This 5-day course will cover basic covert surveillance techniques to give the student a working knowledge of issues they will be facing during the course. The legal aspects to both spying and countermeasures will be discussed to help ensure that the students understand their responsibilities and the legal pitfalls of counter-espionage casework.

COURSE CURRICULUM:

The course will cover the development of an espionage case from the point of view of the attacker and the methods used in developing their plan for acquiring the information they need. Each team in the course will be given an assignment of collecting information that is required from the victim for a successful attack. They will learn to utilize the extraction techniques in the most efficient ways to obtain the necessary information.

– Students will learn how to select instruments for a Go-Bag of espionage equipment and how the instruments are used to conduct a basic counter-espionage sweep of executive suites and meeting sites. The same scenarios will be used to show the students both the capabilities and limitations of counter-espionage equipment.
– Students will learn how Hackers acquire information from unsecured computers and the best practices to secure personal and business computers. Students will learn cyber security methods while on the road with traveling executives and how best to defend their own systems in the process.
– Students will learn all of the above in practical exercises with team and individual applications. They will graduate from this course with a basic understanding of how to conduct technical surveillance sweeps of physical spaces as well as computer equipment and the legal implications in a corporate environment.