SMI - Training

Counter-Espionage

SMI - Counter-Espionage
Luke Bencie, Managing Director of SMI

Luke Bencie is the Managing Director for Security Management International, LLC.

In this capacity, Mr. Bencie has been a consultant to the US Department of State, US Department of Defense, Fortune 500 companies, as well as foreign governments. He specializes in conducting strategic and security management assessments, performing counterintelligence and due-diligence investigations, and also provides specialized intelligence advisory services. He is the author of "Among Enemies: Counter-Espionage for the Business Traveler" and "Global Security Consulting: How to Build a Thriving International Practice."

Mr. Bencie has worked in over 100 countries and has trained thousands of domestic and international students from police, military, and intelligence services on topics such as economic and industrial espionage, border security, intellectual property protection, counterfeiting/piracy, and recognizing/discouraging terrorist travel movement. Prior to establishing SMI, Mr. Bencie was a Senior Security Consultant for Raytheon Company in the Intelligence and Information Systems Division, and assigned to the emerging markets of Brazil, India and Lebanon.

Mr. Bencie previously served on the US Department of State’s Foreign Emergency Support Team. In this capacity, he was responsible for responding to terrorist attacks carried out against US targets overseas. As a result, he performed numerous trips to Iraq, Afghanistan, and other "hot spots" throughout the world.

Mr. Bencie holds graduate degrees in “National Security Studies” from The George Washington University’s Elliott School of International Affairs and The American Military University, as well as an MBA from the University of Sarasota. He received his BA from Michigan State University and completed further course work from the University of Pennsylvania’s Wharton School, the Federal Bureau of Investigation’s National Training Academy, and the United Nations Institute for Training and Research.

The Counter-Espionage for Business Travelers Course is the solution for protecting your organization's secrets

According to an annual Congressional report on espionage, "the United States private sector is seen as an irresistible 'soft target' for foreign intelligence collectors."

As today's business environment has become globally interconnected, foreign intelligence activities have extended beyond traditional targets in the Intelligence Community and other US national security structures. Hostile intelligence services, as well as private collectors, now target a wide variety of unclassified/classified information and technologies in a range of sectors. Although cyber threats are increasingly pervasive, most collectors still employ more traditional espionage practices when targeting international business travelers.


Luke Bencie is the Managing Director for Security Management International, LLC.

In this capacity, Mr. Bencie has been a consultant to the US Department of State, US Department of Defense, Fortune 500 companies, as well as foreign governments. He specializes in conducting strategic and security management assessments, performing counterintelligence and due-diligence investigations, and also provides specialized intelligence advisory services. He is the author of "Among Enemies: Counter-Espionage for the Business Traveler" and "Global Security Consulting: How to Build a Thriving International Practice."

Mr. Bencie has worked in over 100 countries and has trained thousands of domestic and international students from police, military, and intelligence services on topics such as economic and industrial espionage, border security, intellectual property protection, counterfeiting/piracy, and recognizing/discouraging terrorist travel movement. Prior to establishing SMI, Mr. Bencie was a Senior Security Consultant for Raytheon Company in the Intelligence and Information Systems Division, and assigned to the emerging markets of Brazil, India and Lebanon.

Mr. Bencie previously served on the US Department of State’s Foreign Emergency Support Team. In this capacity, he was responsible for responding to terrorist attacks carried out against US targets overseas. As a result, he performed numerous trips to Iraq, Afghanistan, and other "hot spots" throughout the world.

Mr. Bencie holds graduate degrees in “National Security Studies” from The George Washington University’s Elliott School of International Affairs and The American Military University, as well as an MBA from the University of Sarasota. He received his BA from Michigan State University and completed further course work from the University of Pennsylvania’s Wharton School, the Federal Bureau of Investigation’s National Training Academy, and the United Nations Institute for Training and Research.

Unfortunately, most business travelers are untrained, and thus unprepared, to handle even the most common espionage tactics, such as:

  • Elicitation
  • Bribery
  • Blackmail
  • Extortion
  • Electronic Surveillance
  • Electronic Exploitation
  • Physical Surveillance
  • Hotel/Office Covert Intrusions

Protect yourself and your company's vital secrets with an intelligent solution...
- The Counter-Espionage for Business Travelers Course

Counter-Espionage
 
 

Course Overview

The Counter-Espionage for Business Travelers Course is a two-day seminar designed to educate those individuals in your organization who may become targets of espionage, whether knowingly or unknowingly, from an economic competitor or a hostile intelligence service.

Two SMI instructors will facilitate the training, using a combination of lectures, case studies, videos, group exercises, and one-on-one elicitation scenarios.

Course Content

This highly informative course will open your employees' eyes to how vulnerable intellectual property actually is while traveling, and the lengths to which others will go to undercut your organization.

