Name: Consultancy & Training

Text: Consultancy & Training

Aim
To provide the highest quality consultancy and
training at the lowest possible cost, delivered
from a strictly ethical framework
• 26 support staff
• 850 consultants
• Offices in London, Salisbury, Dubai and Munich

Surveillance and Technical Solutions

Specific Expertise and Capability
• Capability audit independent
of suppliers
• Threat assessment
• X-ray operator training
• Crowd-monitoring systems
• Covert beaconry
• Covert methods of entry
• Border security
• Coastal protection
• Crisis Management
• Visitor risk-profiling
• Air cargo security
• Search training

• Ship search
• Recognition of prohibited
material precursors
• Countering suicide bombers
Blast mitigation
• Intelligence gathering and
analysis
• Interview and interrogation
• Covert surveillance team
training
• Overt surveillance operator
training

Surveillance
• Overt surveillance by manned observation and overt CCTV
• Covert surveillance by surveillance teams, covert CCTV and
technical monitoring
• Video data trawling
• Personal identifier monitoring
• Communications monitoring
• Eavesdropping

Technical Surveillance Counter Measures











Threat assessment
Technical audit
Set up and management of a
sweep team
Reporting and Documentation
Pre Sweep equipment selection
Establish planning documentation
and protocols
Establish equipment check list
Establish service and test checks
Establish sweep area profile
Establish transportation and
storage system










Repetition of TSCM skills already
learned.
Coordination within the sweep
teams
Start a small workshop for the
counter teams
Set into place management preplanning protocols and reporting
methods
Emphasis on cable measurement
and security
Set into place assessment
protocols of areas to be swept
Practical Training
Physical Search

Intelligence Solutions

Intelligence Gathering





Source handling
Screening of visitors
Analysis of intelligence
Utilisation of civil and
commercial partners
• Exploitation of
intelligence

Intelligence Analysis
• Analytical theory
• Analytical investigation
techniques using i2
Analyst Notebook
• Database design and
manipulation using
iBase
• Open-source
information analysis
• Billing analysis

Intelligence Development











Threat assessment
Source handling
Capability and structural audit
Physical covert surveillance
(foot/mobile)
Eavesdropping
Covert video surveillance
Overt video surveillance
Communications interception
(voice/text GSM, PABX, e-mail,
CB radio, letters and documents,
internet tracking)
Active technical tracking (covert
beaconry and tagging) of people
and objects









Passive technical tracking
(personal identifiers: IMSI, credit
card, VRN, passenger lists, tax
records, medical records)
Profiling, screening and
associating
Intelligence analysis
Open-source information analysis
Billing analysis
Archive analysis

Integrated Intelligence
• Power is of little use without good, timely and accurate
intelligence
• Despite huge budgets and enormous effort, the intelligence
community’s super-powers still get it spectacularly wrong
• The key is not in capacity or even in the use of technology
• The key is in the Integration of intelligence from all sources and
the Integration of its exploitation
• Integrated Intelligence training offered from Elaman
• It is applicable today to deal with an equally pernicious threat
from Islamic fundamentalists and internationally sponsored
terrorism
• It is not a ‘magic bullet’
• It is an intelligence force multiplier

Integration of the Intelligence Operation
Government
Special
Forces

Covert exploitation
of Intelligence

Intelligence Asset Tasking

Integrated Intelligence
Committee

Other Ministries

National Crisis Management
Committee

Integration and Analysis
Centre

Commercial and Civil
structures

Police
Border Security and
Immigration

External Intelligence Service

Internal Security Service

Technical Monitoring Service

Military Intelligence and
Reconnaissance
Intelligence
Sources

Intelligence
Sources

Intelligence
Sources

Information
Raw Intelligence
Integrated Intelligence
Command Direction

Intelligence
Sources

Integration of the Intelligence Operation
• Elaman training offers solutions:
– To ensure that all agencies are working to common
priorities at all times
– To ensure that all agencies’ product is crossreferenced with other agencies
– To verify or consolidate the intelligence of one agency
through another
– To get the intelligence to decision-makers
• All within a closed-loop multi-agency intelligence cycle in
which each agency will be guarding its own sources and
methodology

Crisis Management Solutions

Crisis Management
• Elaman provides training for government-level crisis
management and business continuity.
• We utilise experts in their field.
• We conduct seminars and training at all levels.

Specific Expertise and Capability
• Capability audit
• Threat assessment
• Crisis management
leadership training
• Crisis management
communications
• Crisis management theory
• Crisis management
structures and processes
• Business continuity theory
• Business continuity
structures and processes

• One-to-one training for
senior officers and ministers
• Collective training at very
senior level
• Multi-level training for all
agencies involved in
resolving crises
• Table-top exercises
• Simulation

Summary
• Elaman offers a one-stop shop for training and
consultancy:
– Intelligence
– Surveillance
– Internal security
• Highly professional systematic approach to training
• Licensed by UK DTI

Document Path: ["training-overall-presentation.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh