1 Element 1.pptx
IG1 Element 1.pptx
 
Exit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire Protection
Exit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire ProtectionExit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire Protection
Exit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire Protection
 
Safety education -swimming pool
Safety education -swimming poolSafety education -swimming pool
Safety education -swimming pool
 
Materials Handling, Storage, Use, and Disposal by OSHA
Materials Handling, Storage, Use, and Disposal by OSHAMaterials Handling, Storage, Use, and Disposal by OSHA
Materials Handling, Storage, Use, and Disposal by OSHA
 
Promoting positive-mental-health-ppt
Promoting positive-mental-health-pptPromoting positive-mental-health-ppt
Promoting positive-mental-health-ppt
 
Tbt confined spaces
Tbt confined spacesTbt confined spaces
Tbt confined spaces
 
CHEMICAL SAFETY
CHEMICAL SAFETYCHEMICAL SAFETY
CHEMICAL SAFETY
 
Amn safety induction j 175 - staff rev 4 - s 14
Amn safety induction  j 175 - staff rev 4 - s 14Amn safety induction  j 175 - staff rev 4 - s 14
Amn safety induction j 175 - staff rev 4 - s 14
 
Chemical Safety Training.pptx
Chemical Safety Training.pptxChemical Safety Training.pptx
Chemical Safety Training.pptx
 
Process hazard analysis 13,47
Process hazard analysis 13,47Process hazard analysis 13,47
Process hazard analysis 13,47
 
chemical safety
chemical safetychemical safety
chemical safety
 

En vedette

Personal safety at university
Personal safety at universityPersonal safety at university
Personal safety at university
jodiecmills
 
Memory & Brain Power
Memory & Brain PowerMemory & Brain Power
Memory & Brain Power
Joseph Chacko
 
Eom ppt
Eom pptEom ppt
Eom ppt
Lhacha
 

En vedette (20)

Empowering Oneself With Personal Safety Education 2009
Empowering Oneself With Personal Safety Education 2009Empowering Oneself With Personal Safety Education 2009
Empowering Oneself With Personal Safety Education 2009
 
Search
SearchSearch
Search
 
Personal safety or security of women
Personal safety or security of womenPersonal safety or security of women
Personal safety or security of women
 
RUG and UMCG and world-class papers: how successful are we? | Folkert Kuipers...
RUG and UMCG and world-class papers: how successful are we? | Folkert Kuipers...RUG and UMCG and world-class papers: how successful are we? | Folkert Kuipers...
RUG and UMCG and world-class papers: how successful are we? | Folkert Kuipers...
 
Sergeant Stefan Fish's Personal Safety Presentation
Sergeant Stefan Fish's Personal Safety PresentationSergeant Stefan Fish's Personal Safety Presentation
Sergeant Stefan Fish's Personal Safety Presentation
 
Personal Safety & Awareness
Personal Safety & AwarenessPersonal Safety & Awareness
Personal Safety & Awareness
 
Chapter10 microfarid
Chapter10 microfaridChapter10 microfarid
Chapter10 microfarid
 
Personal safety at university
Personal safety at universityPersonal safety at university
Personal safety at university
 
Nova my personalsafetyprogram
Nova my personalsafetyprogramNova my personalsafetyprogram
Nova my personalsafetyprogram
 
Violence Prevention and Personal Safety for Lone Workers and Remote Employees
Violence Prevention and Personal Safety for Lone Workers and Remote EmployeesViolence Prevention and Personal Safety for Lone Workers and Remote Employees
Violence Prevention and Personal Safety for Lone Workers and Remote Employees
 
Memory & Brain Power
Memory & Brain PowerMemory & Brain Power
Memory & Brain Power
 
Airworthiness: Maintenance Error Dirty Dozen
Airworthiness: Maintenance Error Dirty DozenAirworthiness: Maintenance Error Dirty Dozen
Airworthiness: Maintenance Error Dirty Dozen
 
communication errors
communication errorscommunication errors
communication errors
 
Eom ppt
Eom pptEom ppt
Eom ppt
 
Don Personal Safety For Women Power Point.5
Don   Personal Safety For Women Power Point.5Don   Personal Safety For Women Power Point.5
Don Personal Safety For Women Power Point.5
 
Anatomy of extraocular muscles and ocular motility
Anatomy of extraocular muscles and ocular motilityAnatomy of extraocular muscles and ocular motility
Anatomy of extraocular muscles and ocular motility
 
