Counter UAS for SLTT Agencies:

Drones have continued to make a positive impact in our everyday lives and given public safety professionals at every level a tool to not only make them more proficient but also allowed them to perform their jobs safer.  Unfortunately like most technology criminals and terrorists have utilized drones to advance their criminal enterprises or terrorist attacks.  This course focuses on introducing State, Local, Tribal, and Territorial (SLTT) public safety agencies to Counter UAS technology and what legislative authority they have to deal with the careless, clueless, or criminal operators when they encounter them.  Like all of our courses we take a wholistic approach to what the four layers of a Counter UAS program are from first encounter of the patrol officer to the forensic examination of a drone for prosecution purposes.  We discuss the educational focus when encountering the careless or clueless pilots to explain what their requirements are under the law and what constitutes bad flight.  We also cover what Counter UAS technology SLTT agencies can possess and deploy and discuss what Legislative hurdles exist at the Federal Level to do more.  How to educate your respective local and state legislators to craft legislation that will give you an effective tool to deal with airspace violations.

________________________________________________________________________________________________________________

MjY2MDAyOQ

Squirrel In the Stack

Most agencies have surveillance equipment for investigative purposes.  With budgets strained this course covers how to integrate that equipment into your Tactical Operations as well as how to utilize commonly off the shelf (COTS) items to make cost effective tactical surveillance solutions.   Modifying body wires as tactical listening devices or turning a small camera & monitor into a tactical pole camera are just a few of the items covered.  This course also  covers commonly marketed surveillance equipment  for Hostage/Barricade operations such as man-portable robots, Rescue Phones, small throwable robots, Pole Cams, and IR in the Tactical environment to name a few.  The operator will learn how to deploy this technology while maintaining the integrity of your tactical stack. The proper use of surveillance equipment during hostage/barricade operations has proven to keep the operator safer by limiting their exposure and giving actionable intelligence to save lives and dramatically reduce damage to property.

________________________________________________________________________________________________________________

Soldering

Basic Electronics For Covert Surveillance

This is an eighty hour (2-week) course that will teach the participant how to gather the intelligence and evidence needed for criminal prosecution or internal investigation through the use of covert electronic surveillance methods.  This course is specifically designed for the professional criminal or narcotics investigator at any skill level of expertise.

This is a fast paced and challenging course that will teach the participants the following:

  • Basic electronics and soldering
  • Covert microphones and audio intercepts
  • Reconnaissance and covert site surveys
  • Misdirection installs
  • Covert video installations
  • Covert Video/Audio Enclosure Fabrication
  • Proper Body wire installation (both video and audio)
  • Batteries and power supplies (including fabrication of power supplies)
  • Night vision
  • GPS tracking and necessary pre-deployment intelligence needed for successful install
  • Clandestine video deployment, counter-surveillance, countermeasures
  • Antenna placement and location
  • Field expedient repairs and troubleshooting

Additionally, students will cover State and Federal laws that govern the use and deployment of the various types of surveillance equipment as well as related case law and legal issues such as Title III considerations.

In order to successfully complete the course, students will be expected to completely fabricate a covert video concealment device with audio and properly deploy it.  Additionally, students will be shown the various install techniques for a covert GPS installation and how to analyze the data obtained. At the conclusion of the course students will be allowed to keep their concealment devices!

This class is taught in a manner that is scale-able to meet the needs of the students or agency operators attending.

________________________________________________________________________________________________________________

fa46c05578d7e753dd9695d5d5c1bfc1

Covert Entry and Lock-Picking

This course focuses on the basics of lock picking and ways to bypass commonly encountered locking devices. The student will learn how to identify the different types of locks and which lock picks are used for that type of locking mechanism.  There will also be a focus on various methods of bypassing various locks to gain entry quickly.  The course will also discuss the proper way to plan and execute a covert entry or sneak and peak entry.  Also what to avoid and how to work around security measures such as cameras or magnetic motion locks.  This course like all of our courses will have a lessons learned approach and examples of real world successes and failures we learned from.

b46ad135-ccfa-41de-9f83-6e4dfc3de512

________________________________________________________________________________________________________________

The Al-A-Cart Course

This is a Technical Surveillance course where we let you pick the topics and we will cater the course to meet your operational needs.  So if your needs are to get some lock-picking with some basic electronics and an intro to Technical Surveillance Countermeasures (TSCM) we can put that together.  Reach out to us and let us know what your needs are.