Situational Awareness and the Danger of Hypervigilance

I recently read an article by Patrice Bonnafoux entitled What Too much Situational Awareness Does to Your Brain(http://www.urbanfitandfearless.com/2015/08/what-too-much-emphasis-on-situational.html) that raised some great points worth considering. While I don’t agree with everything in the article, it illustrates the danger of becoming hypervigilant when striving to be situationally aware. Hypervigilance is defined as is “an enhanced state…

Resources–Staying Safe: A Blog by Christopher Pendas

If you find the articles on Integrated Protective Concepts interesting and helpful you will enjoy the Staying Safe blog by Christopher Pendas. Christopher takes a proactive approach to personal protection and self defense that provides the reader useful tools and ideas that can be implemented immediately. His approach to developing and enhancing situational awareness goes…

Suspicious Signs — Recognizing Pre-Attack Indicators

In the past we have discussed the importance of pre-incident indicators with regard to detecting surveillance and other activities.  It’s also important to recognize when an incident such as an assault, robbery or other violent crime may be about to unfold.   Even crimes with a short or compressed operational cycle give off some pre-incident signs….

Situational Awareness and Being Present

We have frequently emphasized the importance of situational awareness as the key component of personal security whether at home or overseas.  We have discussed various levels of awareness and discussed when to raise our level of awareness such as during arrivals and departures, when entering known danger areas and so forth.  It’s also important to…

The Criminal Interview

While we are discussing unsolicited approaches it’s a good time to mention the criminal “interview” that is often the precursor to a robbery or assault.  The interview occurs when the criminal engages the potential victim in conversation prior to initiating a crime.  This usually serves two purposes: (1) it gives the criminal or criminals and…

Loose Lips: Recognizing and Avoiding Elicitation

In discussing social engineering and threats to your personal security we mentioned elicitation.  Elicitation is a technique that is used by an adversary to get a person to unintentionally divulge more information about a particular subject than they normally would.  Its used to gather confidential or proprietary information and in the realm of personal security…

Social Engineering: Personal Security Implications

Social engineering – the calculated manipulation and exploitation of people has historically been associated with cyber security issues.  Computer hackers found they could best get access to secure networks by targeting the weakest link – the human factor. The same techniques used to get an employee to give up their password or provide other information…