MALTEGO FOR OSINT
Duration: 10 Training Days
Class Size: 10 Students
Course Number: VEL-OS-0001
This course introduces analysts to OSINT concepts and Maltego usage.
Audience
Analysts with at least one year of experience
Program of Instruction (POI)
- Introduction to Maltego and Open-Source Intelligence (OSINT)
- Privacy, data and usage
- Common terms
- Navigating your Graph
- Entities & Links
- Links
- Importing Data and Layouts
- Collection Automation
- Advanced Maltego Concepts
- Practical Exercises
- Capstone
PRACTITIONER PART I
Duration: 5 Training Days
Class Size: 10 Students
Course Number: VEL-OS-0002
Description
This course covers advanced search functionality, optimization of Maltego machines for long term OSINT operations, Introduction to signature reduction.
Audience
Analysts with at least one year of experience (waiver able if they have had OSINT Maltego course)
Program of Instruction (POI)
- Advanced Entity creation
- Advanced Search Operators
- Advanced Regex
- Introduction to Databases/Google Dorking
- Introduction to Reverse Image & Metadata
- Machines
- Introduction to Signature Reduction
PRACTITIONER PART II
Duration: 5 Training Days
Class Size: 10 Students
Course Number: VEL-OS-0003
Description
This course covers advanced search functionality using third party API integrations in Maltego. Introduction to Maltego Darkweb and Cryptocurrency analysis as well as additional OSINT tool exploration use cases.
Audience
Analysts with at least one year of experience (waiver able if they have had OSINT Maltego course)
Program of Instruction (POI)
-
- Third-Party Open-Source Tools
- Advanced Transforms
- Intro to Darkweb
- OSINT Tool Exploration
DATA ANALYSIS & OPERATIONALIZATION
Duration: 5 Training Days
Class Size: 10 Students
Course Number: VEL-OS-0004
Description
This course introduces social network analysis to maximize usage of OSINT data to turn exploited data into actionable insight.
Audience
Analysts with at least one year of experience (waiver able if they have had OSINT Maltego course)
Required Materials
Maltego Pro, SocialNet and Identity Search Transform
Program of Instruction (POI)
- OSINT methodology for social movements
- Social Network Analysis
- Using SocialNet to create useful social networks
- Link diagramming in Maltego
- Basic social network analysis data structures
- Importing data in Gephi
- Visualization of data in Gephi
- Running metrics of interest in Gephi
- Adding and using attributes in Gephi
- Filtering data in Gephi
- Identifying key actors, showing the subgroups the key actors are in
- Capstone social media malign actor network focusing on TBD Country of Interest
INVESTIGATOR
Duration: 5 Training Days
Class Size: 10 Students
Course Number: VEL-OS-0005
Description
These courses are three to five days in length and meant to provide focused deep dives on specific topics in OSINT.
Audience
Analysts who want to develop experience in specific exploitation tools and tradecraft.
Required Materials
Data Packages based on Course Customization
Program of Instruction (POI)
- OSINT General Search
- OSINT Cryptocurrency
- OSINT Image Search and Reverse Image Search
- OSINT Map/Imagery Analysis
- OSINT Video Exploration & Exploitation
- OSINT Cyber Identify Management
- OSINT News Monitoring
- OSINT Transportation Monitoring
- OSINT Data Visualization
- Python for OSINT
Targeting Proliferation Related Shipment
Duration: 4 Training Days
Class Size: 40 Students
Course Number: VEL-BS-0001
Description
Front-line border officers at the port of entry play a key role in enhancing their country’s security by serving as one of the last lines of defense against proliferation. To do this effectively, border officers must have information about the types of cargo, conveyances, and travelers most likely to be at high-risk of proliferation-related activity. These targeting criteria must be developed using a structured approach, which enhances its accuracy and effectiveness. The risk management process provides a structure for analyzing risk and generating targeting criteria. This program is designed to help countries develop and improve their strategic trade and related border control systems to meet international requirements.
The purpose of this course is to develop or enhance the participants’ ability to apply a risk management approach to assess risk, analyze risk, develop targeting criteria, and determine appropriate treatments that are applied by the front-line border officers reviewing and evaluation transactions at the port of entry. By the end of the course participants will be able to:
- Explain the purpose of strategic trade controls and the role of targeting
- Identify areas of proliferation and explain the role of dual-use goods
- Describe and implement techniques for analyzing high-risk proliferation activity
- Explain, describe and develop a risk profile and its use
Audience
This course is designed to be universally applicable with minimal tailoring required to suit new audiences. The course will convey targeting and risk management standards such as those reflected in the Kyoto Convention and the World Customs Organization (WCO) framework of Standards.
This strategic course is geared towards analysts and technical experts supporting their national export control system. Additional roles, such as enforcement officers, will also benefit by improving cooperation and technical reach back capabilities.
