Critical Infrastructure & High Value Assets Protection
Protective Services
Critical Infrastructure & High Value Assets Protection
Protective Services
Critical Infrastructure & High Value Assets Protection
Protective Services
Critical Infrastructure & High Value Assets Protection
Protective Services
Critical Infrastructure & High Value Assets Protection
Protective Services
Security - Investigation - Consulting - Homeland Security Training and Certification Institute
Criminal Justice
C4SEM-CJ-100 The Mission of Law Enforcement
24 Clock Hours
This course provides a comprehensive overview of the United States criminal justice system with a primary focus on law enforcement; including the recent change in the mission and the objectives in the aftermath of the attacks of September 11, 2001. It includes in-depth discussions on policy changes; the importance of professional, aggressive enforcement; information sharing; intelligence gathering; cooperation, coordination, and partnering strategies; and the need to stay abreast of current events.
Objectives:
-
Define the mission of law enforcement
-
Explain and discuss how and why the mission has changed as a result of the terrorist attacks of September 11, 2001
-
Identify and discuss what law enforcement can do to disrupt terrorist activity
-
Discuss various patrol strategies and how they can impact terrorism
-
Identify and discuss critical infrastructure
-
Define the term Target Hardening
-
Discuss law enforcement’s role when responding to a suspected terrorist act
-
Discuss how to gather and report intelligence about reporting terrorist activity
-
Identify available resources when dealing with terrorist activity
-
Explain the Office of Homeland Security’s Alert System
-
Explain how coordination, cooperation, and partnering between local, state, and federal agencies and private sectors have changed since the attacks of September 11, 2001
C4SEM-CJ-101 Individual Behavioral Indicators
24 Clock Hours
This course provides an overview of the principle ideology, policies, practices, beliefs, and procedures of the Al-Qaeda organization, based upon a document recovered by the Manchester (England) Metropolitan Police during a search of an Al-Qaeda member's home. The manual was found in a computer file described as "the military series" related to the "Declaration of Jihad." This Al-Qaeda Manuscript provides numerous behavioral indicators that may be indicative of terrorist activity.
Objectives:
-
Identify and discuss the FBI profile of a terrorist, a domestic terrorist, and an international terrorist
-
Explain and discuss the implication of the recovery of the military series of the Declaration of Jihad
-
Explain and discuss behavioral indicators in relation to a terrorist’s utilization of funds
-
Explain and discuss behavioral indicators in relation to a terrorist’s use of fraudulent documents
-
Explain and discuss behavioral indicators in relation to a terrorist’s selection of shelter and or housing
-
Explain and discuss behavioral indicators in relation to a terrorist’s means of communication
-
Explain and discuss behavioral indicators in relation to a terrorist’s method of travel
-
Explain and discuss behavioral indicators in relation to a terrorist’s method of gathering intelligence and conducting surveillance
C4SEM-CJ-102 Hate Crimes-Domestic Terrorism
24 Clock Hours
This course involves a study of the foundations of domestic terrorism with an examination of Domestic Terrorist Organizations, delineating between right-wing extremists, left-wing extremists, lone-wolf terrorists, and Special Interest/Single Issue organizations. Topics include a discussion of current and active domestic groups and their organizational structure, philosophies, and networks.
Objectives:
-
Define domestic terrorism
-
Explain domestic terrorism and its changing character
-
Discuss how domestic terrorism is defined both legally and socially
-
Examine the historical evolution of domestic terrorist philosophies
-
Analyze both early and contemporary domestic terrorist group organizations
-
Identify and investigate single- or special-interest terrorist networks
-
Discuss the challenges of domestic terrorism intelligence gathering
-
Explain how the image of a terrorist has transformed
-
List and explain the types of domestic terrorist groups
-
Define Special Interest Groups
C4SEM-CJ-103 Identity Theft-Fraudulent Documents
24 Clock Hours
This course provides an overview of the Al-Qaeda Manuscript and its specific focus on the instruct that all terrorist cell members receive. It focuses on the identification of fraudulent documentation when conducting an operation in an attempt to identify the security features associated with each form of identification, including the examination of the Resident Alien - Permanent Resident ID Cards (green cards), various state driver licenses, the Social Security Card and Visas/Passports.
