18 - 21 October , 2011

Having trouble viewing this email?
click here
 
   

This Issue

Small hr

Course Information


Date: 18-21 Oct 11
Time: 9am to 5pm
Venue:Concorde Hotel, Orchard
(Formerly Le Meridien Hotel)
Fee : S$2900 NETT

To register, please contact Jaslyn
@ 9767 9686 or
jaslyn@cbsgroup.com.sg

Registration is on a 1st come 1st
serve basis. Register early to avoid
disappointment.
Click here for registration form
Small hr

Unsubscribe

If you no longer wish to receive
this email
please unsubscribe
 

ANTI-TERRORISM OFFICER (ATO) COURSE

Worldwide recognised ATO course Now in Singapore !

Featuring Mr Craig S Gundry, World Acclaimed specialist in force protection and anti-errorism with the United States Army, and also consultant for numerous media organisations including CNN and Fox News Network on issues relating to terrorism

The Anti-Terrorism Officer (ATO) Course is designed to prepare security and law enforcement professionals for assignments involving the protection of facilities against terrorist attack. This program provides a detailed exploration of contemporary terrorist methods and essential skills and knowledge that all anti-terrorism personnel should possess.


Who Should Attend?

Security Officers, Security Directors, Military Force Protection Personnel, Police Officers Assigned to Anti-Terrorism Activities

 

 
 


Learning Objectives

Students attending Anti-Terrorism Officer (ATO) Programme will acquire the following skills and competencies:

  • Recognizing risks associated with contemporary terrorism including an in-depth understanding of contemporary terrorist modus operandi
  • Identifying general security requirements essential to reducing terrorism related risk
  • Assessing facility risks and utilizing risk management principles in anti-terrorism planning
  • Implementing Operations Security (OPSEC) and protective counterintelligence principles to impair terrorists’ ability to gather target intelligence, including:
  • Implementing appropriate sound information security principles
  • Recognizing possible attempts to collect target intelligence
  • Documenting suspicious activity
  • Investigating and analyzing trends of suspicious activity
  • Performance-based physical security design as applicable to anti-terrorism
  • Screening and searching entrants at facility and building entry points, including:
  • Implementing facility access control procedures
  • Questioning entrants and identifying behavioral signs of deception
  • Recognizing indications of falsified or altered identity documents
  • Safely searching hand-carried objects at access control points
  • Safely searching vehicles at access control points
  • Using technical aids for conducting search and screening
  • Identifying hazardous devices, possible device components, and risks associated with hazardous devices
  • Recognizing indications of terrorist attack or impending terrorist events, including:
  • Recognizing possible hazardous device deliveries
  • Screening mail and deliveries for indications of potential hazards
  • Recognizing indications of chemical or biological attack
  • Safely responding to terrorist incidents and facility-level security response planning:
  • Bomb threats
  • Suspicious hand-carried objects
  • Suspicious vehicles (Possible vehicle bomb deliveries)
  • Suspicious mail
  • Unopened mail
  • Possible contaminated mailings (after opening)
  • Post-Blast Response
  • Chemical/Biological/Radiological attack (Indoor Aerosol/Vapor)
  • Chemical/Biological/Radiological attack (Outdoor Aerosol/Vapor)
  • Chemical/Biological/Radiological attack (Covert)
 
     
 

What Will You Receive?

In addition to 32-hours of instruction, all students attending the Anti-Terrorism Officer Course will receive the following:

  • Certificate of Completion suitable for framing
  • Course notebook including over 250 pages of slides and reference material
  • 1-Year Membership in the International Association of Counterterrorism and Security Professionals (IACSP), including one-year subscription to Counterterrorism & Homeland Security International magazine. Existing IACSP members will receive one-year renewal of membership)
  • 1-Year S2 Institute Membership
  • S2 Institute Anti-Terrorism Officer Challenge Coin
 
     
 

About International Association for Counterterrorism and Security Professionals (IACSP)

Founded in 1992, International Association for Counterterrorism and Security Professionals (IACSP) is an international professional body based in USA which is dedicated to the professional development of security and counter-terrorism professionals across the world. IACSP is focus on all aspects of counterterrorism and will serve its members as a focal point through its suite of professional certification programs, conferences and workshops. As a membership organization, IACSP serves as an excellent platform for security professionals across the world to learn and exchange knowledge from one another and to promote international cooperation in counterterrorism policy IACSP has extensive industry and military links to security professionals across US and Europe and is now expanding its global footprint into Asia through its collaboration with S2 Institute and Centre for Behavioral Science (CBS).

