Docstoc

ato

Document Sample
ato Powered By Docstoc
					                Anti-terrorism officer
                     (Ato) course
                               18 - 21 octber 2011, singApore
Featuring Mr Craig S Gundry, World Acclaimed specialist in force protection and anti-terrorism with the United States
Army, and also consultant for numerous media organisations including CNN and Fox News Network on issues relating to
terrorism. The Anti-Terrorism Officer (ATO) Course is designed to prepare security and law enforcement professionals for
assignments involving the protection of facilities against terrorist attack. This program provides a detailed exploration of
contemporary terrorist methods and essential skills and knowledge that all anti-terrorism personnel should possess.




               Organized by:                              Conjunction Partner:                  Strategic Security Partner:
                                  Anti-terrorism officer

                                      LeArning objectives
                                      Students attending Anti-Terrorism Officer (ATO) Programme will acquire
                                      the following skills and competencies:
                                      • Recognizing risks associated with contemporary terrorism including
                                        an in-depth understanding of contemporary terrorist modus operandi
                                      • Identifying general security requirements essential to reducing
                                        terrorism related risk
                                      • Assessing facility risks and utilizing risk management principles in
                                        anti-terrorism planning
                                      • Implementing Operations Security (OPSEC) and protective
                                        counterintelligence principles to impair terrorists’ ability to gather
                                        target intelligence, including:
                                        - Implementing appropriate sound information security principles
                                        - Recognizing possible attempts to collect target intelligence
                                        - Documenting suspicious activity
Who shouLd Attend?                      - Investigating and analyzing trends of suspicious activity
Security Officers, Security
Directors, Military Force             • Performance-based physical security design as applicable to anti-
Protection Personnel, Police            terrorism
Officers Assigned to Anti-            • Screening and searching entrants at facility and building entry points,
Terrorism Activities                    including:
                                        -   Implementing facility access control procedures
                                        -   Questioning entrants and identifying behavioral signs of deception
WhAt WiLL You receive?                  -   Recognizing indications of falsified or altered identity documents
In addition to 32-hours of              -   Safely searching hand-carried objects at access control points
instruction, all students attending     -   Safely searching vehicles at access control points
the Anti-Terrorism Officer Course       -   Using technical aids for conducting search and screening
will receive the following:           • Identifying hazardous devices, possible device components, and risks
• Certificate of Completion             associated with hazardous devices
   suitable for framing
                                      • Recognizing indications of terrorist attack or impending terrorist
• Course notebook including             events, including:
  over 250 pages of slides and          - Recognizing possible hazardous device deliveries
  reference material                    - Screening mail and deliveries for indications of potential hazards
                                        - Recognizing indications of chemical or biological attack
• 1-Year Membership in the
  International Association of        • Safely responding to terrorist incidents and facility-level security
  Counterterrorism and Security         response planning:
  Professionals (IACSP), including      -   Bomb threats
                                        -   Suspicious hand-carried objects
  one-year subscription to              -   Suspicious vehicles (Possible vehicle bomb deliveries)
  Counterterrorism & Homeland           -   Suspicious mail
  Security International                -   Unopened mail
  magazine. Existing IACSP              -   Possible contaminated mailings (after opening)
  members will receive one-year         -   Post-Blast Responseæ
                                        -   Chemical/Biological/Radiological attack (Indoor Aerosol/Vapor)
  renewal of membership)                -   Chemical/Biological/Radiological attack (Outdoor Aerosol/Vapor)
• 1-Year S2 Institute Membership        -   Chemical/Biological/Radiological attack (Covert)

