Behavioral and Predictive Analysis for LE, private security, sport venue staff, and educational institutions
This course is designed to effectively train a variety of different personnel in how to detect behavioral anomalies in crowds by utilizing Israeli and global best practices developed originally for airport security, now available for your personnel in a wide variety of customized course offerings.
Participants will be trained to proactively recognize threats and depending on their authority, arm them with techniques to establish conversation and confirm suspicion. In addition to recognizing potentially problematic behavior and confirming, the course also deals with how to detect surveillance, essential to terror attacks and how to defend against attacks by having a properly managed vulnerability assessment and security plan based on potential modus operandi.
Jeff Bauman, a civilian, who tragically lost both legs at the Boston Marathon bombing knew immediately who the bombers were when he recovered in the ambulance, because he saw them and felt they were acting strangely.
By accurately reading these signs and knowing how to act in response, we can train everyone from cleaning staff, through security and law enforcement to help confront and mitigate these actions.
|8.30-9.15||Course introduction, goals, methods, and expectations||Drill: vulnerability and risk assessment - submission of presentations||Drill: “through the eyes of the opponent”- submission of presentations|
|9.15- 10.30||The Multi-layer approach to crowd security at venues||Document verification: Local and international||Worskshop IED and weapon concealment and detection|
|10.30 – 11.45||Global Systems for Behavioral and predictive analysis||Case Studies: terrorist modus operandi||Security screening technologies- an overview|
|11.45 – 12.45||Body language classroom||Counter Surveillance||Manual search techniques|
|12.45 – 14:00||LUNCH||LUNCH||LUNCH|
|14:00- 14.45||Suspicious indicators – appearance and behavior||Workshop: questioning simulations and role play||Final Exercise – red team vs. blue team scenario including role play|
|15.00 – 15.45||Security questioning Intro||Drill– detecting counter surveillance and suspicious behavioral indicators||Final exercise continued|
|15:45 – 16:15||Drill : venue vulnerability and risk assessment||Drill summation||Exercise summation|
|16:15 - 16:45||Q and A||Drill: “through the eyes of the opponent”- forming a plan of attack||Course summation and certificate distribution|
|16:45 – 17:00||Q and A|