Course Topics
- Introduction to Targeting
- Understanding the Threat of Proliferation
- Managing Proliferation Risks
- Analytic Techniques
- Sources of Information
- Developing a Risk Profile
- Monitoring Results
- Assessing Risk in Various Environments
- Assessing Risk in Outbound Commodities
Concealed Trap Training
Duration: 2 Training Days
Class Size: 40 Students
Course Number: VEL-BS-0002
Description
All criminals, even the most elusive, are vulnerable while traveling on roadways. However, given the volume and nearly constant threat of drugs and other illicit contraband moving across our country, front-line officers need specific training to effectively identify, intervene, apprehend and prosecute lawbreakers. Since they must often be capable of making a rapid assessment on whether criminal activity is taking place, this course offers high quality instruction supplemented by current intelligence regarding trends and techniques in criminal activity. Instructors of this course will emphasize not only the basic bulk currency and narcotics concealment methods currently used but also sophisticated and highly technical processes, including financial money laundering schemes that are designed and deployed to elude law enforcement detection.
The team conducting this course will utilize an approach which will cover the processes in detection, identification, interdiction, evidence gathering and record keeping which, when properly applied, could lead to successful prosecution of those individuals involved in such illegal activities. The concealed trap training course will provide participants with numerous new skills, highlights include:
- Identify the origin and destination of contraband
- Identify potential intelligence information, beneficial to developing and assisting in existing major illicit trafficking investigations
- Becoming familiar with large money laundering/drug trafficking organizations (ML/DTOs), how they operate, and how enhanced criminal patrol techniques can benefit the officer
Audience
This course is designed to be universally applicable. However, law enforcement officers who are looking to acquire new knowledge and skills and who are the front lines of a country’s border and custom operations will find the most use out of the contents being taught.
Front line officers need to continually adapt to maintain pace with the criminals and lawbreakers they are trying to apprehend. As this course is most often taught by current and former agents and officers with years of experience, the exchange of knowledge will be invaluable for new generations of law enforcement officers.
Course Topics
- Concealed Assets Introduction/Asset Forfeiture
- Pre-Patrol Preparations
- Origin and Destination of Controlled Substances
- Conducting Traffic Stops/Potential Vehicle Indicators
- Concealment Methods/Case Development
- Processing Arriving Cargo
- Examining Containers, Cargo and Vessels
- Documenting and Reporting/Interdiction and Seizure
WMD Interdiction – Airport
Duration: 4 Training Days
Class Size: 40 Students
Course Number: VEL-BS-0003
Description
Border officers play a key role in enhancing their country’s security by serving as the last line of defense against illegal and proliferation-related activity at the border. Border officers must have the knowledge and skills needed to effectively identify vessels of high risk of illegal and proliferation-related activity that are arriving and departing from an airport port of entry, inspect those vessels, and seize contraband found on board.
This course focuses on internationally accepted processes that can be used to evaluate documents submitted by arriving and departing vessels. The Interdiction Proliferation Related Shipments in an Airport Environment Course is constructed to focus on the basic knowledge and skills necessary that front-line border officers require to perform their jobs in the face of today’s proliferation laden environment. The following skills will be taught:
- Prescreen shipping documents
- Recognize indicators of proliferation
- Search, examine vessels/seizing contraband
- Documents and share information
Audience
This course is designed for front-line border officers (Customs officers) who review and analyze air cargo transactions (manifest, bills of lading, and other cargo documents, select cargo, containers, and vessels for proliferation–related goods).
The course is designed to enhance the capabilities of the front-line officers working at an air port of entry to assess, target, inspect, detect and interdict contraband of proliferation concern.
Course Topics
- Threat of Proliferation
- Risk Management for Front Line Border Officers
- Interdicting Proliferation
- Reviewing Transactions
- Processing Arriving Cargo
- Examining Containers, Cargo and Vessels
- Documenting and Reporting/Interdiction and Seizure
WMD Interdiction – Seaport
Duration: 4 Training Days
Class Size: 40 Students
Course Number: VEL-BS-0004
Description
Border officers play a key role in enhancing their country’s security by serving as the last line of defense against illegal and proliferation-related activity at the border.
Border officers must have the knowledge and skills needed to effectively identify vessels of high risk of illegal and proliferation-related activity that are arriving and departing from an airport port of entry, inspect those vessels, and seize contraband found on board.
This course focuses on internationally accepted processes that can be used to evaluate documents submitted by arriving and departing vessels.
The Interdiction Proliferation Related Shipments in an Airport Environment Course is constructed to focus on the basic knowledge and skills necessary that front-line border officers require to perform their jobs in the face of today’s proliferation laden environment. The following skills will be taught:
- Prescreen shipping documents
- Recognize indicators of proliferation
- Search, examine vessels/seizing contraband
- Documents and share information
Audience
This course is designed for front-line border officers (Customs officers) who review and analyze sea cargo transactions (manifest, bills of lading, and other cargo documents, select cargo, containers, and vessels for proliferation–related goods.
The course is designed to enhance the capabilities of the front-line officers working at a sea port of entry to assess, target, inspect, detect and interdict contraband of proliferation concern.
Course Topics
- Threat of Proliferation
- Prescreening Shipments
- Primary Inspection
- Examining Vessels and Containers
- Interdiction and Seizure
- Documenting and Reporting
Threat Finance
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-CE-0001
Description
Threat finance encompasses the means and methods used by organizations to finance terrorism operations and activities. The Threat Finance course teaches the participant how to identify, analyze and trace financial evidence that supports or proves that terror related activities are being carried out in violation of law. This includes violations of terrorist financing or money laundering of illicit funds raised by or directed to terrorists.
