18 - 21 October , 2011

Having trouble viewing this email?
click here

This Issue

Small hr

Course Information

Date: 18-21 Oct 11
Time: 9am to 5pm
Venue:Concorde Hotel, Orchard
(Formerly Le Meridien Hotel)
Fee : S$2900 NETT

To register, please contact Jaslyn
@ 9767 9686 or

Registration is on a 1st come 1st
serve basis. Register early to avoid
Click here for registration form
Small hr


If you no longer wish to receive
this email
please unsubscribe


Worldwide recognised ATO course Now in Singapore !

Featuring Mr Craig S Gundry, World Acclaimed specialist in force protection and anti-errorism with the United States Army, and also consultant for numerous media organisations including CNN and Fox News Network on issues relating to terrorism

The Anti-Terrorism Officer (ATO) Course is designed to prepare security and law enforcement professionals for assignments involving the protection of facilities against terrorist attack. This program provides a detailed exploration of contemporary terrorist methods and essential skills and knowledge that all anti-terrorism personnel should possess.

Who Should Attend?

Security Officers, Security Directors, Military Force Protection Personnel, Police Officers Assigned to Anti-Terrorism Activities



Learning Objectives

Students attending Anti-Terrorism Officer (ATO) Programme will acquire the following skills and competencies:

  • Recognizing risks associated with contemporary terrorism including an in-depth understanding of contemporary terrorist modus operandi
  • Identifying general security requirements essential to reducing terrorism related risk
  • Assessing facility risks and utilizing risk management principles in anti-terrorism planning
  • Implementing Operations Security (OPSEC) and protective counterintelligence principles to impair terrorists’ ability to gather target intelligence, including:
  • Implementing appropriate sound information security principles
  • Recognizing possible attempts to collect target intelligence
  • Documenting suspicious activity
  • Investigating and analyzing trends of suspicious activity
  • Performance-based physical security design as applicable to anti-terrorism
  • Screening and searching entrants at facility and building entry points, including:
  • Implementing facility access control procedures
  • Questioning entrants and identifying behavioral signs of deception
  • Recognizing indications of falsified or altered identity documents
  • Safely searching hand-carried objects at access control points
  • Safely searching vehicles at access control points
  • Using technical aids for conducting search and screening
  • Identifying hazardous devices, possible device components, and risks associated with hazardous devices
  • Recognizing indications of terrorist attack or impending terrorist events, including:
  • Recognizing possible hazardous device deliveries
  • Screening mail and deliveries for indications of potential hazards
  • Recognizing indications of chemical or biological attack
  • Safely responding to terrorist incidents and facility-level security response planning:
  • Bomb threats
  • Suspicious hand-carried objects
  • Suspicious vehicles (Possible vehicle bomb deliveries)
  • Suspicious mail
  • Unopened mail
  • Possible contaminated mailings (after opening)
  • Post-Blast Response
  • Chemical/Biological/Radiological attack (Indoor Aerosol/Vapor)
  • Chemical/Biological/Radiological attack (Outdoor Aerosol/Vapor)
  • Chemical/Biological/Radiological attack (Covert)

What Will You Receive?

In addition to 32-hours of instruction, all students attending the Anti-Terrorism Officer Course will receive the following:

  • Certificate of Completion suitable for framing
  • Course notebook including over 250 pages of slides and reference material
  • 1-Year Membership in the International Association of Counterterrorism and Security Professionals (IACSP), including one-year subscription to Counterterrorism & Homeland Security International magazine. Existing IACSP members will receive one-year renewal of membership)
  • 1-Year S2 Institute Membership
  • S2 Institute Anti-Terrorism Officer Challenge Coin

About International Association for Counterterrorism and Security Professionals (IACSP)

Founded in 1992, International Association for Counterterrorism and Security Professionals (IACSP) is an international professional body based in USA which is dedicated to the professional development of security and counter-terrorism professionals across the world. IACSP is focus on all aspects of counterterrorism and will serve its members as a focal point through its suite of professional certification programs, conferences and workshops. As a membership organization, IACSP serves as an excellent platform for security professionals across the world to learn and exchange knowledge from one another and to promote international cooperation in counterterrorism policy IACSP has extensive industry and military links to security professionals across US and Europe and is now expanding its global footprint into Asia through its collaboration with S2 Institute and Centre for Behavioral Science (CBS).


