ESI is approved by the Colorado Office of Veterans Education and Training
(COVET) for Veterans Education and Training Benefits.
ESI is also eligible for MyCAA - Financial Assistance to Military Spouses
The Corporate Security and Threat Management Program (CSM) trains Corporate Security Professionals and Executive Security Officers to manage risks in a corporate setting. The Program will cover Best Practices in a wide range of issues confronting corporate security personnel: Monitoring, Tracking and Responding to Global Crisis whether human or natural, Managing Threats to Employees, Property and Executives; strengthening the understanding of corporate security personnel of the core analytical concepts of criminal patterns, Link Analysis, Association Matrix, Time Lines and Flow Charts; learning interview skills of Deception Detection and Statement Analysis as well as clues to personality profiles and Handwriting Analysis; developing policies to mitigate Workplace Disruption and Violence and Managing Aggression and Pre-Indicators of Dangerous Behavior; finally, students will be introduced to Kidnap & Ransom practices.
In the 28-Day CSM, ESI has assembled coherent subject matter relevant to corporate security professionals that if taken in separate seminars would cost several times more stretched out over an unpredictable time span than if taken as an integrated curriculum. However, in order to accommodate busy time schedules, the Corporate Security & Threat Management Program can be taken either as a 28-Day Residency or as Stand Alone short Certificate Modules. In the case of Stand Alone Modules, Credit Hours are accumulated towards an ESI Certificate and Credential as a Corporate Security Threat Management Specialist (CSTMS) as the student has time to complete each block of instruction.
The combination of the two Residencies: Corporate Security and Executive Protection prepare the student for ESI's premier certification as a Certified Security Specialist (CSS). It is also possible to obtain the CSS Certification by completing 18 Distance Education courses ON-LINE plus either Corporate Security or Executive Protection Residency.
CORPORATE CRISIS MANAGEMENT
Executive Director, CTI Consulting
A primary goal of this two-day course is to prepare students to conduct Security Surveys for or at Corporations and Government Facilities. Students will learn how to conduct Security Surveys of buildings and their staff using the FEMA model, which is now a recommended practice for corporations, and may soon become a mandate.
Students will be able to conduct a FEMA model survey and develop working solutions to include training and drills. The student will learn how these surveys are used to mitigate new threats of an Active Shooter Incident as seen in Mumbai, India and Aurora, Colorado. FEMA is seeking to establish national standards that would apply to all public locations.
Upon completion of the course, students will be eligible for FEMA Certification and demonstrate real-world qualifications for this type of work.
In addition, the course will address issues such as “How do Executive Protection Agents support or fit into the corporate security that must confront a wide range of threats both human and natural? Is there a role for Close Protection during natural disasters I.e. Hurricanes, earthquakes and other natural disasters?
Corporate Security consist of a broader skill set than Close Protection. What do you need to know in order to be of value to a global corporation? And what are the intelligence resources necessary to Monitor, Track and Respond to global crisis situations?
- Security Surveys According to National Standards
- Corporate Security Surveys
- Governmental Facilities
- FEMA Standards
- Active Shooter on Premises
- Best Practices of Crisis Management
- Role of Close Protection Agents in Human or Natural Disasters
- Role of Intelligence and Bridges to Corporate Security
MANAGING THREATS & RISKS
IN A CORPORATE ENVIRONMENT
Operational Security Consultant
The Managing Threats & Risks course takes the principles of threat and risk management and applies them to the overall corporate security role, and introduces procedures to manage and intervene in situations where threats and acts of violence are directed towards any member of the company workforce. Discussion includes coworker harassment, customer or client threats, and the rising issue of domestic violence spillover.
This course teaches corporate security from a risk management perspective, and introduces the student to the challenges of operational security in a corporate setting. This course reinforces threat management as a primary proactive approach to mitigate risks, and drives a looping model of risk identification, mitigation, and incident response and business recovery. Discussion includes the nature of workplace violence; threat management in a five-component workable model; technology to receive, manage and monitor ongoing risk situations; training employees to respond should gun violence occur in the corporate work environment; and building a threat assessment team leveraging human resource, security, legal, and risk management perspectives.