• S2 Institute Anti-Terrorism
  Officer Challenge Coin
(Ato) course                                                                   18 - 21 october 2011, singApore




scheduLe & outLine
dAY one                                   dAY tWo                                      - Barriers (Conventional Barriers:      • Response to Hazardous Mailings
Anti-Terrorism Officers (ATOs)            Threat: Chemical & Biological                  Delay Time Calculation, Barrier         - Suspect Mail Bomb Response
• ATO Functions & Responsibilities        Terrorism                                      System Design)                          - Response to Contaminated
• ATO Skills                              • Common Assumptions About CB                - Vehicle Barriers (Kinetic Energy          Mailings
                                            Terrorism                                    Calculation, Vehicle Barrier System
Introduction to Terrorism                 • Why Use CB Agents?                           Design)                               Response to Terrorist Incidents
• Definition                              • CB Terrorists                              - Vehicle Entry Points (Entry Point     • Incident Response Scenarios
• Ideological Motives                     • Challenges faced By CB Terrorists            Design, Active Barriers)              • Response Priorities
• Strategic Objectives                    • Requisite Characteristics of CB Agents   • Access Control                          • Responsibilities
• Types of Terrorist Targets                - Terrorist vs Military Agents             - Planning Considerations               • Weapons of Mass Destruction
• Target Selection Criteria               • Routes of Exposure                         - Types of Entrants                       - WMD Response Authority
• Categories of Terrorism Related Risk    • Symptoms                                   - Entrant Identification                • Bomb Threat Response
   - Explosive Attack                     • Chemical Agents                            - Access Screening Technologies           - Bomb Threat Motives (Malevolent
   - Kidnapping                           • Agents of Biological Origin                  (X-Ray Based Technologies,                Bomb Threat Strategies)
   - Armed Attack (Hijacking, Armed       • Dissemination of CB Agents                   Explosive Trace Detection, Nuclear      - Bomb Threat Planning
     Occupation, Barricaded Hostage)      • CB Employment Scenarios                      Detection Systems, Explosive              Considerations
   - Arson                                  - On-Target Facility Attacks (Point          Detection Canines)                      - Search and Response Approaches
   - Chemical/Biological/Radiological          Source Contamination, IDD               - Human Entry Screening (Initial            (Security Team Search, Employee
     (CBR)                                     Attacks, Contaminated Deliveries)         Considerations, Identity Document         Work Area Search, Police Directed
   - Nuclear                                - Off-Target Facility Attacks (Point         Examination, Entrant Screening            Search
   - Cyber Attack                              Source Contamination, Outdoor             Methodology, Behavioral Threat          - Search Safety
   - IEMI/Radio Frequency Weapon               Aerosol/Vapor Attacks, Projected          Indicators, Hand Search of              - Security Team Search Walk
     Attacks                                   Charge Weapons)                           Personal Objects)                         Through (Managing Bomb Threat
• Terrorist Planning and Execution          - Attacks Against Employees at             - Vehicle Entry Screening (Initial          Calls, Search Procedures: Room
  Phases                                       Off-Site Venue (Food & Beverage           Considerations, Driver Screening,         Search Techniques)
                                               Contamination, CB Projectile              Driver Documents, Vehicle               - Bomb Threat Response & The Real
Threat: Explosive Attacks                      Weapon)                                   Search Procedures: VBIED Threat           World, Response to Suspicious
• Types of Explosive Devices                                                             Indicators)                               Objects)
• Characteristics of Chemical             Anti-Terrorism Planning                    • Additional Proactive Security Issues    • Suspicious Vehicle Response
  Explosions                              • Integrated Countermeasures Theory          - Limited Concealment                     - Initial Alert & Refuge
• High vs Low Explosives                  • Proactive Countermeasures                    Opportunities                           - TSWG Evacuation and Refuge
• Sensitivity of Explosives               • Reactive/Mitigative Countermeasures        - Obscuration (Projected Charge             Guidelines
• Initiation                                                                             Weapon Dynamics, Obscuration            - Refuge Procedures
   - Blasting Caps                        Operations Security (OPSEC)                    Screens)                                - Evacuation Procedures
   - Detonating Cord                      • Terrorist Intelligence Requirements        - Point Source Protection               • Post-Blast Response
   - Boosters                             • Terrorist Intelligence Collection            (Physical Security for Possible         - Types of Post-Blast Scenarios
   - The Firing Train                       Methods                                      Contamination Points,                   - Localized Bombings
• Common Explosives                       • Complexity of Intelligence                   Cafeteria and Break Room                  (Characteristics of Localized
   - Commercial Explosives                  Requirements                                 Countermeasures, Water                    Bombings: Facility Damage,
   - Military Explosives                  • Protective Counterintelligence/OPSEC         Filtration, Air Filtration)               Casualties and Injury Types, Post-
   - Improvised Explosives                • Information Security                                                                   Blast Hazards)
   - Conventional Ordnance                • Employee/Contractor Screening            dAY four                                    - Localized Response Procedures
• Gas Enhanced IEDs                         & Monitoring: Background Flags,                                                      - Conventional Weapon of
                                                                                     Blast Mitigation & Facility Design
• Activation                                HUMINT Indicators                                                                      Mass Destruction Incidents
                                                                                     • Blast Mitigation Strategies