Schedule & Outline

Day One Program Agenda

1. Anti-Terrorism Officers (ATOs)
        1.1 ATO Functions & Responsibilities
        1.2 ATO Skills
2. Introduction to Terrorism
        2.1 Definition
        2.2 Ideological Motives
        2.3 Strategic Objectives
        2.4 Types of Terrorist Targets
        2.5 Target Selection Criteria
        2.6 Categories of Terrorism Related Risk
                2.6.1 Explosive Attack
                2.6.2 Kidnapping
                2.6.3 Armed Attack
               Armed Occupation
               Barricaded Hostage
                2.6.4 Arson
                2.6.5 Chemical/Biological/Radiological (CBR)
                2.6.6 Nuclear
                2.6.7 Cyber Attack
                2.6.8 IEMI/Radio Frequency Weapon Attacks
        2.7 Terrorist Planning and Execution Phases
3. Threat: Explosive Attacks
        3.1 Types of Explosive Devices
        3.2 Characteristics of Chemical Explosions
        3.3 High vs Low Explosives
        3.4 Sensitivity of Explosives
3.5 Initiation
        3.5.1 Blasting Caps
        3.5.2 Detonating Cord
        3.5.3 Boosters
        3.5.4 The Firing Train
3.6 Common Explosives
        3.6.1 Commercial Explosives
        3.6.2 Military Explosives
        3.6.3 Improvised Explosives
        3.6.4 Conventional Ordnance
3.7 Gas Enhanced IEDs
3.8 Activation
        3.8.1 Time Delay
        3.8.2 Anti-Disturbance
        3.8.3 Environmental Change
        3.8.4 Command Detonation
        3.8.5 Unique Terrorist Modus Operandi
3.9 Device Concealment
3.10 Damage Potential
        3.10.1 Types of Destructive Forces
        3.10.2 Estimating Charge Size
        3.10.3 Overpressure Range Effects Estimation
3.11 Explosive Employment Scenarios: Land Facilities
        3.11.1 Hand Delivered IEDs
        3.11.2 Vehicle Borne IEDs
        3.11.3 Projected Charge Attacks
               Direct Fire
               Indirect Fire
  3.12 Explosive Employment Scenarios: Piers & Watercraft
        3.12.1 Limpet Mine Attacks
        3.12.2 Submerged Proximity Charges
        3.12.3 Surface Vessel Borne IEDs

Day Two Program Agenda

4. Threat: Chemical & Biological Terrorism
        4.1 Common Assumptions About CB Terrorism
        4.2 Why Use CB Agents?
        4.3 CB Terrorists
        4.4 Challenges faced By CB Terrorists
        4.5 Requisite Characteristics of CB Agents
        4.5.1 Terrorist vs Military Agents
        4.6 Routes of Exposure
        4.7 Symptoms
        4.8 Chemical Agents
        .9 Agents of Biological Origin
        4.10 Dissemination of CB Agents
        4.11 CB Employment Scenarios
                4.11.1 On-Target Facility Attacks
               Point Source Contamination
               IDD Attacks
               Contaminated Deliveries
                4.11.2 Off-Target Facility Attacks
               Point Source Contamination
               Outdoor Aerosol/Vapor Attacks
               Projected Charge Weapons
                4.11.3 Attacks Against Employees at Off-Site Venue
               Food & Beverage Contamination
               CB Projectile Weapon
5. Anti-Terrorism Planning
        5.1 Integrated Countermeasures Theory
        5.2 Proactive Countermeasures
        5.3 Reactive/Mitigative Countermeasures
6. Operations Security (OPSEC)
        6.1 Terrorist Intelligence Requirements
        6.2 Terrorist Intelligence Collection Methods
        6.3 Complexity of Intelligence Requirements
        6.4 Protective Counterintelligence/OPSEC
        6.5 Information Security
        6.6 Employee/Contractor Screening & Monitoring
                        6.6.1 Background Flags
                        6.6.2 HUMINT Indicators
        6.7 Surveillance Detection
                        6.7.1 Surveillance Detection Guidelines
                        6.7.2 Active Counter-Surveillance
        6.8 Suspicious Activity Investigation
                        6.8.1 Suspicious Telephone Inquiries
                        6.8.2 Possible On-Site Reconnaissance
                        6.8.3 Possible Off-Site Surveillance
                        6.8.4 Possible Elicitation Contacts
                        6.8.5 Recruitment Approaches
                        6.8.6 Theft of ID Cards, Company Vehicle Stickers, etc.
          6.9 Suspicious Activity Reporting & Analysis

