Advanced Fusion Center Training
This is a one day/8 hour course for fusion liaison officers, whether they are called FLOs, TLOs or ILOs, depending on the fusion center they report to. Over many years, with fusion centers trying different methodologies, the most successful, and best practice, has been this one-day classroom approach, providing the mission essential skills and knowledge the FLOs need to be successful. This can be augmented with online training, and shouldn’t be considered a replacement for solid community outreach efforts by the fusion centers that are less formal or time-consuming.
Policing Violent Extremism 1 – ISIS/ISIL and the Evolution of Al Qaeda
This intermediate to advanced level course explores the latest threat from such groups as the Islamic State of Iraq and the Levant (ISIL) along with the diffusion of the Al Qaeda threat worldwide beyond its classic core to the network of affiliates and homegrown AQ inspired terrorists. This course focuses what has been called the threat of violent Islamic extremists, but distinguishes this extremist ideology from the precepts of the mainstream religion. While this course is intended for anyone concerned about terrorism and public safety, it replaces Policing Violent Extremism 1 for those familiar with that widely praised course offering.
Policing Violent Extremism 2 – Domestic Terrorism
This is an advanced course that will provide students with an understanding of the violent emerging threats facing law enforcement and all first responders in every discipline. Among the threats covered are violent Islamic extremists, Sovereign Citizens and Narcotics Cartels. It will contrast the motivations, tactics, and relationships and shared ideologies of these groups and will provide the investigators the resources available to counter these threats. The discussion will close with a detailed case study of the Mumbai, India terrorist attack in 2008, which allied an Islamic terrorist group with an organized criminal syndicate and how the prospect of a similar assault weapons terrorist attack could occur. For graduates of the TLO/ILO/FLO basic and intermediate courses, this is an ideal follow-on refresher while also introducing advanced concepts and information for those wishing to further their understanding of terrorism.
Al Qaeda Doctrine (AQD)
This advanced (8 hour) course examines the full range of doctrinal materials that have guided or trained Al Qaeda inspired terrorists, to include Homegrown Violent Extremists. Starting with dynamic assessment of the famous “Manchester Manual,” it moves into more recent examples to include AQAP’s “Inspire” online magazine. All of this is focused on better identifying pre-incident indicators aimed at preventing acts of terrorism.
Mastering Influence – Human Engineering
The curriculum in Mastering Influence – Human Engineering (Non-Judgmental Behavioral Assessment and Advanced Approach) is an advanced workshop concerned with the collection of information from people during the course of everyday conversation without relying on question & answer. Whether you are a law enforcement officer, a fire fighter, or other public servant this course will teach students to maneuver through conversations, employing a variety of techniques to prompt conversational partners to provide detailed responses.
Counter Surveillance Training Program
A terrorist attack relies on surprise. The potential for an attack plan to be uncovered and compromised exists across all phases of the attack-chain, but the most vulnerable pre-operational activities in the attack planning cycle is target selection, target site surveillance and Target System Analysis (TSA). These activities are critical to completing an attack plan and require terrorists to physically scout their potential objectives. While conducting these activities, attack planners must attempt to blend in with the crowd—in their actions and demeanor—in order to escape observation. The most significant deterrence to this type of threat-related activity, therefore, is to demonstrate an unambiguous heightened vigilance and keen situational awareness. Early on in the target assessment process, attack planners seek to gauge the presence of personnel, security or otherwise, trained to recognize the signatures of potential malicious intent.
With this in mind, our training approach includes a mix of proven terrorism-prevention tactics, techniques, and procedures that will ensure on-site employees and contractors have the knowledge, plans, and tools necessary to achieve this heightened level of vigilance. The training and exercise concept is built on four core concepts:
- Threat Awareness – Establish and communicate the current threat situation.
- Pre-Incident Indicator Awareness – Know what to look for and how to report it.
- Engagement and Outreach – Facilitate partnerships and networking.
- Red-Teaming – Facilitate a surveillance-detection field activity.
Cyber Threats and Crime
The Cyber Threat to the United States is the most serious challenge facing our country today. Cyber Crime has resulted in the greatest transfer of wealth in history and everyday suspects are using high technology against law enforcement agencies and individual officers. These attacks have compromised operational security and national security.
This course will increase your awareness of these threats and provide training on specific practical countermeasures including live demonstrations of attack technique and undercover Internet based investigations.
Human Trafficking (Law Enforcement & Public Safety)
This entry level awareness overview will aid students in establishing a regional culture of resources and response strategies to Human Trafficking situations, as well as application of victims’ rights when an HT victim is refusing, or not requesting services and help. Specific HT victim response skills will be covered, with exercises that will illustrate the full spectrum of HT from labor to sex trafficking, as well as domestic and international cases. This class was designed to approach the subject matter from a victim’s standpoint, rather than from the traditional first responder/public entity orientation.
