Training Courses Catalog 2015



Similar documents
TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Purpose of the Governor s strategy. Guiding Principles

UFF Position Statement: Fire and Smoke as a Weapon

Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington

National Surface Transport Security Strategy. September Transport and Infrastructure Senior Officials Committee. Transport Security Committee

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

South Carolina Criminal Justice Academy - PoliceOne Academy Course Guide

Establishing a State Cyber Crimes Unit White Paper

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015

THE STRATEGIC POLICING REQUIREMENT. July 2012

FAQs Organised Crime and Anti-corruption Legislation Bill

Ohio Homeland Security Strategic Plan

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Department of Homeland Security Information Sharing Strategy

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

The Comprehensive National Cybersecurity Initiative

WENTWORTH MILITARY ACADEMY JUNIOR COLLEGE Lexington, MO Course Syllabus

2 Gabi Siboni, 1 Senior Research Fellow and Director,

National Cyber Security Policy -2013

v. 03/03/2015 Page ii

Homeland Security and Terrorism COURSE SYLLABUS

Planning & Response Considerations for Mass Shooting Incidents

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Law Enforcement and Homeland Security Anti-Terrorism Training

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

Business Plan 2012/13

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism

At the Frontline: Miami International Airport Security Director Lauren Stover

Homeland Security for Schools: Threat Status Alert Worksheet

Cyber Crime ACC Crime

Curriculum Vitae EXPERIENCE WORK HISTORY

ACTIVE THREAT TEMPLATE

Law Enforcement Consolidation Task Force INVESTIGATIONS TEAM REPORT

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

A school crisis is any event that drastically disrupts or alters a normal school day for your campus. More dynamic if the media covers the event!!

Organizational Security Track FAQ

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

PROGRAMME "PREVENTION OF AND FIGHT AGAINST CRIME" CALL FOR PROPOSALS 2012 RESTRICTED TO FRAMEWORK PARTNERS

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

The Strategic Importance, Causes and Consequences of Terrorism

Ten Steps for Preventing a terrorist Attack

PENNSYLVANIA COLLEGE CAMPUS SECURITY ASSESSMENT REPORT

Counter-Terrorism Strategy

A Proposal of Employee Benefits. Innovations in IDENTITY THEFT

Globalization of Security Threat Groups (CJSA 2371) Online. Credit: 3 semester credit hours (3 hours lecture)

TUSKEGEE CYBER SECURITY PATH FORWARD

School Safety & Emergency Preparedness. Presented by Dr. Joe Melita Professional Standards & Special Investigative Unit

A Risk Assessment Methodology (RAM) for Physical Security

OHIO COURT SECURITY STANDARDS

HOMELAND SECURITY INTELLIGENCE RPAD 556

Business Continuity for Cyber Threat

Action Plan for Canada s Cyber Security Strategy

CMJS/SOCI 4013 Homeland Security

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17

Cyber Security Strategy

CYBER SECURITY GUIDANCE

SALVE REGINA UNIVERSITY. Emergency. Office of Safety & Security

Active Threat Scenario (ATS) RFP 1. INTRODUCTION

Security Criteria for C-TPAT Foreign Manufacturers in English

Homeland Security and Protective Services CIP Task Grid

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

National Prevention Framework. National Prevention Framework

Anti-Money Laundering and Counter- Terrorism Financial Policy

Teaching an Overview of Homeland Security

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

Academic Program Assessment Plan Certificate: Homeland Security Studies

STATE HOMELAND SECURITY GRANT PROGRAM

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013

INTELLIGENCE ASSESSMENT

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Option 1: Use the Might of the U.S. Military to End the Assad Regime

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

State of Ohio Homeland Security STRATEGIC PLAN

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process

STATEMENT OF LORETTA E. LYNCH ATTORNEY GENERAL OF THE UNITED STATES BEFORE THE UNITED STATES SENATE

BUSINESS CONTINUITY PLANNING

Transcription:

Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015

Law Enforcement and Public Safety Courses Introduction to Terrorism The Creation of Fear Terrorism can range from complex plots to small scale attacks and can take many forms. Often, the terrorist goal is to create an atmosphere of fear in an effort to convince a population that their government is powerless to protect them. This 2 hour presentation serves as an introduction to terrorism as a global phenomenon and is designed to provide a general understanding of terrorism, terrorist activities, and methodologies. The presentation discusses terrorist ideologies and belief systems, lone wolf terrorism, and significant terrorist organizations and movements, which are a threat to the United States today. Domestic Extremism Terror from Within While international terrorism is still on the top of the threat-pyramid, a chain of recent events and new research indicates that the threat from far right and far left extremist movements here in the United States is increasing. The current domestic terrorist threats facing the United States include racial hate groups, environmental extremists, violent anti-government groups, and radical separatists groups. This 2 hour presentation examines the fundamental beliefs of the most prevalent domestic extremism ideologies in the United States today. As well, this presentation provides information on radicalization, the threat from lone offenders, important extremist terms and concepts, and the challenges of domestic terrorism information gathering.

The Sovereign Citizen Movement Understanding their Beliefs The Sovereign Citizen movement generally rejects the authority of the United States Government and although they know the government exists; Sovereign Citizens believe that they have found obscure legal ways to be immune from its various laws. This 2 hour presentation will provide vital information about this growing movement by discussing the most common conspiracy theories behind their ideology as well as the most common practices and tactics of the Sovereign Citizen. It is intended to heighten awareness of the threat for law enforcement and public safety professionals as they may encounter these individuals during the course of their duties. Radicalization and the Homegrown Violent Extremism A Call to Global Jihad The terrorism threat to the United States is ever evolving. While the threat of another large-scale September 11, 2001 attack from a foreign terrorist organization has been diminished, there has been an increase in individuals within the United States adhering to global radical ideology and mobilizing towards or even carrying out attacks within the homeland. These individuals are known as Homegrown Violent Extremists (HVEs) and while they share several characteristics of both traditional domestic and international terrorists, they are in a class all their own. This 2 hour presentation will provide an in-depth examination of homegrown violent extremism, to include the current state of the threat, terrorists' radicalization process, as well as U.S. counter strategies. It is intended to aid law enforcement and public safety professionals in understanding their role in detecting, disrupting, and deterring acts of terrorism within the homeland.

Critical Infrastructure Awareness The systems that make up the infrastructure of our society are often taken for granted. However, if a disruption, from either a natural disaster or a deliberate act, was to impact any of these systems it would have major consequences - especially at the local and regional levels. Protecting, strengthening and maintaining these assets and systems require a proactive and collaborative effort across all levels of government and private industry. This 1 hour presentation is intended to inform and encourage law enforcement and public safety professionals to work closely with their private sector partners to increase security and resilience of America s critical infrastructure. Tennessee Fusion Center s Consolidated Records Management System (CRMS) LAW ENFORCEMENT ONLY Criminal activity knows no jurisdictional boundaries and often times offenders operate in multiple municipalities. But with limited time, resources, and budgetary restraints, information sharing can be a challenge for law enforcement. The Tennessee Fusion Center s Consolidated Records Management System (CRMS) is a comprehensive database, available to Tennessee law enforcement, which can provide crucial information and aid in the criminal investigation process by making available access to statewide law enforcement department records. This course is available in either a 2 hour or 4 hour formatted program and is intended to provide a look of the Tennessee Fusion Center s Consolidated Records Management System (CRMS) and how statewide law enforcement officers and investigators can benefit from this comprehensive tool. This is a hand-on course, wherein attendees will utilize the CRMS system. Attendees are required to have access to an internet assessable computer.