A small sample of the topics covered include:

  • Economic vs. Industrial Espionage
  • Foreign Intelligence Collection Methods
  • How to Recognize Elicitation and Recruiting Techniques
  • Operational Security (OPSEC) Awareness
  • Communication Security (COMSEC) Awareness
  • Data Attack and Intrusion Methodologies
  • How to become an "Invisible Traveler"
  • Surveillance Detection Techniques
  • Plus much more…

Target Audience

The Counter-Espionage for Business Travelers Course is perfect for organizations with international operations and/or employees who travel overseas and are responsible for:

  • Research and Development
  • Business Development
  • Marketing
  • Logistics
  • Legal
  • Finance
  • Project Management
  • Quality Assurance
  • Human Resources
  • Executive Decision Making

The SMI Managing Director, Luke Bencie, wrote an essential book for every business traveler, Among Enemies: Counter Espionage for the Business TravelerAmong Enemies: Counter Espionage for the Business Traveler.

SMI offers additional training courses for executives and business travelers. Click to find out more about our Traveler Safety Courses including: Kidnapping Prevention and Awareness CourseKidnapping Prevention and Awareness Course and Hostile Travel CourseHostile Travel Course.

In addition, SMI provides Security ConsultingSecurity Consulting, Security ManagementSecurity Management, and Intellectual Property ProtectionIntellectual Property Protection for executives, business owners, and Fortune 500 companies.


The CARVER Methodology

SMI - CARVER - Target Analysis and Vulnerability Assessment Methodology
Leo Labaj, Director of Critical Infrastructure Protection talks about CARVER

With over 40 years of government and commercial experience, Mr. Labaj is a veteran of the U.S. Navy, the Air National Guard and the Central Intelligence Agency. He has managed research and development programs and applied science projects for the Department of Defense, the Department of Energy, the Intelligence Community, and federal, state and local law enforcement agencies.

While at the CIA, Mr. Labaj developed and implemented the Defense Against Terrorism Survey, a vulnerability assessment methodology used to assess security at borders, high threat residences and facilities and over 100 international airports. Mr. Labaj also served on the Federal Aviation Administration's Blue Ribbon Panel on Airport Security and Vulnerability Assessment, and implemented and managed the FAA's National Safe Skies Team Security Screening Test Bed.

He has also served as a member of the Nuclear Emergency Search Team (NEST) Access Working Group and participated in a number of professional and technical organizations, including the Defense Department’s Technical Support Working Group, the American Defense Preparedness Association, the International Association of Bomb Technicians and Investigators, and the Joint Service Small Arms Program.

CARVER 2017 Training Courses in Tysons Corner, Virginia

April 11-13, 2017
June 13-15, 2017
August 15-17, 2017
October 10-12, 2017

Each course is limited to 8 attendees | Register Today


The CARVER Target Analysis and Vulnerability Assessment™ training course, offered by Security Management International, is an interactive three-day course on conducting facility threat and vulnerability assessments. CARVER is a nationally recognized target analysis and vulnerability assessment methodology used extensively by the military, intelligence and law enforcement community and the Department of Homeland Security in its Automated Critical Asset Management System.

CARVER identifies assets most attractive to attack by an adversary based upon key factors:
  • Criticality – Single points of failure and degree of importance to system operations.
  • Accessibility – Ease of access to critical assets.
  • Recoverability – The time and effort to recover system operations after an adverse event.
  • Vulnerability – Level of exposure to attack based on adversary capability.
  • Effect – Magnitude of adverse consequences resulting from malicious actions and subsequent responses.
  • Recognizability– Likelihood that potential adversaries would recognize that an asset is critical.

Past Performance: What Previous Attendees Said About This Workshop

"Just wanted to let you know that Mr. Labaj conducted an excellent class that was very well received by all. Several members of the class had recently attended another Vulnerability Assessment class, and everyone agreed that this was a 100 times better. In fact, one of my officers stated 'I learned more in 15 minutes in this class than I did in two days from the other course' Thanks again for your prompt and professional service, I am looking forward to working with you in the future
- Bruce Barnes, CPP, MA Ed Director, Physical Security and Emergency Management NV Energy


"This course brings all walks of security together; it provides a wealth of experience to bear on how this methodology can be applied. The field work was eye opening."
- Robert Hargesheimer, US Navy, Site Installation Manager


"Loved the interaction of students and instructors. Varied attendees gave many points of view and shared experiences."
- Henry Britt, The Response Group


"Valuable class. Provided a good mix of backgrounds and experience and presented material in a manner that was great for novices and pros alike."
- J. Phil Harmon, Washington Group International, Manager, Red Team Operations


"Excellent course for developing a fundamental understanding of the Carver Target Analysis and Vulnerability Assessment Process."
- Kevin Nowak, U.S. Department of Energy, Security Specialist


"Great course! Exceeds expectations and professional requirement. The training will have a positive and dynamic impact."
- Mark. K Gerwig, NSWC Crane, EOD Project Specialist


"Worth every penny! There are no other courses available that teach the fundamentals of doing a TA and VA."
- Tracy DeWitt, Southwest Tennessee Community College, Adjunct Faculty

2017 CARVER Target Analysis & Vulnerability Assessment™ Training
On-Site Training at Your Location

"The CARVER Target Analysis and Vulnerability Assessment training course" can be specially designed for your organization, and presented at your facility worldwide. Please call us today at 865-567-2938 for a price quote.
Note: SMI recommends the On-Site option if you are training four or more employees. If you are planning to train less than four employees, SMI recommends attending one of our quarterly courses held in Vienna, Virginia.