Aircraft maintenance program
Aircraft maintenance programAircraft maintenance program
Aircraft maintenance program
 
Occular motility
Occular motilityOccular motility
Occular motility
 
Eye movements - Anatomy, Physiology, Clinical Applications
Eye movements - Anatomy, Physiology, Clinical ApplicationsEye movements - Anatomy, Physiology, Clinical Applications
Eye movements - Anatomy, Physiology, Clinical Applications
 
Aircraft maintenance programme
Aircraft maintenance programmeAircraft maintenance programme
Aircraft maintenance programme
 

Similaire à Basic Personal Safety Concepts

Olivares Personal Assessment Survival System (OPASS)
Olivares Personal Assessment Survival System (OPASS)Olivares Personal Assessment Survival System (OPASS)
Olivares Personal Assessment Survival System (OPASS)
Sergio Olivares & Associates
 
Olivares Personal Assessment Survival System Updated 11012011
Olivares  Personal  Assessment  Survival  System  Updated 11012011Olivares  Personal  Assessment  Survival  System  Updated 11012011
Olivares Personal Assessment Survival System Updated 11012011
Sergio Olivares & Associates
 
Risk In Our Society
Risk In Our SocietyRisk In Our Society
Risk In Our Society
daryl10
 
Security revolutionized fosdem_20120205
Security revolutionized fosdem_20120205Security revolutionized fosdem_20120205
Security revolutionized fosdem_20120205
David Fetter
 
District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]
Benjamin Drader
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
Adrian Wright
 
E moderation carrot-rehearsing-managing-social-media-crisis-july-2013
E moderation carrot-rehearsing-managing-social-media-crisis-july-2013E moderation carrot-rehearsing-managing-social-media-crisis-july-2013
E moderation carrot-rehearsing-managing-social-media-crisis-july-2013
Emoderation
 
Workplace Violence: Responding to the Challenges (Free Webinar)
Workplace Violence: Responding to the Challenges (Free Webinar) Workplace Violence: Responding to the Challenges (Free Webinar)
Workplace Violence: Responding to the Challenges (Free Webinar)
Cooperative of American Physicians, Inc.
 

Similaire à Basic Personal Safety Concepts (20)

Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool StuffMeasurement, Qualitative vs Quantitative Methods, and other Cool Stuff
Measurement, Qualitative vs Quantitative Methods, and other Cool Stuff
 
Olivares Personal Assessment Survival System (OPASS)
Olivares Personal Assessment Survival System (OPASS)Olivares Personal Assessment Survival System (OPASS)
Olivares Personal Assessment Survival System (OPASS)
 
Olivares Personal Assessment Survival System Updated 11012011
Olivares  Personal  Assessment  Survival  System  Updated 11012011Olivares  Personal  Assessment  Survival  System  Updated 11012011
Olivares Personal Assessment Survival System Updated 11012011
 
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool StuffMeasurement, Quantitative vs. Qualitative and Other Cool Stuff
Measurement, Quantitative vs. Qualitative and Other Cool Stuff
 
Risk In Our Society
Risk In Our SocietyRisk In Our Society
Risk In Our Society
 
5.4 Your Own Safety.pptx
5.4 Your Own Safety.pptx5.4 Your Own Safety.pptx
5.4 Your Own Safety.pptx
 
Security revolutionized fosdem_20120205
Security revolutionized fosdem_20120205Security revolutionized fosdem_20120205
Security revolutionized fosdem_20120205
 
District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]District Combatives Personal Protection Fundamentals [FINAL]
District Combatives Personal Protection Fundamentals [FINAL]
 
Conflict march 16
Conflict   march 16Conflict   march 16
Conflict march 16
 
Rcs webinar 1 2011_06_23
Rcs webinar 1 2011_06_23Rcs webinar 1 2011_06_23
Rcs webinar 1 2011_06_23
 
Secret Self Defense Tips for Women
Secret Self Defense Tips for WomenSecret Self Defense Tips for Women
Secret Self Defense Tips for Women
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
Polpeo rehearsing-and-managing-social-media-crisis-2014
Polpeo rehearsing-and-managing-social-media-crisis-2014Polpeo rehearsing-and-managing-social-media-crisis-2014
Polpeo rehearsing-and-managing-social-media-crisis-2014
 
