252.774.0252

    info@hkschoolhouse.com

Course Descriptions

Mobile Training Tailored to Your Needs

Course Length Can Vary Based on Customer Needs

Behavior Recognition Training for Law Enforcement Officers 

This course provides uniformed and plain clothes Law enforcement personnel with the ability to enhance their understanding of the importance of human behavior as it relates to verbal and nonverbal cues and signals while conducting custodial and non-custodial field interviews.

This training course will consist of the following topics:

 

  • Suspicious behavior detection

  • Decoding and deciphering nonverbal cues

  • Verbal and non-verbal indicators of potential deception

  • Establishing environmental baseline behavior types

  • Recognizing deviations from expected norms

  • Recognizing and engaging the anomalies in behavior

  • Cognitive Questioning techniques-highly effective

 

This course of instruction will consist of lecture, slides, videos.

Behavior Recognition Training for Law Enforcement Officers and Explosive Threat Assessment Training 

This course provides uniformed or plain clothes law enforcement personnel with the ability to enhance their understanding of the importance of human behavior as it relates to verbal, nonverbal
cues and signals when conducting custodial and non-custodial
field interviews. 

This course will also enhance LE personnel with the ability to better understand and identify explosives, explosive devices, and what to do should they come across suspected explosives or devices when working in the field.

The BRTLEO will consist of the following information:

 

  • Suspicious behavior detection

  • Decoding and deciphering nonverbal cues

  • Verbal and non-verbal indicators of potential deception

  • Establishing environmental baseline behavior types

  • Recognizing deviations from expected norms

  • Recognizing and engaging the anomalies in behavior

  • Cognitive Questioning techniques-highly effective

 

The ETAT will consist of the following information:

 

  • Unattended, Abandoned, or Suspicious package – What’s
    the difference?

  • Homemade Explosives – What to look for!

  • Behaviors associated with Bomb Related Offenders, lone wolf etc.

  • “Hands On” instruction with inert training aids

 

This course of instruction will consist of lecture, slides, videos.

Corporate Travelers Awareness Course

The Corporate Travelers Awareness Course is designed to inform and educate personnel traveling overseas for corporate related business. Separate blocks of instruction will educate the traveler with various techniques to help better protect themselves, corporate and personal information. The course provides opportunities for open dialogue with subject matter experts who explain why certain events may take place when traveling overseas, and what the traveler can do to mitigate exposure. This training identifies the value of human capital, proprietary information, Intellectual property, corporate espionage and how criminals, host nation government and foreign intelligence may be targeting the traveler. Background information will be provided relating to the types of crimes being committed and what to do if a crime occurs. Most importantly, the traveler will be informed why it’s important to maintain situational awareness, have a plan prior to travelling and to speak with your corporate security, and report anything out of the ordinary.

Level I: Course Length 1-3 days

This level of training will provide a general global overview and perspective to the traveler as it relates to current trends associated with current general customs practices to include primary and secondary screening. Also, addressed will be mitigation strategies for the protection of the travelers physical, personal and corporate related information.

Level II: Course Length 1-3 days

This level of training will provide a regional overview and perspective to the traveler as it relates to current trends associated with current customs practices to include primary and secondary screening. Cultural customs and business-related practices will be discussed to ensure that the traveler will be prepared and have an informed understanding in regard to the region of the world they will be travelling. Also, addressed will be mitigation strategies for the protection of the traveler’s physical, personal and corporate related information. This training will identify those areas that may pose a threat to traveler based on identified threats relating to corporate/industrial espionage and/or crime, civil unrest or economic challenges associated with the region.

Level III: Course Length 1-3 days

This level of training will provide a specified country overview, and perspective to the traveler as it relates to current trends associated with current customs practices to include primary and secondary screening. It will contain the Level II course information, but will specifically target an identified country that does pose a threat to the traveler relating to identified corporate/industrial espionage, and crime, civil unrest or economic challenges associated with the country.

All training module information can be provided upon request.

Covert/Undercover Operations 

This training will focus on the safety of conducting undercover and covert operations while maintaining the integrity of the criminal investigation. Cover techniques and tradecraft from the undercover operator’s perspective will be discussed. Best practices utilizing informants, current technologies, and a cover team to properly gather evidence will be presented. Prosecution strategies will also be discussed to include Conspiracy, RICO and VICAR laws. Students will be presented with case studies, the video review of actual undercover deadly force situations, and have an open dialogue with the instructors throughout the training. Finally, students will be presented with information that will offer ideas and solutions to aid in properly backstopping their alias, how to lower their digital persona, and manage their personal information available on the internet.

Some experience in operating in an undercover capacity or as part of the cover team is helpful but not required. The primary prerequisite is to be a law enforcement officer with a desire to work as a team member supporting undercover operations. This course is beneficial to both officers and supervisors.

This training course will consist of the following topics:

 

  • Operation Briefings

  • Cover Team Roles Including Extraction and Rescue

  • Confidential Informants/Sources – Recruitment and Control

  • Armed vs. Unarmed While in Role/Defensive Tactics

  • Electronic Surveillance

  • Being Prepared (Rip-offs, Searches, Buy Busts)

  • Street Theater

  • Elicitation Skills and Anomalous Behavior

  • Legal Aspects of UC Operations, Defense Pitfalls, Concerns and Precautions

  • Undercover Identity and Identity Management

  • The Stress and Surviving
     

 

This course of instruction will consist of lecture, slides, videos.