The course imparts application of “follow the money” concepts through hands-on scenarios using mock financial evidence, such as wire transfers. It teaches the investigative paradigm of terror investigations: taking assertive, proactive investigative measures to get ahead of the terrorists’ next attack and thwart injury, destruction, and the resulting terror. The course contains internationally accepted border operation processes and procedures as well as best practices.
This course emphasizes “hands on” practical exercises in which participants apply strategies and techniques to a series of scenarios released in stages throughout the course. At the conclusion of the course participants will be able to:
- Tactics to detect, investigate, and aid in the interdiction and prevention terror attacks
- Apple methodologies to build cases of prosecutable financial crimes related to terrorism
- Communicate effectively with Financial Intelligence Units in conducting investigations
Audience
This course is an introduction to threat finance and is best suited for those who are involved in investigations and familiar with presenting evidence to prosecutors and/or the judiciary. This course teaches investigators, analysts, examiners, auditors, prosecutors, and other legal professionals what evidence to analyze in order to help lead to the source of terrorist financing. It develops the participants’ skills related to examining and analyzing evidence such as financial records, presenting evidence in written reports, graphical depictions, and court testimony.
Course Topics
- Fundamental Agreements about Terrorism
- Types of Terror Groups
- Money Laundering vs. Terror Financing
- Terror Finance Timeline Investigative Methodology
- The Homegrown Violent Extremist (HVE)
- Apartment Search and Seizure
- Financial Investigation Interviewing
- Conducting a Witness Interview
- Evidence Diagramming and Documentation
- Analyzing a Company’s Bank Records
- Evaluating a Company’s Role in a Criminal Offense
- Analyzing a Company’s Books/Records
- Tracing International Wires
- Isolating the Cell
- Best Practices in Surveillance and Officer Safety
- Preparation for Trial
- Sequence of Events in Terror Finance Trials
Community Policing
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-CE-0002
Description
Engaging local communities in efforts to promote public safety is an important aspect of crime prevention. However, many international police agencies neglect opportunities to build better relations with the communities from which criminals and violent extremists emerge. Following a criminal incident, law enforcement actions and words will often alienate these very communities, making the job of law enforcement more difficult as a result. This course provides effective training in best practices for community engagement and trust building that can help to save lives, prevent crime, and build stronger relations with a community. The course engages participants through practical exercises built upon actual cases and regional issues. In a final capstone exercise, participants create personal action plans for Community Policing that include:
- Understanding Causes and Factors
- Profiles and Methodologies Targets and Vulnerabilities
- Push/Pull Factors Crisis Leadership in CVE
- Effective Strategies for Countering
- Violent Extremism
Audience
The CVE Community Policing course is designed for up to 40 mid or senior law enforcement managers who can positively influence their agency’s mission, vision and strategies as they relate to the local community. The training provides senior managers with the tools necessary to protect and serve its citizens as part of the national and international community.
Course Topics
- Overview of Violent Extremism and Their Effects on Communities
- How Violent Criminals and Radical Extremists Use Communities
- The Path to Becoming a Violent Extremist
- Community Policing: Principles, Strategies, and Proactive Engagements
- Citizens Academy Models and Other Community Engagement Programs
- Community Leader Perspectives and Expectations
- Understanding Backlash and Hate
- Preventing Community Alienation
- Successful Use of Media in Community Relations and Countering Violent Extremism
- Reflections of Community Engagement Successes and Future Community Policing
- Evaluating a Company’s Role in a Criminal Offense
- Analyzing a Company’s Books and Records
- Tracing International Wires
- Isolating the Cell
- Best Practices in Surveillance and Officer Safety
- Preparation for Trial
Sequence of Events in Terror Finance Trials
Basic Street Survival
Duration: 10 Training Days
Class Size: 21 Students
Course Number: VEL-CN-0001
Description
The Basic Street Survival Course is a two-week course designed for law enforcement officers operating in high-risk environments. The course teaches participants how to maneuver in fluid situations, approach non-compliant subjects, and skills related to firearm safety and usage. The course is a physically demanding and interactive program with a majority of instruction focusing on physical and practical exercises to simulate conditions and situations faced by officers. Instructor-led briefings complement practical exercises to convey important information such as awareness and safety issues. This course builds on an evolving real-world scenario using breakout group exercises. At the conclusion of this course, participants will be able to name and discuss each component of the course instruction.
Audience
This course is designed for 21 mid-level law enforcement officers. It is meant to be universally applicable, however, law enforcement officers who are looking to acquire new knowledge and skills and who routinely operate in urban or dynamic environments will find the most use out of the contents being taught.
The Basic Street Survival Course will conclude with a Capstone Exercise which will enable the students to reinforce their knowledge and skills at the end of the training. They will have the opportunity to demonstrate thru the following course topics such skills learned.
