Available Courses

8-Hour Counterterrorism Modules

  • An overview of terrorist group attacks and tactics from the 1960s to the present in both urban and rural environments. Rolling attacks, weapons close range, ambush attacks, stand-off attacks (bombings), and layered attacks will be discussed in detail, as will countermeasures including the use of personal security elements, surveillance detection and movement analysis.

    8-Hour Seminar

    Taught by Dan Mulvenna

  • We will explore in this seminar the following US terror attacks associated with international groups or ideologies: the assassination of President McKinley in 1903; the Bombing of Wall Street in 1920; Armenian terror attacks of the 1980s; the first bombing of the World Trade Center in 1993; the September 11, 2001 attacks in New York and Washington DC; and numerous other attacks, concluding with an overview of the August 12, 2021, conviction of Mark Steven Domingo for conspiracy to bomb a rally in Long Beach, California, which was motivated by revenge for Muslim terror attacks around the world.

    8-Hour Seminar

    Taught by Rusty Capps

  • Counterterrorism is not a separate discipline but a component of counterintelligence. CT operations use centuries-old counterintelligence tradecraft against terrorist and terror groups. This seminar will examine in detail those Cl tactics, including: the organization of the Cl Team; the use of elicitation and recruitment to identify and operate agents; the various forms of surveillance; the critical role played by analysis; the value of creative public awareness programs; the necessity for law enforcement personnel training; and the important role of double agents in CT operations.

    8-Hour Seminar

    Taught by Constance Huff

  • This module will present a systematic approach to recognizing the early warning signs of a terror attack and effective evasion measures.

    The Generation I approach to the terror threat:

    • Protective Security Details

    • Automatic weapons

    • Armored vehicles

    The Generation II Approach:

    • Movement, Terrain and Threat Analysis (MTA):

      • Provide information/skills necessary to conduct MTA and identify likely terror attack sites

      • Route selection to minimize exposures including random variation of routes and departure times

      • Characteristics of “Choke Points” and an ideal attack site

      • Identification of observation and firing positions and a discussion of natural concealments

      • Identification of natural or staged obstacles or barriers on critical egress or access points around the potential attack site

    • Counter-Surveillance

      • Provide skills necessary to conduct effective, discreet counter-surveillance

      • Discuss offensive techniques to uncover possible terrorist surveillance of your protectee including the selection of an “Area of Concentration”

      • Illustrate various “Bad Guys” surveillance silhouettes

      • Explain the concept of identifying a Bad Guy who is surveilling you using the method of “targeting correlation over time and distance”

      • Mistakes made by terrorist surveillants that betray them

      • The typical terrorist pre-incident intelligence collection and targeting process.

    • Attack Recognition

      • Terrorist attacks have pre-incident indicators (a “signature” or a “look”) just before the attack is initiated

      • Discuss the skills required to recognize these pre-incident indicators

      • Present examples of indicators of an upcoming terror attack

    8-Hour Seminar

    Taught by Dan Mulvenna and/or Rusty Capps

  • An overview of the laws, the definitions, and the origins of right-wing terrorism in America. We will discuss the philosophy, tactics, and threats right-wing terror groups pose to law enforcement and national security from the American Revolution to the modern era. Included in this module will be the evolution, the operations and the current threats posed by the Ku Klux Klan, the Militia Movement, the Sovereign Citizens Movement, the Army of God, the Alt-right, the January 6 assault on the US Capitol, and the remarkable increase in hate crimes against Jewish and Muslim targets globally since the October 7, 2023 terror attacks in Israel by Hamas.

    8-Hour Seminar

    Taught by Rusty Capps

4-Hour Counterterrorism Modules

  • A comprehensive examination of the evolution, theories, tactics, and operations of left-wing, Anarchist terror organizations in America. We will examine the violence associated with the organization of the labor movement in the late 19th Century, the anti-Vietnam War and Civil Rights movements of the 1960s and 70s, and conclude with the current violent threat posed by Antifa. There will also be an examination of single-issue terrorism to include the Animal Liberation Front, the Earth Liberation Front, and SHAC.

    4-Hour Seminar

    Taught by Rusty Capps

  • This module considers the theory, definitions, typologies, and evolution of the current, worldwide terror threat and its counterintelligence implications. The evolution of terrorism from early Jewish terror groups in Roman Palestine to the present; the “terror” of the French Revolution – our first example of “state terror”; the “People’s Will” of Tsarist Russia; early Anarchists; defining and examining examples of “state terror” from Lenin to Stalin to Mao; Jewish terror groups during from the end of WWII until the formation of the state of Israel in 1948.

