Level Five.jpg

IED and suspect recognition training for security personnel

During the training course the participants will have the opportunity to view and practice with a variety of simulated explosives, explosive devices and mechanisms.

The suspect recognition techniques that will be presented during the course are based upon accumulated experience derived from and based upon the terrorist methods used in actual terror acts that occurred recently around the world.

Highlights

The structure of explosive devices (explosives, initiators, mechanisms)Bomb threat recognition including concealed and homemade explosive devices.The use of explosive detection technology.People and baggage screening.Suspect recognition.Case studies from recent terror events.