Exciting Course line up for HALO Summit 2012

Exciting Course line up for HALO Summit 2012

Here is a list of the courses that will be offered at The HALO Counter Terrorism Summit (29 Oct – 2 Nov 2012)

al-Qaeda’s Penetration of the US Army, FBI and CIA

David Williams

Following the Trail of Terror Against America: How an Al-Qaeda Spy Penetrated the USIC. This segment will discuss the case of Ali Mohamed, a U.S. naturalized citizen, U.S. soldier, al-Qaeda spy and terrorist. Through this case, we will review how the USIC and US Army was penetrated by al Qaeda; the WTC attack in 1993; how the FBI penetrated the terrorist cell; and the relationships between terrorists. You will learn through the benefit of hindsight how to collect and connect the dots; and the damaging consequences of what happens when the signs are ignored, and what living in denial does to the security of the United States.

Applied Intelligence – Breaking Down the Analytical Mindset

Kathy Pherson and Randolph H. Pherson

Everyone talks about the need for better critical thinking skills to deal with the problems facing our nation, but practical guidance on how to accomplish that is hard to come by. Kathy and Randy Pherson, authors of Critical Thinking for Strategic Intelligence: A Practical Guide for Analysts, will work with students in this workshop on a real case study from the southwestern United States that stumped local authorities and investigators trying to determine why seemingly healthy people were suddenly dying. Through the exercise, students will practice using analytic strategies to structure and externalize thinking processes to improve rigor, avoid mental traps, and communicate with others. The exercise will demonstrate the value of group and individual brainstorming, checking key assumptions, generating multiple hypotheses, evaluating hypotheses for inconsistent data, and validating indicators. Use of the techniques will be facilitated by ThinkSuite™ software, a timesaving set of thinking tools that helps make the analytic process transparent, leaves an audit trail, and supports the generation of collection requirements.


Basic iPhone Forensics and Exploitation for Law Enforcement

Remy Baumgarten

The Basic iPhone Forensics and Exploitation workshop provides the attendee with a background of iPhone forensics and interaction with an advanced but easy to use iPhone Reconnaissance Tool called the “iPhone Commander”. The attendee will first learn how the iPhone works from a forensic perspective, following guided instruction on how to install and operate the remote access tool. The workshop will conclude with a scavenger hunt to locate hidden iPhones on the island using the techniques learned during the session. Information retrieval from the iPhone will include:

  • GPS Coordinates
  • Live video feeds
  • Live audio feeds
  • Passwords stored on the device

This workshop and scavenger hunt exercise will provide real world and hands on experience in successfully tracking and locating individuals using iPhone devices.

iPhones, software and laptops will be provided for use in this workshop.


Cartels – Tactics, Techniques, and Procedures (TTP)

Paul Hagerty

This course was developed for law enforcement and includes dozens of videos, graphic photos, and multimedia records of the murders of fellow law enforcement officers. Attendees receive a detailed overview of weapons, tactics, techniques, and procedures used by cartels and Mexican Law Enforcement. SSA Hagerty demonstrates the multi-state nexus of International Firearms Trafficking by the drug cartels. Specific case analysis, and anecdotal examples, detail the methods used by violent Mexican drug cartels to acquire firearms in the United States. This course explains how firearms have become a “rate of exchange,” either directly for drugs in the US, or the subsequent drug proceeds. The specific firearms requirements of these “narcos” will be discussed and the state of the violence in Mexico that is spilling over the borders.


Cartel Threats to the US (aka Mexicos Drug War)

Sylvia Longmire

Most Americans have heard news about the violence in Mexico, but don’t know why it’s happening or if they should be concerned. My presentation will cover who the cartels are, why they’re fighting the police and each other, and where the violence is most pronounced. It will also provide an overview of different illegal activities the cartels are involved in, like drug trafficking, weapons trafficking, and kidnapping.

