[Expert Led Masterclass] Effective Investigative Questioning

Overview

This 2-day workshop is aimed at equipping delegates with the necessary skills and approaches of Security Questioning. Apart from general guidelines and principals of Security Questioning, delegates will learn the how to use tactical questioning to elicit information from suspects. Through this workshop, delegates will be able to apply the skills and knowledge of Security Questioning when dealing with suspicious documentation, human resource and internal investigation.

Most importantly, this workshop will teach delegates how to identify and differentiate between someone with malicious intent and someone who is duped or coerced into committing a crime. To enhance delegates’ learning experience, this workshop includes both theoretical and simulated scenarios (field exercise) to illustrate the application of Security Questioning in day-to-day security operations.

What you will learn from this Masterclass:

  • LEARN how to use tactical questioning to uncover information and intelligence from individuals, suspects and/or convicted criminals and terrorists
  • MASTER different approaches and techniques to questioning.
  • RECOGNISE and DIFFERENTIATE someone with malicious intent and someone who is duped or coerced into becoming a mule.
  • APPLY security questioning as an investigative tool to solve an internal security incident in an organisation.
  • IMPLEMENT effective security questioning processes in your own protected environment.
Who should attend
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. He has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Our trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer.

He is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

Tabletop Exercise - Developing and Testing a Cover Story

Delegates will work in groups and receive specific assignments for developing cover stories for specific missions.  They will then be challenged by their peers in the classroom who will test the strength and reliability of the cover story and the ability of the trainee to maintain it against security questioning.

Mall Field Exercise

Delegates will be tasked with specific targets and missions for which they will use their cover stories to gain information and intelligence.

Exercise Debrief

Delegates will brief each other about their experiences in the field. They will also point out weaknesses and strengths in their cover stories and behaviors as individuals and as a group.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about the venue closer to the date of the course.

Brochure Download


[Expert-Led Masterclass] Reading Suspicious Indicators & The Adversary’s MO

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will learn more about Suspicious Indicators and Adversary’s Methods of Operations, allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will also learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who should attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

Professionals such as:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our  Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. The Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

He is a

  • Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates
  • Registered NSW security trainer.
  • Member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.
  • Regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.
Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’
Partners

Training Partner:

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Details will be sent to attendees closer to the date of the course.

Brochure Download


[Expert-Led Masterclass] Real World Surveillance Techniques Course

Overview

Highlights:

  • Intensive 12-Hour Course
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who will attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This in-person Masterclass will be held at one of the hotel venues. Participants will be notified of the venue closer to the date of the class. For more information, please email us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Open Source and Social Media Intelligence

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential. The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Expert Trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world.

His experience, and USP, is based on 38 years as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely. Our onboarding package will ensure a smooth learning experience.
Not to worry, we're ready to answer any questions, reach us at hello@q8asia.com.sg.

Brochure Download


[Expert Led Masterclass] CCTV Operator Surveillance for Security with CPTED Principles

Overview

Highlights:

  • DETECT suspicion indicators relating to their operational environment using CCTV.
  • ASSESS suspicion indicators based on known and predicted criminal and/or terrorist methods of operation.
  • CONDUCT, deploy, interact and communicate using criminal threat mitigation techniques.
  • AUGMENT the human element of security framework and enhance the safety and security of the people and the assets they serve.
  • INCREASE the perceived risk of being detected, captured and possibly arrested,
  • IMPLEMENT effective CCTV Deterrence strategies.
  • MASTER the principles of Security Surveillance through proper CCTV placement.
Who should attend

This Masterclass is ideal for the:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

About the Expert Trainer

  • Over 40 years of experience handling high-profile cases and investigations with the Singapore Police Force.
  • Recipient of awards and accolades for outstanding achievements and long service in the police force.
Case Studies

Our trainer will incorporate relevant case examples of real, local cases solved by CCTV and detective ground work  in this masterclass.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive information about the venue closer to the date of the event.

Brochure Download


[Expert Led Digital Masterclass] Advanced Intelligence Analysis Masterclass

Overview

This Masterclass will introduce delegates to various techniques and approaches of Intelligence Analysis. The emphasis of the Masterclass is on managing the processes used in the Intelligence Cycle ensuring intelligence is directed, produced and delivered efficiently. Delegates will also learn and practise how to plan and collect information from national and international open and closed sources.

This Masterclass provides opportunities to evaluate and collate information, use different analysis techniques to transform information into intelligence and most importantly how to apply critical thinking techniques and dealing their own biases when gathering information.