E moderation carrot-rehearsing-managing-social-media-crisis-july-2013
E moderation carrot-rehearsing-managing-social-media-crisis-july-2013E moderation carrot-rehearsing-managing-social-media-crisis-july-2013
E moderation carrot-rehearsing-managing-social-media-crisis-july-2013
 
Rehearsing and Managing a Social Media Crisis
Rehearsing and Managing a Social Media CrisisRehearsing and Managing a Social Media Crisis
Rehearsing and Managing a Social Media Crisis
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
College Essay Starters. Online assignment writing service.
College Essay Starters. Online assignment writing service.College Essay Starters. Online assignment writing service.
College Essay Starters. Online assignment writing service.
 
Week 9 Conflict
Week 9 ConflictWeek 9 Conflict
Week 9 Conflict
 
Workplace Violence: Responding to the Challenges (Free Webinar)
Workplace Violence: Responding to the Challenges (Free Webinar) Workplace Violence: Responding to the Challenges (Free Webinar)
Workplace Violence: Responding to the Challenges (Free Webinar)
 
Self defence ppt
Self defence pptSelf defence ppt
Self defence ppt
 

Dernier

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Dernier (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

Basic Personal Safety Concepts

  • 1. A Research & Analysis Services Company
  • 2.
  • 3.
  • 4. Risk The elements where a person has a certain level of control, such as social contacts, and how these elements may expose him/her to unforeseen dangers. Threat The broader elements that affect a person and are beyond his/her control; traveling, business position, politics, the weather, etc. Copyright (c) 2011. SOA. All Rights Reserved. 4
  • 5. Categories of Risks/Threats  Against a Person’s Safety / Security  Against a Person’s immediate Family  Against a Person’s psychological well-being  Against a Person’s Privacy Copyright (c) 2011. SOA. All Rights Reserved. 5
  • 6.  Wealth  Social Status  Celebrity / Public Exposure  Political Views  Symbolic Status  Personal / Business Travel Copyright (c) 2011. SOA. All Rights Reserved. 6
  • 7. Types of Threats  Verbal Assault  Physical Assault  Use of Blunt Objects  Edged Weapons  Firearms  Explosives  Kidnapping  Severe Weather  Natural Disasters Copyright (c) 2011. SOA. All Rights Reserved. 7
  • 8. Types of Potential Attackers  The Deranged Individual  Former Intimate Stalker  Unknown Stalker  Disgruntled Employees / Co-Workers  Personal Vendetta / Revenge  Criminals  Professional Assassins / Contract Killers  Terrorists Copyright (c) 2011. SOA. All Rights Reserved. 8
  • 9. Types of Health Risks  Heart Problems  Allergic Reactions  Diabetes  Previous Injuries  Communicable Diseases  Previous Surgeries Copyright (c) 2011. SOA. All Rights Reserved. 9
  • 10. Types of Personal Risks/Threats  Sexual Encounters  Association with known criminals  Excessive Drinking  Drug Use  Financial Problems Copyright (c) 2011. SOA. All Rights Reserved. 10
  • 11.
  • 12. Daily Transit Activity When you are in transit, from Point A to Point B, you automatically have less control over the environment and are open to many Risks and Threats. You must learn to keep a Mental Snapshot of your Surroundings throughout your day. Copyright (c) 2011. SOA. All Rights Reserved. 12
  • 13. Exercise Draw a map from Point A to Point B identified by the course Instructor. What Risks or Threats can you identify along the route that you took? Copyright (c) 2011. SOA. All Rights Reserved. 13
  • 14.
  • 15. Situational Awareness  Being Aware of your environment and of any Potential or Real Risks or Threats that might be present is the first and most important key of Personal Safety and Security.  You should apply the Concepts while at Home, Work, School, In Transit, etc. Copyright (c) 2011. SOA. All Rights Reserved. 15
  • 16. Situational Awareness  Being Aware of your Surroundings will help you Avoid hostile actions and violent confrontations.  Do you have a Safety and Security Plan to address any Potential or Real Risks or Threats you might face? Copyright (c) 2011. SOA. All Rights Reserved. 16
  • 17. Situational Awareness It is always better to EVADE any hostile and dangerous situation by any means possible. There is nothing wrong with running from a Risk or Threat if possible. Copyright (c) 2011. SOA. All Rights Reserved. 17