Next, I’ll explain the different approaches governments and law enforcement agencies on both sides of the border are trying to approach the drug war, and the direct impact on US law enforcement. I spend a considerable amount of time talking about cartel-run marijuana grows in the US, as well as covering the debate over the existence of border violence spillover.

I wrap up the presentation with some solutions I believe are more practical than others, and the challenges to both countries involved in implementing these solutions. Finally, I posit that the drug war needs to be managed because it can’t be won in the manner of a “traditional” armed conflict.


Close Quarters Combat

Tony Blauer

This is a CQB specific program that identifies the S.P.E.A.R. SYSTEM™’s dynamic tactical applications with full gear/kit during room clearing operations. The S.P.E.A.R. SYSTEM™ represents the only fully ambidextrous CQC tactic and does not require the operator to slow down or stutter step to line up a kick or strike. The S.P.E.A.R. SYSTEM’s™ options for the operator are diverse, from addressing threat levels like the classic no-shoot belligerent, to unarmed but still very dangerous assailants and even applications clear bystanders and even the classic ‘Stockholm Syndrome’ hostage. Contact evolutions include ‘Point of Domination’ exercises and ‘IA’ applications. The program also offers a special phase on solo cuffing applications with full gear. The S.P.E.A.R. SYSTEM™ is compatible with high-speed transitions from long guns & handguns. Course includes: Personal Close quarter skills, S.P.E.A.R. SYSTEM™ basics, standup grappling, ground fighting, weapon control, weapon takeaways, B.M.F. simulations, and tandem combative strategies.


Corporate Threat Awareness (Corporate Espionage)

Joe Butta

This briefing describes the threat posed by economic and industrial espionage including foreign collectors, methods of collection, economic targets, and industrial and technological sectors of adversarial exploitation. An in depth analysis to include economic and industrial vulnerabilities plus a quantitative global analysis of risk and potential countermeasures are also included in this presentation.


Death in the Southwest: Structured Analytic Techniques in Action and Practical Application

Randolph H. Pherson

Everyone talks about the need for better critical thinking skills to deal with the problems facing our nation, but practical guidance on how to accomplish that is hard to come by. Kathy and Randy Pherson, authors of Critical Thinking for Strategic Intelligence: A Practical Guide for Analysts, will work with students in this workshop on a real case study from the southwestern United States that stumped local authorities and investigators trying to determine why seemingly healthy people were suddenly dying. Through the exercise, students will practice using analytic strategies to structure and externalize thinking processes to improve rigor, avoid mental traps, and communicate with others. The exercise will demonstrate the value of group and individual brainstorming, checking key assumptions, generating multiple hypotheses, evaluating hypotheses for inconsistent data, and validating indicators. Use of the techniques will be facilitated by ThinkSuite™ software, a timesaving set of thinking tools that helps make the analytic process transparent, leaves an audit trail, and supports the generation of collection requirements.


Defining the Terrorism Problems: Myths and Facts

David Major

This module discusses the number of US based terrorist plots and individuals arrested for terrorism related crimes from Sept 11, 2001 to the present. US-based terrorism cases are those involving US-born, naturalized, US citizens, or residents within the United States, either legal or illegal. They are individuals who either called the United States their home, or resided here for a period of time, even if only for operational/residential purposes. These individuals attempted to, or were successful in, carrying out violent and deadly attacks designed to terrorize the United States and its people. The individuals discussed include those who finance terrorist organizations, offer material support to terrorist organizations, obstruct justice in cases involving terrorism, and lie to federal authorities in cases involving terrorism. A demographic profile of these individuals is discussed along with a detailed review of the target of these cases which include American soldiers, civilians, airlines, trains, buildings, infrastructure, transportation, utilities, airports, subway stations, shopping malls, buses, bridges, tourist places, and more.