What you will learn from this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and exploit the steps of the Intelligence Cycle.
  • USE and FUSE multiple intelligence source to create credible reports.
Who should attend?
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer has more than 20 years’ experience in the British Army Intelligence Corps in which time he worked in various fields including Counter Intelligence, Technical Investigations, Information Assurance (IA), Human Intelligence (HUMINT), Imagery Intelligence (IMINT) and Cyber Security.  He has experience across most strands of the Intelligence world and gained particular insight by undertaking a variety of roles. Our trainer has worked as an operator, analyst and manager and he was the technical investigations subject matter expert (SME) for Army Headquarters.

Our second Expert Trainer has worked in mainland Germany, France, Turkey, Cyprus, Oman, Qatar, Bahrain, the Balkans, Iraq, Afghanistan, and Sierra Leone, and currently teaches intelligence techniques to military staff from across the 29 NATO member nations, African partner nations and also to partners within the defence industry.

Case Studies

Our trainer will use case studies to illustrate the different analytical techniques that are covered in this course.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about the venue closer to the date of the course.

Brochure Download


[Expert-Led Digital Masterclass] Covert Operational Tradecraft

Overview

Highlights:

  • Intensive 14-Hour Course
  • More than 12 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Certificate of Completion

What you will learn from this Masterclass:

  • APPLY operational security and other security practices employed in high-risk, fast-paced intelligence and covert operations environments
  • UNDERSTAND technical intelligence assets that can be deployed in support of covert operations, deploy and detect technical surveillance
  • MASTER good tradecraft and digital hygiene when researching online covertly
  • CAPTURE data relating to the subject, deleted, historic and current without being seen
  • EQUIP yourself with the latest and updated methods to effectively profile a subject
  • ADOPT the latest cutting-edge tradecraft and good practice around masking
  • STEP UP skills in effectively capturing everything in a subject’s digital footprint
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations when deployed
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence gathering on subjects
Who will attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be on Zoom. Participants will receive their login details closer to the date of the course.

If you have questions about the course, please contact us at: hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Counter Improvised Explosive Devices (CIED)

Overview

Highlights:

This online Masterclass is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this Masterclass:

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainer

Our expert trainer has 30 years’ experience in both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances. He has extensive experience of IEDD, Explosive Ordnance Disposal (EOD) and Conventional Munitions Disposal (CMD) operations.

Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This class will be conducted online on Zoom. Participants will receive Zoom details  closer to the date of the course.

For enquiries, please write to hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Covert Operational Tradecraft

Overview

Highlights:

  • Intensive 14-Hour Course
  • More than 12 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Certificate of Completion

What you will learn from this Masterclass:

  • APPLY operational security and other security practices employed in high-risk, fast-paced intelligence and covert operations environments
  • UNDERSTAND technical intelligence assets that can be deployed in support of covert operations, deploy and detect technical surveillance
  • MASTER good tradecraft and digital hygiene when researching online covertly
  • CAPTURE data relating to the subject, deleted, historic and current without being seen
  • EQUIP yourself with the latest and updated methods to effectively profile a subject
  • ADOPT the latest cutting-edge tradecraft and good practice around masking
  • STEP UP skills in effectively capturing everything in a subject’s digital footprint
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations when deployed
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence gathering on subjects
Who will attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be on Zoom. Participants will receive their login details closer to the date of the course.

If you have questions about the course, please contact us at: hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] COIN Operations for Team Leader Task Force

Overview

Highlights:

  • 3 day online course, 3 hours per day
  • Classes are available on demand in October, November and December 2022.
  • Remote Access
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn at this Expert-Led Digital Masterclass:

  • Establish the key soft skills of a leader and composition of a team.
  • Identify the differences between Insurgency and countering terrorism.
  • Comprehend the development of policies for countering terrorism vs Counter Insurgency Operations
  • Adopt the strategies that suits one organisation.
  • Recognise the role of information and intelligence play in leadership decision making.
  • Discover issue raised from planning to operations and the role of leader in building a Top Notch Counter Insurgency Task Force.
Who should attend

The workshop is aimed at security practitioners, policing services and organisations who have a responsibility for developing effective leadership teams responsible for countering terrorism from the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
Trainer

Our Expert Trainer has been working, training and educating internationally in the field of anti and counter-terrorism for the past 25 years. He is a retired former
member of a counterterrorism training wing, known only as DG1.

He has been delivering education and training to International Police, Armed Forces, and Private Security Personnel including international organizations from both public and private sectors. His work has taken him through Russia, Ukraine, Kazakhstan, Latvia, Estonia, Finland, United States, Ecuador, Egypt, Poland, Bulgaria, Turkey, Greece, Italy and many more places in connection with his duties. He gives his clients a leading edge in preventing and countering the phenomenon that is International Terrorism to make the world a safer place.

Case Studies

Relevant case studies will be included in this course

Partners

Interested in partnering with us for this course, write to hello@q8asia.com.sg for partnership opportunities!

Venue

This Digital Masterclass will be conducted on Zoom.

Zoom details will be provided closer to the date of the course.

Brochure Download