30.09.2015 Views

Predictive Profiling

Predictive Profiling - Chameleon Associates

Predictive Profiling - Chameleon Associates

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SEMINAR PROGRAM<br />

DAY ONE Description<br />

09:00 - 09:10 Introduction to the course and the instructors<br />

09:10 - 10:30 The Nature of the Terrorist Threat -Audience will learn of the guiding principles<br />

for planning and executing a terrorist attack.<br />

10:30 - 10:45 Break<br />

10:45 - 11:30 Means of Aggression - Audience will learn about bomb configurations as well as<br />

concealment methods of means of aggression.<br />

11:30 - 11:40 Break<br />

11:40 – 12:30 Adversary’s Workshop - Audience will develop terrorist methods of operations<br />

through a red teaming table top exercise. Groups will present the terrorist methods<br />

of operations that they developed as a group. This exercise will be used to predict<br />

plausible terrorist methods of operations and subsequent suspicion indicators.<br />

12:30 - 13:30 Lunch<br />

13:30 - 15:00 Suicide Bombers - Methods of operations and the mitigation procedures used to<br />

thwart and prevent suicide terrorism<br />

15:00 – 15:15 Break<br />

15:45 – 17:00 <strong>Predictive</strong> <strong>Profiling</strong> - Audience will learn about the <strong>Predictive</strong> <strong>Profiling</strong> methodology<br />

and how to utilize it in threat assessments of people, objects and situations.<br />

DAY TWO Description<br />

09:00– 09:10 Recap<br />

09:10 – 10:10 Principles of Security System Testing & The Cyclical Security Engineering Process<br />

Audience will learn how to plan and implement Security System Testing drills and<br />

the effectiveness of a test for keeping the security system threat oriented. Audience<br />

will learn how to engineer predictive profiling into security operations in an<br />

effective manner.<br />

10:10 – 10:25 Break<br />

10:25 -11:15 Psychology of Threat Assessment and Decision Making – This module covers the<br />

psychological elements that influence decision making for both the adversary and<br />

the questioning officer.<br />

11:15 – 12:30 Principles of Questioning – This module general questioning techniques and the<br />

differences between law enforcement approaches, intelligence driven questioning,<br />

security questioning and interrogation.<br />

12:30 -13:30 Lunch<br />

13:30 – 15:00 Security Questioning – This module discusses the methods for effective security<br />

questioning and some of the suspicion indicators associated with individuals being<br />

questioned.<br />

15:00 – 15:15 Break<br />

15:15 – 16:00 Questioning and Technology - Audience will learn how to integrate questioning<br />

into a screening process that uses technology. Questioning is necessary to refute<br />

suspicion or threat that was identified using technology<br />

16:00 – 16:30 Questioning workshop – Trainees will exercise questioning a source under different<br />

scenarios such as: a volunteering source, a potentially betraying source and other…<br />

16:30 -17:00 Q & A – Conclusion & Handing Out Certificates<br />

!"#$%&$%&'()&'*&+#)&,)%+&-./%%)%&012)&/++)(3)3&$(&45&-/6))67&&"#)&'(.5&<br />

-'48./$(+&0&#/2)&$%&$+&$%&*/6&+''&%#'6+&+'&,)&+69.5&)**)-+$2)7&&0+&%#'9.3&,)&/&<br />

4$($494:&'()&4'(+#&.'(;7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!