Body Bunker Usage

We offer excerpts from the Federal Law Enforcement Training Center "Catalog of Training Programs FY 1997-98": Financial Fraud Institute The FFI takes the proactive role of arming the student with specialty skills and techniques to develop solid prosecutable cases in a range of crimes. Included are crimes involving government contracts, procurement fraud, illegal tax shelters, complex financial transactions supporting terrorism and criminal conspiracies, asset removal/seizures, money laundering activities involving drug smuggling organizations and other illegal enterprises, insurance frauds, electronic funds transfer fraud, and employee embezzlement. Also addressed in training are technical crimes involving computers and networks such as unauthorized access to government data systems and complex fraud cases using or involving computer systems. Training programs: Computer Evidence Analysis Criminal Investigations in an Automated Environment Financial Crimes Investigations Financial Forensics Techniques International Banking and Money Laundering International Financial Fraud Microcomputers for Investigators Money Laundering and Asset Forfeiture Seized Computer and Evidence Recovery Specialist Telecommunications Fraud White Collar Crime Windows Applications for Investigations http://jya.com/ffi.htm (34K) ----- Security Specialties Division The design, development, and conduct of courses relating to antiterrorism, physical security, and officer safety and survival is the prime mission of the Security Specialties Division (SSD). Courses include; Bombs and Explosives, Personal Protection, First Response, Handling Sensitive/ Classified Information, Criminal Information/Intelligence, Officer Safety and Survival, Physical Security, Surviving Hostage Situations, and Weapons/Explosive Detection. Training programs: Advanced Physical Security Antiterrorism Contingency Planning Antiterrorism Management Criminal Intelligence Analyst Crisis Management First Response Officer Safety and Survival Physical Security Managers Protective Security Operations Seaport Security/Antiterrorism http://jya.com/ssd.htm (22K) ----- The former addresses, among others, "encryption/decryption, disguised data, data hidden by programming techniques, hackers and phreakers." The latter addresses, among others, "left-wing terrorism, right-wing terrorism, animal rights and environmental extremists, assassinations and body bunker usage."
participants (1)
-
John Young