Carver Training SMI

 
 
 
 

We frequently offer special promotions -- for more follow us on FacebookFacebook and TwitterTwitter or ask us prior to registration!
For help registering, call 865-567-2938 or email This email address is being protected from spambots. You need JavaScript enabled to view it..

CARVER Target Analysis/Vulnerability Assessment Outline

INTRODUCTION
Course Introduction
  • Welcome & Administrative
  • Instructor Staff
 
MODULE 1
Introduction to Target Analysis/Vulnerability Assessments
  • TA/VA Course Objectives
  • Definitions
  • Understanding the TA/VA Philosophy, Benefit/Value & Complexity
MODULE 2
CARVER “The Tool to Use”
CARVER Introduction
  • History
  • Concept
  • CARVER
  • Process
  • Ranking
  • Matrix
  • CARVER Exercise
MODULE 3
Target Analysis
Target Analysis Overview
  • Objectives
What is a TA and Why is it used and Who uses it
Methodology & Process
  • System
  • Sub System
  • Complex
  • Asset
  • Phases
  • Statement of Requirement
  • Target Assessment
  • Operational Plan
  • Reporting
  • Target Folder
  • Target Analysis Example
  • Mall Example
  • Conclusions 
 
MODULE 4
Threat Assessment
  • Objectives
  • Definition
  • General Threat
  • Adversary Capabilities, Intent, History, Target Selection Criteria (open source info)
  • Defining & Analyzing the Threat
  • Developing the Threat Spectrum
  • Developing a Pair Wise Threat Assessment
  • Definition
  • Pair Wise Exercises
  • Threat Spectrum Pair Wise Exercise
  • Threat Rankings
  • Design Basis Threats
  • Site Specific Threats
  • Developing Design Basis Threats
  • Design Basis Threat Exercise
  • Adversary Scenarios
  • Adversary Objective
  • Adversary Scenario
  • Adversary Scenario Exercise
MODULE 4A
  • IED Familiarization
  • Vehicle Bombs
  • Suicide Bomber Operations
  • The Suicide Bomber
  • Suicide Vehicle Bombs
MODULE 5
Vulnerability Assessments
Vulnerability Assessment Overview
  • Introduction to a VA
  • VA Process
  • Planning
  • Threat Assessment
  • Infrastructure Characterization
  • Data Analysis
  • Risk Reduction Recommendations
  • Reporting Phase
VA Planning
  • Form Project Team
  • Develop VA Objectives (i.e. who to interview)
  • Develop VA Scope (i.e. who to interview)
  • Review Policies & Procedures (Intro to ASAP principle)
Infrastructure Characterization
  • Critical Asset Identification using the Pair Wise
  • Hazards Identification
Data Assessment/Analysis
  • Target Attractiveness
  • Consequence Analysis
  • Risk Reduction Recommendation
  • Security Implementation Planning
Reporting Phase (expand off of flow chart)
 
MODULE 6
Security System Effectiveness
  • Definition
  • Elements
  • Deter, Detect, Delay, Respond, Mitigate
MODULE 6A
  • Perimeter Security
  • Introduction
  • Perimeter Systems
  • Fences
  • Gates
  • Access Control
  • Perimeter Sensors
MODULE 6B
  • Building Security
  • Introduction
  • Building Types and Threats
  • Access Control
  • Doors
  • Windows
  • Nontraditional Access Points
  • Access Control Hardware and Systems
MODULE 7
  • VA Exercise
  • Classroom Exercise
  • Objectives
  • Power Point Presentation
  • Introduction & Planning
  • Threat Assessment
  • Infrastructure Characterization
  • Security System Effectiveness
  • VA Methodology
  • Consequence Assessment
  • Risk Reduction Recommendations
  • Risk Reduction Summary
  • Cost Estimate

VA/TA Practical Exercise Field Exercise
  • Objectives
  • Power Point Presentation
  • Executive Summary
  • Introduction & Planning
  • Threat Assessment
  • Infrastructure Characterization
  • Security System Effectiveness
  • VA Methodology
  • Consequence Assessment
  • Risk Reduction Recommendations
  • Risk Reduction Summary
  • Cost Estimate
MODULE 8
  • Exercise Tab
  • Threat Assessment
  • Design Basis Threats
  • Exercise Objectives
  • Water Utility Exercise
  • Overview Map Exercise
  • Glossary of Water Terminology
COURSE CLOSING

Global Security Consulting University™

SMI - Global Security Consulting University
SMI - PT Mikolashek Global Security Consulting University
PT Mikolashek
PT Mikolashek served in the U.S. Army for more than 35 years. He held the rank of Lieutenant General and was The Inspector General, U.S. Army.

He also served as the Commanding General, Third United States Army/Army Forces Central Command and as Coalition Land Forces Component Commander he commanded all ground forces in Afghanistan and the Middle East during Operation Enduring Freedom. Following his distinguished military career, General Mikolashek joined Raytheon Company, where he was responsible for business development and achieving international growth goals.