   - Time Delay                           • Surveillance Detection                                                                 (Characteristics of CWMD
                                                                                     • Minimizing Fragmentation Hazards
   - Anti-Disturbance                        - Surveillance Detection Guidelines                                                   Incidents: Facility Damage,
                                                                                     • Blast Walls
   - Environmental Change                    - Active Counter-Surveillance                                                         Casualties and Injury Types,
                                                                                     • Structural Design (Structural
   - Command Detonation                   • Suspicious Activity Investigation                                                      Post-Blast Hazards, CWMD Public
                                                                                       Shape, Structural Support, Façade
   - Unique Terrorist Modus Operandi         - Suspicious Telephone Inquiries                                                      Safety Response: CWMD Response
                                                                                       Construction & Fenestration:
• Device Concealment                         - Possible On-Site Reconnaissance                                                     Scenario, Triage, CWMD Facility
                                                                                       Glazing Systems, TTG Glass, Security
• Damage Potential                           - Possible Off-Site Surveillance                                                      Response Guidelines: Important
                                                                                       Window Films, Laminated Glass, Blast
   - Types of Destructive Forces             - Possible Elicitation Contacts                                                       Safety Guidelines)
                                                                                       Curtains)
   - Estimating Charge Size                  - Recruitment Approaches                                                            - Post-Incident Recovery Issues
                                                                                     • Emergency Access & Evacuation
   - Overpressure Range Effects              - Theft of ID Cards, Company Vehicle                                              • Chemical & Biological Attack
                                                                                       Requirements
     Estimation                                Stickers, etc.                                                                    Response
                                                                                     • Protection of Building Subsystems
• Explosive Employment Scenarios-         • Suspicious Activity Reporting &                                                      - Unique Response Issues
                                                                                     • Utilization & Protective Asset
   Land Facilities                           Analysis                                                                            - Key Players
                                                                                       Positioning
   - Hand Delivered IEDs (Covert,                                                                                                - Responsibilities
                                                                                     • Blast Suppression Systems
     Overt, Deceptive, Naïve)             dAY three                                                                              - Public Safety Response Sequence
   - Vehicle Borne IEDs (Covert, Overt,                                                                                          - Facility-Level Response (Attack
                                          Physical Security & Access Control         Mail Security
     Deceptive, Naïve, Proxy)                                                                                                      Recognition: Chemical Attack
                                          • Physical Security Theory: Physical       • Types of Hazardous Mailings
   - Projected Charge Attacks (Direct                                                                                              Indicators. Biological Attack
                                            Security System Functions                  - Mail Bombs (Characteristics of
     Fire, Indirect Fire)                                                                                                          Indicators, Response to Indoor
                                            - Integrated Systems                         Letter Bombs, Characteristics of
   - Explosive Employment Scenarios:                                                                                               Aerosol/Vapor Attacks: Evacuation,
                                            - Performance Definition                     Package Bombs
     Piers & Watercraft (Limpet Mine                                                                                               Expedient Respiratory and
                                            - Common Design Flaws                      - Contaminated Mailings
     Attacks, Submerged Proximity                                                                                                  Skin Protection, Emergency
                                            - System Design Guidelines                 - Improvised Projectile Devices)
     Charges, Surface Vessel Borne                                                                                                 Decontamination, Response to
                                          • Physical Security Components             • Mail Security Planning
     IEDs)                                                                                                                         Outdoor Aerosol/Vapor Attacks:
                                            - Intrusion Detection Systems              - Initial Considerations
                                                                                                                                   Shelter-In-Place Procedures,
                                            - Area Surveillance: CCTV, Stationary    • Physical Mail Screening
                                                                                                                                   Emergency Evacuation Procedures,
                                              Posts (Mobile Patrols, Intrusion         - Threat Indicators, Case Studies
                                                                                                                                   Response to Covert CB Attacks
                                              Indicators, Bomb Delivery              • Technical Mail Screening
                                              indicators)
About the instructor