Course Topics
- Introduction
- Agency Use of Force Policy
- Situational Awareness
- Combative Mindset and Handling Non-compliant Subjects
- Firearms Safety
- Fundamentals of Pistol Marksmanship
- Fundamentals of Carbine Marksmanship
- Model 8: Advanced Weapons Marksmanship
- Baton Employment and Non-Lethal Use of Force
- Civil Unrest
- Communicating with the Public
- Vehicle Stops
- Vehicle Searches
- Subject Transport
- Capstone Exercise
- Course Summary and Commencement
Advanced Tactical Skills
Duration: 10 Training Days
Class Size: Minimum 14/ Maximum 28 students
Course Number: VEL-CN-0002
Description
The Advanced Tactical Skills course is made up of course outlines and modules currently in use by CTP, is a highly interactive, physically demanding, skills-based training program focusing on the knowledge and skills required by law enforcement to engage narcotic-trafficking networks and extremists in a combat environment. The majority of this course takes place in a firing range and shoot house and finishing with a Capstone Exercise, where participants demonstrate their new skills.
Participants will acquire the following skills and knowledge: incident management and response, advanced firearm planning, tactical planning and communication, use and maintenance, and tactical operation in key areas. At the conclusion of the course, participants will be able to apply best practices in operations planning, marksmanship, teamwork, and other related topics.
Audience
This course is designed for a maximum 28 mid-level law enforcement officers. It is meant to be universally applicable; however, law enforcement officers who are looking to acquire new knowledge and skills and who are the front lines of a country’s counternarcotic and countering violent extremists’ operations will find the most use out of the contents being taught.
The Advanced Tactical Skills course will conclude with a Capstone Exercise which will enable the students to reinforce their knowledge and skills at the end of the training. They will have the opportunity to demonstrate thru the following course topics such skills learned.
Course Topics
- Course Introduction
- Police Conduct and Integrity
- Human Rights
- Use of Force Policy
- Team Leadership
- Developing a Training Plan
- Physical Fitness
- Managing a Regional Team
- Reports and Records (Training & Ops)
- Incident Management
- Tactical Planning
- Tactical Communications
- Scouting and Diagramming
- Team and Section (Sniper/Breach/Medical, etc.) Employment
- Sharpshooter and Observer (S/O) Functions
- Advanced Pistol and Shoulder-fired Shooting
- Marking Cartridge and Live-Fire Operations
- Close Quarters Battle (CQB)
- Tactical Breaching
- Diversionary Tactics
- Use of Ballistic Shields
- Tactical Assaults
- Officer Rescue
- Low-Light Operations
- Defensive Tactics and Subject Control Techniques
- Weapons Retention
- Less Lethal Devices
- Oleoresin Capsicum Aerosol (OC Spray)
- Improvised Explosive Devices (IED) and Booby Traps
- Capstone Exercise
- Course Summary and Commencement
Advanced Criminal Intelligence Analysis
Duration: 10 Training Days
Class Size: Minimum 15 / Maximum 20 students
Course Number: VEL-CN-0003
Description
This course incorporates the essential skills and tools necessary for the mid- to senior-level criminal investigator or intelligence analyst to contribute to the successful conclusion of a criminal investigation. Competent intelligence analysts are an essential part of an investigative team. Among their many contributions they are able to assemble, collate, and review data with an end goal of providing the investigative team with new leads, evidence, and facts to support or refute witness and defendant statements. Participants use laptops in order to practice using open-source geographical and data analysis software and create time-event analysis charts and association matrices. A threaded scenario throughout the two-week course challenges participants to apply the skills learned in class to reality-based investigative scenarios and culminates in a capstone analysis exercise and briefing presentation.
This course will teach officers the tools and approaches of advanced intelligence collection and analysis. By the end of the two weeks, participants will understand how to allocate resources for an intelligence collection effort, how to use the new skills in a variety of criminal environments, how to influence decision-makers, understand a proactive versus reactive approach, and understand the specific roles and responsibilities when establishing an intelligence collection and analysis effort.
Audience
This course is designed for up to 20 mid-level law enforcement officers. It is meant to be universally applicable, however, law enforcement officers who are looking to acquire new knowledge and skills and routinely conduct complex investigations will find the most use out of the course.
Course Topics
- Introduction
- Creative/Critical Thinking
- Logic
- Competing Hypotheses
- Crime Pattern Analysis
- Association analysis
- Mapping the Financial Process
- Communications Analysis
- Report Writing and Briefing
- Capstone Exercise
- Summary and Commencement
Criminal Enterprise Theory
Duration: 10 Training Days
Class Size: Minimum 20/Maximum 40 Students
Course Number: VEL-CN-0004
Description
The Criminal Enterprise Theory Course is a two-week course designed to provide participants with the knowledge and skills necessary to define and identify the elements of a criminal enterprise, determine the scope of the enterprise’s criminal activities, develop an investigative strategy, form task forces to pool and utilize resources, and successfully attack and dismantle criminal organizations. Additionally, this training will provide instruction in skills in, criminal investigations, informant management, surveillance, telecommunications intercept, intelligence, complex investigations management, and other relevant skills in the development and in counter-terrorism operations.
The course will be developed according to recognized instructional systems design best practices, following the ADDIE model of course development. CTP will ensure that the program of instruction (POI) will be planned to focus on specific learning objectives, and that the training will contain instructional methodologies designed to engage the adult learner. The course will contain classroom instruction, practical exercises, and a threaded scenario culminating in a capstone exercise.
