Online Training Registration
Law Enforcement Training Courses and Schedule
PATC Links
Law Enforcement Training Institute
PATC Internal Affairs Institute
PATC Internal Association of Hostage Negotiators
PATC Class Materials
Contact Us      Aboout PATC      PATC Publishing/Bookstore      Training Partners      Newsletter, Training Brochures, RSS, Facebook, Twitter, LinkedIN

Training Options and CategoriesTerrorism  << back

Counter Terrorism for Law Enforcement Investigators

Length of Seminar: 2 Days
Instructor: Eric Vandenburg and/or Michael Savallo

Target Audience: Detectives/Investigators

Course Overview: An introductory level course intended to equip the investigative law enforcement officer rudimentary skills required to detect and investigate potential terrorist activity, and when necessary, interview and interrogate a potential terrorist or group.


  • Introduction to Terrorism
  • International Terrorism
  • Domestic Terrorism
  • Individual Behavioral Indicators
  • Hostile Surveillance/Terrorist Surveillance
  • Interview and Interrogation
  • Fraudulent Documents/Identity Theft
  • Funding Terrorism
  • Cyberterrrorism
  • Introduction to Islam for Law Enforcement

Introduction to Terrorism

This module of instruction provides an introduction to the methods utilized by a terrorist or a terrorist group, including the hierarchical structure, an introduction to the methods utilized for training, funding, and gathering intelligence, the operational phases of a terrorist attack, and the process of target selection.


  • Define the term “Terrorism”.
  • Define the objectives of terrorism.
  • Discuss historic terrorist events that have affected law enforcement in the United States.
  • State the terrorist’s mission.
  • Explain the components of a terrorist cell and their functions.
  • Explain the characteristics of a terrorist operation.
  • Explain terrorist operational phases.

International Terrorism:

This module of instruction provides an examination of Foreign Terrorist Organizations, with particular focus on these organization’s primary spheres of influence and ideologies, methods of funding, past terrorist attacks and potential for attack against U.S. interests domestically and globally.


  • Define International Terrorism
  • Identify the State Sponsors of Terrorism
  • Discuss various international terrorist groups.
  • Explain the ideologies behind various international terrorist groups
  • Explain the origins and goals of Al Qaeda.

Domestic Terrorism

An examination of Domestic Terrorist Organizations, delineating between right-wing extremists, left-wing extremists, lone wolf terrorists, and Special Interest/Single Issue organizations. Various case studies are discussed.


  • Define “domestic terrorism.”
  • Briefly explain how the image of a terrorist has transformed.
  • List and explain the types of domestic terrorist groups.
  • Identify Right-Wing groups
  • Identify Left-Wing groups.
  • Explain the “New World Order Conspiracy”
  • Explain the “Lone Wolf” theory.
  • Define Special Interest Groups.

Individual Behavioral Indicators

This module of instruction provides an overview of the ideology, policies, procedures, and practices of a terrorist organization, based upon a document recovered by the Manchester, England Police Department entitled “The Military Series of the Declaration of Jihad.” This “al-Qaeda Manuscript” provides numerous behavioral indicators that may be indicative of terrorist activity.


  • Identify the FBI “profile” of a terrorist, a domestic terrorist, and an international terrorist.
  • Explain the significance of the recovery of “the military series” of the “Declaration of Jihad.”
  • Identify behavioral indicators associated with a terrorist’s utilization of funds.
  • Identify behavioral indicators associated with a terrorist’s utilization of fraudulent documents.
  • Identify behavioral indicators associated with a terrorist’s selection of housing.
  • Identify behavioral indicators associated with a terrorist’s method of communication.
  • Identify behavioral indicators associated with a terrorist’s method of travel.
  • Identify behavioral indicators associated with a terrorist’s method of gathering intelligence/ conducting surveillance.

Hostile Surveillance/Terrorist Surveillance

This module will aide in the understanding of hostile surveillance methodology, the different types of hostile surveillance and measures that can be taken to detect hostile surveillance. This segment of instruction defines the various types of surveillance (foot, vehicular, and technological) and serves to introduce the officer to the concepts of hostile surveillance and counter-surveillance.