He also served as Chairman of the Board of Raytheon Canada Limited. Previous assignments at Raytheon include: vice president of International Business Development for Network Centric Systems, vice president of Raytheon International Washington Office and regional executive for the Americas; regional executive for Raytheon Middle East, North Africa and Pakistan within Raytheon International and as the Army Account executive, to which he was appointed in April 2005.

Every year, thousands of highly qualified individuals from the intelligence community, the military and law enforcement – as well as related areas of government and private industry – look to strike out on their own as global security consultants. The excitement and the prospect of making it big lead many to choose this fast-paced and potentially lucrative field as a career. Some go on to live the dream. Most do not. The vast majority of new businesses, consultants included, fail to make it even through their first year. In fact, 95% of consultants never even gross one million dollars in annual sales during the lifespan of their company. The reasons are myriad, but the trends are visible – the most frequent case of failure is being unprepared to meet the difficult and sometimes dangerous challenges of this highly specialized market.

However, what if there was a way to learn from the mistakes and successes of other global security consultants in order to more effectively grow your own consulting practice? For the first time, a program has been established that does just that.

The Global Security Consulting University™ is a 3½-day workshop, held within the Washington DC beltway, which will allow you to learn from some of the finest and most successful international security consultants anywhere. These experts have traveled the world, providing advisory services to governments, corporations, NGO’s, celebrities, and high-net worth individuals. Many have sold their own consulting firms for millions of dollars.

This intensive week of training covers all aspects of global security consulting, to include topics such as:

  • Developing your international brand
  • Establishing best practices in leadership, management, processes and pricing
  • Building an international network of (useful) contacts
  • Creating an annual marketing plan
  • Writing international proposals that win
  • Recognizing how business is done cross-culturally
  • Understanding the geopolitical security threats that provide security consulting opportunities
  • Utilizing an effective sales process to target and acquire new clients
  • Delivering unmatched customer service that drives referral business
  • Conducting international business negotiations
  • Developing useful intellectual property to

In addition to our impressive lecture series, students will also be engaged in role-playing simulations, group strategy sessions, practical exercises, as well as the creation of marketable intellectual property, which they can immediately begin to use upon the completion of the course. Each student will be provided with a course notebook, a copy Global Security Consulting: How to Build a Thriving International Practice, a copy of Among Enemies: Counter-Espionage for the Business Traveler, numerous handouts with consulting methodologies and useful proposal/report templates, as well as a graduation certificate. Finally, in order to put the lessons of the Global Security Consulting University™ to immediate use, each student will be given 30 days of free coaching from one of the instructors. This is a $2500 value!

Our Instructors Include:

  • Developing your international brand
  • Luke Bencie, Managing Director, of Security Management International and author of Global Security Consulting: How to Build a Thriving International Practice
  • Maj. General Edward Leacock, Expert on government contracting
  • Viviane Vicente Bencie, Former International Security Director at ESPN
  • Leo Labaj, former CIA Officer and vulnerability assessment expert
  • Jon Monett, Former CEO who operated a hugely-successful security consulting firm for years, before selling it for millions
  • Wendy Jones, International Protocol expert who has trained CEOs to diplomats in proper global etiquette and business practices
  • Haley VanLoon – Former Australian Counterterrorism and Cyber Security Professional

The intensive 3 ½-day agenda includes, but is certainly not limited to, the following content:
Tuesday, October 6 – Building Your Global Security Consulting Brand
08:00 – Continental breakfast and registration
09:00 – The role of the global security consultant
10:00 – Identifying and understanding your prospective clients
10:30 – Break
10:45 - Establishing your brand
11:30 – Marketing your brand
12:00 – Lunch
13:00 – Selling yourself and your services
14:00 – Break
14:15 – Sales role playing exercise
15:15 – Break
15:30 – Building your international network
16:30 – Adjourn

Wednesday, October 7 – Winning Global Consulting Business
08:30 – Continental breakfast
09:00 – Meeting in the client’s office
10:00 – Client office role play
10:30 – Break
10:45 – Writing a winning proposal
11:30 – Proposal writing exercise
12:00 – Lunch
13:00 – Doing business with the USG
13:30 – Doing business with foreign governments
14:00 – Break
14:15 – International Protocol Workshop
15:30 – Break
15:45 – International protocol role playing exercise
16:30 – Adjourn

Thursday, October 8 – Managing Your Global Consulting Business
08:30 – Continental breakfast
09:00 – Managing your global security consultancy
10:00 – Policies, procedures, leadership
10:30 – Break
10:45 – Emerging physical security threats
11:30 – Emerging cyber security threats
12:00 – Lunch
13:00 – International Negotiation Workshop
14:00 – Break
14:15 – International negotiation role-playing exercise
15:15 – Break
15:30 – Financial responsibilities of global security consulting
16:30 – Adjourn

Friday, October 9 – Delivering Your Services and Expanding Business
08:30 – Continental breakfast
09:00 – Delivering the highest value to your client
10:00 – Sample client deliverable exercise
10:30 – Break
10:45 – Panel discussion/Q&As
11:45 – Course wrap up
12:00 – Adjourn

30 Days of Free Coaching!

Immediately following conclusion of the Global Security Consulting University™, each student will be provided with 30 days of free coaching by one of the SMI mentors. The mentoring format consists of daily email exchanges and weekly phone calls (during business hours). This is a value of $2500, which includes the following coaching services:

  • Providing advice on general global consulting questions
  • Reviewing proposals
  • Reviewing marketing materials
  • Reviewing client deliverables
  • Assessing RFPs and/or prospects to determine suitability
  • Role-playing before client meetings
  • Assisting in the creation of new consulting services
  • Planning business strategies for long-term growth

NOTE - In order to provide personalized training and feedback, attendance is limited to only 18 students.

