This three day course integrates both Counterintelligence and Counterterrorism to provide students with an insight on the biggest threats facing the United States today. The course focuses on both strategic and tactical solutions for professionals in the intelligence and law enforcement communities, as well as those in the contractor and corporate-private sector who have personnel and asset protection responsibilities.
As the world’s most active and persistent espionage perpetrators, China and Russia currently pose the greatest foreign threat to U.S. economic health and industrial competitiveness. Both view themselves as strategic competitors of the U.S. They have directed their intelligence services and industries to acquire economic and technical intelligence, sensitive manufacturing processes, trade secrets and dual-use technologies from developed countries, especially the U.S. Some specialists state that the scope and scale of this activity has surpassed that at the height of the Cold War.
In the CI portion of this course we review the structure, operational tradecraft and targeting activities of the Chinese Ministry of State Security (MSS) and People’s Liberation Army (PLA) Department, as well as the Russian Foreign Intelligence Service (SVR) and Foreign Military Intelligence Directorate (GRU). Case studies illustrate the range and complexity of the threat, from “insider spies” to classic espionage and the accelerating onslaught of intrusions in the cyber domain. We detail the craft and practice of counterintelligence (CI); the hard won CI lessons of the Cold War and their application to the current situation; and the development of CI and security programs to protect corporate assets and competitiveness.
During the Counterterrorism portion of the course, students will walk away with an expanded knowledge and new skills learned from the three sections of the course; The Theory, Definitions and Evolution of Terrorism, Domestic Terrorism and Major Groups, and Generation III Terror Countermeasures. Students will take a walk through where terrorism started, what drives terrorist activities, common tactics used and typical operations and goals of terrorist behavior. Focus will turn to the introduction of domestic terrorism such as the KKK, the Army of God, and anarchist terror groups and the unique threats these organizations pose to the United States.
Finally, the course will take a look at the adaptation of counterintelligence tactics to counterterror operations. We will discuss in great details the roles and responsibilities of members on the CI/CT team, from the Case Officers to the Analysts and everything in between. With the use of case studies and real life experiences, students will return to their own work environment with tools and insight to enhance their programs.
- Security professionals wanting to gain knowledge from CT experts with first-hand experience.
- Security professionals wanting to gain CI best-practices from experts with first-hand experience.
Why Take the Course
- Raising awareness of the threat of terrorism assists participants in aligning or developing proactive and reactive awareness and protective programs in order to protect company personnel and assets.
- Develop and deploy CT safeguard countermeasures.
- Apply the current espionage threat profile in aligning or developing protective counterintelligence and security programs to protect company assets and intellectual property.
- Gain a more robust comprehension of the CI environment and how it applies to security compromises.