top of page

Security Operations

The U.S. Code of Federal Regulation defines terrorism as "the unlawful use of force and violence against person of property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives".  (28 C.F.R. Section 0.85)

In today's world there are limited or no prior intelligence on the next lone actors, active killer or suicide bomber of when, where and how an attack will happen. The federal government as great as it is does not have the resource to protect us from all threats foreign or domestic. 
 

Every terrorist attack or active killer incident starts and ends with a person from pre-operational activities to operational deployment.


Here at TACT Consulting LLC. We specialize in Deviant Behavioral Profiling and Detection, also known as Offender Profiling or Criminal Profiling, This is an investigative tool used by law enforcement agencies to identify likely suspects and analyze deviant behavioral patterns that may predict deceptive behavior through social norms or criminal activities such as acts of terrorism or active killer situations.

TACT Consulting LLC. we will help you evolve and enhance your current security and public protection programs in today's changing world with concerns of lone actors, active killers and other forms of terrorism.

TACT Consulting will give you tools to recognize prevent and respond to behavioral threat detection indicators.

 

Government agencies such as the Federal Bureau of Investigations (FBI), Department of Homeland Security (DHS), Central Intelligence Agency (CIA) and the Department of Defense (DoD) has adapted and instilled these type of  programs. 

This program is one of the most pro-active, real-time threat assessment strategies any entity private or public  can institute in their security programs. 

Behavior Threat Detection (BTD) Programs

The BTD program utilizes non-invasive behavior detection techniques based on scientifically validated behaviors to identify individuals who potentially pose a threat to or nations society, infrastructures and ultimately or way of life. These individuals are deemed potentially higher risk and subjected to additional scrutiny.

The BTD program identifies potentially high risk individuals exhibiting behaviors indicative of excessive stress, fear or deception and engages the them by looking for a combination of individual indicators that warrant further scrutiny or interaction.

BTD officers are trained to identify behavior cues that have been shown through research, science, and decades of domestic and international law enforcement experience to be reliable indicators and predictors of anomalous or suspicious behavior.  BTD trained officers engage in conversation with individuals displaying anomalous behaviors, looking at possible verbal cues indicative of a high risk individuals and refer those individuals exhibiting such behavior for additional questioning or law-enforcement involvement. 

We will create and train your own organizations Behavior Threat Detection program and certified officers in  two levels of operations:

  • ​BTD Training  - Officers are trained in the collateral duty in Behavioral Threat Detection within there daily duties and operations.

  • SATA Certified - Officers are certified in advance Behavioral Detection and Analysis as there primary duty and subject matter experts in behavioral threat assessments.

Courses

man-in-black-and-white-taking-photos-in-
Grey%20Man2_edited.jpg

CST Training Covert Surveillance

Covert

Plain Clothes Operations

MIM_edited.jpg

BTD Training

Behavior Threat Detection

suspicious behavior2.jpg

SATA Certified

Situational Awareness / Threat Assessment

Our BTD program are designed for (but not limited to) the operations in: 

  • National infrastructure - Critical infrastructure includes the vast network of highways, connecting bridges and tunnels, railways, utilities and buildings necessary to maintain normalcy in daily life. Transportation, commerce, clean water and electricity all rely on these vital systems.

    • Mass Transit Systems: Aviation, Rail and Metro/public transportation

  • Malls / Shopping Centers

  • Political Venues

  • Sports/Entertainment Events

    • Concerts​

    • Premieres

    • Sports Competition

  • Public/Special Events

    • Parades​

    • Festivals 

    • Celebrations

    • Amusement Parks

  • Other Soft Targets

Behavior Threat Detection: BTD Training

Attendees will learn to observe and identify anomalies in their surrounding environment that may be indicative of terrorist activities, and to conduct behavioral analysis using modern techniques including body language and gestures to assist in identifying whether individuals are showing signs of deception. Though the training was designed by law enforcement, the intended audience is anyone in the public safety community who regularly interacts with the public, including hospital, amusement parks and retail security staff. This will be an excellent training opportunity for anyone who has events coming up, including entertainment venues such as sporting events, concerts, or other public gatherings. 