Tennessee Office of Homeland Security Liaison Officer The Tennessee Office of Homeland Security Liaison Officer serves as the conduit through which homeland security and crime-related information flows from the field to the Fusion Center for assessment and analysis as it has become evident that one of the best ways to mitigate criminal and terrorist activity is to prevent it. This 8 hour basic Liaison Officer program fosters communication and collaboration amongst public safety, law enforcement, and homeland security partners and provides the knowledge and resources to better understand the responsibilities of a Liaison Officer. This program is designed to train law enforcement and public safety officials in information collection, suspicious activity reporting, the role of fusion centers, the special problems of terrorism, as well as, increase the participant s knowledge of information versus intelligence and their awareness of civil rights and civil liberties issues in regards to information collection and information sharing. ALERRT Terrorism Response Tactics Active Shooter Level 1 LAW ENFORCEMENT ONLY This dynamic course of instruction is designed to prepare the first responder to isolate, distract, and neutralize an active shooter. The course curriculum includes weapon manipulation, threshold evaluation, concepts and principles of team movement (including solo officer strategies), setting up for room entry and room entry techniques, approach and breaching the crisis site, follow-on responder tactics, improvised explosive devices (IED's), and post-engagement priorities of work. The course will culminate with dynamic force-onforce scenarios. Course Length: 2 days/16 hours. This is a specialized course, taught by the Tennessee Office of Homeland Security in partnership with other Tennessee Law Enforcement Agencies. It is restricted to certified law enforcement officers at this time. Requests for this training course must be made directly to the Tennessee Office of Homeland Security s Training Coordinator at 615-532-7825 or email brice.allen@tn.gov

Public Courses Introduction to Terrorism The Creation of Fear Terrorism can range from complex plots to small scale attacks and can take many forms. Often, the terrorist goal is to create an atmosphere of fear in an effort to convince a population that their government is powerless to protect them. This 1 ½ hour presentation serves as an introduction to terrorism as a global phenomenon and is designed to provide a general understanding of terrorism, terrorist activities, and methodologies. What is Suspicious Activity? Every citizen being alert to and reporting suspicious activity is the best way to protect our communities from terrorism and other criminal activity. In July 2010, the United States Department of Homeland Security launched a national "If You See Something, Say Something " campaign, to raise public awareness and to highlight the importance of reporting suspicious activity.* This 1 hour presentation is designed to aid in identifying suspicious activity based on suspicious behavior and situations; as well as discuss who to report suspicious activity to and what mechanisms are in place to do so. *United States Department of Homeland Security. "If You See Something, Say Something " Campaign. http://www.dhs.gov/if-you-see-something-say-something%e2%84%a2-campaign

Sudden Violence Surviving an Active Shooter Throughout the United States, acts of sudden and unexpected violence in schools, shopping malls, office buildings, and other public locations have been on the rise. Events like the shootings in Virginia, Colorado, Oregon, and Connecticut raise awareness of this continuing national problem. This 1 ½ hour presentation - intended for businesses, schools, and other private entities - will provide vital information about mitigating the threat posed by individuals who carry out acts of violence, along with information that addresses intervention, clarifies the role of those involved, and how to effectively respond to the problem. (This is not a tactical training course) Bomb Incident and Suspicious Package Management Bomb and suspicious package threats persist as one of the most common threat related problems encountered by any organization. This 1 hour program - intended for private businesses and other entities - is designed to provide options for an organization faced with a bomb incident and/or a suspicious package at their facility. The program will cover reasons for bomb threats, credibility of the threat, search techniques, evacuations, and threat management choices.

Protecting Your Identity What You Should Know, What You Should Do Identity fraud is one of the fastest growing crimes in the world. It affects millions of victims each year and results in billions of dollars in losses for consumers, businesses, and financial institutions. It takes years to build one s identity, but it could be destroyed very quickly if it is misused by someone. This 1 hour presentation is intended to explain some common methods used by identity thieves, how to safeguard your identity, and what to do if you become a victim of identity theft.

How to Host a Training Program in Your Classroom or Training Facility In addition to delivering training at various conferences across Tennessee, the Tennessee Office of Homeland Security delivers training programs via host organizations. Organizations that host our programs are normally expected to provide training or classroom space and assist with marketing the class. The Tennessee Office of Homeland Security will typically provide everything else necessary to deliver the training program, including instructors, handouts, and supplies. Who can be a Host? A host can be any organization private, corporate, or government that: has a need or interest in one or more of our training programs has free access to a suitable classroom where training can be conducted and is willing to get the word out and promote the training in and around their area. What is required to become a Host? 1. Determine which training program(s) you would like to host.* 2. Contact Brice Allen, Training Coordinator, at the Tennessee Office of Homeland Security. Phone: (615) 532-7825 Email: brice.allen@tn.gov - put Host Training in the subject line. *If your organization needs a particular type of training and you do not see it in our catalog, please send us an email and we will try to accommodate your needs.