Predictive Profiling
Predictive Profiling - Chameleon Associates
Predictive Profiling - Chameleon Associates
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
SEMINAR PROGRAM<br />
DAY ONE Description<br />
09:00 - 09:10 Introduction to the course and the instructors<br />
09:10 - 10:30 The Nature of the Terrorist Threat -Audience will learn of the guiding principles<br />
for planning and executing a terrorist attack.<br />
10:30 - 10:45 Break<br />
10:45 - 11:30 Means of Aggression - Audience will learn about bomb configurations as well as<br />
concealment methods of means of aggression.<br />
11:30 - 11:40 Break<br />
11:40 – 12:30 Adversary’s Workshop - Audience will develop terrorist methods of operations<br />
through a red teaming table top exercise. Groups will present the terrorist methods<br />
of operations that they developed as a group. This exercise will be used to predict<br />
plausible terrorist methods of operations and subsequent suspicion indicators.<br />
12:30 - 13:30 Lunch<br />
13:30 - 15:00 Suicide Bombers - Methods of operations and the mitigation procedures used to<br />
thwart and prevent suicide terrorism<br />
15:00 – 15:15 Break<br />
15:45 – 17:00 <strong>Predictive</strong> <strong>Profiling</strong> - Audience will learn about the <strong>Predictive</strong> <strong>Profiling</strong> methodology<br />
and how to utilize it in threat assessments of people, objects and situations.<br />
DAY TWO Description<br />
09:00– 09:10 Recap<br />
09:10 – 10:10 Principles of Security System Testing & The Cyclical Security Engineering Process<br />
Audience will learn how to plan and implement Security System Testing drills and<br />
the effectiveness of a test for keeping the security system threat oriented. Audience<br />
will learn how to engineer predictive profiling into security operations in an<br />
effective manner.<br />
10:10 – 10:25 Break<br />
10:25 -11:15 Psychology of Threat Assessment and Decision Making – This module covers the<br />
psychological elements that influence decision making for both the adversary and<br />
the questioning officer.<br />
11:15 – 12:30 Principles of Questioning – This module general questioning techniques and the<br />
differences between law enforcement approaches, intelligence driven questioning,<br />
security questioning and interrogation.<br />
12:30 -13:30 Lunch<br />
13:30 – 15:00 Security Questioning – This module discusses the methods for effective security<br />
questioning and some of the suspicion indicators associated with individuals being<br />
questioned.<br />
15:00 – 15:15 Break<br />
15:15 – 16:00 Questioning and Technology - Audience will learn how to integrate questioning<br />
into a screening process that uses technology. Questioning is necessary to refute<br />
suspicion or threat that was identified using technology<br />
16:00 – 16:30 Questioning workshop – Trainees will exercise questioning a source under different<br />
scenarios such as: a volunteering source, a potentially betraying source and other…<br />
16:30 -17:00 Q & A – Conclusion & Handing Out Certificates<br />
!"#$%&$%&'()&'*&+#)&,)%+&-./%%)%&012)&/++)(3)3&$(&45&-/6))67&&"#)&'(.5&<br />
-'48./$(+&0&#/2)&$%&$+&$%&*/6&+''&%#'6+&+'&,)&+69.5&)**)-+$2)7&&0+&%#'9.3&,)&/&<br />
4$($494:&'()&4'(+#&.'(;7