Designed for law enforcement professionals, Investigators, Internal Auditors, Inspectors, Prosecuting Attorneys, and TLO/ILO/FLOs, the Money Laundering course is course provides a complete overview of the money laundering tactics, techniques and procedures, with an explanation of how to recognize indicators of this activity that can aid the investigative process including:
- Introduction to Money Laundering and financial investigative techniques
- Pertinent Money Laundering definitions and current trends
- Indications and Warning of illegal financial activity
- Overview of Mexican Banking laws and Money Service Businesses (MSB)
- Pertinent Federal money laundering and financial crime laws and procedures
- Investigative concepts with money laundering and illegal financial activity
- Case Studies and Federal, State, public record, and other law enforcement sources of information.
Leadership Fundamentals: The Social Psychology of Trust for Leaders
This course is designed around highlighting the leadership soft-skills required in every situation from leadership challenges, motivating others, conflict resolution, implementing organizational change and any other of life’s challenges, whether they are work related or personal communication challenges, and specifically addresses:
- Introduction to Personality Assessment
- Communication Style Inventory (CSI)
- Rapport Building, Trust, and Influence
- Identifying YOUR communication style and the style of OTHERS
- Identify STRENGTHS when used to EXTREMES
- Identify how to adjust your communication style to better relate to others and influence in all situations
- CSI preferences and how they affect our leadership
- Generational differences and challenges
- The five step model of influence
- “Top Ten Techniques for Building Quick Rapport with Anyone.”
- How to IDENTIFY and BUILD upon that which you already know.
- Know YOURSELF and seek self-improvement
Whether your organization suffers espionage or criminal mischief, it all begins with a human being, an insider. This eight hour course examines the threats and risks posed by the manipulation of your people. Geared towards government organizations, private companies and government contractors, The Insider Threat will help you understand and mitigate these threats.
This eight hour course examines the intertwined histories of Iran and Lebanese Hezbollah with an eye toward understanding the threats posed by each, and giving students the means to recognize pre-incident indicators of Iranian and Hezbollah terrorist threat activity. Iran-Hezbollah is geared toward Fusion Center analysts, liaison officers, investigators and intelligence officers at all levels.
Crisis Action Planning Workshop
Originally developed for the Navy Installations Command and its worldwide network of geographical regional commands, this is a 2-3 day workshop culminating in a command post or emergency operations center exercise, tabletop exercises or both that looks at a variety of threats, natural and man-made, developing the ability of an organization to quickly and effectively assess the situation and develop the best plan of action. Using proven military planning processes (e.g., Military Decision-Making Process, Joint Planning Process, Marine Corps Planning Process and even Rapid Response Planning Process) in tailored, hybrid approach, it not only develops optimal operational plans, but also is instrumental in developing bona fide intelligence requirements dealing with real world threats and major contingencies, and for targeting the intelligence towards mission essential situational awareness and understanding – what is truly needed for decision makers.
Gap Analysis Workshop
This is a one day workshop or series of workshops that look at the variety of threats (and sometimes opportunities) facing government and larger corporations, or joint activities, then weighs the risks and vulnerability, and develops priorities that are eventually geared towards developing courses of action. It blends tabletop exercise or discussion using various analytical tools, and easily incorporates data from various database systems like Digital Sandbox. For Urban Area Security Initiative grant recipients, DHS has required this kind of rigorous analytical approach in determining where to allocate those funds. The Gap Analysis Workshop follows the standards established by PPD-8, the National Preparedness System (NPS), and the National Preparedness Goal (NPG).
Pre-Incident Indicators (PII)
This course provides valuable tools regarding the identification of Pre-Incident Indicators derived from actual terrorist plots and conspiracies. The workshop will examine recent terrorist events in the United States with the objective of identifying critical pre-incident indicators that led to the thwarting of these conspiracies.
Legal Aspects of Intelligence (a.k.a. “28 CFR PART 23”)
This advanced course is designed to familiarize Fusion Center personnel, TLOs/FLOs/ILOs and other public safety professionals involved with intelligence. It develops a working knowledge of the statutes and legal guidelines that regulate intelligence, state and federal, and reviews the regulatory concepts developed for protecting civil liberties of our constituents while also protecting the public from various threats, criminal or terrorist.
Sovereign Citizen Extremists
This advanced course examines the origin and ideology of the Sovereign Citizen extremist movement and discusses the tactics, techniques and procedures utilized by these anti-government extremists, including violence and “paper terrorism.” Criminal activities and the variety of “scams” by these extremists will be analyzed. In addition, recognizable behavioral indicators of sovereign citizen extremists will be identified, including their unusual interpretation of the constitution, various laws and concepts that includes “Posse Comitatus.”