    4-Hour Seminar

    Taught by Gina Bennett

  • This module will examine the challenges and difficulties terrorists face in preparing to conduct a terrorist assault. Using the first bombing of the World Trade Center in 1993, this module will introduce the terrorist cell that operated from the Masjid al-Farooq at 552-554 Atlantic Ave., Brooklyn, NY. It will also identify the government players from the NYPD, the FBI, and the Office of the U.S. Attorney for the Southern District of New York. It will explore in detail the planning, logistics, building of the bomb, the detonation of the bomb, the efforts of cell members to avoid arrest, the investigation of the incident, and the court proceedings against the suspects as they were taken into custody.

    4-Hour Seminar

    Taught by Rusty Capps, Gina Bennett, and/or Cindy Storer

  • This seminar will focus on significant historical events in the Middle East, including: the impact of Jewish immigration to Palestine; the formation of the Jewish State; the Israeli-Arab wars; the formation of important Palestinian/Middle Eastern terror groups; aircraft hijackings; and the evolution of Osama bin Laden and al Qaeda; the Bojinka Conspiracy; the Africa Embassy Bombings; the Millennium Attacks – Jordan, the U.S.S. Cole and LAX; the September 11, 2001 attacks; the Arab Spring and origins and growth of ISIS.

    4-Hour Seminar

    Taught by Gina Bennett

  • Inherent in every counterespionage (CE) investigation are unique complexities and decision-making processes. These stem from personal, legal, and investigative concerns and requirements. One tried and true investigative strategy used to collect evidence of betrayal and to develop new investigative leads is the sting operation, formally called a false flag. This course describes this strategy which is normally used as a last resort when a person is known or highly suspected to have engaged in espionage and is believed to be inactive. Stings imitate the real handling of spies. They provide an opportunity for suspects to reengage with someone purporting to be from the foreign intelligence entity (FIE) previously in contact with them. The course examines American counterintelligence's rich and successful history using stings. We study several of these operations from the 1980s to the 21st century: James Hall, US Army SIGINT analyst; Robert Lipka, US Army soldier assigned to NSA; GS-15 (COL, US Army Reserves) George Trofimoff, interrogator; SP4 Albert Sombolay, US Army soldier attempting to spy for Iraq during Desert Storm Gulf War; FBI Special Agent Earl Pitts, spying for the Russians; SP4 Ryan Anderson, US Army soldier attempting to spy for Al-Qaeda; Jonathan Toebbe, Dept. of the Navy civilian submarine engineer attempting to spy for Brazil; and Alexander Yuk Ching Ma, former CIA and FBI employee, spying for China.

    4-Hour Seminar

    Taught by Connie Huff

  • This module begins with an overview of the evolution of Leaderless Resistance and it defines the concept and presents the FBI profile of a Lone Wolf terrorist. It also offers several case examples of “lone wolves,” “known wolves” and “lone wolf cells.” It concludes with countermeasures for law enforcement agencies to neutralize the threat from Lone Wolf terrorists.

    4-Hour Seminar

    Taught by Rusty Capps

  • This presentation is designed to provide attendees with improved situational awareness, the ability to recognize pre-incident indicators, and how to employ simple strategies to counter a common street criminal’s attack or an attack by terrorist groups, either domestically or in one of the many high-threat areas in the world.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • The evolution, organization, and operations of the various intelligence services of the Islamic Republic of Iran and their Lebanese surrogate, Hezbollah, from the 1979 Revolution and the rise of Ayatollah Khomeini to the present. We will focus on the Iran-lraq War; Iranian/Hezbollah terror attacks worldwide; the Arab Spring's impact on Iran; the redundancy and overlay of the Iranian military/intelligence entities: the Iranian Army; the Revolutionary Guard and its Quds Force; and the Iranian Ministry of Intelligence (SAVAMA). Lastly, we will look at the current operations of Iranian Intelligence agencies in Iraq and Syria against coalition forces, ISIS and in support of the Iraqi and Syrian governments.

    4-Hour Seminar

    Taught by Rusty Capps

  • Students will be presented with the evolution of al Qaeda operations in America, the intelligence in the public domain that preceded the 9/11 attack, and an in-depth examination of Osama bin Laden to provide them with a better understanding of the successes and failures of our counterterror responses to the man and his terror group. Among the several dots of intelligence we will examine are the Soviet invasion of Afghanistan; bin Laden's involvement in that conflict in support of the Mujahadeen; the assassination of Rabbi Kahani by Islamic radicals in NYC; the first bombing of the World Trade Center in 1993; the "Bojinka Plot" and hunt for Ramzi Yousef; the CIA's monitoring of the al Qaeda meeting in Malaysia; the bombing of US embassies in Africa; Bin Laden’s life, beliefs, motivation, and the threat he represented to our national security until his death in 2011.