Domestic Counter-Terrorism Insurgency Operations (COIN)

Douglas A. Ollivant

Inspired by early failures in the Iraq War, the United States Army and Marine Corps produced in 2006 a new counterinsurgency or COIN doctrine. The creation of this doctrine played at least a small part in the abrupt reduction in violence in Iraq that accompanied the 2007 Iraq “Surge.” However, the doctrine appears to have been much less successful in Afghanistan and may now be showing the limitations of what was known in 2005-2006 as the original manual was crafted.

State of the art has now advanced; both because of the lessons learned from a second and very different test case in Afghanistan and because of a growing output of scholarship as multiple disciplines turned to the topic. The result is a rare collusion between theory and practice that instructor Douglas Ollivant and his co-author Radha Iyengar have labeled “COIN 2.0.”.

Counterinsurgency is not going away so long as there are insurgencies against existing governments, and there appears to be no lack of separatist movements—whether ideological, ethnic, sectarian or otherwise. Further, states without active insurgencies could develop them should the central government fall for whatever reason. This mini course will teach participants:

  • Basic types of insurgencies and conditions under which they develop.
  • Macro-level methodologies for defeating insurgencies.
  • Micro-level best practices for defeating insurgencies.
  • How to develop integrated military and political strategies for defeating insurgencies.
  • Likely future roles for governmental and non-governmental organizations in defeating insurgencies.
  • Lessons applicable for law enforcement agencies

Domestic Human Trafficking / Pimping and Prostitution

Chappie Hunter

This course is an eye opening presentation on trends and practices of Domestic Human Trafficking, less commonly known as Pimping and Prostitution, and provides detailed information regarding gang involvement. The goal of this course is to provide the audience with the skills to recognize the indicators of this crime, as well as the confidence to react in accordance with the law.

This course takes the audience on a journey through the Human Trafficking process in the United States. It begins with a statistical introduction to help people understand the overall reality of the crime. Then, covers basic state and federal law, identifies who a trafficker is, educates the audience on the prostitute as a ‘victim’, and identifies the varying backgrounds of victims. Mr. Hunter continues by explaining the growth of this crime — specifically, as it relates to local gang members embracing the high pay / low risk reality and their violent efforts to control the victims. This course details how crime raises the status of an individual within their gang and promotes cooperation between enemy gang sets. Once the attendees understand the business aspect vs. the criminal aspect, they then learn how money is made and distributed. Mr. Hunter explains the differences between street and internet-based prostitution, and the millions of dollars made by internet companies who support this crime. Through the use of institutional knowledge, as well as audio and video clips, Mr. Hunter reveals intimate details of past and present investigations, which support the training curriculum. These cases span every aspect of the crime, but depict the extreme violence often overlooked by lawmakers, law enforcement, and citizens alike. Finally, the course concludes with a breakdown of social services for victims, the political and financial woes these services must endure, and how both law enforcement and private citizens can help fight this crime.


Drug Cartels, An American View from Mexico

Melesio Hernandez

Abstract Coming Soon


The ER is Full – Deploying the ER to the Field

Dr. Steven Phillips

Abstract Coming Soon


Extreme Close Quarters Conditioning (ECQC)

Wes Doss, PhD

Extreme Close Quarters Conditioning (ECQC) is a reflexive training system created to help contemporary warriors move, act and respond with fluid precision regardless of the situation or the tools at hand. Systems of physical and emotional control have long been apart of the training regimes for professional and elite athletes; they are used to condition the athlete for safe and precise movement and to reduce injuries. The same principle utilized by professional and elite athletes has been successfully adapted to the realms of firearms, defensive tactics, SWAT and Special Operations.

The cornerstone of ECQC is emersion in an environment based on interaction and engagement with actual, thinking targets that respond, react and hit back versus typical inanimate stationary targets found in most training programs. A training environment where operators are conditioned to solve an array of challenges and problems, while engaging reactive opponents, creating more of an experience then simply a training session. ECQC is a unique proprietary program of instruction and conditioning, emphasizing all mechanical and psychological skill aspects of close quarters engagements. This dynamic and engaging program focuses on developing reflexive skills and psychological control for winning in the close quarters environment.