​​​

BTD is completely flexible and can be customized to any organizational need. Contact us for GSA or Group Rates.

​​

Individuals must possess Law Enforcement/Peace Officer / Other Credentials or State Security Guard License or have a “Need to Know” such as Public Safety Personnel

 

CST Training

Covert Surveillance Training

Almost any criminal act, from a purse-snatching to a terrorist bombing, involves some degree of pre-operational surveillance. In fact, one common denominator of all the different potential threats — whether from lone actor, militant groups, common criminals or the mentally disturbed — is that those planning an operation all monitor their target in advance. However, while pickpockets or purse-snatchers case their victims for perhaps only a few seconds or minutes, a militant organization might conduct detailed surveillance of a target for several weeks or even months. Regardless of the length of time surveillance is performed, however, the criminal or militant conducting it is exposed, and therefore vulnerable to detection. 
Because of this, covert-surveillance — the process of detecting and mitigating hostile surveillance or pre-attack behaviors — is an important element of counter-terrorism and security operations.

 

This workshop can be tailored to meet the unique needs of any group. CST can be offered in 1 day (8 hour) basic training or a 3-day (24 hour) advance training sessions that also consist of covert plain clothes operations.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SATA Certification

Situational Awareness Threat Assessment

The SATA Certification is a all-inclusive training program that builds upon our greatest weapon... human intelligence (HUMINT). Our training offers the most proactive, real-time threat assessment through Behavior Threat Detection and Covert Surveillance, any industry can adopt to strengthen your existing security/public safety programs. The SATA Certification program will consist of a practical pre and post assessment along with a practical exercise after the completion of the class room training program. This program is designed for both uniform and plain clothes operations.​

These type of behavior threat assessment programs are being deployed nationally through the private and public industries:

Mall of America - Risk Assessment Mitigation (RAM) Officers, TSA - Behavior Detection Officer (BDO), and the FBI - Behavioral Analysis Program (BAP). Other agencies such as the U.S. Department of State, DoD, CIA and the U.S. Secret Service all have a behavioral threat assessment programs as well.

 

SATA Certification is completely flexible and can be customized to any organizational need. 

Contact us for GSA or Corporate Rates and for scheduling.

 

​Participants are required to have a 7 day advance registration. Participants must have a "need to know" for this course. Registered participants must hold in good standings Law Enforcement / Peace Officer credentials or state registered security guard license. All participants are subjected to a background check.

man-in-black-and-white-taking-photos-in-

CST Basic

Training will consist of the following:

  • Terrorist Attack Planning Cycle

  • Pre-Operational Indicators

  • Surveillance activities and indicators

  • Suspicious activities

  • Suspicious packages/baggage

  • Social Engineering

  • Active Engagement

man-in-black-and-white-taking-photos-in-

CST Advance

This 3-day advance course is created toward operational level hands on training. The 3rd day of training will consist of practical exercise within a public environment consisting in plain clothes (covert) operations, along with role  players.                                       

CST
BTD
SATA

Special Security Consulting Operations

Special Security Consulting Operations - Deploys a mobile and flexible  Behavioral Threat Assessment and Detection consulting team in plainclothes operations, giving the ability to avoid detection or identification from the public or adversaries. The purpose is to blend into the environment to create additional force multiplier for any security or law enforcement operations. 

Operations:

  • Special/Public events to include political, sports or entertainment venues.

  • Executive Protection Attachment:

Ideal for but not limited to:

Hollywood.jfif

Entertainment / Premieres

Fortune500.jfif

Executives / VIP's

Infra2.jfif

Infrastructure Systems

To learn more how we can help contact us below

Contact Us

You may also call at 716-514-2196, Thank you

bottom of page