Audience
This course is designed for up to 40 law enforcement officers who are looking to acquire new knowledge and skills relating to gathering and acting upon intelligence as it relates to criminal enterprises. While some existing knowledge of detecting criminal organizations is useful, it is not necessary.
As this course is most often taught by current and former agents and officers with years of experience, the exchange of knowledge will be invaluable for new generations of law enforcement officers. At the completion of this Criminal Enterprise Theory Course, the students will be able to recognize the existence of a criminal enterprise and be able to formulate a plan to disrupt, dismantle and ultimately defeat that criminal enterprise.
Course Topics
- Introduction
- Conspiracy Theory & Law
- Compartmentalized Criminal Operations
- Poly-Drug/Poly-Crime Organizations
- Recruiting and Managing Informants
- Complex Conspiracy Casework
- Transnational Criminal Organizations
- Information Security Management
- Cooperative Relationships
- Critical Case Leadership & Task Delegation
- Capstone Exercise
- Summary and Commencement
Evidence Collection Crime Scene Management
Duration: 10 Training Days
Class Size: Minimum 20/Maximum 40 Students
Course Number: VEL-CN-0005
Description
The Evidence Collection and Crime Scene Management course is designed for 20 up to 40 participants and covers best practices for securing major incidents, crime scenes and collecting and securing evidence. During the two-weeks of course instruction, participants will be familiarized with various types of crime scene management strategies, various forms of physical and electronic evidence, and proper collection and handling of evidence in preparation for prosecution. Several practical exercises throughout the program will provide participants an opportunity to apply acquired skills and techniques to reality-based scenarios.
This course concludes with a Capstone Exercise where the participants will be required to recognize, plan and respond to a major crime scene case. Participants will have the opportunity to demonstrate skills in proficiency areas learned throughout the course such as scene management, investigation, safety concerns, evidence collection, scene contamination, media issues, logistical team planning, and scene evacuation.
Audience
This course is designed for up to 40 law enforcement officers who are looking to acquire new knowledge and skills relating to the area of crime scene management and evidence collection utilizing the techniques taught in this course. The adult learning philosophy used throughout this course centers on the idea that an adult professional seeks to learn in order to gain a direct benefit, such as a job-related skill set, and therefore will “learn by doing.” Active participation is a key element in this course and officers will use the skills and concepts learned throughout this training in a threaded scenario.
Course Topics
- Course Introduction
- Crime Scene Management
- Management Planning
- Evidence
- Evidence Integrity
- Preparing for Prosecution
- Capstone Exercise
- Course Summary and Commencement
Mid-level Management Skills
Duration: 10 Training Days
Class Size: Minimum 15 Students Maximin 40 Students
Course Number: VEL-CN-0006
Description
The Mid-Level Management Skills course focuses on how Mid-Level Managers can carry out the mission, vision, and strategies of their top-level leadership, while at the same time learning to “manage up” within the organization to keep the agency responsive to changes and emerging threats. The training is highly interactive and consists of classroom instruction, practical exercises, and a series of skill-based individual deliverables which participants will summarize and present at the conclusion of the course. The practical exercises will be a major focus of the course, to ensure that participants have a concrete understanding of topics that may initially appear to them as novel or abstract.
The training covers topics such as resource assignment, budgeting, communications, leadership, agency culture, implementing change, and measuring results. The objective of the course is to help participants become more effective managers. The goals of the course include:
- Developing management oversight that will allow law enforcement agency resources to conduct successful high-level, high-impact investigations
- Countering threats that emanate from narcotics, financial, and other related crimes
Audience
This course is designed to be universally applicable for up to 40 Mid-Level managers in all types of law enforcement agencies and is specifically aimed at law enforcement management.
The Mid-Level Management Skills Course will conclude with a Capstone Exercise which will enable the students to reinforce their knowledge and skills at the end of the training. They will have the opportunity to demonstrate thru the following course topics such skills learned.
Course Topics
- Introduction
- Management & Leadership
- Management Theory
- Strategic Planning
- Personnel
- Law Enforcement Values
- Stress and Police Occupation
- Training
- Summary and Commencement
Defensive Tactics Instructor
Duration: 10 Training Days
Class Size: Minimum 15 / Maximum 30 Students
Course Number: VEL-CN-0007
Description
The Defensive Tactics Instructor Course is designed as a “Train-the-Trainer” program for a class size of 15-30 participants. CTP’s instructor team has extensive experience in defensive tactics instruction and adult learning methodologies to teach law enforcement officers best practices and strategies to instruct future iterations of this course. As with the other tactically focused courses, this course will be both physical and interactive with a majority of instruction focusing on practical exercises and instruction methods for facilitating exercises and simulations with the adult learner. The goal of the Train-the-Trainer (TTT) course is to create a means by which participants are able to transfer knowledge to their colleagues and sustain the training for future participants.
The Defensive Tactics Instructor Course will conclude with a Capstone Exercise whereby participants will have the opportunity to exhibit proficiency in Defensive Tactics Instructor techniques including the ability to demonstrate and teach all applicable course lesson topics, as noted below, and explain the principals of instructing and curriculum development.
Audience
This course is intended for up to 30 mid-to senior-level law enforcement officials. As this course is a Train-the-Trainer, course participants are expected to already have a basic understanding of the course material and/or be a trainer themselves. When delivering this course, CTP understands that it is essential to know the differences between the standard course participant and the TTT participant who require distinct training methodologies.