  • 18. 4 Levels of Personal Safety UNAWARE  A State of Mind in which you are not Alert to your immediate surroundings.  This would include while you sleep, watch TV, cook a meal, being at home, etc. Copyright (c) 2011. SOA. All Rights Reserved. 18
  • 19. 4 Levels of Personal Safety Aware  The State of Mind in which you are Aware of your environment.  At this level, you have not yet identified any Potential or Real Risk or Threat that may be present. Copyright (c) 2011. SOA. All Rights Reserved. 19
  • 20. 4 Levels of Personal Safety Aware Awareness involves the use of your Five Senses: Sight Sound Smell Touch Taste Copyright (c) 2011. SOA. All Rights Reserved. 20
  • 21. 4 Levels of Personal Safety During conditions where a Potential or Real Risk or Threat is Present, you should avoid using items that will impair your Vision and Sound. Example: Avoid using headphones while jogging or walking, especially at Night and Alone. Copyright (c) 2011. SOA. All Rights Reserved. 21
  • 22. 4 Levels of Personal Safety Alert  In this State of Mind, you have identified a Potential or Real Risk or Threat within your environment.  Your spider sense is going nuts… Copyright (c) 2011. SOA. All Rights Reserved. 22
  • 23. 4 Levels of Personal Safety Alert General Rule Any person not known to you or your family can constitute a Potential or Real Risk or Threat. Copyright (c) 2011. SOA. All Rights Reserved. 23
  • 24. 4 Levels of Personal Safety Alarm  In this State of Mind, the Potential Risk or Threat has now become a Real and your Personal Safety and Security has been compromised. A high level of FEAR and ANXIETY takes over. Copyright (c) 2011. SOA. All Rights Reserved. 24
  • 25. Alarm Alert Aware Unaware Copyright (c) 2011. SOA. All Rights Reserved. 25
  • 26. The Defensive Mindset The values, mental techniques, and attitude that maximizes the effectiveness of how you respond to a Risk or Threat. Copyright (c) 2011. SOA. All Rights Reserved. 26
  • 27. Defensive Mindset Concepts Ability to Defend Do you have the ability and willingness to defend yourself and not become a VICTIM? Be wary of self-defense instructors that claim they can train to defend yourself…their systems are untested and are more for sport. Copyright (c) 2011. SOA. All Rights Reserved. 27
  • 28. Defensive Mindset Concepts Ability to Defend The State of Texas’ new Self-Defense Castle Doctrine Statute effective September 1, 2007. Copyright (c) 2011. SOA. All Rights Reserved. 28
  • 29. Defensive Mindset Concepts Never Give Up A person becomes a VICTIM because he / she gives up and is overpowered by the Offender. You must be determined to persevere by all means necessary and never give up. Copyright (c) 2011. SOA. All Rights Reserved. 29
  • 30. Defensive Mindset Concepts Develop A Plan Planning is an important component of Personal Survival. Are you laying the foundation to be Victimized? Copyright (c) 2011. SOA. All Rights Reserved. 30
  • 31. Defensive Mindset Concepts Develop A Plan A Plan is a Pre-Determined Course of Action used to respond to specific situations you might encounter. A Threat Assessment and Risk Analysis complement your Personal Safety and Security Plan. Copyright (c) 2011. SOA. All Rights Reserved. 31
  • 32. Defensive Mindset Concepts 2 Steps To Take After Identifying A Potential Or Real Risk or Threat: 1. Formulate a Hypothetical Plan of Action to deal with the Risk or Threat. 2. Establish Barriers that will initiate your Plan of Action. An Aggressive Gesture, entering your Personal Space, etc. Copyright (c) 2011. SOA. All Rights Reserved. 32
  • 33. Defensive Mindset Concepts Situational Visualization This is the formation of a mental image for handling different Situations. It is also a major component of Developing A Plan. Copyright (c) 2011. SOA. All Rights Reserved. 33
  • 34. Defensive Mindset Concepts Remember Panic = Victimization Copyright (c) 2011. SOA. All Rights Reserved. 34
  • 35.
  • 36. Fear  Fear is good…it is your body telling you that you are in some type of Danger.  If Fear becomes paralyzing, it can’t help you fight harder or run faster. Copyright (c) 2011. SOA. All Rights Reserved. 36
  • 37. Fear Fear = Release of Adrenaline into the bloodstream. Adrenaline dictates the Fight or Flight Concept. Copyright (c) 2011. SOA. All Rights Reserved. 37
