|
|
|
|
Learning Objectives
Students attending Anti-Terrorism Officer (ATO) Programme will acquire the following skills and competencies:
- Recognizing risks associated with contemporary terrorism including an in-depth understanding of contemporary terrorist modus operandi
- Identifying general security requirements essential to reducing terrorism related risk
- Assessing facility risks and utilizing risk management principles in anti-terrorism planning
- Implementing Operations Security (OPSEC) and protective counterintelligence principles to impair terrorists’ ability to gather target intelligence, including:
- Implementing appropriate sound information security principles
- Recognizing possible attempts to collect target intelligence
- Documenting suspicious activity
- Investigating and analyzing trends of suspicious activity
- Performance-based physical security design as applicable to anti-terrorism
- Screening and searching entrants at facility and building entry points, including:
- Implementing facility access control procedures
- Questioning entrants and identifying behavioral signs of deception
- Recognizing indications of falsified or altered identity documents
- Safely searching hand-carried objects at access control points
- Safely searching vehicles at access control points
- Using technical aids for conducting search and screening
- Identifying hazardous devices, possible device components, and risks associated with hazardous devices
- Recognizing indications of terrorist attack or impending terrorist events, including:
- Recognizing possible hazardous device deliveries
- Screening mail and deliveries for indications of potential hazards
- Recognizing indications of chemical or biological attack
- Safely responding to terrorist incidents and facility-level security response planning:
- Bomb threats
- Suspicious hand-carried objects
- Suspicious vehicles (Possible vehicle bomb deliveries)
- Suspicious mail
- Unopened mail
- Possible contaminated mailings (after opening)
- Post-Blast Response
- Chemical/Biological/Radiological attack (Indoor Aerosol/Vapor)
- Chemical/Biological/Radiological attack (Outdoor Aerosol/Vapor)
- Chemical/Biological/Radiological attack (Covert)
|
|
|
|
|
|
What Will You Receive?
In addition to 32-hours of instruction, all students attending the Anti-Terrorism Officer Course will receive the following:
- Certificate of Completion suitable for framing
- Course notebook including over 250 pages of slides and reference material
- 1-Year Membership in the International Association of Counterterrorism and Security Professionals (IACSP), including one-year subscription to Counterterrorism & Homeland Security International magazine. Existing IACSP members will receive one-year renewal of membership)
- 1-Year S2 Institute Membership
- S2 Institute Anti-Terrorism Officer Challenge Coin
|
|
|
|
|
|
|
|
|
About International Association for Counterterrorism and Security Professionals (IACSP)
Founded in 1992, International Association for Counterterrorism and Security Professionals (IACSP) is an international professional body based in USA which is dedicated to the professional development of security and counter-terrorism professionals across the world. IACSP is focus on all aspects of counterterrorism and will serve its members as a focal point through its suite of professional certification programs, conferences and workshops. As a membership organization, IACSP serves as an excellent platform for security professionals across the world to learn and exchange knowledge from one another and to promote international cooperation in counterterrorism policy IACSP has extensive industry and military links to security professionals across US and Europe and is now expanding its global footprint into Asia through its collaboration with S2 Institute and Centre for Behavioral Science (CBS).