Course Topics
- Introduction
- Principles of Adult Learning
- Lesson Plan Development
- Defensive Tactics Teaching
- Techniques for Law Enforcement
- Use of Force Policies and Procedures
- Situational Awareness
- Communication
- Officer Presence
- Verbal Command and Control Techniques
- Physical Empty-hand Control Techniques
- Use of Less-Lethal Devices
- Weapon Retention Techniques
- Personal Defense Techniques
- Handcuffing Techniques
- Search Techniques
- Officer Team Defensive Tactics
- Crowd Control
- Capstone Exercise
- Summary and Commencement
Basic Investigative Criminal Analysis
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0001
Description
Investigative criminal analysis is a valuable tool for identifying criminal associations and activities, generating investigative leads, and identifying patterns and trends in criminal activity. The resulting data can be used by law enforcement for strategic and tactical planning. Effective investigative criminal analysis requires the systematic application of proven analytic methods and techniques.
This course introduces the concept of investigative criminal analysis and establishes the foundational knowledge and skills needed to capture information and conduct a basic analysis of criminal investigative information.
- Recognize the purpose and value of investigative criminal analysis
- Understand and use current available Internet-based investigative techniques
- Understand and apply the information analysis process
- Create association matrices, link and time-event analysis charts manually and using RFFlow
- Develop and present a concise, accurate, and effective criminal analysis briefing
- Overcome analytical bias mindset and perceptions inherent in investigative criminal analysis
- Create a plan to incorporate and sustain BICA skills within the participant’s organization
Audience
This course is designed for 40 mid-level analysts, investigators, law enforcement or legal personnel charged with conducting criminal investigations or information management in support of investigations. Participants should have a basic understanding of investigation and criminal analysis. This course requires the use of personal computers (provided) as well as basic database and analytical software. Basic computer skills are recommended but not required.
Course Topics
- What is Investigative Criminal Analysis?
- Internet Resources for Criminal Analysis
- Information Analysis Process
- Association Matrices and Link Charts
- Effective Briefings
- Time-Event Analysis
- Bias, Mindset, and Perception
Intermediate Investigative Criminal Analysis
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0002
Description
Investigative criminal analysis is a valuable tool for identifying criminal associations and activities, generating investigative leads, and identifying patterns and trends in criminal activity. The resulting data can be used by law enforcement for strategic and tactical planning. Effective investigative criminal analysis requires the systematic application of proven analytic methods and techniques.
This course introduces the concept of investigative criminal analysis and establishes the foundational knowledge and skills needed to capture information and conduct a basic analysis of criminal investigative information.
- Recognize the purpose and value of investigative criminal analysis
- Understand and use current available Internet-based investigative techniques
- Understand and apply the information analysis process
- Create association matrices, link and time-event analysis charts manually and using RFFlow
- Develop and present a concise, accurate, and effective criminal analysis briefing
- Overcome analytical bias mindset and perceptions inherent in investigative criminal analysis
- Create a plan to incorporate and sustain BICA skills within the participant’s organization
Audience
This course is designed for 40 mid-level analysts, investigators, law enforcement or legal personnel charged with conducting criminal investigations or information management in support of investigations. Participants should have a basic understanding of investigation and criminal analysis. This course requires the use of personal computers (provided) as well as basic database and analytical software. Basic computer skills are recommended but not required.
Course Topics
- Architecture of a Criminal Analysis Center (CAC)
- Leveraging International Assets
- Graphic Development Using Google Earth
- Advanced Searches
- Introduction to Logic
- Analysis of Competing Hypotheses
Advanced Investigative Criminal Analysis
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0003
Description
Investigative criminal analysis is a valuable tool for identifying criminal associations and activities, generating investigative leads, and identifying patterns and trends in criminal activity that can be used by law enforcement management for strategic and tactical planning. Effective investigative criminal analysis requires the systematic application of proven analytic methods and techniques.
This course expands participants’ investigative criminal analytic abilities by exposing them to more advanced analytic methods and techniques. It introduces the use of a database for organizing and analyzing criminal investigative information and explores telephone records and communications analysis which can be used to support an investigation into criminal activity and generate investigative leads.
- Use a simple database application to index, search for, and retrieve information for analysis
- Use a simple database application to create collection taskings or requests
- Index telephone and internet communication records and conduct analysis using RFFlow and other proven analytical methods
- Understand the value of Collaborative Analysis teams and the criteria for selection/assembling
- Create a plan to incorporate and sustain AICA skills
Audience
This course is designed for 40 mid-level analysts, investigators, law enforcement or legal personnel charged with conducting criminal investigations or information management in support of investigations. Participants should have a basic understanding of investigation and criminal analysis. This course requires the use of personal computers (provided) as well as basic database and analytical software. Basic computer skills are recommended but not required.
Course Topics
- Database Information Management
- Using the Criminal Activity Reports Database
- Collection Planning and Tasking
- Telephone Record Analysis
- Internet Communications Analysis
- Collaborative Team Analysis
Financial Investigations
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0004
Description
Financial investigations are becoming more complex and are requiring more resources and skills to resolve. A thorough investigation of financial records is imperative to determine and document whether financial fraud is occurring. This practical and interactive course is designed to enhance the participants' investigative skills while following the money of a criminal enterprise.