Students who sign up before September 15th receive a $500 discount!


Managing the Threat of Suicide Bombers and Improvised Explosive Devices (IEDs) Workshop

SMI - Managing the Threat of Suicide Bombers and Improvised Explosive Devices (IEDs) Workshop

The FBI and DHS are warning state and local partners to be on the alert for suicide bombers using large vehicle borne improvised explosive devices (LVBIED) and man-portable/hand-carried IEDs. Managing the Threat of Suicide Bombers and Improvised Explosive Devices - based on U.S. and international case studies - is designed for experienced government and security personnel to provide you with critical information about the motivation, training, equipment, techniques and operational methods used by terrorist bombers, with particular attention to the suicide bomber. In addition, you will learn about other terrorism counter-measures, including how to prepare an effective bomb threat and bombing response plan.

This workshop will provide you with background on the different bombing methods employed by different terror groups, assist you with detection techniques for Suicide Terrorists, help you to understand what an effective protective policy might look like, and give considerable detail about attempted and actual incidents that have occurred in the United States and overseas. It will also teach you how to conduct building and vehicle searches and evacuations, mitigate bombing attacks and understand the sources, costs and evaluation of physical security enhancements.

This workshop is not only designed for local, state and federal agencies dealing with today's security concerns, but will also be of extreme value if you are a security manager for a government building, school or corporate headquarters. By gaining an understanding of who the terrorists are, how they gather intelligence and operate, the nature of explosive devices, and how the devices may be detected, you will be able to work more closely with your security staff and local agencies to mitigate or prevent disasters.

What You Will Learn:

  • Overview of terrorist bombings in the U.S. with current statistics and trends
  • Intro to Explosives, Explosive Effects, and Improvised Explosive Devices (IEDs)
  • Concealment techniques and methods of operation
  • Rationale, recruitment, training and methods of operation of suicide bombers
  • How to respond to suicide bombers, combined attacks and secondary devices
  • How to prepare an effective bombing response and bomb threat plan

You will see specific incident photographs and videos of actual post-attack scenes and footage shot by terrorists detailing bomb-making instructions. Mock suicide terrorist explosive devices ranging from a "shoe bomb" to suicide vests will be used during the workshop to illustrate various teaching points.


Threat Detection & Terrorism Awareness

SMI - Threat Detection & Terrorism Awareness

The Threat Detection and Terrorism Awareness course will instill a basic understanding of how terrorists use open source intelligence and surveillance techniques to assess and select targets, and will teach students specific skills to track such activities. Students will learn the information necessary to provide a foundation of understanding in threat detection, specifically terrorism awareness and surveillance recognition prior to a terrorist event.
The course utilizes stand-up lectures and hands-on classroom exercises to identify the profile and method of operation of terrorists, the threats they pose, the techniques they employ, and how the United States combats them.

What You Will Learn:

Students will leave the training with a comprehensive background in the casing methods employed by terrorists, and will understand how terrorists utilize open source information during the target selection process. Students will be familiar with the MO’s of terrorist organizations and the threats they pose to various targets. Particular focus will be placed upon the techniques and methodologies that can be employed to track terrorists during their target selection process, and how to recognize when a facility or operation has been targeted. Course activities include:

Classroom Lectures and Presentations

  • Terrorism Awareness Briefing
  • Surveillance and Counter-Surveillance Techniques
  • Terrorist Methods of Operation
  • Attack Scenario Case Studies
  • Potential Indicators

Emergency Management Plan Writing

Emergency Management Plan Writing

The Emergency Management Plan Writing workshop is designed to help participants develop an emergency management plan for their agency or organization. The instructor will interact with participants to help them develop individual emergency management plan components. This workshop will concentrate on the actual “nuts & bolts” of what it takes to write emergency action procedures and comprehensive emergency management plan components.

Participants are encouraged to bring with them a section from their existing emergency/crisis management plan for discussion and further development during the workshop. If you do not have a plan yet, no problem! You will start to develop one while completing this workshop.

The instructor will walk participants through the process of organizing and consolidating existing policies, procedures and protocols into a comprehensive crisis management plan. Participants will also receive handouts and digital files which will provide them with take-home information as they continue to develop their document beyond the workshop.

Throughout this workshop, participants will work with the instructor to develop consensus opinions on particular plan components for each of their plan document sections.

Participants in this workshop should bring with them a laptop computer with Microsoft Word, Adobe Reader and digital copies of their emergency action procedures, emergency management plans or plan components with which they are having difficulties.