|
|
|
|
|
|
Schedule & Outline
Day One Program Agenda
1. Anti-Terrorism Officers (ATOs)
1.1 ATO Functions & Responsibilities
1.2 ATO Skills
2. Introduction to Terrorism
2.1 Definition
2.2 Ideological Motives
2.3 Strategic Objectives
2.4 Types of Terrorist Targets
2.5 Target Selection Criteria
2.6 Categories of Terrorism Related Risk
2.6.1 Explosive Attack
2.6.2 Kidnapping
2.6.3 Armed Attack
2.6.3.1 Hijacking
2.6.3.2 Armed Occupation
2.6.3.3 Barricaded Hostage
2.6.4 Arson
2.6.5 Chemical/Biological/Radiological (CBR)
2.6.6 Nuclear
2.6.7 Cyber Attack
2.6.8 IEMI/Radio Frequency Weapon Attacks
2.7 Terrorist Planning and Execution Phases
3. Threat: Explosive Attacks
3.1 Types of Explosive Devices
3.2 Characteristics of Chemical Explosions
3.3 High vs Low Explosives
3.4 Sensitivity of Explosives
3.5 Initiation
3.5.1 Blasting Caps
3.5.2 Detonating Cord
3.5.3 Boosters
3.5.4 The Firing Train
3.6 Common Explosives
3.6.1 Commercial Explosives
3.6.2 Military Explosives
3.6.3 Improvised Explosives
3.6.4 Conventional Ordnance
3.7 Gas Enhanced IEDs
3.8 Activation
3.8.1 Time Delay
3.8.2 Anti-Disturbance
3.8.3 Environmental Change
3.8.4 Command Detonation
3.8.5 Unique Terrorist Modus Operandi
3.9 Device Concealment
3.10 Damage Potential
3.10.1 Types of Destructive Forces
3.10.2 Estimating Charge Size
3.10.3 Overpressure Range Effects Estimation
3.11 Explosive Employment Scenarios: Land Facilities
3.11.1 Hand Delivered IEDs
3.11.1.1 Covert
3.11.1.2 Overt
3.11.1.3 Deceptive
3.11.1.4 Naïve
3.11.2 Vehicle Borne IEDs
3.11.2.1 Covert
3.11.2.2 Overt
3.11.2.3 Deceptive
3.11.2.4 Naïve
3.11.2.5 Proxy
3.11.3 Projected Charge Attacks
3.11.3.1 Direct Fire
3.11.3.2 Indirect Fire
3.12 Explosive Employment Scenarios: Piers & Watercraft
3.12.1 Limpet Mine Attacks
3.12.2 Submerged Proximity Charges
3.12.3 Surface Vessel Borne IEDs
Day Two Program Agenda
4. Threat: Chemical & Biological Terrorism
4.1 Common Assumptions About CB Terrorism
4.2 Why Use CB Agents?
4.3 CB Terrorists
4.4 Challenges faced By CB Terrorists
4.5 Requisite Characteristics of CB Agents
4.5.1 Terrorist vs Military Agents
4.6 Routes of Exposure
4.7 Symptoms
4.8 Chemical Agents
.9 Agents of Biological Origin
4.10 Dissemination of CB Agents
4.11 CB Employment Scenarios
4.11.1 On-Target Facility Attacks
4.11.1.1 Point Source Contamination
4.11.1.2 IDD Attacks
4.11.1.3 Contaminated Deliveries
4.11.2 Off-Target Facility Attacks
4.11.2.1 Point Source Contamination
4.11.2.2 Outdoor Aerosol/Vapor Attacks
4.11.2.3 Projected Charge Weapons
4.11.3 Attacks Against Employees at Off-Site Venue
4.11.3.1 Food & Beverage Contamination
4.11.3.2 CB Projectile Weapon
5. Anti-Terrorism Planning
5.1 Integrated Countermeasures Theory
5.2 Proactive Countermeasures
5.3 Reactive/Mitigative Countermeasures
6. Operations Security (OPSEC)
6.1 Terrorist Intelligence Requirements
6.2 Terrorist Intelligence Collection Methods
6.3 Complexity of Intelligence Requirements
6.4 Protective Counterintelligence/OPSEC
6.5 Information Security
6.6 Employee/Contractor Screening & Monitoring
6.6.1 Background Flags
6.6.2 HUMINT Indicators
6.7 Surveillance Detection
6.7.1 Surveillance Detection Guidelines
6.7.2 Active Counter-Surveillance
6.8 Suspicious Activity Investigation
6.8.1 Suspicious Telephone Inquiries
6.8.2 Possible On-Site Reconnaissance
6.8.3 Possible Off-Site Surveillance
6.8.4 Possible Elicitation Contacts
6.8.5 Recruitment Approaches
6.8.6 Theft of ID Cards, Company Vehicle Stickers, etc.
6.9 Suspicious Activity Reporting & Analysis
Day Three Program Agenda
7. Physical Security & Access Control
7.1 Physical Security Theory
7.1.1 Physical Security System Functions
7.1.2 Integrated Systems
7.1.3 Performance Definition
7.1.4 Common Design Flaws
7.1.5 System Design Guidelines
7.2 Physical Security Components
7.2.1 Intrusion Detection Systems
7.2.2 Area Surveillance
7.2.1.1 CCTV
7.2.1.2 Stationary Posts
7.2.1.3 Mobile Patrols
7.2.1.4 Intrusion Indicators
7.2.1.5 Bomb Delivery indicators