Day Three Program Agenda

7. Physical Security & Access Control
        7.1 Physical Security Theory
                        7.1.1 Physical Security System Functions
                        7.1.2 Integrated Systems
                        7.1.3 Performance Definition
                        7.1.4 Common Design Flaws
                        7.1.5 System Design Guidelines
        7.2 Physical Security Components
                        7.2.1 Intrusion Detection Systems
                        7.2.2 Area Surveillance
                       Stationary Posts
                       Mobile Patrols
                       Intrusion Indicators
                       Bomb Delivery indicators
7.2.3 Barriers
                       Conventional Barriers
                       Delay Time Calculation
                       Barrier System Design
                       Vehicle Barriers
                       Kinetic Energy Calculation
                        Vehicle Barrier System Design Vehicle Entry Points
                        Entry Point Design
                       Active Barriers
        7.3 Access Control
                        7.3.1 Planning Considerations
                        7.3.2 Types of Entrants
                        7.3.3 Entrant Identification
                        7.3.4 Access Screening Technologies
               X-Ray Based Technologies
               Explosive Trace Detection
               Nuclear Detection Systems
               Explosive Detection Canines
                        7.3.5 Human Entry Screening
                       Initial Considerations
                       Identity Document Examination
                       Entrant Screening Methodology
                       Behavioral Threat Indicators
                       Hand Search of Personal Objects
                                7.3.6 Vehicle Entry Screening
                       Initial Considerations
                       Driver Screening
                        Driver Documents
                        Vehicle Search Procedures
                        VBIED Threat Indicators
        7.4 Additional Proactive Security Issues
                7.4.1 Limited Concealment Opportunities
                7.4.2 Obscuration
               Projected Charge Weapon Dynamics
               Obscuration Screens
                        7.4.3 Point Source Protection
               Physical Security for Possible Contamination Points
               Cafeteria and Break Room Countermeasures
               Water Filtration
               Air Filtration

