With the growing use of the internet, it is now possible to provide advice, training and consulting services on-line. In consultation with the client, Anshin Consulting can develop specifically designed packages that can include downloadable presentations, YouTube videos, direct one-on-one private Skype coaching and podcasts. Please contact Anshin Consulting to arrange an interview to discuss this further.
Insights and Research
Anshin Consulting thought leadership has a reputation for asking, and providing answers, to hard questions specific to the security and crime prevention communities. Articles, reports, presentations, case studies and papers are referenced and follow strict academic standards. Below is the list of manuscripts that have been published by Anshin Consulting. Click on the link to down load the manuscript.
Case Study
Reducing burglary crime in the Canberra suburb of Kambah by 42%.
This Case Study looks at how David Harding of Anshin Consulting and Neighbourhood Watch, was able to reduce burglary crime in Kambah by 42%. You can download a PDF of the Case study by following the below link:
https://anshinconsulting.com/wp-content/uploads/2021/09/Anshin-Consulting-Kambah-Case-Study.pdf
‘Summary of using Ethnography to develop crime prevention interventions.’ This is a PowerPoint audio summary of the academic article “Using Ethnography to Identify Deviant Behaviors for the Development of Crime Prevention Interventions”. You can download the audio summary by following the below link:
Using Ethnography to Identify Deviant Behaviors for the Development of Crime Prevention Interventions, published online in the Journal of Applied Security Research.
The Abstract for the paper reads:
This paper introduces a crime prevention methodology that focuses on deviant beliefs and behaviors. Situated between developmental and environmental crime prevention approaches, this empirical study utilized ethnographical methods to identify potential and active deviants and their support networks. Interventions were implemented through the community program of Neighborhood Watch, that focused on the identified deviant communities prior to the actuation of a burglary crime. Comparison between pre-intervention period and intervention periods show the incidence of burglary crime reducing by 42%. If validated through replication, other fields that engage with active actors, such as insurgents, gangs, and terrorists, may have similar success.
You can find the article by following the below link:
Security Risk Management: A dangerously overrated and broken paradigm
This paper shows through statistical analysis that where Security Risk Management has been implemented the incidence of crime has increased. Click on this link to download the article: https://anshinconsulting.com/wp-content/uploads/2021/05/White-Paper-Security-Risk-Management-A-dangerously-overrated-and-broken-paradigm-D.Harding.pdf
Professional criminals: a whole new game for security thinking
Professional criminals show the ineffectiveness of static security risk treatments and situational crime prevention options.
On 30 July 2016, Madura McCormack of the Courier-Mail reported that Queensland police were establishing a Task Force with the aim of capturing two criminals that were believed to be responsible for seven armed robberies across Brisbane. The article comes with CCTV footage that shows one of the attacks against a pub. The article describes the difficulty that police are having in identification, as both the robbers are heavily disguised. The CCTV footage highlights the difficulty that static protective security measures have against the professional criminal.
The Professional Criminal can be defined as the person who takes the time to plan and prepare for their crime. Professional Criminals will also conduct detailed intelligence gathering activities, such as reconnaissance, to gather information about their intended target. By so doing, Professional Criminals often plan methods to defeat implemented preventative crime measures or risk treatment options.
Review of the above mentioned CCTV footage reveals several aspects of the criminals planning, preparation and intelligence gathering activities. Understanding these aspects can provide valuable knowledge to the protective security professional in their attempts to prevent attacks against their organisations.
For example, the robbers seem to be very deliberate in their movements and appear to have detailed knowledge of the layout of the target.
The robbers also appear to know the best time to attack, that is, when there are limited patrons and staff in attendance, but prior to the cash tills being emptied.
The robbers appear to work well together as a team, possibly due to practice rehearsals or the like.
The robbers are intimidating, although they do have a weakness regarding their care of their own weapons.
The robbers have knowledge of where the CCTV cameras are located and take care to avoid being stationary and in direct line of sight of the cameras
The robbers are heavily disguised and thus far have been able to avoid being identified both visually and forensically
When the robbers depart the crime scene, they appear to make a quick and effective ‘get away’
All of these facets highlight the Professional Criminal’s attention to detail in the level of planning, preparation and intelligence gathering that has been undertaken. The above attack also points out the limited value of static protective security measures.
To prevent professional criminal attacks, measures that include counter-surveillance, counter-intelligence, and CCTV that views criminal’s preparation, locations and their possible infiltration and exfiltration routes are required. These measures will identify the criminals in their preparation and intelligence gathering phases of their planned attack. Identification in these phases can provide law enforcement with the opportunity to intercede prior to the planned attack.
Preventing the Professional Criminals attack requires the security planner to literally think outside the box, or in this case pub.
Routine habits that can get you killed
In protective security operations routine activities are easily exploited by Threat Actors. Sometime routine habits can get you killed.