What You Will Learn:

  • What should be considered when writing a plan
  • What belongs in an emergency management plan
  • How the plan is best organized
  • How to consolidate your existing policies, procedures and contact lists into a finished comprehensive crisis management plan
  • How to develop consensus while you develop the plan
  • Detailed instructions on how to consolidate and organize emergency contact information for use in an emergency
  • How to maintain, update and distribute the final plan document

SMI also offers training courses for government, military, and business professionals. Click to find out more about our training courses including: Emergency Response Planning, Crisis Response, Threat Detection & Terrorism Awareness, Managing the Threat of Explosive Devices, and Combating Terrorist Explosive Attacks.

In addition, SMI provides Security Consulting, Security Management, and Intellectual Property Protection for executives, business owners, and Fortune 500 companies.


Combating Terrorist Explosive Attacks

SMI - Combating Terrorist Explosive Attacks

“Since the modern era of terrorism began, the use of explosives has been the terrorists’ weapon of choice in repeated attempts to bring about political and social change to a country or region… Explosives can inflict damages upon both humans and infrastructure with devastating effects. In addition, the psychological impact from explosives often strikes fear into civilian populations, while at the same time delivers awe-inspiring displays when used against one’s own enemies.” - Leo Labaj, Retired CIA EOD Tech

Security Management International has teamed with BakerRisk Engineering to offer the “Combating Terrorist Explosive Attacks” training course

Taught by an EOD-trained professional, who has spent his career investigating terrorist attacks for the Central Intelligence Agency, the course teaches students the essentials of the terrorist modus operandi when it comes to the use of explosive devices… whether they be vehicle born, body worn, or stand-off IEDs.

In addition, BakerRisk engineers are internationally recognized experts on how the explosive blast wave phenomenon can weaken the integrity of various levels of building materials.

In this two-day training seminar and half-day field practicum, students will become familiar with:

  • The history and motivations of terrorist explosive threats
  • How terrorists conceal devices, and how explosions can impact a range of infrastructure
  • How to mitigate the threats when critical infrastructure is exposed
  • How to conduct threat and vulnerability assessments
  • How to take this knowledge and convert it into meaningful defensive
    measures to bring about change

With decades worth of experience from the engineering, demolition, EOD and post-blast investigation fields, the “Combating Terrorist Explosive Attacks” course provides one of a kind instruction.

Whether you work in security, construction, government, or only have a limited knowledge of the subject, let us help you engineer a safer world.

Course Description / Scope of Work:

The Combating Terrorist Explosive Attacks Course is designed to provide the attendee with information necessary to protect critical infrastructure. Attendees in this 2 1/2-day course, which is based on a threat overview, threat and vulnerability assessment, security system effectiveness and engineering concepts, will learn, practice, and integrate skills used in the analysis and examination of the interrelationships between assets, threats, vulnerabilities and countermeasures of a specified facility to an explosive attack. The course is designed to aid the attendee in identifying assets most attractive to attack by an adversary based upon several key factors identified during the vulnerability assessment and develop countermeasures and security systems to mitigate the attack. An exercise will be conducted at a selected facility in the northern Virginia area

A laptop computer equipped with Microsoft Power Point, Word, and Excel is a prerequisite for this training. All training materials are provided on a CD to include all slides, spreadsheets, Power Point templates and reference material. A digital camera or smart phone w/camera is also of value when conducting the live field exercise.

Course/Training Objectives:

Participants will:

  • Demonstrate an understanding of the terrorist´s use of a variety of improvised explosive device (IED) configurations and attack operations
  • Understand the characteristics and phenomena of various explosive devices and how a structure responds to blast loads
  • Understand and develop a Threat Assessment to define the IED spectrum of threats to various infrastructures
  • Understand and employ the principles of the Carver Vulnerability Assessment Methodology to define the likelihood of an attack of an improvised explosive device against various infrastructure
  • Understand blast mitigation techniques and how they are employed to protect critical infrastructure
  • Formulate and prioritize Risk Reduction Recommendations
  • Develop a security plan and blast mitigation report.
     

Course Agenda

  Tuesday Wednesday Thursday
8:00 AM   Course Introduction   Target Analysis & Vulnerability Assessment (TAVA) Practical Field Excercise    
9:00 AM Terrorist Bombs &
Bombing Operations
10:00 AM Vulnerability Assessment
(VA) Process  
Blast Wave Phenomena
11:00 AM
12:00 PM 12:00pm Lunch 12:00pm Lunch 12:00pm Lunch
1:00 PM Threat Assessments Security System Effectiveness (SSE)   Course Closing
2:00 PM  
3:00 PM Infrastructure Response
to Blast Loads
Blast Mitigation  
4:00 PM

Combating Terrorist Explosive Attacks Engineer a Safer World


Crisis Response Simulation

SMI - Crisis Response Simulation

Table Top Exercise

The Crisis Response Simulation exercise offers a specialized form of training that allows organizations to safely test and evaluate the thoroughness and effectiveness of their emergency plans, preparations and protocols through a simulated table-top exercise. If there is a plan already in place, we review, revise, and test your emergency planning response materials. Participants are encouraged and assisted in coordinating their emergency response efforts with the necessary response partners from the community.