    4-Hour Seminar

    Taught by Gina Bennett

  • The presentation covers the evolution of the conflict in Ireland and some innovative adaptations of counterintelligence tradecraft to counterterror operations developed by the British over the 25 years of the "Troubles" in Northern Ireland. lt will explore the centuries-long conflict between Irish terrorists and the British government and examine the tactics of the Irish revolutionary and politician Michael Collins, who is frequently credited with creating modern urban terrorism.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • In this seminar, we discuss the concept of double agent operations and explore two terrorist double agents (DA).

    1. Ali Mohammad, who penetrated the US Army, FBI and CIA on orders for the al Qaeda leadership.

    2. A DA/suicide bomber operation that targeted the CIA and the Jordanian General Intelligence Department (GID) at Forward Operating Base Chapman, Khowst, Afghanistan, on 30 December 2009. The suicide bomber, Dr. Humam al-Balawi, a Jordanian, was working for the Tehrik-i-Taliban (the Taliban of Pakistan).

    This seminar defines the tradecraft of double agentry, studies various historical examples, and examines the lessons learned from these attacks.

    4-Hour Seminar

    Taught by Constance Huff

4-Hour Intelligence Modules

  • This seminar will focus on the intelligence and counterintelligence lessons to be learned from the American Revolution, including General Washington, America's first spymaster; Paul Revere and the Mechanics; Dr. Benjamin Church, America's first traitor; the Setauket, the "Culper Ring" of spies on Long Island; and MG Benedict Arnold, America's second traitor.

    4-Hour Seminar

    Taught by Constance Huff and/or Rusty Capps

  • This seminar highlights the intelligence and counterintelligence operations of both the Union and the Confederacy during the Civil War. Because the intelligence skills and lessons learned in the Revolutionary War were not made permanent, both sides in the Civil War had to reinvent intelligence collection strategies, methodologies, and tradecraft.

    4-Hour Seminar

    Taught by Constance Huff and/or Rusty Capps

  • The impact of the Industrial Revolution, anarchism, and the violence associated with the US Labor Movement on police labor squads, federal intelligence, and law enforcement agencies. The organization and early roles of the Department of Justice, Secret Service, ONI, MID, and the Bureau of Investigation. The impact of intelligence in the Spanish-American War and German intelligence and sabotage operations in the US during WWII.

    4-Hour Seminar

    Taught by Constance Huff and/or Rusty Capps

  • This seminar will focus on the following Japanese intelligence collection operations that targeted the US and our allies: the recruitment of Harry Thompson; the treason of Navy Commander John Farnsworth; the espionage case of the "Doll Lady," Velvalee Dickinson; the joint Japanese and Nazi intelligence operations in Hawaii involving the Otto Kuehn family of spies and Japanese Naval Lt. Takeo Yoshikawa; and finally the extraordinary tale of Lucille Ball's teeth and the Japanese spy who never was that became a segment of "Myth Busters.“

    4-Hour Seminar

    Taught by Rusty Capps

  • This seminar will focus on the following Nazi intelligence operations in America: The early German intelligence networks in American companies following WWI; the loss of America's second most protected secret of WWII - the Norden Bomb Sight; FBI double agent, William G. Sebold, who broke the Fritz Duquesne Spy Ring; Operation PASTORIUS and the 8 Nazi saboteurs that landed in America; the operations of the FBI's Special Intelligence Service (SIS) in Latin America; and the creation of America's second civilian intelligence service, the OSS.

    4-Hour Seminar

    Taught by Rusty Capps

  • This module will focus on the early Soviet intelligence operations in America, the Spanish Civil War; the Bonus March; the several perpetrations of the Manhattan Project, the Army Signals Security Agency’s (a predecessor of NSA) VENONA Program; early Soviet defectors; the Rosenbergs espionage network; and “the Spies that got away,” Joel Barr and Alfred Sarant, who escaped justice by defecting and for 30+ years, worked in the defense industry of the Soviet Union.

    4-Hour Seminar

    Taught by Rusty Capps

  • Anarchist attacks in America including the 1920 Anarchist bombing of Wall Street, the deadliest terror bombing until the bombing of the Murrah Federal Building in Oklahoma City in 1995, and the federal response:

    • The Palmer Red Raids

    • The impact of the world depression on espionage in America

    • The “Lawless Years” - the national crime wave of the 1930s and the federal law enforcement and Congressional responses

    • The WWI Bonus Marchers as a threat to national security

    • The “Terror” in the USSR – the defections of Soviet intelligence officers and several critical warnings missed

    • The rise of fascism in Italy and Germany and the Spanish Civil War as a prelude to WWII

    • The formation of the OSS, America’s second civilian intelligence service

    The world moves toward war and the FDR Administration reorganizes American intelligence and CI agencies. Congress passes new laws to counter the threats:

    • The Neutrality Laws

    • The Foreign Agents Registration Act; and the Smith Act

    • WWII begins in Europe on September 1, 1939, and America remains neutral.