Through comprehensive use of real-world case studies, financial documents, lectures and activities, this course will provide participants with an opportunity to apply techniques and strategies to identify and track assets, analyze bank documents, and identify various methods of money laundering.
- Identify the importance of a financial investigation that focuses on the funds generated by criminals
- Recognize different money laundering methods that appear to be from legitimate sources
- Identify records that can be used in a number of financial investigative techniques to prove a case
- Create a flow chart and link analysis with evidence obtained by various sources
- Produce an actionable sustainment plan for maximizing learning transfer
Audience
This course is an introduction to financial investigation and is best suited for those who are involved in investigations and familiar with presenting evidence to prosecutors and/or the judiciary.
This course teaches investigators, analysts, examiners, auditors, prosecutors, and other legal professionals the latest techniques in records analysis. It develops the participants’ skills related to examining and analyzing financial records, and presenting evidence in written reports, graphical depictions, and court testimony.
Course Topics
- What is a Financial Investigation?
- What is Money Laundering?
- Beginning a Financial Investigation
- Organizing a Financial Investigation
- Banking and Financial Operations
- Determining Funds from Unknown Sources
- Following the Money
Office of Professional Responsibility/Internal Affairs
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0005
Description
The global need for professional integrity and accountability in law enforcement has become more important than ever. An effective Office of Professional Responsibility/Internal Affairs (OPR/IA) conducts criminal and administrative investigations of employees, dealing with issues including but not limited to theft, bribery, police officer shootings, criminal and administrative misconduct, death or injury of prisoners and politically sensitive investigations.
This OPR/IA course trains law enforcement professionals how to establish and operate an OPR organization and conveys the skills and knowledge required to effectively carry out OPR/IA investigations, leading to an integrity-rich workplace environment.
- Recognize the value and need for an effective Office of Professional Responsibility
- Understand and utilize investigative techniques and processes in an OPR
- Prepare and write a proper investigative report
- Understand how proper case management and documentation supports integrity and accountability in the workplace
- Recognize the complexities of interviewing and interrogating agency employees
Audience
This course is designed for law enforcement leaders and staff personnel who are currently in positions that require the investigation of internal employees, special investigations and corruption investigations. Participants should be familiar with basic investigative techniques and report writing.
Course Topics
- Introduction into an effective Office of Professional Responsibility/Internal Affairs
- Complaint Intake Process
- Report of Investigation
- Conducting an Investigation
- Disposition and Resolution
- Specialized Investigations
Undercover Operations Techniques
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0006
Description
This 40-hour course trains criminal investigators in the use of specialized investigative techniques needed to effectively investigate transnational organized crime (TOC) activity.
This training develops the specific skills needed to successfully prepare for and conduct controlled deliveries and undercover meetings, including eliciting cooperation from a violator, preparing for an undercover meeting, the proper use and handling of informants, establishing an undercover identity and other surveillance techniques.
- Explain what transnational organized crime is
- Identify types of transnational organized crime
- Identify techniques used to investigate transnational organized crime
- Explain surveillance, controlled delivery, and undercover operations and when to use each
- Identify strategies for protecting officers engaged in controlled delivery, surveillance, and undercover operations
Audience
This course is designed for 40 mid-level criminal field investigators with a minimum of three years of experience.
Course Topics
- Transnational Organized Crime
- Controlled Delivery
- Five Stages Leading to Controlled Delivery
- Use of Consensual Monitoring Equipment
- Operational Planning
- Surveillance
- Introduction to the Undercover
- Undercover Tradecraft
- Undercover Flashes and Investigator Safety
- Use of Informants in Undercover Investigations
- Undercover Identification
- Undercover Storefronts
- Stress Management
- Prosecuting Undercover Cases
Advanced Controlled Delivery
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0007
Description
Controlled seizure, monitoring and transportation of illegal goods have the potential to identify not only the couriers of the contraband but also the buyers, financers and ringleaders of a criminal organization. This training program will advance the investigations of transnational criminal activities by promoting foreign governments’ use of controlled delivery techniques to target, in particular, professional criminal organizations.
Participants learn best practices for conducting controlled delivery operations, including: interviewing informants and cooperating sources, operating electronic surveillance equipment, conducting surveillance, and developing a detailed operational plan. They will apply all of these in performing a series of controlled delivery field exercises.
- Definition of controlled delivery
- Specific benefits and purpose of using a controlled delivery in an investigation
- Types of controlled deliveries and when to use them
- How and where controlled deliveries may originate
- The importance of quick decision-making in the success of a controlled delivery
- The importance of obtaining arrestee cooperation
- Advanced investigative techniques that can increase the chances of controlled delivery success
- The importance of officer/cooperator safety in carrying out a controlled delivery
- Overview of the steps in the controlled delivery process
Audience
This course is designed for 40 mid-level criminal field investigators with a minimum of three years of experience.