On 21 August 2018, The Canberra Times published a story written by Sally Rawsthorne which outlined how a former Outlaw Motor Cycle Gang’ leader was ‘gunned down’ in front of the Rockdale Fitness First centre that he habitually used. With due respect for the deceased’s family, the story does highlight how a routine habit can get you killed.
The story tells how gang leader Mick Hawi, had gone to the fitness centre for his morning workout. Following his workout, Hawi went back to his car, that was reportedly parked in an illegal spot that he habitually used. When Hawi was in his car, a person walked up to the former OMCG member’s car and shot Hawi several times.
But how did the assassin know that Hawi would be at the gym? How did the assassin know where Hawi had parked his vehicle?
For surveillance operatives to first identify the location of their desired target, the operative will often commence their surveillance at known locations that the target visits. Locations such as the person’s home, their place of work, and other locations that the person may usually visit. In the above case such as Hawi’s regular gym.
According to reports the assassin conducted surveillance outside the Fitness First gym for several days prior to the attack. On the day of the attack Hawi illegally parked his vehicle in his usual spot, did his workout, and returned to his vehicle. It was at this time that the assassin, who would have been able to confirm Hawi’s location was able to walk up and make the attack.
Habit got Hawi killed.
But what can professional security managers learn from this painful lesson? How can security professionals make it difficult for hostile surveillance operatives to gather information regarding the security professional’s location responsibilities?
As humans we tend to like some elements of structure in our lives. And for many people change can be very uncomfortable. Therefore, it must be remembered that with any proposed change to normal routines there will be some ‘push back’. Additionally, change that is implemented in a proactive way can also relieve the boredom that comes with over familiarity.
For the security manager changing patrol routes and times, changing procedures on how a particular activity is carried out, or changing guard rosters all will have a hindering effect to someone conducting hostile surveillance, or about to implement an attack based on previous intelligence gathered regarding previous methods used by the facility.
Changing procedures like those mentioned above, will often necessitate the hostile surveillance operatives to recommence their surveillance operation. This will also give the security manager the opportunity to commence counter-surveillance operations that may identify hostile surveillance.
In the world of protective security operations, the conducting of a routine habit, will make you predictable. Being predictable provides Threat Actors with the knowledge of what a party will do and when they will do it. Thus, making it easy for the Threat Actors to plan their attack. Ultimately, within the protective security space, habits can get you killed.
The Difference between Risk and Threat
Defining the distinction between Risk and Threat
I was recently involved in a discussion on the differences between Risk and Threat. During the discussion I realised that there is a misconception regarding the two terms. With this in mind I am starting a series of blog posts on the difference between the two concepts. This week, I will start by looking at how each term and concept is different. In the following weeks why each term should be considered differently and how the assessment of each is different will be reviewed. Finally, there will be a discussion on how the management of Risks and Threats should be different.
Risk is defined by the International Standards Organisation AS/NZS ISO 31000:2009 Risk management-principles and guidelines, as “the effect of occurrences on objectives”. Risk therefore focuses on incidents and the effects of those incidents. Risk can have either positive or negative effects, but most people generally see risk as a negative. In addition, risk is generally measured as the likelihood of a particular incident occurring combined with the harm that that incident could cause.
Threat is generally defined as the intention to cause harm. Threat therefore is about intentions and the harm that those intentions could cause. Because Threat is about intentions, it implies that Threats are made by those who possess some form of rational thought. Depending on a person’s philosophical beliefs, threats can be made by Gods, humans or animals. For the purpose of this blog post, Gods and animals will be left to philosophers and scientists. This post and the ones to follow will focus on threats that are made by humans.
When Risk is compared to Threat, Risk looks at different types of events, and the effect those events could cause if they occur. Risk is very event focused. Threat focuses on a person’s or group’s intentions, and the harm those intentions could cause if they are actioned. Threat focuses on the rational actor’s intentions, showing that the two concepts are quite different.
Although many people commonly see Risk and Threat to be the same, they are in fact quite different to each other. In the following blog posts I will review how Risk and Threats are assessed and then how each can be managed.
Consulting
Anshin Consulting has over 30 years’ experience in consulting to the highest levels of governments. Anshin has provided advice to organizations looking to expand their markets in hostile environments, business leaders, ambassador’s, and senior diplomatic staff on in-country threat actors.
To achieve your business goals requires an ability to understand the environment that the business works within. All environments have opportunities, risks, and threats. Threats come from those organizations and persons with an intent to harm your organization. Knowing who these actors are and where they are along their development pathway can provide the knowledge to be able manage these actors. Decisions made today can either guide these actors along co-existing pathways or turn them into enemies. Let us work together to provide a safe working environment for your organization to flourish in.
Community Safety
Anshin Consulting specialises in the identification of those persons who wish to cause harm to you or your organisation. By identifying the threat actor, it becomes possible to develop strategies to guide, counter or neutralise that actor prior to a physical attack.
