Hostile Intelligence Gathering Seminar   
Hostile Intelligence Gathering Seminar
Coping with Hostile Intelligence Gathering

Security forces are facing a growing need to cope with the potential intelligence assailant.

Hostile intelligence gathering is most efficiently dealt with when deeply understood from the assailant’s point of view.

Understanding and knowing the stages of planning and executing an attack (of any sort), and the role of operational intelligence collection (OIC) enables a security force to prepare and

carrying out preventative actions that will disrupt the attack already in it’s early stages and thus bring to it’s prevention.


One of AFIK’s main goals is to bring the intelligence aspect into existing security systems so that more and more forces will shift from being a passive force, which only reacts to attacks, into being an active force, which combines together with the regular activity the initiative and preventative activities.

In order to do so, AFIK has built this seminar. It is built to bring deep understanding and experience of the assailant’s point of view and action, thus enabling the security force to apply new methods of action and prevention.

General layout and duration of the course

The duration of the seminar is a few days and is mainly subject to the clients needs. It includes theoretical studies, field activities, practical exercises that simulate the assailant’s actions,

and discussions to conclude each exercise.

The main subjects and content brought in the course

·Understanding the stages in the assailant’s action.

·Understanding the different working methods and working tools that the assailants might apply.

·The psychology of an intelligence information collecting operative.

·Actual practices in observations, operational intelligence collection, planning an attack, executing an attack.

·Building the security answer to hostile intelligence attacks.

·Discussion and conclusion of each subject that is presented and practiced.

 
 




    News & Updates

U.C.P. is a method of security, which exposes a potential assailant in the early stages of planning an attack and also on attack occurrence.
U.C.P. helps to locate, identify and defuse the attackers before they manage to cause damage.
The methods of U.C.P. are based upon applications of similar techniques, applied in major secret services.

spacer

 

Home Page   |  Afik Services   |  Operational Activity   |  Courses   |   Founder and CEO   |  Article   |  Contact us

 ^ çæøä ìîòìä







îñçø àì÷èøåðé
çðåú åéøèåàìéú | àçñåï àúøéí
 Web Design by Eyal Eliraz