Covert Investigations & Surveillance Technologies are excellent methods of acquiring information; however they require sound techniques and the use of experienced, trained investigators and state-of-the-art technology. They are closely related because in each instance, the investigator banishes his or her official standing to an obscure identity in order to accomplish the mission. In undercover operations, the investigator may assume an entirely different identity, often requiring extensive preparations. Because of the total involvement, and in some cases, danger to the investigator, surveillance and undercover operations are used when necessary as the best way or, as in many instances, the only way of achieving the desired results.
Undercover operations and surveillance are both employed in a variety of ways and require special skills and qualifications. There are several required skills that the surveillant must be trained in prior to going undercover: Observation and Description, Selection and Utilization of Informants, Techniques of Undercover and Surveillance Activities, Foot and Vehicular Surveillance Techniques, Airborne and Marine Surveillance, Visual Surveillance, Computer Surveillance, Electronic Surveillance, Technical Equipment, and Surveillance Log.
Surveillance can be also categorized according to function. There is, for example, intelligence-seeking surveillance where the investigator attempts to learn everything he or she can about a potential crime or an activity that takes place within any type of industrial environment.
Undercover operations and surveillance can be defined as the secretive, continuous, and sometimes periodic watching of persons, vehicles, and places or objects to obtain information concerning the activities and identities of individuals or groups. Oftentimes, surveillance is the only investigative technique available to identify the source, couriers, and recipients of illegal substances (drugs), stolen items and the co-defendants and co-conspirators in an operation.
This program provides information and techniques for establishing and implementing covert investigative and surveillance activities within any industrial environment.
OBJECTIVES OF THIS PROGRAM ARE TO:
- Familiarize participants with the basic principles of informant selection and control
- Explain management and relationship of the informant and investigator
- Determine the legal status of obtaining information
- Discuss the procedures used in preserving and documenting information during informant and surveillance operations
- Explain appearance and function of the Surveillant
- Describe surveillant planning, Procedures and Methods of Surveillance
- Discuss loose and close Surveillance Techniques and Procedures
- Discuss Foot and Vehicular Surveillance methods and techniques
- Demonstrate specialized Tools of the Trade and established “Tradecraft” practices.
- Understand Technical Surveillance where Physical, Mechanical, Electronic, Telephone, Computer, or other Devices are used to Intercept Contents of Wire/Oral Communications & follow activities of Target
Instruction includes practical hands on demonstrations of devices
used in undercover and surveillance activities.
Practical exercises in surveillance will be conducted.
WHO SHOULD ATTEND?
This course is designed for Security and Law Enforcement personnel whose job requires them to conduct investigations. It is beneficial to Detectives, Private Investigators, Public Defenders, Security Managers, Security Supervisors and other security personnel responsible for Investigations and Surveillance Activities.
CONTINUING EDUCATION UNITS (CEU):
Continuing Education Units (CEUs) are nationally recognized units in qualified programs which allow participants to document all non-academic credi work completed. CEUs may be used as evidence of increased performance capabilities and for job advancement, and are recognized by many professional organizations and companies.
CERTIFIED PROTECTION PROFESSIONAL (CPP) RECERTIFICATION:
Documentation of attendance at these programs may be submitted to the ASIS Professional Certification Board for consideration of recertification credit by qualified Certified Protection Professionals.
NORTH CAROLINA PRIVATE PROTECTIVE SERVICES BOARD (NCPPSB)
This “Covert Investigation & Surveillance Technologies” program has been reviewed and is “Approved by the North Carolina Private Protective Services Board”. This Board regulates and licenses all Private Investigative, Security, & Counterintelligence activity within the State.