 
     
 

Schedule & Outline

Day One Program Agenda

1. Anti-Terrorism Officers (ATOs)
        1.1 ATO Functions & Responsibilities
        1.2 ATO Skills
2. Introduction to Terrorism
        2.1 Definition
        2.2 Ideological Motives
        2.3 Strategic Objectives
        2.4 Types of Terrorist Targets
        2.5 Target Selection Criteria
        2.6 Categories of Terrorism Related Risk
                2.6.1 Explosive Attack
                2.6.2 Kidnapping
                2.6.3 Armed Attack
                        2.6.3.1 Hijacking
                        2.6.3.2 Armed Occupation
                        2.6.3.3 Barricaded Hostage
                2.6.4 Arson
                2.6.5 Chemical/Biological/Radiological (CBR)
                2.6.6 Nuclear
                2.6.7 Cyber Attack
                2.6.8 IEMI/Radio Frequency Weapon Attacks
        2.7 Terrorist Planning and Execution Phases
3. Threat: Explosive Attacks
        3.1 Types of Explosive Devices
        3.2 Characteristics of Chemical Explosions
        3.3 High vs Low Explosives
        3.4 Sensitivity of Explosives
3.5 Initiation
        3.5.1 Blasting Caps
        3.5.2 Detonating Cord
        3.5.3 Boosters
        3.5.4 The Firing Train
3.6 Common Explosives
        3.6.1 Commercial Explosives
        3.6.2 Military Explosives
        3.6.3 Improvised Explosives
        3.6.4 Conventional Ordnance
3.7 Gas Enhanced IEDs
3.8 Activation
        3.8.1 Time Delay
        3.8.2 Anti-Disturbance
        3.8.3 Environmental Change
        3.8.4 Command Detonation
        3.8.5 Unique Terrorist Modus Operandi
3.9 Device Concealment
3.10 Damage Potential
        3.10.1 Types of Destructive Forces
        3.10.2 Estimating Charge Size
        3.10.3 Overpressure Range Effects Estimation
3.11 Explosive Employment Scenarios: Land Facilities
        3.11.1 Hand Delivered IEDs
                        3.11.1.1 Covert
                        3.11.1.2 Overt
                        3.11.1.3 Deceptive
                        3.11.1.4 Naïve
        3.11.2 Vehicle Borne IEDs
                        3.11.2.1 Covert
                        3.11.2.2 Overt
                        3.11.2.3 Deceptive
                        3.11.2.4 Naïve
                        3.11.2.5 Proxy
        3.11.3 Projected Charge Attacks
                        3.11.3.1 Direct Fire
                        3.11.3.2 Indirect Fire
  3.12 Explosive Employment Scenarios: Piers & Watercraft
        3.12.1 Limpet Mine Attacks
        3.12.2 Submerged Proximity Charges
        3.12.3 Surface Vessel Borne IEDs

Day Two Program Agenda

4. Threat: Chemical & Biological Terrorism
        4.1 Common Assumptions About CB Terrorism
        4.2 Why Use CB Agents?
        4.3 CB Terrorists
        4.4 Challenges faced By CB Terrorists
        4.5 Requisite Characteristics of CB Agents
        4.5.1 Terrorist vs Military Agents
        4.6 Routes of Exposure
        4.7 Symptoms
        4.8 Chemical Agents
        .9 Agents of Biological Origin
        4.10 Dissemination of CB Agents
        4.11 CB Employment Scenarios
                4.11.1 On-Target Facility Attacks
                        4.11.1.1 Point Source Contamination
                        4.11.1.2 IDD Attacks
                        4.11.1.3 Contaminated Deliveries
                4.11.2 Off-Target Facility Attacks
                        4.11.2.1 Point Source Contamination
                        4.11.2.2 Outdoor Aerosol/Vapor Attacks
                        4.11.2.3 Projected Charge Weapons
                4.11.3 Attacks Against Employees at Off-Site Venue
                        4.11.3.1 Food & Beverage Contamination
                        4.11.3.2 CB Projectile Weapon
5. Anti-Terrorism Planning
        5.1 Integrated Countermeasures Theory
        5.2 Proactive Countermeasures
        5.3 Reactive/Mitigative Countermeasures
6. Operations Security (OPSEC)
        6.1 Terrorist Intelligence Requirements
        6.2 Terrorist Intelligence Collection Methods
        6.3 Complexity of Intelligence Requirements
        6.4 Protective Counterintelligence/OPSEC
        6.5 Information Security
        6.6 Employee/Contractor Screening & Monitoring
                        6.6.1 Background Flags
                        6.6.2 HUMINT Indicators
        6.7 Surveillance Detection
                        6.7.1 Surveillance Detection Guidelines
                        6.7.2 Active Counter-Surveillance
        6.8 Suspicious Activity Investigation
                        6.8.1 Suspicious Telephone Inquiries
                        6.8.2 Possible On-Site Reconnaissance
                        6.8.3 Possible Off-Site Surveillance
                        6.8.4 Possible Elicitation Contacts
                        6.8.5 Recruitment Approaches
                        6.8.6 Theft of ID Cards, Company Vehicle Stickers, etc.
          6.9 Suspicious Activity Reporting & Analysis

