Length of Seminar: 1 Day Instructors: Eric Vandenburg and/or Michael Savallo
An introduction to the methods utilized by a terrorist or a terrorist group, with specific focus on the al-Qaeda network, including the hierarchical structure, an introduction to the methods utilized for training, funding, and gathering intelligence, the operational phases of a terrorist attack, and the process of target selection. This course also examines traditional crimes that have been identified as the means of funding terrorist organizations, including narcotics trafficking, money laundering, currency counterfeiting, tax fraud, coupon fraud, trademark infringement, illegal diamond/mineral smuggling, and kidnapping. Finally, the course examines the behavioral indicators and methodologies associated with the phenomenon of suicide attacks, including self-sacrificing attackers, suicide bombers, and truck bombs.
This module of instruction provides an examination of Foreign Terrorist Organizations, with particular focus on these organization’s primary spheres of influence and ideologies, methods of funding, past terrorist attacks and potential for attack against U.S. interests domestically and globally.
Define International Terrorism
Identify the State Sponsors of Terrorism
Discuss various international terrorist groups.
Explain the ideologies behind various international terrorist groups
Explain the origins and goals of Al Qaeda.
2. The al-Qaeda Network
This module of instruction provides an examination of the development of the al-Qaeda Network from its inception through the attacks of September 11, 2001, with a particular focus on how the application of modern political and management principles fostered the development of the first transnational terrorist organization.
Explain the origins of the Al Qaeda terrorist organization.
Define the goals and ideology of Al Qaeda.
Define the terms: “Jihad”, “Fatwah” and “Mujhadeen”.
Explain Al Qaeda’s opposition to the US and the West.
List the Al Qaeda’s main anti-U.S. activities to date.
Explain the significance of the Al Qaeda Manual
Define al Qaeda’s influence since September 11, 2001
This module of instruction provides an examination of behavioral indicators and methodologies associated with the phenomenon of suicide attacks, including self-sacrificing attackers, suicide bombers, and Vehicle Borne Improvised Explosive Devices. Deals with the principals associated with VBIEDs and the methods and tactics utilized to screen vehicles and address operational procedural safety issues.
Identify types of suicide attack.
Identify stages in the evolution of a suicide attacker.
Identify methods utilized for the delivery of an improvised explosive device (IED) by a suicide attacker.
Describe the evolution and spread of pedestrian borne suicide bombings.
Identify the hierarchical/organizational structures that support a suicide attack.
Describe the strategic benefits associated with carrying out a suicide attack.
Identify the visual behavioral indicators associated with a pedestrian-borne/suicide bomber.
Identify the components utilized to construct a suicide bomber’s IED.
Identify the individual behavioral indicators associated with a vehicle-borne suicide attack.
Identify the vehicular indicators associated with a vehicle-borne suicide attack.
Identify the policy regarding the identification of and response to a suicide attacker
Identify effects caused by the detonation of an IED.
Identify types of injury caused by the detonation of an IED.
4. Funding Terrorism
This module of instruction provides an introduction to and examination of traditional crimes that have been identified as the means of funding terrorist organizations, including narcotics trafficking, money laundering, currency counterfeiting, credit card fraud, coupon fraud, trademark infringement, illegal diamond/mineral smuggling, and kidnapping.
Explain characteristics of terrorist funding.
List sources of terrorist funds.
Define money laundering.
Describe the difference between criminal and terrorist money laundering.
Explain how terrorist organizations move their funds.
Describe ways to recognize suspicious transactions.
Explain the ‘hawala” system.
Articulate how charitable donations obtain a criminal taint from terrorism.
List resources available to combat terrorist funding.
5. Introduction to Islam for Law Enforcement
This module of instruction serves as an introduction to the Islamic religion. Discuss beliefs and terms related to the religion. Also provides an examination of Radical Islamism, with a specific focus on terrorist recruitment, ideology and propaganda.