Cultivating and Managing Confidential Informants 

The use of Confidential Informants/Sources enables Law Enforcement to penetrate into the criminal element in many ways that otherwise we would not have access to; however, with that there are often various pitfalls. This class will focus on the use and control of Confidential Informants during criminal investigations with the objective of mitigating these pitfalls by providing techniques and examples of suggested controls. The overall objective will be to maintain the integrity of the criminal case, minimize liability of the law enforcement agency, and to minimize any adverse action against the officers working with, and controlling informants/sources. This course is beneficial to both officers and supervisors.

This training course will consist of the following topics:

 

  • Defined

  • Motivation

  • How to Develop an Informant/Source

  • Initial Contact

  • Vetting Process

  • Disqualifiers

  • Instructions

  • Written Agreement

  • Conducting Ops

  • UC Introduction

  • Meeting Location

  • Issues

  • OPSEC

  • Payments

  • Trial Prep

  • Relocation of CI/Source

  • Do's and Don'ts

  • CI/Source Intimate Contact with Suspec

  • Opposite Sex Informants

  • Contact with Represented Persons

  • CI/Source Contact with Incarcerated Suspects

  • Discontinuing CI/Source

  • Rachel’s Law
     

 

This course of instruction will consist of lecture, slides, videos.

Cyber and Electronic Information Security Awareness Training 

In the modern interconnected world, one’s information can be put anywhere, and almost anyone can access it. In this Cyber and Electronic Information Security Awareness Training, we aim to educate and arm law enforcement personnel and their family members with the information to protect themselves and their family’s information online. They will be educated utilizing current techniques and applications to lower their profile online when utilizing social media and internet browsers. They will also learn how to better secure their electronic devices. This will range from common core security practices to information control.

This training course will consist of the following topics:

 

  • Online Threats

  • Wireless Communication Security

  • Managing Your Online Footprint

  • World Wide Cyber Threats

  • iOS and Android Security Threats

  • Cellular Security Threats

  • Computer and Networking Security
     

 

This course of instruction will consist of lecture, slides, videos.

Gang Investigators Training 

This training course is designed to enhance the knowledge of all law enforcement personnel who may encounter gang members while on the job. The instructors will provide investigative strategies, investigative techniques and prosecutorial partnering solutions that are proven successful when addressing these criminal organizations.

This training will provide the nuances of street and outlaw motorcycle gangs, along with a general background and overview of their hierarchy and structure. The information provides a better understanding of what makes these criminal organizations work, their complexities, and what makes them vulnerable. Recognizing gang indicators, and addressing their presence early on is key to suppressing the growth of these gangs in your communities.

 

  • Street Gang Overview

  • Outlaw Motorcycle Gang Overview

  • Investigative Strategies and Techniques

  • Case Studies

  • Developing Informants and Sources

  • Prosecutorial Partnering

  • Gangs and Social Media
     

 

This course of instruction will consist of lecture, slides, videos.

Non Verbal Cues and Effective Interviewing

This training course provides uniformed and plain clothes Law enforcement personnel with the ability to enhance their understanding of the importance of human behavior as it relates to verbal and nonverbal cues and signals while conducting custodial and non-custodial field interviews. This training course will consist of the following topics:

•  Suspicious behavior detection

•   Verbal and non-verbal indicators of potential deception

•   Establishing environmental baseline behavior types

•   Recognizing deviations from expected norms

•   Recognizing and engaging the anomalies in behavior

•   Psychology of Lying.

•   CBCA, Criteria Bases Content Analysis

•   Recognizing, decoding and deciphering nonverbal cues for both        field and static interviews

•   Cognitive Questioning Techniques (field and static) - highly                 effective in exposing deception

 

Day 2

 

  • Role plays

Supervising Covert Operations 

This training will provide first line supervisors with an overview of pit falls and dangers inherent in covert/undercover operations, and to ensure that the proper planning has taken place prior to any undercover operation.

This training course will consist of the following topics:

 

  • Understand the supervisors’ responsibilities to the case officer and the Undercover (UC) Officer

  • Resource coordination by the supervisor and case officer

  • Understand Short Term vs. Long Term Operational requirements

  • Identify those law enforcement officers with the capacity to work in an undercover capacity

  • Explain the importance of planning an undercover operation, briefing and debriefing of every operation

  • Identify the main responsibilities of the supervisor and cover team during the operation

  • Understand the benefits and pitfalls of carrying a gun during a UC operation

  • Recognize the benefits and pitfalls of using a hidden transmitter during a covert/undercover meeting

  • Understand the benefits and pitfalls of “tripping”

  • Identify indicators that a suspect may give, indicating a
    possible rip-off

  • Identify and understand stress related to undercover operations

  • Case Study
     

 

This course of instruction will consist of lecture, slides, videos.

Surveillance Operations 

This two day class focuses on the various aspects of surveillance. Surveillance is often overlooked as a critical skillset, but is a crucial technique often used to substantiate allegations and help perfect criminal charges utilizing photography and video surveillance. This class will enable the officers a better understanding of the importance of blending with the community, utilizing proper collection methods, documenting what is observed, and the importance of communication between the surveillance team members. This will allow them to maximize the benefits of surveillance while minimizing the risk of getting "burned" while on surveillance.

This training course will consist of the following topics:

 

  • Mobile and stationary surveillance techniques

  • Surveillance Logs

  • Aspects of vehicle and foot surveillance

  • Covertly tracking suspects

  • Covering undercover or CI contacts

  • Scouting search warrant locations

  • Surveillance on active robbery (or other) suspects

  • The use of cell phone pings

  • GPS

  • Surveillance Photography
     

 

Maximum number of students per course is 20.

This course of instruction will consist of lecture, slides, videos,
and a training exercise with an after-action review with the students and instructors.

  • Twitter
0