A descriptions of a methodology for conducting observational user research within high security environments where typical methods: contextual inquiry and naturalistic observation are ineffective due to inability to record participants. This presentations reviews the methodology process and tools, and shows examples of the type of data which can be shared with product teams.