Day Three Program Agenda

7. Physical Security & Access Control
        7.1 Physical Security Theory
                        7.1.1 Physical Security System Functions
                        7.1.2 Integrated Systems
                        7.1.3 Performance Definition
                        7.1.4 Common Design Flaws
                        7.1.5 System Design Guidelines
        7.2 Physical Security Components
                        7.2.1 Intrusion Detection Systems
                        7.2.2 Area Surveillance
                                7.2.1.1 CCTV
                                7.2.1.2 Stationary Posts
                                7.2.1.3 Mobile Patrols
                                7.2.1.4 Intrusion Indicators
                                7.2.1.5 Bomb Delivery indicators
7.2.3 Barriers
                                7.2.3.1 Conventional Barriers
                                7.2.3.1.1 Delay Time Calculation
                                7.2.3.1.2 Barrier System Design
                                7.2.3.2 Vehicle Barriers
                                7.2.3.2.1 Kinetic Energy Calculation
                                 7.2.3.2.2 Vehicle Barrier System Design
7.2.3.3 Vehicle Entry Points
                                 7.2.3.3.1 Entry Point Design
                                7.2.3.3.2 Active Barriers
        7.3 Access Control
                        7.3.1 Planning Considerations
                        7.3.2 Types of Entrants
                        7.3.3 Entrant Identification
                        7.3.4 Access Screening Technologies
                        7.3.4.1 X-Ray Based Technologies
                        7.3.4.2 Explosive Trace Detection
                        7.3.4.3 Nuclear Detection Systems
                        7.3.4.4 Explosive Detection Canines
                        7.3.5 Human Entry Screening
                                7.3.5.1 Initial Considerations
                                7.3.5.2 Identity Document Examination
                                7.3.5.3 Entrant Screening Methodology
                                7.3.5.4 Behavioral Threat Indicators
                                7.3.5.5 Hand Search of Personal Objects
                                7.3.6 Vehicle Entry Screening
                                7.3.6.1 Initial Considerations
                                7.3.6.2 Driver Screening
                                 7.3.6.3 Driver Documents
                                 7.3.6.4 Vehicle Search Procedures
                                 7.3.6.4.1 VBIED Threat Indicators
        7.4 Additional Proactive Security Issues
                7.4.1 Limited Concealment Opportunities
                7.4.2 Obscuration
                        7.4.2.1 Projected Charge Weapon Dynamics
                        7.4.2.2 Obscuration Screens
                        7.4.3 Point Source Protection
                        7.4.3.1 Physical Security for Possible Contamination Points
                        7.4.3.2 Cafeteria and Break Room Countermeasures
                        7.4.3.3 Water Filtration
                        7.4.3.4 Air Filtration