Trainees experience hands-on practice of task management, coordinated responses, communication & interaction with others, both inside and outside of organizational management. Specific scenarios such as biological outbreak/contamination, toxic chemical release/spill, WMD recognition & response and psychological terrorism may also be simulated.

What You Will Learn:

  • Detection and recognition of an incident
  • How to alert/notify the response community
  • Implementation of the appropriate response plan
  • Protection of life/safety of the First Responders
  • Identification of agent used & size of scene
  • Protection/rescue those affected by the attack
  • Containment and/or limiting the size of attack
  • How to provide timely public information
  • How to preserve as much evidence as possible
  • How to maintain continuity of business

SMI facilitators assist in the setup and moderation of the simulated exercise, consisting of multi-media presentations and real-time breaking news events. We offer expert advice for coordination and implementation of your organizations personal Emergency Response Plan.  The Crisis Response Simulation exercises are effective means of confirming that both you and those whom you rely upon in crisis situations are adequately prepared for an emergency, disaster or crisis such as a terrorist attack.


Human Terrain Operations Training

Human Terrain Operations Training

Lessons learned from recent campaigns have prompted important shifts in how military and intelligence professionals view the battlefield. Among the most critical has been a growing recognition of the value of detailed knowledge about the civilians among whom operations are conducted. Enemy-centric approaches to operational planning and execution have thus been modified to consider the opposition’s place in society: the “human terrain.”

SMI’s Human Terrain Operations courses are designed for analysts, planners, and field personnel interested in learning how to generate and utilize human terrain information, in understanding the ways human terrain influences opposition networks, and in exploring how the enemy’s place in society can be exploited for strategic and tactical objectives.

Options:

  • 3-Day Human Terrain Operations Seminar
  • 1-Week Human Terrain Operations Training Course
  • Multi-Week Human Terrain Operations Training & Mentoring

What You Will Learn:

  • All of SMI’s Human Terrain course offerings build from the core module of our 3-Day Seminar. This course provides a full-spectrum overview of:
  • The practical operational methods and theoretical frameworks required for human terrain operations – rooted in SMI’s field-proven Four-Phased Approach™
  • The Operational Relevance of Human Terrain Data
  • Operational Design and Research Planning
  • Collection Planning and Collection TTPs
  • Analyzing and Presenting Human Terrain Data
  • Operational Implementation

Participants in SMI’s 1-Week Human Terrain Operations Training Course are then coached through a real-time scenario specialized for each client. Our instructors oversee trainees as they execute the steps of the Four-Phased Approach™, leaving clients with a customized and functional operational template at the conclusion of training.

SMI’s Multi-Week Human Terrain Operations Training & Mentoring service offers continued, hands-on support as trainees return to their jobs and apply their new skills to daily challenges. SMI can provide remote consulting support during operational design, execution, and implementation phases, or embed with client personnel to provide additional hands-on support to planning, collection, and analysis efforts.

SMI also offers training courses for military and security professionals. Click to find out more about our Training Courses including: The CARVER Methodology, Bomb Threat Detection, and Threat Detection & Terrorism Awareness.

In addition, SMI provides Security Consulting, Security Management, and Intellectual Property Protection for executives, business owners, and Fortune 500 companies.


Kidnapping Awareness and Prevention for Business Travelers Course

Each day, thousands of business executives travel internationally to countries where the threat of kidnap and ransom (K&R) is a genuine reality. Would your people know what to do if they were suddenly abducted off the street in a foreign land? Would your company know how to respond? Do you have a plan in place for this scenario and have your travelers been trained on what to expect during their capture? For the overwhelming majority of companies, the answer to these questions is “No”.

At SMI’s “Kidnapping Awareness and Prevention for Business Travelers Course”, your executives will receive the training they need to understand the threats faced when traveling and help them avoid danger. In addition, should they fall victim to a kidnapping incident, they will be armed with the knowledge to better comprehend and cope with their situation.

In this fast-paced, two-day course, students will learn:

Day One

  • Understanding the Threat (and Business) of Kidnap and Ransom
  • The Differences between Kidnappings and Hostage Situations
  • The Various Methods of Kidnappings
  • Kidnapper Modus Operandi and the Phases of a Kidnapping
  • How Not to Become a Target
  • Pre-Departure Contingency Planning

Day Two

  • What to Expect Should You be Kidnapped
  • How to Cope During a Kidnapping
  • Psychological Factors
  • Escape and Survival
  • Rescue
  • Recovery Phase
Your employees are your organization’s greatest assets. Demonstrate your duty of care, by providing them with the knowledge to keep safe while traveling.

The SMI Managing Director, Luke Bencie, wrote an essential book for every business traveler, Among Enemies: Counter Espionage for the Business TravelerAmong Enemies: Counter Espionage for the Business Traveler.

SMI offers additional training courses for executives and business travelers. Click to find out more about our Traveler Safety Courses including: Business Traveler Safety and Counter-Espionage CourseBusiness Traveler Safety and Counter-Espionage Course and Hostile Travel CourseHostile Travel Course.

In addition, SMI provides Security ConsultingSecurity Consulting, Security ManagementSecurity Management, and Intellectual Property ProtectionIntellectual Property Protection for executives, business owners, and Fortune 500 companies.