Home Invasion Kidnapping Enforcement (HIKE)

Lauri Burgett

The HIKE presentation will discuss the trends and violence that led to the Unit’s creation and how it continues to evolve. The complexities of these investigations will be demonstrated in case studies of kidnapping/abductions involving criminality and police-style home invasions.


Inside the Killing Machines of Mexican Drug Cartels

Ioan Grillo

Background: Mexican drug cartels have carried out murder on an enormous scale, leaving 50,000 dead in the last five years, and unleashing terror tactics such as car bombs and mass graves. But how does their machine of murder really function? Looking at testimonies from inside cartels, exclusive video footage and experience tracking the cartels from Mexico and the United States, journalist Ioan Grillo looks at the command structures and operations of cartels.

Objectives:

  1. Participants get a deeper understanding of how the killing machines of drug cartels operate.
  2. Participants see how the assassins are recruited, how they train and how they think on an operational level.
  3. Participants see how assassins are so effective at killing on such an enormous scale.

Intelligence Fusion and Practical Application

Kathy Pherson and and Randolph H. Pherson

Everyone talks about the need for better critical thinking skills to deal with the problems facing our nation, but practical guidance on how to accomplish that is hard to come by. Kathy and Randy Pherson, authors of Critical Thinking for Strategic Intelligence: A Practical Guide for Analysts, will work with students in this workshop on a real case study from the southwestern United States that stumped local authorities and investigators trying to determine why seemingly healthy people were suddenly dying. Through the exercise, students will practice using analytic strategies to structure and externalize thinking processes to improve rigor, avoid mental traps, and communicate with others. The exercise will demonstrate the value of group and individual brainstorming, checking key assumptions, generating multiple hypotheses, evaluating hypotheses for inconsistent data, and validating indicators. Use of the techniques will be facilitated by ThinkSuite™ software, a timesaving set of thinking tools that helps make the analytic process transparent, leaves an audit trail, and supports the generation of collection requirements.


Islamic Literalist Ideology

Joe Butta

The greatest weapon used by terrorist organizations against the United States and citizens is our own ignorance of them. This presentation will disarm that weapon and provide the audience with tools to defend our principles and help defeat their ideology. We will discuss the radicals’ long-term goals for the United States and ultimately what they hope to achieve. This course is a must for all in the conflict with Islamic literalism. This includes our military, policy makers, law enforcement, and educators.


Low Light Tactical Operations

Ken Good

Want to maintain dominance in low-light situations? Want to operate with greater skill and confidence when illumination tools are required? Want to know what NOT to do in darkness? This course is not a “how to shoot in the dark manual.” This course addresses the when, where, how, and how come of operating in the dark. It challenges you to push yourself into new mental and physical realms of capability. Sound fundamentals are examined, critical philosophical underpinnings are explored and practical drilling methodologies are explained. Ken Good, a former U.S. Navy SEAL, imparts his wisdom to attendees from his direct involvement with Realty-Based Training (Force-on-Force) in low-light environments for over two decades. Mr. Good’s course is a condensed version of his book, Strategies of Low-Light Engagements: A Law Enforcement Officer’s Guide – dubbed the “Low-Light Bible” by experts.


Managing a Terrorist Attack and Investigation: Onsite Commanders’ Lessons Learned

David Williams and Richard Marquise

The onsite FBI commanders of these two terrorist attacks will discuss the process of establishing the investigation teams to respond to these two cases and the problems they had to overcome. They will review how each case was solved, the role international liaison played, and the obstacles that had to be overcome to bring each case to a successful conclusion.

Narco-Terrorism

Greg Ferency (ITOTA)

This course looks at the growing connection between international terrorism and transnational organized crime, illicit drugs, money laundering, illegal arms, and human trafficking, as well as the possible movement of NBC materials. Attendees will explore the reasons for cooperation between organized crime groups and terror groups, their similarities, strategies, and the use of intelligence collection. Part of this course focuses specifically on Mexico and the opportunities for cooperation between cartels and terror groups, as well as operations conducted in the past.