  • Define surveillance and why it is important to law enforcement
  • Define what the principles of a successful surveillance are
  • Define the objectives of a surveillance operation
  • Define and describe surveillance terminology
  • Identify the four types of surveillance: foot, vehicle, combined foot and vehicle and static
  • Define how to counter the four basic forms of surveillance
  • Know surveillance detection techniques
  • Know surveillance pitfalls and common errors and how to avoid them
  • Define techniques that should be used when making observation and taking descriptions of a person, place or vehicle
  • Describe the different mechanical devices used in surveillance operations
  • Define hostile surveillance
  • Identify the steps followed by most terrorist organizations in planning attacks
  • Identify the indicators of terrorist planning and indicators that law enforcement can use to recognize those actions
  • Discuss the seven steps that terrorists logically follow in planning and executing an attack
  • Describe suspicious activity that would indicate terrorist activity
  • Describe the local protocol for reporting possible terrorist activity

Interview and Interrogation

This module of instruction provides an introduction to the various techniques that can be employed by an investigator in order to become a more effective interviewer and interrogator. Students will be introduced to various types of behavior that serve as cues and which can be utilized during the interrogation or interview process. Provides an examination of various debriefing techniques employed when conducting prisoner interviews and interrogations. In addition to examining the methodologies currently utilized by law enforcement, FBI, and CIA, there is a role-play scenario where a student utilizes these skills while debriefing an instructor’s assistant. The proper selection and direction of questioning will result in the development by the participant of the intelligence required to successfully identify and prevent a potential terrorist attack.


  • Explain the importance of both verbal and non-verbal communication.
  • Understand how question phraseology will elicit different responses both verbally and non verbally.
  • Understand the profile of the interviewer and its relationship with the interviewee.
  • Understand Behavioral Symptom Analysis and its applications during an interview or interrogation.
  • Identify fight or flight manifestations that may be revealed during an interview or interrogation.

Fraudulent Documents/Identity Theft

The “al-Qaeda Manuscript” specifically instructs that all terrorist cell members possess fraudulent documentation when conducting an operation. This section involves the examination of the Resident Alien/ Permanent Resident ID Cards, as well as, various state Driver’s Licenses, the Social Security Card, and Visas/Passports in an attempt to identify the security features associated with each.


  • List general security features that can be used to identify documents as being either valid or fraudulent.
  • Define holograms, ghost images and micro-printing.
  • Define the changes in identification and documents security in a post September 11, 2001 society.
  • Identify the differences in the legal status of Permanent Resident Aliens, Non-Immigrant Aliens, and Undocumented Aliens.
  • Identify employment authorization documents and travel documents that aliens may possess.
  • Define and explain the privileges and limitations associated with using an International Driving Permit.
  • List general security features that can be used to identify passports as valid or fraudulent.
  • List general security features found in Social Security Cards.
  • List general security features found in miscellaneous documents.
  • Discuss “Fantasy” documents.
  • Identify countries from which foreign citizens may enter the United States without a visa and briefly explain why visas are not required.
  • Identify and apply basic fraud detection techniques to distinguish past and current immigration documents.
  • List the elements or segments of the face used to detect the validity of a photo compared to an actual person.
  • List the methods of photo comparison.
  • Discuss terrorist’s procurement and use of identification.
  • Define Identity Theft

Funding Terrorism

This module of instruction provides an introduction to and examination of traditional crimes that have been identified as the means of funding terrorist organizations, including narcotics trafficking, money laundering, currency counterfeiting, credit card fraud, coupon fraud, trademark infringement, illegal diamond/mineral smuggling, and kidnapping.


  • Explain characteristics of terrorist funding.
  • List sources of terrorist funds.
  • Define money laundering.
  • Describe the difference between criminal and terrorist money laundering.
  • Explain how terrorist organizations move their funds.
  • Describe ways to recognize suspicious transactions.
  • Explain the ‘hawala” system.
  • Articulate how charitable donations obtain a criminal taint from terrorism.
  • List resources available to combat terrorist funding.

Cyber Terrorism

This module of instruction provides an examination of the vulnerabilities associated with information technologies. This section will also examine the use of the Internet by Islamist terrorist organizations for the purpose of recruitment, funding and pre-operational surveillance, as well as case studies that involve the targeting of information technologies by these groups.


  • Define the term “cyber terrorism”.
  • List some “dangers” of the Internet.
  • Explain various targets of our electronic infrastructure.
  • Describe best practices for Computer and Physical Security.
  • Demonstrate examples of terrorists’ use of the Internet.

Introduction to Islam for Law Enforcement

This module of instruction serves as an introduction to the Islamic religion. Discuss beliefs and terms related to the religion. Also provides an examination of Radical Islamism, with a specific focus on terrorist recruitment, ideology and propaganda.


  • Explain a brief history of Islam.
  • Explain what Muslims believe.
  • Discuss the Qur’an and Hadith.
  • List the five pillars of Islam.
  • Identify Muhammed.
  • Define the term “jihad”.
  • Discuss the Sunni-Shia split




Las Vegas Winter Conference
November 29 - December 10, 2021


View Legal Article Archive



Click Here to See Our FAQ!



Legal Updates
Internal Affairs

Click below to sign up for
emails and brochures!

PATC Mailing List

Public Agency Training Council - 5235 Decatur Blvd - Indianapolis, IN 46241 - 800.365.0119

About PATC | PATC Publishing/Bookstore | Training Partners | E-Newsletter | Contact Us | Home | Site Terms of Use Policy