Hostile Travel Course

SMI - Hostile Travel Course
SMI Hostile Travel Course - Ed Leacock

Edward Leacock
Edward Leacock served in the U.S. Army for more than 41 years as an intelligence professional in the Active Duty, Army Reserve and National Guard components. He served both in the enlisted and officer ranks and retired as a Major General.

His final assignment was the Mobilization Assistant to the Director, Defense Intelligence Agency. He also served as the Deputy J2, U.S Africa Command; Deputy Commanding General, U.S. Army Intelligence Center and Fort Huachuca, Arizona; Assistant Adjutant General for the Maryland Army National Guard and Senior Intelligence Officer for the U.S. Army National Guard.

Coinciding with his distinguished military career, General Leacock joined TASC, Inc. where he was responsible for business development and achieving growth goals associated with the Intelligence Community. He has his Project Management Professional certification from the Project Management Institute, an Advance Master’s Certificate in Project Management from the George Washington University School of Business and an Information Technology Infrastructure Library v3 Foundation certification. Mr. Leacock earned his Bachelor’s Degree in Political Science from University of New York and a Master’s Degree in General Administration/Information Technology from University of Maryland.

Globalization of Business and Safety Concerns

Global Safety

At SMI we recognize that the world is not always a safe place. However, as the world has gotten “flatter”, business travelers are often times required to venture to parts of the globe that they would otherwise prefer not to visit. Political unrest and public upheaval, terrorism, kidnapping, criminal intent, and overall street violence are just some of the issues that international business travelers must be aware of In addition, medical issues such as dehydration, malaria, or even a broken leg could severely threaten your life in some countries.

Therefore, let SMI be your guide to these parts part of the world.

Global Safety for Business Travelers

Over the past four decades, our associates have experienced a variety of threats first hand in over 100 countries. Allow us to share our knowledge – much of which is current to the ever-evolving conflicts in the Middle East, North Africa, Latin America and Central Asia – in SMI’s “Hostile Travel Course.”

This two-day training is packed full of useful information that you will immediately put to good use on your next overseas trip (regardless if you are headed to Afghanistan or Luxembourg).

Topics covered include:

  • Pre-departure Planning
  • Travel Considerations
  • Arrival SOPs
  • Transportation and Vehicle Safety
  • Hotel/Apartment Security
  • Food and Restaurants
  • Behavior and Vices
  • Scams
  • Personal Security
  • Checkpoints and “Shakedowns”
  • Explosives
  • Kidnapping Threats
  • The Go Bag Concept
  • First Aid and Medical
  • Escape and Evasion
  • Survival Priorities
  • Departure

SMI offers additional training courses for executives and business travelers. Click to find out more about our Traveler Safety Courses including: Business Traveler Safety and Counter-Espionage CourseBusiness Traveler Safety and Counter-Espionage Course and Kidnapping Prevention and Awareness CourseKidnapping Prevention and Awareness Course.

The SMI Managing Director, Luke Bencie, wrote an essential book for every business traveler, Among Enemies: Counter Espionage for the Business TravelerAmong Enemies: Counter Espionage for the Business Traveler.

In addition, SMI provides Security ConsultingSecurity Consulting, Security ManagementSecurity Management, and Intellectual Property ProtectionIntellectual Property Protection for executives, business owners, and Fortune 500 companies.


The Shopping Mall Assessment and Response Training (SMART)

SMI - SMART
SMI - The Shopping Mall Assessment and Response Training (SMART)

Instructors for this course include two gang police officers of the year, as well as a former CIA agent trained in infrastructure protection. SMART is constructed to highlight how local street gangs infiltrate malls for the purposes of narcotics marketing and recruiting, and how such activities easily go undetected by mall security. Additionally, SMART instructors are experts in flash mob control and active shooter mitigation, ensuring the greatest safety for your patrons by offering your team the most sophisticated and targeted gang and violence training available for retail operators.

What You Will Learn:

  • How to detect the presence of street gangs in your mall, how to decipher graffiti, and how to document these encounters
  • How to distinguish a peaceful from a violent flash mob, and how to respond to both
  • How to prepare for an active shooter scenario
  • How effective your existing security system is, and what options exist for enhancing its effectiveness
  • How to develop a comprehensive safety procedure that integrates electronic detection and physical manpower to construct the most effective security for your size and budget
retail security training

SMI also offers training courses for executives and business travelers. Click to find out more about our Traveler Safety Courses including: Business Traveler Safety and Counter-Espionage Course, Kidnapping and Awareness Course, and Hostile Travel Course.

In addition, SMI provides Security Consulting, Security Management, and Intellectual Property Protection for executives, business owners, and Fortune 500 companies.


SMI - Security Management International Training Courses
security consulting education
SMI -  CARVER Training
SMI -  Counter Espionage Training
SMI -  Hostile Environment Training
SMI
SMI - Among Enemies Counter-Espionage for the Business Traveler
SMI -  Global Security Consulting University
SMI -  Clandestine Consultant
CARVER Book
SMI - Logo
 

SMI Social Media

White Papers

Testimonials