Criminals and terrorists follow an identifiable and often predictable pathway in their intentions and actions to attack an organisation. Those person’s or group’s that are identified early provide opportunities to develop alternative options to guide them away from harmful intentions. Counter narrative strategies and tactics can be put in place to deter growing harmful intent that will deter threat actors and force them to change their intentions and plans. Should identification occur when intent has turned to the attack cycle, tactics can be put in place that will neutralise the threat actor prior to the attack.
Case study
Reducing burglary crime in the Canberra suburb of Kambah, by 42%
The Challenge
In 2017 the Canberra suburb of Kambah had the dubious reputation for having the highest burglary crime rate in all of Canberra. This was not only by reputation, but also identified in news posts by Steven Trask of the Canberra Times, stating, ‘The most burglaries (in Canberra) occur in Kambah’. This statement by Trask was reinforced by local law enforcement’s burglary crime statistics.
At a luncheon with colleagues, this issue was raised with David Harding of Anshin Consulting. It was proposed that since his consulting firm was based in the suburb, he should volunteer some of his time and expertise to undertake to help reduce the incidence of crime in Kambah.
Subsequently, David volunteered to start a Neighbourhood Watch group in Kambah West, where a large portion of the suburb’s burglary crime took place. David became the Neighbourhood Watch Kambah West Area Co-ordinator.
Solution
David decided to utilise a method that he had successfully used against gangs, armed robbers, terrorists and insurgencies. Although obviously he would have to change aspects of the method to suit a residential area in Australia’s capital city. The solution required using ethnography to learn about the beliefs and behaviours of varying deviant communities that were the root of the issues. Then developing and implementing interventions that would divert these communities along different non-deviant pathways. The interventions were delivered through the community program of Neighbourhood Watch (NHW).
By developing an understanding of the deviant communities, and how individual burglars went about their business, David was able to identify weaknesses in peer and social networks that the ‘gangs’ formed in, as well as the planning, preparation and intelligence gathering that the potential burglars utilised. David was also able to identify what the burglars were most fearful of. With this information, David was able to develop interventions that would guide potential burglars along alternative non-deviant pathways.
The interventions
Directed information was disseminated through NHW regarding the specific methods that the burglars were using, such as how deviants identified their target house, where the burglars would leave their getaway vehicle, and how they conducted their surveillance. Residents were provided with ways and means to identify burglars in the process of planning their burglary, and ways to prevent the burglary. This was based on the knowledge that had been gained through the ethnographical research that was conducted throughout the entire intervention period.
Results
The aim of this method is to divert deviants to non-deviant pathways. For example, in some cases, peers and siblings were recruited to influence deviant siblings along non-deviant pathways. As one elder sibling said:
“When I found out that my brother was in with that shit (referring to a small gang), and probably breaking into places, I changed his attitude.”
In other cases, NHW newsletters were delivered to high-risk areas of Kambah. These newsletters were also given to possible deviants that were identified within the same area. The purpose was to alert burglars that residents knew of the deviants’ methodologies and would identify and report suspicious behaviours.
As a former burglary offender said:
“If you had walked up to us and handed each of us a newsletter of this type, I would not want to go back to this area for a long time. This says exactly what we used to do. I would be worried that you, or some of the neighbors would be watching all the time.”
The Incidence of Burglary
After exhaustive research to find other possible causes for the drop in crime, the interventions were found to cause a 42% drop in burglary crime.
Conclusion
The method outlined in this project is substantially different to developmental crime prevention methods which focus on ‘at risk’ individuals, or environmental crime prevention methods which focus on changing the environment. However, as can be seen by the results, this method can substantially reduce crime. Also, when implemented through community programs such as Neighbourhood Watch, the method offers a very cost effective way to reduce the incidence of burglary crime.
If you wish to inquire about the services of Anshin Consulting please go to our contact form.
The methodology describe above has been peer reviewed and published in the Journal of Applied Security Research. You can read the entire article by following the below link:
https://www.tandfonline.com/doi/full/10.1080/19361610.2021.1956268?src=
Reference
Trask, S. (2017, March 6). Canberra’s crime hotspots revealed. The Canberra Times.
https://www.canberratimes.com.au/story/6035774/canberras-crime-hotspots-revealed/
Bespoke Security Services
Whether your organization requires a professional and friendly concierge or trained professionals capable of detecting terrorists in the process of planning an terrorist event against your organization, Anshin Consulting can provide highly trained operatives.
Many of today’s security issues are specific to the individual organization. The various actors that wish to do harm to your organization have different support groups, and plan, prepare and conduct intelligence gathering against your organization in different ways. Security and crime prevention measures should be put in place that are specifically tailored to detect and deter those with an intention to harm you. If you require security and crime prevention services specifically designed and tailored to assist you with crime prevention Anshin Consulting can assist you.
Together let us protect your organization and its people.