Course Topics
- The Controlled Delivery Process
- Laws Related to Controlled Delivery
- Interviewing Techniques and Nonverbal Communications
- Interviewing a Cooperative Source
- Decision-Making Process for Controlled Deliveries
- Utilizing Electronic Surveillance Equipment
- Surveillance for Controlled Deliveries
- Operational Planning for Controlled Deliveries
- Conducting a Controlled Delivery
Strategic Management for Law Enforcement
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0008
Description
The Strategic Management for Law Enforcement (SMLE) course presents strategies that law enforcement managers can implement to make their agencies more effective, efficient, and responsive to the challenges facing the law enforcement community in their respective countries. The SMLE course combines practical lessons derived from field experience with business fundamentals to enable the law enforcement manager to become increasingly adaptive, responsive, and effective in applying human and financial resources. The overall purpose is to promote professionalism of law enforcement managers, develop awareness of increasing international crime threats, suggest new perspectives and strategies to address these threats, and emphasize improvements in strategic planning, measurement of results, and public communications to support government stability, citizen safety, and respect for law. Objectives of the Course Include:
- Leading for and Effective Government
- Core Values, Ethics, and Anti-Corruption
- Managing Culture
- Managing Change
- Managing Outcomes of Operations
- Transitioning from Management to Leadership
- Handling Stress and Avoiding Mistake
- Professional Development Strategies
Audience
The SMLE course is designed for up to 40 senior law enforcement managers who can positively influence their agency’s mission, vision and strategies. The training provides senior managers with the tools necessary to protect and serve its citizens as part of the national and international community. It is adaptable for presentation to either senior/divisional managers or to front line managers. Basic computer skills are recommended but not required.
Course Topics
- Leading for an Effective Government
- Core Values, Ethics, and Anti-corruption
- Managing Organizational Culture
- Managing Organizational Change
- Transitioning from Management to Leadership
- Managing Outcomes of Operations
- Strategies for Handling Stress and Avoiding Mistakes
- Professional Development Strategies
- Case Management Strategies
- Task Force Strategies
- Program Management Strategies
- Strategies for Managing Resources
- Strategies for Budget Management
- Developing a Strategic Plan
- External Communications Strategies
- Managing Results and Feedback
Threat Finance
Duration: 5 Training Days
Class Size: 40 Students
Course Number: VEL-OC-0009
Description
The Threat Finance course teaches participants how to identify, analyze, and trace financial evidence that supports or proves that terror related activities are being carried out in violation of law. This includes violations pertaining to financing of terrorists, or money laundering of illicit funds raised by or directed to terrorists. The course is intended to impart “follow the money” concepts through hands-on scenarios, threaded throughout the course, using mock financial evidence such as checks and wire transfers. Unlike typical money laundering investigations, this course also teaches the investigative paradigm of terror investigations: that the goal of the investigation should not be solely based on a historical compilation of evidence, but that an investigator should take assertive, proactive investigative measures to get ahead of the terrorists’ next attack and thwart injury, destruction, and the resulting terror. As a result, training will emphasize forwarding investigative results and leads back into criminal intelligence units and financial investigation units (FIUs) for further evidentiary development. This effort is so that investigations become a source of intelligence that can be shared, as appropriate, with international partners who are similarly tackling terrorist activities.
Audience
This 40-person course is an introduction to threat finance and is best suited for those who are involved in investigations and familiar with presenting evidence to prosecutors and/or the judiciary. This course teaches investigators, analysts, examiners, auditors, prosecutors, and other legal professionals what evidence to analyze in order to help lead to the source of terrorist financing. It develops the participants’ skills related to examining and analyzing evidence such as financial records, presenting evidence in written reports, graphical depictions, and court testimony.
Course Topics
- Identify the components of a financial investigation
- Identify money laundering techniques used by terrorist organizations
- Identify methods terrorists use to generate their funds
- Identify methods terrorists use to maintain their funds
- Identify methods terrorists use to move funds
- Demonstrate actions that help with a financial investigation of a terror organization
AI for Decision Makers
Duration: ½ Day Offsite
Class Size: 20 students
Course Number: VEL-AI-0001
This half day, all-inclusive offsite course informs decision makers who want to understand how AI can address common business problems such as predicting customer churn, understanding the power of computer vision, autonomous machines, and how it intersects with emerging technologies such as virtual reality and wearables. Participants gain an understanding of the science behind machine learning and how humans will interact with intelligent machines. Finally, we walk the participants through the development a simple object recognition camera! Don’t worry, if you can browse the web, you can do this!
Veloxxity will work with the client to tailor the venue to their specific wants.
Audience
C-Suite, VPs, and Director level managers.
Program of Instruction (POI)
- What is AI?
- Examples of AI
- How machines learn
- How machines predict
- AI in action
- Build your object detection camera
- Discussion on how you can use AI in your organization
Leadership Lessons from the Battle of Gettysburg
Duration: 1 Day and 2 Day Options
Class Size: 30 students
Course Number: VEL-LD-0001
Description
This course covers key leadership lessons that apply to leaders at all levels. Using the power of story and the setting of this historic battlefield, you have the opportunity to step into the shoes of famous historical leaders. An optional second day will give you the chance to discuss these lessons as they apply to your organization. We also feature a whiskey tasting!
Audience
Program of Instruction (POI)
- Overview
- Initiative
- Clear communication
- Accountability
- Personal Leadership
- Character
- Speaking truth to power
- Getting the strategy right
- Conclusion