Day Four Program Agenda

8. Blast Mitigation & Facility Design
        8.1 Blast Mitigation Strategies
        8.2 Minimizing Fragmentation Hazards
8.2.1 Blast Walls
        8.3 Structural Design
8.3.1 Structural Shape
8.3.2 Structural Support
8.3.3 Façade Construction & Fenestration Glazing Systems TTG Glass Security Window Films Laminated Glass Blast Curtains
        8.4 Emergency Access & Evacuation Requirements
        8.5 Protection of Building Subsystems
         8.6 Utilization & Protective Asset Positioning
         8.7 Blast Suppression Systems
9. Mail Security
        9.1 Types of Hazardous Mailings
9.1.1 Mail Bombs Characteristics of Letter Bombs Characteristics of Package Bombs
9.1.2 Contaminated Mailings
9.1.3 Improvised Projectile Devices
        9.2 Mail Security Planning
9.2.1 Initial Considerations
9.3 Physical Mail Screening
9.3.1 Threat Indicators
9.3.2 Case Studies
9.4 Technical Mail Screening
9.5 Response to Hazardous Mailings
9.5.1 Suspect Mail Bomb Response
9.5.2 Response to Contaminated Mailings
10. Response to Terrorist Incidents
        10.1 Incident Response Scenarios
        10.2 Response Priorities
        10.3 Responsibilities
        10.4 Weapons of Mass Destruction
10.4.1 WMD Response Authority
10.5 Bomb Threat Response
        10.5.1 Bomb Threat Motives
       Malevolent Bomb Threat Strategies
        10.5.2 Bomb Threat Planning Considerations
        0.5.3 Search and Response Approaches
       Security Team Search
       Employee Work Area Search
       Police Directed Search
        10.5.4 Search Safety
        10.5.5 Security Team Search Walk Through
       Managing Bomb Threat Calls
       Search Procedures
       Room Search Techniques
        10.5.6 Bomb Threat Response & The Real World
        10.5.7 Response to Suspicious Objects
        10.6 Suspicious Vehicle Response
                10.6.1 Initial Alert & Refuge
                10.6.2 TSWG Evacuation and Refuge Guidelines
                 10.6.3 Refuge Procedures
                10.6.4 Evacuation Procedures
        10.7 Post-Blast Response
                10.7.1 Types of Post-Blast Scenarios
                10.7.2 Localized Bombings Characteristics of Localized Bombings
               Facility Damage
               Casualties and Injury Types
               Post-Blast Hazards
               Localized Response Procedures
                10.7.3 Conventional Weapon of Mass Destruction Incidents
       Characteristics of CWMD Incidents
               Facility Damage
               Casualties and Injury Types
               Post-Blast Hazards
               CWMD Public Safety Response
               CWMD Response Scenario
       CWMD Facility Response Guidelines
               Important Safety Guidelines
       Post-Incident Recovery Issues
        10.8 Chemical & Biological Attack Response
         10.8.1 Unique Response Issues
         10.8.2 Key Players
         10.8.3 Responsibilities
         10.8.4 Public Safety Response Sequence
         10.8.5 Facility-Level Response
         Attack Recognition
                  Chemical Attack Indicators
                  Biological Attack Indicators
         Response to Indoor Aerosol/Vapor Attacks
                  Expedient Respiratory and Skin Protection
                  Emergency Decontamination
         Response to Outdoor Aerosol/Vapor Attacks
                  Shelter-In-Place Procedures
                  Emergency Evacuation Procedures
         Response to Covert CB Attacks


About the Instructor

Craig S. Gundry, CPS, ATO, CHS-III

Craig Gundry is the S2 Institute’s lead instructor for anti-terrorism subjects and the Vice President of Special Projects for Critical Intervention Services (CIS). Mr. Gundry is responsible for directing CIS consulting and training projects pertaining to terrorism and security management, including the development of doctrine and training for the CIS Anti-Terrorism Officer Division. Prior to joining CIS, Mr. Gundry was the President of Palladium Media Group, a company specializing in training and consulting on explosive, chemical, and biological terrorism. Mr. Gundry's expertise in anti-terrorism began as a specialist in force protection and anti-terrorism with the United States Army.

Mr. Gundry is the author of the acclaimed Bomb Countermeasures for Security Professionals CD-ROM and a new book on assessing terrorism-related risk. Mr. Gundry is also a frequent consultant on issues relating to terrorism and weapons of mass destruction and has provided expert commentary for numerous media organizations including Al-Jazeera, CNN, and Fox News Network.

As an instructor, Mr. Gundry has been training security, police, and emergency responders in terrorism-related issues for over 16 years. His previous students have included security professionals, facility managers, military personnel, police officers, and federal officials from over 30 nations.

Copyright 2009 CBS. All Rights Reserved
This email is an advertisement. You are currently subscribed to our mailing list. We sincerely apologize if you find this email an intrusion of your privacy or a source of inconvenience to you.
If you no longer wish to receive our email advertisements - please reply "unsubscribe" Thank you.