Topics will include: training employees for the "what if" scenario; facilitating an efficient active shooter response by law enforcement; armed vs. unarmed guard contracts; and planning and administering mass casualty medical response in a corporate environment.
Students will apply their skills and knowledge of course concepts through individual and team assignments of actual cases, which highlight, the administrative, political, financial, and often frustrating issues facing the corporate security professional.
CASE STUDIES OF CORPORATE CEO STALKERS
CORPORATE INTERNATIONAL TRAVEL SECURITY
Corporate Security Consultant
The Case Studies of Corporate CEO Stalker Exercise is a unique teaching platform designed to present the student with an immersive, stress induced, Team Building Mission that we introduce on the study of CEO Stalking. The Module is based on actual case studies of long-term stalking incidents of corporate executives and how they were managed to a successful conclusion.
The students are given their own client case with all the incidents associated with the threat to an executive and their family. The Team is then asked to collect factual data, analyze the details and develop a Management Plan on how to handle the case that minimizes the danger to the client and to the corporation. The end goal of the course is to provide a platform whereby the individual student and the team will learn how to develop a Threat Assessment and a Management Plan based on structured analytical techniques. The course will illustrate guidelines for policy on how to crisis manage threats to officers and the corporation, when it is advisable to invite outside consultants i.e. psychiatrists, legal counsel and law enforcement agencies to facilitate a peaceful resolution
TECHNIQUES OF ANALYZING
CRIMINAL & SOCIAL NETWORKS
A Certificate Course
D. Anthony Nichter, ARM, CHE, CPP, CPS, CDTI
This course is designed to strengthen the understanding of corporate security personnel with the core analytical concepts beginning with the Intelligence Cycle, methods of Intelligence Collection, Report Writing and resulting in Policy Development. It’s goal to convey techniques develop by the military intelligence that can be applied to a corporate environment to mitigate organized criminal operations.
Social Network Analysis utilizes a technique for organizing information like Link Analysis, Flow Charts, Association Matrix, Time Lines and other analytic tools to tract the relationships between individuals, organizations, agencies, and businesses in order to form the basis for conclusions. The course introduces various Structured Analytic Techniques used by analysts from Structured Brainstorming, Nominal Group Technique, and Star Bursting. Students will also cover hypothesis generation and decision analysis tools such as SWOT Analysis. Social Network Analysis techniques are one of the most commonly used forms of analysis in law enforcement, corporate security loss prevention, investigation of narcotics network, organized crime, terrorism, fraud, and other criminal conspiracies.
The course will present a Structured Analytic Technique as a way of reducing the ambiguity of highly ambiguous situations that opens the process of analysis in a manner that makes it apparent to others. Techniques include Structured Brainstorming, Scenarios, Indicators, Analysis of Competing Hypothesis and Key Assumptions Check.
Students will build a valuable foundation in Intelligence Analysis and understand the distinction between a data collector and an Intelligence Analyst.
Finally the course will introduce the position of the OPSEC Manager and how it offers a strong basis to develop “Good Practices” for security departments.
- Data Collection
- Open & Closed Sources
- Private and Public Databases
- Analytical Process
- Matrix Development
- Link Analysis
- Flow Charting
- Time Lines
- Activity Charting
- Financial Analysis & Money Laundering
- Commodity Flow Charting
- Inference Development & Recommendations
- Report Writing
- Evidence Preparation
- Oral Briefings
A Personality Profile Tool
A Certificate Course
Barry Wilson, President
Anlance Protection Inc
The skilled Executive Protection Agent understands that Knowledge in both proactive and reactive skills is Power. They also recognize that the more Knowledge Based Tools they possess, the more effective they will be at devising and implementing a Protective Strategy that will successful defend their Clients.