Day Four Program Agenda

8. Blast Mitigation & Facility Design
        8.1 Blast Mitigation Strategies
        8.2 Minimizing Fragmentation Hazards
8.2.1 Blast Walls
        8.3 Structural Design
8.3.1 Structural Shape
8.3.2 Structural Support
8.3.3 Façade Construction & Fenestration
8.3.3.1 Glazing Systems
8.3.3.2 TTG Glass
8.3.3.3 Security Window Films
8.3.3.4 Laminated Glass
8.3.3.5 Blast Curtains
        8.4 Emergency Access & Evacuation Requirements
        8.5 Protection of Building Subsystems
         8.6 Utilization & Protective Asset Positioning
         8.7 Blast Suppression Systems
9. Mail Security
        9.1 Types of Hazardous Mailings
9.1.1 Mail Bombs
9.1.1.1 Characteristics of Letter Bombs
9.1.1.2 Characteristics of Package Bombs
9.1.2 Contaminated Mailings
9.1.3 Improvised Projectile Devices
        9.2 Mail Security Planning
9.2.1 Initial Considerations
9.3 Physical Mail Screening
9.3.1 Threat Indicators
9.3.2 Case Studies
9.4 Technical Mail Screening
9.5 Response to Hazardous Mailings
9.5.1 Suspect Mail Bomb Response
9.5.2 Response to Contaminated Mailings
10. Response to Terrorist Incidents
        10.1 Incident Response Scenarios
        10.2 Response Priorities
        10.3 Responsibilities
        10.4 Weapons of Mass Destruction
10.4.1 WMD Response Authority
10.5 Bomb Threat Response
        10.5.1 Bomb Threat Motives
                10.5.1.1 Malevolent Bomb Threat Strategies
        10.5.2 Bomb Threat Planning Considerations
        0.5.3 Search and Response Approaches
                10.5.3.1 Security Team Search
                10.5.3.2 Employee Work Area Search
                10.5.3.3 Police Directed Search
        10.5.4 Search Safety
        10.5.5 Security Team Search Walk Through
                10.5.5.1 Managing Bomb Threat Calls
                10.5.5.2 Search Procedures
                10.5.5.2.1 Room Search Techniques
        10.5.6 Bomb Threat Response & The Real World
        10.5.7 Response to Suspicious Objects
        10.6 Suspicious Vehicle Response
                10.6.1 Initial Alert & Refuge
                10.6.2 TSWG Evacuation and Refuge Guidelines
                 10.6.3 Refuge Procedures
                10.6.4 Evacuation Procedures
        10.7 Post-Blast Response
                10.7.1 Types of Post-Blast Scenarios
                10.7.2 Localized Bombings
10.7.2.1 Characteristics of Localized Bombings
                        10.7.2.1.1 Facility Damage
                        10.7.2.1.2 Casualties and Injury Types
                        10.7.2.1.3 Post-Blast Hazards
                        10.7.2.2 Localized Response Procedures
                10.7.3 Conventional Weapon of Mass Destruction Incidents
                10.7.3.1 Characteristics of CWMD Incidents
                        10.7.3.1.1 Facility Damage
                        10.7.3.1.2 Casualties and Injury Types
                        10.7.3.1.3 Post-Blast Hazards
                        10.7.3.2 CWMD Public Safety Response
                        10.7.3.2.1 CWMD Response Scenario
                10.7.3.2.2 Triage
                10.7.3.3 CWMD Facility Response Guidelines
                        10.7.3.3.1 Important Safety Guidelines
                10.7.3.4 Post-Incident Recovery Issues
        10.8 Chemical & Biological Attack Response
         10.8.1 Unique Response Issues
         10.8.2 Key Players
         10.8.3 Responsibilities
         10.8.4 Public Safety Response Sequence
         10.8.5 Facility-Level Response
                  10.8.5.1 Attack Recognition
                           10.8.5.1.1 Chemical Attack Indicators
                           10.8.5.1.2 Biological Attack Indicators
                  10.8.5.2 Response to Indoor Aerosol/Vapor Attacks
                           10.8.5.2.1 Evacuation
                           10.8.5.2.2 Expedient Respiratory and Skin Protection
                           10.8.5.2.3 Emergency Decontamination
                  10.8.5.3 Response to Outdoor Aerosol/Vapor Attacks
                           10.8.5.3.1 Shelter-In-Place Procedures
                           10.8.5.3.2 Emergency Evacuation Procedures
                  10.8.5.4 Response to Covert CB Attacks

 
     
 

About the Instructor

Craig S. Gundry, CPS, ATO, CHS-III

Craig Gundry is the S2 Institute’s lead instructor for anti-terrorism subjects and the Vice President of Special Projects for Critical Intervention Services (CIS). Mr. Gundry is responsible for directing CIS consulting and training projects pertaining to terrorism and security management, including the development of doctrine and training for the CIS Anti-Terrorism Officer Division. Prior to joining CIS, Mr. Gundry was the President of Palladium Media Group, a company specializing in training and consulting on explosive, chemical, and biological terrorism. Mr. Gundry's expertise in anti-terrorism began as a specialist in force protection and anti-terrorism with the United States Army.

Mr. Gundry is the author of the acclaimed Bomb Countermeasures for Security Professionals CD-ROM and a new book on assessing terrorism-related risk. Mr. Gundry is also a frequent consultant on issues relating to terrorism and weapons of mass destruction and has provided expert commentary for numerous media organizations including Al-Jazeera, CNN, and Fox News Network.

As an instructor, Mr. Gundry has been training security, police, and emergency responders in terrorism-related issues for over 16 years. His previous students have included security professionals, facility managers, military personnel, police officers, and federal officials from over 30 nations.

 
     
 
Copyright 2009 CBS. All Rights Reserved
This email is an advertisement. You are currently subscribed to our mailing list. We sincerely apologize if you find this email an intrusion of your privacy or a source of inconvenience to you.
If you no longer wish to receive our email advertisements - please reply "unsubscribe" Thank you.