INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
The Vulnerability Analysis Methodology
We know that ISIS has been operating in all 50 U.S. States and many other countries. We also know that terrorist organizations have a planning cycle which includes conducting hostile surveillance for weeks, months and even years prior to an attack. This seminar will inform participants on the terrorist planning cycle, what hostile surveillants look for, how hostile surveillance is conducted and what preventive security counter measures can be taken to identify hostile surveillance and prevent attacks.
“In recent congressional testimony, senior FBI officials said they were conducting about 850 domestic terrorism investigations — a decrease from a year earlier, when there were roughly 1,000. The category covers more than just racist violence, but officials say such motivations are a large part of their domestic terrorism caseload.” - The Washington Post
Available: Immediately upon registration completion Cost: Free Participants of this one-hour webinar will learn holistic process to:
Presented by Jim McGuffey, M.A., CPP, PSP, PCI
Registration will include access to the recorded presentation for ongoing reference. This recently recorded webcast will be available for you to watch from the link sent in your confirmation email.
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us