Objectives:
-
Identify and discuss the general security features that can be used to identify documents as being either valid or fraudulent
-
Define holograms, ghost images, and micro-printing
-
Define and discuss secure ID and the changes in identification and documents security in a post-September 11, 2001 society
-
Explain and discuss the differences in the legal status of Permanent Resident Aliens, Non-Immigrant Aliens, and Undocumented Aliens and various visas
-
Define and discuss employment authorization documents and travel documents that aliens may possess
-
Explain and discuss the privileges and limitations associated with using an International Driving Permit
-
List general security features that can be used to identify passports, Social Security Cards, and other miscellaneous documents as valid or fraudulent
-
List countries from which foreign citizens may enter the United States without a visa and briefly explain why visas are not required
-
Explain and discuss basic fraud detection techniques to distinguish past and current immigration documents
-
Explain the elements or segments of the face used to detect the validity of a photo compared to an actual person
-
Explain the methods of photo comparison
-
Discuss terrorist’s procurement and use of identification
-
Define identity theft
C4SEM-CJ-104 Improvised Explosive Devices
24 Clock Hours
This course provides an introduction to the methods employed in an attack using both unconventional and conventional explosive devices, methodologies to employ when responding to a report of a suspected explosive device, and a visual presentation introducing the student to the common appearance of the different types of unconventional and conventional explosives, including Ammonium Nitrate, Semtex/C4, dynamite, and TNT. Identification and types of Improvised Explosive Devices.
Objectives:
-
Explain and discuss why IEDs are used by terrorists
-
Explain and discuss the general construction of bombs
-
Explain and discuss the protocol to follow upon notification or discovery of a suspicious package
-
Explain how a bomb works
-
Explain and discuss how a bomb causes damage and discuss post-blast effects and injuries
-
List the procedures to follow regarding a bomb threat
-
Identify different types and components of IEDs and explosives
-
Discuss protocols and procedures to follow at a post-explosion bomb scene
-
Explain and discuss general search guidelines for bomb scenes
-
Identify the keys to self-preservation
-
Explain and discuss injuries sustained at a bomb scene
C4SEM-CJ-105 Interview and Interrogation
24 Clock Hours
This course provides an in-depth overview of different techniques that can be employed by an investigator to become a more effective interviewer and interrogator. Students will be introduced to different types of behavior that serve as cues that can be utilized during the interrogation or interview process. It provides an examination of various debriefing techniques employed when conducting prisoner interviews and interrogations. In addition to examining the methodologies currently utilized by law enforcement, the FBI, and the CIA, there is a role-play scenario allowing students to utilize these skills while debriefing an instructor’s assistant. The proper selection and direction of questioning will result in the development of intelligence required to successfully identify and prevent a potential terrorist attack.
Objectives:
-
Explain and discuss the importance of both verbal and non-verbal communication and variation in different cultures
-
Explain and discuss how question phraseology will elicit different responses both verbally and non-verbally
-
Explain the profile of the interviewer and its relationship with the interviewee
-
Explain and discuss Behavioral Symptom Analysis and its applications during an interview or interrogation
-
Identify fight or flight manifestations that may be revealed during an interview or interrogation
C4EM-CJ-106 Hostile Surveillance and Terrorist Surveillance
24 Clock Hours
This course will provide students with an in-depth understanding of hostile surveillance methodology and the different types of hostile surveillance and measures that can be taken to identify, detect and respond to hostile surveillance. It includes the study of various types of surveillance (foot, vehicular, and technological) and the concepts of hostile surveillance and counter-surveillance.
Objectives:
-
Define and explain surveillance and why it is important to law enforcement
-
Define and discuss the principles of a successful surveillance
-
Explain the objectives of a surveillance operation
-
Explain and describe surveillance terminology
-
Identify and discuss the four types of surveillance: foot, vehicle, combined foot and vehicle, and static
-
Explain and discuss how to counter the four basic forms of surveillance
-
Discuss surveillance detection techniques
-
Explain and discuss surveillance pitfalls, common errors, and how to avoid them
-
Explain and discuss techniques that should be used when making observations and taking descriptions of a person, place, or vehicle
-
Describe and discuss the different mechanical devices used in surveillance operations
-
Define the term hostile surveillance
-
Explain and discuss the steps followed by most terrorist organizations in planning attacks
-
Discuss the indicators of terrorist planning and indicators that law enforcement can use to recognize those actions
-
Explain and discuss the seven steps that terrorists logically follow in planning and executing an attack
-
Describe and discuss suspicious activity that would indicate terrorist activity