7.2.3 Barriers
7.2.3.1 Conventional Barriers
7.2.3.1.1 Delay Time Calculation
7.2.3.1.2 Barrier System Design
7.2.3.2 Vehicle Barriers
7.2.3.2.1 Kinetic Energy Calculation
7.2.3.2.2 Vehicle Barrier System Design
7.2.3.3 Vehicle Entry Points
7.2.3.3.1 Entry Point Design
7.2.3.3.2 Active Barriers
7.3 Access Control
7.3.1 Planning Considerations
7.3.2 Types of Entrants
7.3.3 Entrant Identification
7.3.4 Access Screening Technologies
7.3.4.1 X-Ray Based Technologies
7.3.4.2 Explosive Trace Detection
7.3.4.3 Nuclear Detection Systems
7.3.4.4 Explosive Detection Canines
7.3.5 Human Entry Screening
7.3.5.1 Initial Considerations
7.3.5.2 Identity Document Examination
7.3.5.3 Entrant Screening Methodology
7.3.5.4 Behavioral Threat Indicators
7.3.5.5 Hand Search of Personal Objects
7.3.6 Vehicle Entry Screening
7.3.6.1 Initial Considerations
7.3.6.2 Driver Screening
7.3.6.3 Driver Documents
7.3.6.4 Vehicle Search Procedures
7.3.6.4.1 VBIED Threat Indicators
7.4 Additional Proactive Security Issues
7.4.1 Limited Concealment Opportunities
7.4.2 Obscuration
7.4.2.1 Projected Charge Weapon Dynamics
7.4.2.2 Obscuration Screens
7.4.3 Point Source Protection
7.4.3.1 Physical Security for Possible Contamination Points
7.4.3.2 Cafeteria and Break Room Countermeasures
7.4.3.3 Water Filtration
7.4.3.4 Air Filtration
Day Four Program Agenda
8. Blast Mitigation & Facility Design
8.1 Blast Mitigation Strategies
8.2 Minimizing Fragmentation Hazards
8.2.1 Blast Walls
8.3 Structural Design
8.3.1 Structural Shape
8.3.2 Structural Support
8.3.3 Façade Construction & Fenestration
8.3.3.1 Glazing Systems
8.3.3.2 TTG Glass
8.3.3.3 Security Window Films
8.3.3.4 Laminated Glass
8.3.3.5 Blast Curtains
8.4 Emergency Access & Evacuation Requirements
8.5 Protection of Building Subsystems
8.6 Utilization & Protective Asset Positioning
8.7 Blast Suppression Systems
9. Mail Security
9.1 Types of Hazardous Mailings
9.1.1 Mail Bombs
9.1.1.1 Characteristics of Letter Bombs
9.1.1.2 Characteristics of Package Bombs
9.1.2 Contaminated Mailings
9.1.3 Improvised Projectile Devices
9.2 Mail Security Planning
9.2.1 Initial Considerations
9.3 Physical Mail Screening
9.3.1 Threat Indicators
9.3.2 Case Studies
9.4 Technical Mail Screening
9.5 Response to Hazardous Mailings
9.5.1 Suspect Mail Bomb Response
9.5.2 Response to Contaminated Mailings
10. Response to Terrorist Incidents
10.1 Incident Response Scenarios
10.2 Response Priorities
10.3 Responsibilities
10.4 Weapons of Mass Destruction
10.4.1 WMD Response Authority
10.5 Bomb Threat Response
10.5.1 Bomb Threat Motives
10.5.1.1 Malevolent Bomb Threat Strategies
10.5.2 Bomb Threat Planning Considerations
0.5.3 Search and Response Approaches
10.5.3.1 Security Team Search
10.5.3.2 Employee Work Area Search
10.5.3.3 Police Directed Search
10.5.4 Search Safety
10.5.5 Security Team Search Walk Through
10.5.5.1 Managing Bomb Threat Calls
10.5.5.2 Search Procedures
10.5.5.2.1 Room Search Techniques
10.5.6 Bomb Threat Response & The Real World
10.5.7 Response to Suspicious Objects
10.6 Suspicious Vehicle Response
10.6.1 Initial Alert & Refuge
10.6.2 TSWG Evacuation and Refuge Guidelines
10.6.3 Refuge Procedures
10.6.4 Evacuation Procedures
10.7 Post-Blast Response
10.7.1 Types of Post-Blast Scenarios
10.7.2 Localized Bombings
10.7.2.1 Characteristics of Localized Bombings
10.7.2.1.1 Facility Damage
10.7.2.1.2 Casualties and Injury Types
10.7.2.1.3 Post-Blast Hazards
10.7.2.2 Localized Response Procedures
10.7.3 Conventional Weapon of Mass Destruction Incidents
10.7.3.1 Characteristics of CWMD Incidents
10.7.3.1.1 Facility Damage
10.7.3.1.2 Casualties and Injury Types
10.7.3.1.3 Post-Blast Hazards
10.7.3.2 CWMD Public Safety Response
10.7.3.2.1 CWMD Response Scenario
10.7.3.2.2 Triage
10.7.3.3 CWMD Facility Response Guidelines
10.7.3.3.1 Important Safety Guidelines
10.7.3.4 Post-Incident Recovery Issues
10.8 Chemical & Biological Attack Response
10.8.1 Unique Response Issues
10.8.2 Key Players