Patron Saints of the Underworld

Robert Almonté

This course will include information and cases on the use of prayer in traditional or recognized religions to facilitate drug trafficking and other crimes. Often drug traffickers and other criminals engage the spiritual world in their illegal activities for protection from law enforcement and others considered enemies, such as rival drug trafficking organizations and informants. This course is beneficial to federal, state, and local law enforcement officers in all parts of the country who may encounter these items during or pursuant to an investigation. The course has helped enhance understanding by law enforcement throughout the country, aiding in many arrests, several of which included seizures of large amounts of drugs and drug money.


Psychopathology of Hate/Terrorism

John (Jack) R. Schafer, Ph.D (Invited)

This day introduces the Seven-Stage Hate Model (SHM). The SHM is a predictive tool that tracks hate groups from inception to full maturity. A hate group, if unimpeded, passes through seven successive stages. In the first four stages, hate groups vocalize their beliefs and in the last three stages, they act on their beliefs. A transition period exists between verbal violence and acting that violence out. Prior to the groups transition to acting out violence, interdiction has the greatest probability of success. The Seven-Stage Hate Model can be used to predict violence before it occurs. Observers can track individuals and groups as they pass through each of the seven stages and develop intervention strategies before violence occurs. This Model is universal and extends to terrorist groups. It explains why people willingly detonate suicide bombs and what motivates people to become terrorists and suicide bombers. This session provides tools for predicting violence and provides intervention and interdiction techniques to prevent violence. The Group Immersion Dynamic and the Personal Pronoun Index determine commitment of terrorists and provide techniques to interview terrorists with a full range of commitment from sympathizer to jihadist. This session provides practical tools to interview terrorists. The Group Immersion Model determines the level of indoctrination of group members. The students will learn how to identify which terrorists are more likely to talk to investigators. The Seven-Stage Hate Model can predict acts of violence by terrorist and hate groups as well as workplace and school violence. It has been successfully used to predict and prevent violent terrorist acts in the United States.

The Radicalization Process: An Insider’s View

Dr. Tawfik Hamid (Tarek Abdelhamid)

Muslim Reformer Dr. Tawfik Hamid knows what it is like to go over to the dark side. While in medical school, his desire to be a devout Muslim led him to be recruited into Jammaah Islamiya(JI), Egypt’s most radical terrorist organization. He personally knew its leader Dr. Ayman al-Zawahiri—now formally succeeds Osama Bin Laden as the leader of al Qaeda. In only six months, Dr. Hamid was a fully recruited extremist, ready to become a Shahid and kill in the name of his religion. Learn how his radical masters controlled and manipulated him through five simple, yet extremely effective steps. Find out what made him leave and how he risked everything, including his life, to educate and awaken the West to threats we now face. Dr. Hamid will reveal clues to look for if someone is going down the radical path and ways to tell if a person or group is moderate or radical. He exposes the real motives and objectives of jihadists and offers solutions to this problem. Dr. Hamid is now a Muslim Reformer and author of Inside Jihad: Understanding and Confronting Radical Islam and The Roots of Jihad. He is a powerful, engaging and highly-sought after speaker who has briefed the highest levels of government. What he has to say from experience is too important to ignore or wish away.

Continued validation of assets is critical to the successful protection of our national defense. This one-day seminar provides unique procedures, techniques, and critical thought processes to accomplish this task. It covers planning for operational testing, conducting and evaluating operational testing, and general validation concepts.

Red Dragon Rising, Mother Russia, and “Democratic” Korea

Joe Butta

This course explains the operations security components of threat (i.e., adversarial intent and capability), and analyzes them with respect to three examples from a historical perspective through the modern day. This course also describes the threat posed by these adversaries in terms of their unique history, ideology, and policy. Attendees will learn standard threat analysis techniques regarding each threat.