  • 38. 4 Types of Reactions to Fear 1. Tachypsychia The perception from people under stress that describes time moving in slow motion. Copyright (c) 2011. SOA. All Rights Reserved. 38
  • 39. 4 Types of Reactions to Fear 1. Tachypsychia The brain is processing very quickly to allow for a faster defensive response. This is a positive side effect that can enhance defensive abilities. Copyright (c) 2011. SOA. All Rights Reserved. 39
  • 40. 4 Types of Reactions to Fear 2. Auditory Exclusion The brain’s ability to block sound while focused on a Threat. Copyright (c) 2011. SOA. All Rights Reserved. 40
  • 41. 4 Types of Reactions to Fear 2. Auditory Exclusion The brain blocks auditory input to allow you to focus completely on the Threat. This has both a positive and negative effects. Copyright (c) 2011. SOA. All Rights Reserved. 41
  • 42. 4 Types of Reactions to Fear 2. Auditory Exclusion You get an increased ability to focus (positive) while it also keeps you from noticing or hearing other potential risks or threats coming at you (negative). Copyright (c) 2011. SOA. All Rights Reserved. 42
  • 43. 4 Types of Reactions to Fear 3. Tunnel Vision This is the narrowing of your field of vision as you focus on a particular Risk or Threat. Copyright (c) 2011. SOA. All Rights Reserved. 43
  • 44. 4 Types of Reactions to Fear 3. Tunnel Vision You loose peripheral vision, which prevents you from identifying other Risks or Threats that may be approaching you from your left or right. Copyright (c) 2011. SOA. All Rights Reserved. 44
  • 45. 4 Types of Reactions to Fear 3. Tunnel Vision To avoid Tunnel Vision, SCAN the immediate area Left and Right after engaging a Risk or Threat. Copyright (c) 2011. SOA. All Rights Reserved. 45
  • 46. 4 Types of Reactions to Fear 4. Cognitive Dissonance This is a Disassociation with the actual events as they occur. Copyright (c) 2011. SOA. All Rights Reserved. 46
  • 47. 4 Types of Reactions to Fear 4. Cognitive Dissonance A Disassociated Mind is the most dangerous reaction to Fear because it is rejecting the idea that something terrible is happening. Copyright (c) 2011. SOA. All Rights Reserved. 47
  • 48. 4 Types of Reactions to Fear 4. Cognitive Dissonance When this happens, the Victim is negating the ability to effectively fight back or retreat. Copyright (c) 2011. SOA. All Rights Reserved. 48
  • 49.
  • 50. The “6 P’s Principle” Proper Prior Planning Prevents Poor Performance Copyright (c) 2011. SOA. All Rights Reserved. 50
  • 52. Victimization / Targeting 3 Elements of a Potential Criminal Act 1. Desire The criminal (s) must have a desire and / or motivation to justify the actions or receive some type of tangible / intangible benefit from the criminal act. Copyright (c) 2011. SOA. All Rights Reserved. 52
  • 53. Victimization / Targeting 3 Elements of a Potential Criminal Act 2. Ability The criminal (s) need to recognize his ability, physical skills, knowledge, available assets, etc. to commit the criminal act. Copyright (c) 2011. SOA. All Rights Reserved. 53
  • 54. Victimization / Targeting 3 Elements of a Potential Criminal Act 3. Opportunity The criminal (s) selects his target based on vulnerability and accessibility. Copyright (c) 2011. SOA. All Rights Reserved. 54
  • 55. 3 Elements of a Potential Criminal Act Desire Ability Opportunity Copyright (c) 2011. SOA. All Rights Reserved. 55
  • 56. Victimization / Targeting 3 Elements of a Potential Victim 1. Suitability Are you a Suitable Target? Would coming after you further the criminal’s Goals, Desires, or Motivations? What do you possess that the criminal wants? Copyright (c) 2011. SOA. All Rights Reserved. 56
  • 57. Victimization / Targeting 3 Elements of a Potential Victim 2. Vulnerability What type of security measures do you have in place to protect yourself and your family? Copyright (c) 2011. SOA. All Rights Reserved. 57
  • 58. Victimization / Targeting 3 Elements of a Potential Victim 2. Vulnerability  Personal Behaviors  Physical Security (Alarms, Lights, Fences)  Information Security (Denying Access)  Computer Security (Passwords, Locks) Copyright (c) 2011. SOA. All Rights Reserved. 58
  • 59. Victimization / Targeting 3 Elements of a Potential Victim 2. Vulnerability Some Vulnerabilities can be very obvious and can be detected without much effort. Copyright (c) 2011. SOA. All Rights Reserved. 59