10.8.3 Responsibilities
10.8.4 Public Safety Response Sequence
10.8.5 Facility-Level Response
10.8.5.1 Attack Recognition
10.8.5.1.1 Chemical Attack Indicators
10.8.5.1.2 Biological Attack Indicators
10.8.5.2 Response to Indoor Aerosol/Vapor Attacks
10.8.5.2.1 Evacuation
10.8.5.2.2 Expedient Respiratory and Skin Protection
10.8.5.2.3 Emergency Decontamination
10.8.5.3 Response to Outdoor Aerosol/Vapor Attacks
10.8.5.3.1 Shelter-In-Place Procedures
10.8.5.3.2 Emergency Evacuation Procedures
10.8.5.4 Response to Covert CB Attacks
|
|
|
|
|
|
About the Instructor
Craig S. Gundry, CPS, ATO, CHS-III
Craig Gundry is the S2 Institute’s lead instructor for anti-terrorism subjects and the Vice President of Special Projects for Critical Intervention Services (CIS). Mr. Gundry is responsible for directing CIS consulting and training projects pertaining to terrorism and security management, including the development of doctrine and training for the CIS Anti-Terrorism Officer Division. Prior to joining CIS, Mr. Gundry was the President of Palladium Media Group, a company specializing in training and consulting on explosive, chemical, and biological terrorism. Mr. Gundry's expertise in anti-terrorism began as a specialist in force protection and anti-terrorism with the United States Army.
Mr. Gundry is the author of the acclaimed Bomb Countermeasures for Security Professionals CD-ROM and a new book on assessing terrorism-related risk. Mr. Gundry is also a frequent consultant on issues relating to terrorism and weapons of mass destruction and has provided expert commentary for numerous media organizations including Al-Jazeera, CNN, and Fox News Network.
As an instructor, Mr. Gundry has been training security, police, and emergency responders in terrorism-related issues for over 16 years. His previous students have included security professionals, facility managers, military personnel, police officers, and federal officials from over 30 nations.
|
|
|
|
|
|
Testimonials |
|
|
|
|
|
The course covers a wide variety of topics
- Singapore Police Force
Videos & case studies useful
- Marina Bay Sands
The course coverage is comprehensive. Many thanks. Craig has loud and clear voice. He is very detailed in the explanation. I enjoy the videos. Would learn more from the mistakes and other's experience
- Mindef
Mr Craig has wide knowledge and able to answer th questions asked during the class by students
- Shangri La Hotel
This course is designed extremely well. I have had a few terrorism / anti-terrorism classes, but none have come close to the intensity and historical background as the IACSP course. Your course is what every law enforcement officer should be taking.
- RSAF
I thought this course was very well done. The handouts were great and the topics very relevent and up to date with what is currently going on. This is definitely a "must take" course for anyone dealing with physical security/anti-terrorism matters.
- Sentosa Development Corporation
Really excellent. A lot of practical advice that one can use in one's everyday work. Excellent.
- SouthBend Security and Investigative Services
I thought that the course materials and additional handouts provided with the course were extremely well put together and will be useful long after completing the certification examination. In addition, the instructor was very knowledgeable of AT/FP principles and presented the information in a clear and concise manner. This course was well worth the time and money invested.
- Jurong Town Council
This is a really good course and it provides a lot of very useful information about anti-terrorism issues. I would recommend it to others because it is very educational.
- Beth-El Asia Pacific Pte Ltd
The scope and depth of instruction provides an awesome foundation for the development of a career in combating terrorism. I know the investment I made in this course will prove invaluable”.
- ExxonMobil Chemical Asia Pacific
|
|