Social Engineering: The Art of Human Hacking

Chris Hadnagy

This class taught by Chris Hadnagy is based on his best selling book Social Engineering – The Art of Human Hacking, which has been “unanimously voted as the official book on social engineering.” Based on the Web’s first Official Framework for Social Engineers, this class delves into aspects of human thinking that aren’t discussed in other social engineering classes, while focusing on both human vulnerabilities and psychology. Chris does an outstanding job of laying the foundation of social engineering and all the different concepts that come into play. He identifies, defines, and references all the different ways you can monitor, understand and influence people. With in depth discussions into body language, hand gestures, the scientific part of NLP, and microexpressions, this class is ground breaking in the infosec community.


Tactical Interrogation, Debriefing, and Elicitation

John Guzman

The following is a description of topics that will be presented in a four-hour format and the learning objectives that will be achieved:

  • Differences between interview and interrogation – Attendees will be presented the contrast between interview and interrogation, and how the subtle differences affect the strategic approach to each dynamic.
  • Types of lies – In this section, the attendees will learn the most common lies which include: denials, fabrication, omission, exaggeration and minimization.
  • Interpretation of physical and verbal behavior – Physical and verbal behavior will be evaluated as they relate to the interpretation of truth or deception. Cultural values and differences will be discussed as factors that influence the interpretation of behavior. Attendees will learn the five principles of reading behavior as well as the concept of Neurolinguistics.
  • Establishing rapport – In this module, attendees will learn the subtle ways that an interviewer can employ to establish and maintain rapport with a subject. Attendees will learn how proxemics can influence interview and interrogation.
  • Selective interviewing techniques – These interviewing techniques are designed to provoke verbal and physical behavior. Understanding the general principles that govern the interpretation of these behaviors will assist the interviewer in eliminating the innocent from suspicion. Once the innocent have been eliminated the interviewer can concentrate on the subjects that are exhibiting guilty behavior. Special emphasis will be given to developing enticement questions, one of the most dramatic questions that can be asked during a selective interview.
  • Nine steps of confrontational interrogation – Attendees will learn the nine steps in the confrontational approach to interrogation including: direct positive confrontation, theme development, handling denials and objections, getting the suspect’s attention, recognizing signs of submission, asking a choice question, and obtaining, developing and preserving the admission.
  • Non-confrontational Introductory Statement – Attendees will learn the aspects of the non-confrontational Introductory Statement, with a special emphasis on developing rationalizations and tips on how to stage the interrogation setting.

Terrorism and Terrorist Organizations – Police, Military and Private Security Counter-Terrorism Complacency

Carl R. Hospedales

This training package is to aid emergency response management, large and small in preparation for a Terrorist attacks against large soft civilian target. In today’s post 911 and financial market meltdown society, it is very difficult to maintain the level of vigilance that is required to combat both national and international Terrorism.

From my experience in the UK, Europe and in various other parts of the world from the 1970 to today including the 2012 Olympic games in London. Carl Hospedales has experienced security measures designed to mitigate and or stop terrorist action, degrade or poorly executed due to its repetitious nature, which needs rectification through both regionally Government and Private Security generated Threat Training Response.


Trafficked Victim’s Account of the US Sex Trade

Natasha Herzig

Mrs. Herzig reveals the events that led to her kidnapping, resulting in 10 months in the sex trade as a high-end escort before her successful escape. Mrs. Herzig details how the US sex trade functions, the methods used to prey on unsuspecting victims, and how this experience led her to make other choices in life. This survivor’s tale is an eye-opening account of the life of a sex slave, heightens awareness of the sex trade industry, and details the warning signs displayed by victims.