This course in Field Handwriting Analysis will allow the successful student to ascertain the core personality characteristics of any individual. The training opens a window into the opposition’s attitudes, thinking patterns, emotions and character history, which under normal circumstances could take months to uncover.
The Student should be prepared for an intensive course of both empirical and interruptive study taught through practical review of handwriting samples and scenario extrapolation.
Course of Study
- Basic Handwriting Analysis
- Introduction to Handwriting Analysis
- Basic Empirical Study - Major Elements
- Review of Introduction
- Basic Empirical Study - Detailed Elements
- Major and Detailed Elements
- Skills Test - Empirical Study
- Expanded Handwriting Analysis
- Review of Basic Empirical Skill
- Interruptive Analysis Skill
- Extrapolation Skills
- Organizational Documents and Commentary
INTERVIEW and INTERROGATION
A Certificate Course
This module is a 5-Day Certificate Course designed to teach the principles of interviewing for cause or for the solicitation of information from a variety of subjects. The course is comprised of two distinct but highly compatible components taught by two experienced intelligence analysts, Alan and Kaaryn Gough: Behavioral Analysis and Statement Analysis. Combining instruction with interactive and real-world scenarios, this course will give participants immediate and practical knowledge. Individually, each component will teach skills and provide tools to detect deception and gather intelligence from responses provided by subjects. Participants will ultimately learn how to combine both methodologies, resulting in significantly enhanced accuracy in analysis and a more comprehensive gathering of reliable information.
Behavioral Intelligence Analyst
This course component is designed to teach the principles of interviewing for cause or for the solicitation of information from a variety of subjects. Through instruction and numerous interactive exercises, the participants will learn how to conduct effective interviews and analyze the results for maximum accuracy. Whether finding out “what happened”, or discovering information not previously known, these techniques can be applied in formal and informal interview settings and in the analysis of other forms of subject statements or documentation.
- Definition of Terms and Methodologies
- Focus on Behavioral Analysis and Linguistic Analysis
- Cautions Re: Expectations and Outcomes
- Factors Affecting Accuracy
- Factors Affecting Post Interview Analysis Stage
- Location of the interview
- Dynamics of Interpersonal Communications
- Relative Weight Given to Visual and Auditory Responses
- Filters; Language, Culture, Assumed Hierarchical Influence
- Designing the Questions and Structure
- Interviewer Attitude and Controlling the Agenda
- Interview Scheduling and Pacing
- Pre-Established [Mandatory] Questions - Personal circumstances
- Setting the Tone of the Interview
- Establishing a Baseline and Updating the Baseline
- Asking the 'Open' Question
- Observable Behaviors [Markers] and their Possible Meaning
- Marker Clusters vs. Single Markers
- Micro Expression Analysis
- Interviewer ‘Tactics’– Wrap up Questions – The ‘Colombo’ Moment
- Recognizing the Use of Countermeasures
- Recording the interview, Advantages of Video Recording, Audio Recording
Kaaryn Gough, President and CEO
Integra View Inc.
This course component introduces the highly effective method of detecting deception and gathering information through the examination of a subject’s words, linguistic structure and content–what information a subject chooses to include and exclude–in a spoken or written statement. Employed by law enforcement, government agencies, legal firms, insurance companies and private industry around the world, statement analysis is a consistent and systematic method that has proven to be an invaluable investigative tool.
- Defining and Understanding Deception
- Principles of Statement Analysis
- Analyzing Pronouns and Tenses
- Analyzing Active vs Passive Language -Identifying Areas of Sensitivity
- Editing and Continuity: Identifying Logic Conflicts, Missing Information, Missing Time
- Recognizing and Deflecting Verbal Manipulators
MANAGEMENT OF WORKPLACE
DISRUPTION & VIOLENCE
JOHN ROSE, President,
Holston International Training Company
Workplace Disruption & Violence Management- This course provides the Protection Agent with an alternative perspective towards the workplace, namely, how to be a ‘protector’ of the many employees and not just the singular executive. The Agent learns how to apply his/her exotic protection skills to the wider occupational environment and not just members of the Boardroom. From this point of view, modern protection agents will increase their chances of long-term employment as today’s workplaces witness increasing violence that is escalating in both frequency and severity.