Additional instruction may be provided by other faculty members, which might include
CIST – Covert Investigation & Surveillance Technologies
CIST-01 Covert Techniques and Procedure
Development of Surveillance Technologies
Reasons for Covert Investigations
Preparation for Covert Operations
Selection of Sources & Informants
Motives of Sources & Informants
Source & Informant Management
Source &Informant Control
Meeting with Sources & Informants
Treatment of Sources & Informants
Legal Status of Source & Informant Information
CIST-03 Observation, Description & Identification
Techniques of Description Techniques of Identification
Types of Surveillance
– Techniques of Foot Surveillance
– Techniques of Vehicle Surveillance
– Techniques of Alternate Mobile Surveillance
– Techniques of Fixed Surveillance
Methods of Surveillance
CIST-05 Technical Monitoring Methods
Command Post Management
CIST-06 Tools of the Trade
CIST-07 Electrical Theory & Safety
Measurements & Calculations
Batteries & Power Supplies
High Voltage Precautions
CIST-08 Wire Attacks & Communication Intercepts
Acoustics & Microphones
Types & Operation of Taps
Wire Tracing & Recording
Installation Practices & Entry Bypass
Countermeasures – TSCM
CIST-09 Audio Surveillance
RF Spectrum Wave Propagation Modulation Types of Transmitters Types of Receivers & Recorders Antennas Audio Filters & Equalization Countermeasures
CIST-10 Visual Surveillance
Types of Transmitters
Types of Receivers & Recorders Antennas Countermeasures
CIST-11 Tracking Surveillance
Types of Transmitters Types of Receivers Antennas Countermeasures
CIST-12 Telecommunications Surveillance
Types of Intercepts
CIST-13 Computer-based Surveillance
Types of Intercepts
CIST-14 Countermeasure Concerns
Moral & Ethical Issues Legal Responsibilities
CIST-15 Reference Resources
Statistical data Technical Specifications Publications Equipment Providers Sources of Information Training Schools Certifications Associations Conferences & Exhibitions Glossary of Terms
|Day 108:00 AM
||Registration & Check-in
||Welcome & Introduction
World Institute for Security Enhancement
|08:00 – 12:00
||Lecture / Discussion
|13:00 – 17:00 PM
||Lecture / Discussion
The above timetable approximates the schedule for this course.
Instructors may choose to vary the program and any changes will be announced.
World Institute for Security Enhancement courses are provided at our training sites across the United States and throughout the World. Most Open Session Courses have been reviewed and are “Approved by the North Carolina Private Protective Services Board”. This Board regulates and licenses all Private investigative, Security and Counterintelligence activity within the State of North Carolina.
ENROLLMENT: Classroom space is limited. Please reserve your place now!
COURSE FEE: $1,950.00 USD
FEE INCLUDES: The course registration fee includes a attendee Reference Manual, Program Materials, a Mounted Certificate, and Daily Refreshments for most programs held at our United States training sites.
PAYMENT: Payment in U. S. dollars is required with your registration form and must be received at least thirty (30) days prior to the beginning of the Class. Payment not received on time will automatically be placed in the next scheduled class. Payment by Check or Money Order drawn on a U. S. Bank, in U. S. Dollars (USD), are accepted. Purchase orders or Training Requisition Forms Do Not constitute payment. Bank Transfers are Not accepted.
MEALS: Lunches will not be provided.
DRESS: Business casual is the recommended daily attire.
REFUNDS / CANCELLATIONS: The Institute reserves the right to amend any program should circumstances warrant such action. In the event of course postponement or cancellation, the Institute will reschedule the course, or apply the fee payment to any other program offered in the next twelve months. Liability for course cancellation is specifically limited to the amount of prepaid course fees and excludes any incidental or consequential damages. Attendees must confirm cancellations or substitutions, in writing, at least THIRTY (30) days prior to the initial class date. Substitutions may be made, with written notice to the Institute, at least thirty (30) days prior to class commencement. There will be a 10% administrative fee for such a cancellation. Otherwise, fees are not refundable but may be transferred to another program of your choosing.
LODGING: Lodging is NOT included. Each attendee is responsible for their own travel arrangements and lodging costs. Please make your room reservation at least three weeks prior to the initial class date.
INSTRUCTION: While every effort is made to assure that scheduled instructors, equipment and training materials are present, unforeseen circumstances may occur. Therefore, the Institute reserves the right to substitute personnel and curriculum as required.