She has also created 12 Steps To A Victim’s Recovery that covers the broad spectrum of individuals victimized by crime. Key topics include:

  • America’s Most Wanted DVD Introduction
  • Natasha’s Story: Kidnapping, Sex Trafficking, Rescue, and Life After Trafficking
  • Brainwashing Techniques Used by Traffickers
  • Behavior Exhibited by Victims / Understanding this Behavior ◦ Helpful Techniques for Use in the Investigative Process
  • Law Enforcement Missed Opportunities
  • Key Phrases / Establishing Trust with the Victim ◦ 12 Stages to the Victim’s Recovery

Train to Win

Wes Doss, PhD

Learn from veteran Soldier & Police Officer, Wes Doss, what makes our nation’s frontline professionals into winners, not just survivors. What kind of training do they use to develop a winning mind-set? Is there truth to the old adage, “It’s the fight in the dog that counts, not the dog in the fight”? Based on his critically-acclaimed groundbreaking book, Train to Win, Wes shows you what mental and physical characteristics must be developed to make warriors from all disciplines — military, law enforcement, business, and sports –prevail over any odds and win in high-risk, high-stress environments.

This engaging and interactive, presentation focuses on the presence and effects of complacency, improper training and ineffective conditioning in the lives of contemporary warriors, with how & why we must change the way we prepare to deal with the realities of the world.


US – Mexico Extradition Treaty

Melesio Hernandez

The US – Mexico Extradition Treaty workshop/presentation will provide the attendee with a background of the extradition treaty, its history and the mechanics of implementation as it relates to persons who have committed serious crimes within the territory of the United States and have fled to Mexico in order to evade prosecution for their crimes. The treaty is normally applicable to persons who are not US citizens but also to US citizens who have significant ties to Mexico or have derived Mexican citizenship through parents, marriage or children. The workshop will include case exemplars of actual cases and conclude with a question and answer session designed to further inform the attendee by means of practical scenarios in the implementation of the treaty.

Learning Objectives:

Formal Extradition, Deportation, Extraterritorial Investigations [Chief of Mission authority], Foreign Fugitives

The following is a description of topics that will be presented in a two-hour format and the learing objectives that will be achieved:

  • Major difference between formal extradition and deportation – Attendees will be presented with procedures for both methods and will be able to discern the major differences between the two methods in effectiveness, speed, and efficiency although the end result is the same.
  • Extraterritorial investigations – the attendee will be presented with what is permitted and prohibited while performing the specific mission as a US Federal Marshal of locating and apprehending US fugitives in Mexico and other countries in accordance/compliance with Chief of Mission authority.
  • Methods of tracking – the attendee will be presented and informed of the unique obstacles that are encountered while conducting investigations and operating outside of the continental United States. The fugitive tracking presentation will include financial institutions, internet, databases, and case development in the United States. The attendee will be made aware that communication device tracking is used but methods cannot be divulged due to the sensitivity and/or classified nature of techniques and related equipment.
  • Foreign fugitives – the attendee will be presented with specific examples and definition of a foreign fugitive and the US Marshals Service authority to investigate and detain/arrest persons wanted by foreign countries who are legally and illegally within the territory of the United States Procedures such as deportation and formal extradition will be covered in this block of instruction as well as the Presidential Threat Protection Act of 2000.

Warrior Mindset and Practical Application

Tony Blauer

“One man that has a mind and knows it, can always beat ten men who haven’t and don’t.” – George Bernard Shaw. The Warrior Mindset is a critical aspect for successfully dealing with high-fear/high-stress situations. This course focuses on what the Warrior Mindset is and how to develop it. Participants will be instructed in practical methods of preparing for; operation in; and successfully recovering from traumatic tactical engagements.


Delegate Registration for the HALO 2012 Counter-Terrorism Summit is now open. Register early to receive the best rates.

Pricing: Government /  Law Enforcement / Military / EMS Early Bird: $1000 [ ends June 15 ]

Private Sector: Early Bird: $1200 [ ends June 15 ] Regular: $1400 Late: $1600 On:site: $2000

Paradise Point hotel rooms: $131-289 GSA Rate Rooms available

Meal Plan: $133-$665

Register Now

 Digg  Facebook  StumbleUpon  Technorati  Deli.cio.us