  • 60. Victimization / Targeting 3 Elements of a Potential Victim 2. Vulnerability A measure of your Attractiveness to a criminal or terrorist. What are your Vulnerabilities? Copyright (c) 2011. SOA. All Rights Reserved. 60
  • 61. Victimization / Targeting 3 Elements of a Potential Victim 3. Probability of Success What is the probability that if the criminal comes after you, he will be successful? Keep in mind that by the time the criminal comes after you, he has already studied you and determined the Risks and Threats to himself. Copyright (c) 2011. SOA. All Rights Reserved. 61
  • 62. 3 Elements of a Potential Victim Suitability Vulnerability Success Copyright (c) 2011. SOA. All Rights Reserved. 62
  • 63. Victimization / Targeting Victim Selection + Victim Behavior = VICTIMIZATION Copyright (c) 2011. SOA. All Rights Reserved. 63
  • 64.
  • 65. Observation Skills  The eyes provide the visual information, which is sent to the brain for processing, and causes a person to respond to a particular situation.  Since you were a child, you have been trained using your eyes.  You need to further develop this skill. Copyright (c) 2011. SOA. All Rights Reserved. 65
  • 66. Observation Skills  Your eyes are trained to SCAN an area within your sight from LEFT to RIGHT.  This is the skill you use to read a book.  You are also trained to SCAN an area within your sight from LEFT to RIGHT to LEFT.  This is the skill you use when driving a vehicle. Copyright (c) 2011. SOA. All Rights Reserved. 66
  • 67. Observation Skills By SCANNING Left / Right / Left, the retention of what you observe increases, and gives you a better picture of what you have seen. Copyright (c) 2011. SOA. All Rights Reserved. 67
  • 68. Observation Skills SCANNING and GLANCING at something or someone that has caught your attention are a more relaxing and effective ways of observation. Do not stare because this action tires your eyes and causes your vision to become unclear and fuzzy. Copyright (c) 2011. SOA. All Rights Reserved. 68
  • 69. Observation Skills One day, you might get the feeling or intuition that you are being followed by another vehicle. This is your mind warning you of a Potential or Real Risk or Threat. Copyright (c) 2011. SOA. All Rights Reserved. 69
  • 70. Observation Skills Surveillance Indicators  Multiple sightings of same suspicious individuals , a vehicle, or other activity separated by: Date  Time  Location Copyright (c) 2011. SOA. All Rights Reserved. 70
  • 71. Observation Skills Surveillance Indicators TEDD Time Environment Distance Deportment Copyright (c) 2011. SOA. All Rights Reserved. 71
  • 72. Observation Skills What To Look For:  A vehicle that slows down when you slow down, but keeps its distance.  A vehicle that does not pass you; this goes beyond driving behavior.  A vehicle that turns a corner when you do.  A vehicle that stops at a distance when you stop at your destination. Copyright (c) 2011. SOA. All Rights Reserved. 72
  • 73. Observation Skills How To Respond:  Pull your vehicle over and try to get a license plate.  Keep driving but do not go directly to your destination; go somewhere else.  Request police assistance. Copyright (c) 2011. SOA. All Rights Reserved. 73
  • 74. Auditory Skills The most important rule for maximizing your Hearing accuracy is: Breathing Control Copyright (c) 2011. SOA. All Rights Reserved. 74
  • 75. Auditory Skills During a dangerous situation, the pace of your Breathing increases, and so does your Heart Rate. Take deep, slow breaths to control your heart rate and increase your Auditory Skills. Copyright (c) 2011. SOA. All Rights Reserved. 75
  • 76. Smelling Skills You are programmed to React to scents that are pleasing or unpleasant. A particular odor will trigger your sensory memories that will correspond to your past events. Copyright (c) 2011. SOA. All Rights Reserved. 76
  • 77. Smelling Skills To improve your sense of smell, practice these steps: Close your eyes Take a deep breath Let your mind instead of your eyes determine the scent Copyright (c) 2011. SOA. All Rights Reserved. 77
  • 78.
