[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Body Bunker Usage




We offer excerpts from the Federal Law Enforcement 
Training Center "Catalog of Training Programs FY 1997-98":

Financial Fraud Institute

The FFI takes the proactive role of arming the student with 
specialty skills and techniques to develop solid prosecutable 
cases in a range of crimes. Included are crimes involving 
government contracts, procurement fraud, illegal tax shelters, 
complex financial transactions supporting terrorism and criminal
conspiracies, asset removal/seizures, money laundering activities 
involving drug smuggling organizations and other illegal 
enterprises, insurance frauds, electronic funds transfer fraud, 
and employee embezzlement. Also addressed in training are 
technical crimes involving computers and networks such as
unauthorized access to government data systems and complex 
fraud cases using or involving computer systems.

Training programs:

   Computer Evidence Analysis
   Criminal Investigations in an Automated Environment
   Financial Crimes Investigations
   Financial Forensics Techniques
   International Banking and Money Laundering
   International Financial Fraud
   Microcomputers for Investigators
   Money Laundering and Asset Forfeiture
   Seized Computer and Evidence Recovery Specialist
   Telecommunications Fraud
   White Collar Crime
   Windows Applications for Investigations


   http://jya.com/ffi.htm  (34K)

-----

Security Specialties Division

The design, development, and conduct of courses relating to 
antiterrorism, physical security, and officer safety and 
survival is the prime mission of the Security Specialties 
Division (SSD). Courses include; Bombs and Explosives, 
Personal Protection, First Response, Handling Sensitive/
Classified Information, Criminal Information/Intelligence, 
Officer Safety and Survival, Physical Security, Surviving 
Hostage Situations, and Weapons/Explosive Detection.      

Training programs:

   Advanced Physical Security
   Antiterrorism Contingency Planning
   Antiterrorism Management
   Criminal Intelligence Analyst
   Crisis Management
   First Response
   Officer Safety and Survival
   Physical Security Managers
   Protective Security Operations
   Seaport Security/Antiterrorism


   http://jya.com/ssd.htm  (22K)

-----

The former addresses, among others, "encryption/decryption,
disguised data, data hidden by programming techniques,
hackers and phreakers."

The latter addresses, among others, "left-wing terrorism, 
right-wing terrorism, animal rights and environmental 
extremists, assassinations and body bunker usage."