Provided by: World Institute for Security Enhancement

Covert Investigations Surveillance Technologies

Investigations

INTRODUCTION:
Covert Investigations & Surveillance Technologies are excellent methods of acquiring information; however they require sound techniques and the use of experienced, trained investigators and sate-of-the-art technology. They are closely related because in each instance, the investigator banishes his or her official standing to an obscure identity in order to accomplish the mission. In undercover operations, the investigator may assume an entirely different identity, often requiring extensive preparations. Because of the total involvement, and in some cases, danger to the investigator, surveillance & undercover operations are used when necessary as the best way or, as in many instances, the only way of achieving the desired results.
Undercover operations and surveillance are both employed in a variety of ways and require special skills and qualifications. There are several required skills that the surveillant must be trained in prior to going undercover: Observation and Description, Selection and Utilization of Informants, Techniques of Undercover and Surveillance Activities, Foot and Vehicular Surveillance Techniques, Airborne and Marine Surveillance, Visual Surveillance, Computer Surveillance, Electronic Surveillance, Technical Equipment, and Surveillance Log.
Surveillance can be also categorized according to function. There is, for example, intelligence-seeking surveillance where the investigator attempts to learn everything he or she can about a potential crime or an activity that takes place within any type of industrial environments.
Related Awards, Degrees or Certifications: This Course has been reviewed and is "Approved by the North Carolina Private Protective Services Board". This Board regulates an
Related Jobs or Careers: This course is designed for Security and Law Enforcement personnel whose job requires them to conduct investigations. It is ben
This is primarily ilt training
workshop / seminarThis is a workshop seminar
group study and discussionThis class may involve group study
coursewareCourseware may be available for purchase
instructor led trainingThis class may be available at a classroom in Wilmington, NC,
Course Level:basic through advanced
Duration:40 hours
Training Presented in:English
Certificate Program Provided by World Institute for Security Enhancement

Covert Investigations Surveillance Technologies Seminar Schedule

    Location    
April, 2017
3rd Apr   Hartfort, CT   [Register]
 
Covert Investigations Surveillance Technologies
Covert Investigations & Surveillance Technologies
CIST- 01 Covert Techniques and Procedures
Development of Surveillance Techniques
Reasons for Covert Investigations
Preparation for Covert Operations
CIST- 02 Informants
Selection of Informants
Motives of Informants
Informant Management
Informant Control
Meeting with Informants
Treatment of Informants
Legal Status of Informant Information
CIST- 03 Observation, Description & Identification
Observation
- Persons
- Objects
- Places
- Events
Techniques of Description
Techniques of Identification
CIST- 04 Surveillance
Surveillance
Types of Surveillance
- Techniques of Foot Surveillance
- Techniques of Vehicle Surveillance
- Techniques of Alternate Mobile Surveillance
- Van
- Boat
- Aircraft
- Techniques of Fixed Surveillance
Methods of Surveillance
CIST- 05 Technical Monitoring Methods
Surveillance Communications
Surveillance Vans
Command Post Management
CIST- 06 Tools of the Trade
Tool Kits
Trade Craft
CIST- 07 Basic Electrical Theory
Terminology
Schematic Symbols
Basic Circuits
Measurements
Calculations
Batteries & Power Supplies
Troubleshooting
CIST- 08 Wiretapping Techniques
Types & Operation of Taps
Acoustics & Microphones
Wire Tracing
Installation Practices
CounterMearsues
CIST- 09 Audio Surveillance
RF Spectrum
Wave Propagation
Modulation
Types of Transmitters
Types of Receivers
Antennas
Audio Filters
CounterMeasures
CIST-10 Visual Surveillance
Types of Transmitters
Types of Receivers
Antennas
CounterMeasures
CIST-11 Tracking Surveillance
Types of Transmitters
Types of Receivers
Antennas
CounterMeasures
CIST-12 Telecommunications Surveillance
Types of Intercepts
- Hardware
- Software
CounterMeasures
CIST-13 Computer Surveillance
Types of Intercepts
- Hardware
- Software
CounterMeasures
CIST-14 CounterMeasure Concerns
Safety Precautions
Ethical
Legal
CIST-15 Reference Resources
Statistical Data
Technical Specifications
Equipment Sources
Sources of Information
Glossary of Terms
About The Training Provider: World Institute for Security Enhancement
World Institute for Security Enhancement - The WORLD INSTITUTE provides Homeland Security Training and Consultation, to Industry and Government Agencies by an Internationally Respected Faculty. The INSTITUTE focuses on Protection of the Nation's Critical Infrastructure & Key Resources, through Specialized Training, promoting Life Safety & National Security issues, providing Research & Development and serving as a "Think Tank". Some...
Want to market your counterterrorism training?
Custom Search
tcw11-v473M-01/17/17-09:20:11-()[B]-[A]-[A] -05:38:25