  • 79. Basic Criminal Warning Signs  A person intent on committing a Crime will put on a “FALSE FACE”.  The criminal’s intent is to deceive the Target (Victim).  Everything that the criminal says and does will most likely be LIES. Copyright (c) 2011. SOA. All Rights Reserved. 79
  • 80. Basic Criminal Warning Signs The criminal will be extremely Charming and Friendly. Alert: These behaviors are Warning Signs. Copyright (c) 2011. SOA. All Rights Reserved. 80
  • 81.
  • 82. The Victimization Process 1. Pre-Victimization At this point, the criminal will be searching for his Victim. This victim selection process is called “TROLLING”. Copyright (c) 2011. SOA. All Rights Reserved. 82
  • 83. The Victimization Process 1. Pre-Victimization The criminal will Troll for his Targets at: Malls Colleges / Universities Nightclubs Grocery Stores Copyright (c) 2011. SOA. All Rights Reserved. 83
  • 84. The Victimization Process 2. Initial Contact Once the criminal selects a Target, he will do all he can to initiate contact. At this point, the selected Target is unaware about the Initial Contact’s intentions. Copyright (c) 2011. SOA. All Rights Reserved. 84
  • 85. The Victimization Process 2. Initial Contact The criminal will attempt to make contact with his target in some manner. The criminal will get close enough to begin a conversation with the Target. Copyright (c) 2011. SOA. All Rights Reserved. 85
  • 86. The Victimization Process 2. Initial Contact The Initial Contact is to lower the selected Victim’s defenses. The conversation will be prepped in order to take control of the situation. Copyright (c) 2011. SOA. All Rights Reserved. 86
  • 87. The Victimization Process 2. Initial Contact The Initial Contact can be made days or weeks before the Target becomes a Victim. The Initial Contact is part of the victim selection process. Copyright (c) 2011. SOA. All Rights Reserved. 87
  • 88. The Victimization Process 2. Initial Contact The Initial Contact is to commit the Target into some type of obligation and to gain trust. The criminal might do a favor or task in which the Target becomes in Debt to him. Copyright (c) 2011. SOA. All Rights Reserved. 88
  • 89. The Victimization Process 2. Initial Contact The favor might be one that is ongoing and one that makes the Target accompany the criminal into a more private and secluded location. Copyright (c) 2011. SOA. All Rights Reserved. 89
  • 90. The Victimization Process 3. Follow-Up Contact The criminal sets-up the situation in which the Target runs into him to do a follow-up contact. By this point, the criminal has already studied his Target and has decided to Victimized the Target. Copyright (c) 2011. SOA. All Rights Reserved. 90
  • 91. The Victimization Process 4. Target Isolation The objective now is to Isolate the Target. If the criminal has previously gained the trust, it will be easier to Isolate the Target from other people. Copyright (c) 2011. SOA. All Rights Reserved. 91
  • 92. The Victimization Process 4. Target Isolation The Target must be prepared to refuse to be alone with the criminal. Ask yourself…Why should I go alone with this person? Be Inquisitive. Copyright (c) 2011. SOA. All Rights Reserved. 92
  • 93. The Victimization Process 5. Target Victimization Once the Target is completely Isolated, the criminal will attack. Copyright (c) 2011. SOA. All Rights Reserved. 93
  • 94. The Victimization Process 6. Post-Victimization Once the criminal completes the attack, he has to decide whether to release or kill the Victim. Copyright (c) 2011. SOA. All Rights Reserved. 94
  • 95. The Victimization Process 6. Post-Victimization More likely, the Victim will be killed. The criminal will then attempt to cover up the crime by destroying evidence and disposing of the Victim’s body. Copyright (c) 2011. SOA. All Rights Reserved. 95
  • 96. The Victimization Process 6. Post-Victimization The criminal will then depart the crime scene without being seen. Keep in mind that the seasoned, career criminal has more experience and Situational Awareness that a beginner and Victims. Copyright (c) 2011. SOA. All Rights Reserved. 96
  • 97. The Victimization Process Alert The criminal will make his move when it is most convenient to him and the Target is most Vulnerable. Copyright (c) 2011. SOA. All Rights Reserved. 97
  • 98. Sergio Olivares, MPA President & General Manager (361) 694 - 2385 research_and_analysis@yahoo.com