- The theoretical root causes of violence as an acceptable form of expression
- The typological recognition of the sources of occupational violence
- The four primary levels of threats and hostilities to employees and invitees
- The five metrics to assess the probability of violence at work
- The three trigger stages of violence as it manifests along a predictable path
- The three phases of a formal Workplace Violence Prevention Program (WVPP)
IDENTIFYING AND MANAGING AGGRESSION
John Byrnes, CEO
Center for Aggression Management
Essential to any successful Corporate Security is the ability to reliably PREVENT the next violent attack. Predominantly, Corporate Security focuses on Crisis Management, Threat Assessment or even Conflict Management. But Crisis Management is an investment in a crisis that already exists; Threat Assessment is an assessment of a threat that already exists; and Conflict Management presupposes conflict. There is no PREVENTION in these methods of approach! Even those who train as First Responders are responding to a crisis that has already occurred! Preemptive Intervention must be based upon factors that can be MEASURED, increasing the opportunity for PREVENTION. Incidents of workplace violence or threats against an employee, whether from inside or outside company property is a growing concern, and a legal responsibility, for corporate security departments.
Come learn the unique and proprietary methods that permit professional security to foresee the precursors of aggression and violence, which permit the opportunity to reliably PREVENT the next violent incident. Learn about our unique and proprietary Primal (adrenaline-driven) and Cognitive (intent-driven) Aggression and the continua that binds them. In this workshop, you will learn the Judicious Interview; an application of scientific cause and effect principles, a means to affirm and prevent the actions of an emerging aggressor.
BEHAVIORAL INTELLIGENCE and
CLUES TO DANGEROUSNESS
Bob Duggan, President, Executive Security International
ESI has taught this course for 30 years, and believes it an essential skill set to any Protection Specialist. Starting with an archive of film clips of assassinations, attempted and successful, this course will train the student to identify the precursors of assault or pre-indicators of violence. The goal is to enable the student to replace casual observation of generalities with the study of detail, to recall it systematically and to develop the capacity to make accurate descriptions. The Behavioral Intelligence and Clues to Dangerousness course will concentrate on the identification of facial expressions with the primary emotions based on the research of Dr. Paul Ekman and other behavioral scientist. A Protection Specialist that is capable of identifying facial expressions and body gestures as the precursors of assault or aggression is armed with the capacity to Anticipate, and Preempt the Attack on Principle.
- History of Assassinations
- The Two Second Rule
- The Precursors to Assault
- The Inherent Logic of Assault
- Observable Movements
- Body Language
- Facial Expressions
- The Blink and The Adaptive Unconscious
- Pre-Emptive Intervention
Lt.Col Kendall S Schaefer, (USMC retired),
Former Response Consultant for ASI Global Response
This course will be taught using Somali pirate hostage cases from the Indian Ocean and individual kidnap-for-ransom cases from Mexico and Latin America. In addition, the students will learn techniques for avoiding a kidnapping and for surviving a kidnapping incident.
Scott Schaefer managed Kidnap Response Operations for the Houston-based ASI Global Response (www.ASIGlobalResponse.com) until he was medically retired in 2012. As a dedicated response consultant for Travelers Insurance, Scott and the ASI team responded to kidnap-for-ransom, extortion-with-violence, and piracy events around the world. Scott is widely sought after to provide direction and insight to the corporate world regarding kidnap prevention and training, crisis management planning and response.
Prior to working as a Kidnap & Ransom Consultant, Scott served with the Marine Corps and was a Case Officer with the Clandestine Services Division of the Central Intelligence Agency, retiring at the equivalent rank of Lt.Col. He has taught courses for corporate and government clients in the areas of Intelligence Collection and Analysis, Surveillance Detection and Counter Intelligence.