Craig S. Gundry, CPS, ATO, CHS-III
Craig Gundry is the S2 Institute’s lead instructor for anti-terrorism subjects and the
Vice President of Special Projects for Critical Intervention Services (CIS). Mr. Gundry is
responsible for directing CIS consulting and training projects pertaining to terrorism
and security management, including the development of doctrine and training for
the CIS Anti-Terrorism Officer Division. Prior to joining CIS, Mr. Gundry was the
President of Palladium Media Group, a company specializing in training and
consulting on explosive, chemical, and biological terrorism. Mr. Gundry’s expertise
in anti-terrorism began as a specialist in force protection and anti-terrorism with
the United States Army.

Mr. Gundry is the author of the acclaimed Bomb Countermeasures for Security Professionals CD-ROM and a new
book on assessing terrorism-related risk. Mr. Gundry is also a frequent consultant on issues relating to terrorism
and weapons of mass destruction and has provided expert commentary for numerous media organizations
including Al-Jazeera, CNN, and Fox News Network.

As an instructor, Mr. Gundry has been training security, police, and emergency responders in terrorism-related
issues for over 16 years. His previous students have included security professionals, facility managers, military
personnel, police officers, and federal officials from over 30 nations.




                                                                                                REGISTRATION FORM
                                                                                   faX ComPleted form to: 6720 2222
q YES, I will be attending the Anti-Terrorism Officer (ATO) Course on 18-21 October 2011                                   Your investment
                                                                                                                           • Sgd 2,900 (nett)
1ST DELEgATE                                                 2nD DELEgATE
                                                                                                                           For group discount rates for your organisation,
Salutation: (dr/Mr/Mrs/Ms)                                   Salutation: (dr/Mr/Mrs/Ms)                                    kindly contact Jaslyn at 6720 3333 or
                                                                                                                           email: jaslyn@cbsgroup.com.sg
name:                                                        name:

email:                                                       email:                                                        methods of PaYment
designation:                                                 designation:                                                  1. please cross cheque or bank draft made payable to
                                                                                                                              Centre For Behavioral Science Pte Ltd and mail your
department:                                                  department:                                                      payment together with this registration to the above
                                                                                                                              mentioned address.
Mobile:                                                      Mobile:
                                                                                                                           2. By telegraphic transfer into the account of
COmPAnY InFOrmATIOn                                                                                                           centre For Behavioral Science pte ltd
company name:                                                                                                                 OcBc Bank, Orchard Branch
                                                                                                                              account number: 508-763661-001
address:
tel:                                                         Fax:                                                          CanCellations & transfers
name & title of approving Manager:                                                                                         if you are unable to attend, a substitute delegate is
                                                                                                                           welcomed at no extra charge. no refund can be made for
                                                                                                                           cancellation less than 14 days prior to the event date. the
PaYment oPtions (Please tick option boxes accordingly)                                                                     organiser reserves the right to make any amendments
q cheque                     cheque should be crossed and ‘a/c payee only and made payble to                               and/or changes to the programme, venue, speaker
                             Centre For Behavioral Science Pte Ltd                                                         replacement and/or topics if warranted by circumstances
q telegraphic transfer       please use the mentioned details for the account information.                                 beyond its control.
q invoice request            tick the box if you require the invoice to be sent to your company for payment. invoice
                             request is only for individuals sponsored by their companies. no invoice will be issued for
                             non-corporate registration. Only receipts will be issued for non-corporate registrations.




                                             Tel: 6720 3333                         SMS: 9228 7171                           Email: info@aventis.edu.sg
                                                                                                                             Email: enquiry@cbsgroup.com.sg

100 Orchard rOad
cOncOrde hOtel level 4
SingapOre 238840                                                                              www.aventis.edu.sg

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:28
posted:9/16/2012
language:Unknown
pages:4