    • December 7, 1941, Japan attacks Pearl Harbor, December 11, 1941, Germany declares war on the US, and we join the Allies in a world war on two fronts.

    4-Hour Seminar

    Taught by Rusty Capps

  • In this module we will focus on the beginnings of the Cold War; the National Security Act of 1947; the "Red Scare" and McCarthyism; the evolution of covert actions as a tool of American foreign policy, including the Bay of Pigs; Operation MONGOOSE, and CIA plots to assassinate Fidel Castro. We will also explore the USIC's failures to predict significant world events including the rise of Ayatollah Khomeini, the fall of the Berlin Wall, and the al Qaeda attacks on September 11, 2001. We will conclude with the intelligence successes that led to the raid on Abbottabad and the death of Osama bin Laden.

    4-Hour Seminar

    Taught by Gina Bennett and/or Rusty Capps

  • This module is a follow-on to - From the Cold War to the War on Terror: 1945 – 2011. It will be taught by a senior, former CIA all-source analyst who was intimately involved in the raid on Abbottabad that resulted in the death of Osama bin Laden and the period following, including the Arab Spring, the rise and fall of ISIS, and the US withdrawal from Afghanistan.

    In this module, students explore the typical lifecycle of terrorism to better anticipate the emergence and resurgence of socio-political violence of a scale that would require a USG response. The complex and diverse national security challenges posed by an increasingly interconnected global environment demand efficient use of limited, and costly, Intelligence resources. We will explore the stages of terrorism, agnostic of ideology, and discover the most effective sources of indicators along the lifecycle, as well as how to build important collaboration and partnerships to create more seamless coverage. Anticipating the disruptive impact of terrorism on otherwise more important or strategic intelligence efforts is a critical part of the IC’s warning mission.

    4-Hour Seminar

    Taught by Gina Bennett

  • Ethical approaches to the use of intelligence are the responsibility of everyone in the IC. The potential for adverse, long-term consequences of short-term, well-intended decisions is unavoidable. By using an ethical process for decision-making, we can reduce the severity and surprise of such unintended outcomes. In this module, we will examine a four-part ethical decision-making cycle designed specifically for the Intelligence profession. We will also practice with past and future case studies to become more familiar with the process. By understanding how to apply classical ethical frameworks and identify key paradigm tensions, participants will be better equipped to communicate and make good decisions when faced with bad options.

    4-Hour Seminar

    Taught by Gina Bennett

  • This course introduces students to the field of intelligence, particularly as practiced in the United States. After a brief overview of the historical foundations of modern intelligence, it discusses how intelligence is conducted including collection, analysis, counterintelligence, covert action, and oversight. It also discusses intelligence ethics, as well as the disruptive influences of September 11, new technologies, and emerging social trends.

    4-Hour Seminar

    Taught by Cindy Storer

  • An overview of the espionage cases, the foreign intelligence officers, and the traitors who operated in our nation’s Capital, in and around Ft. Meade and rural Maryland and in Northern Virginia.

    4-Hour Seminar

    Taught by Constance Huff and/or Rusty Capps

  • In 1862, Frederick Douglass wrote: "The true history of this war [Civil War] will show that the loyal army found no friends at the South so faithful, active, and daring in their efforts to sustain the government as the Negroes. Negroes have repeatedly threaded their way through the lines of the rebels exposing themselves to bullets to convey important information to the loyal army of the Potomac."

    African Americans have taken an incredible, and mostly unknown, overlooked, or understated, journey from the 18th Century into the intelligence world of the 21st Century. This course highlights interesting cases demonstrating race and gender implications, motivations, risk-taking, sacrifices, contributions, and accomplishments of African Americans throughout our intelligence and nation's history. We discuss intelligence tradecraft and collection techniques that were developed without the benefit of training or mentoring from intelligence professionals and daring feats as spies (both for and against America) and as double agents. The course reveals significant cryptologic contributions during peace and war. This presentation celebrates the courage, dedication, and personal commitment African Americans made in securing the freedom of a people, but also in securing and sustaining America's freedom.

    4-Hour Seminar

    Taught by Constance Huff

  • “Therein lies the fascination with espionage—the weird mixture of high endeavor and sordid treachery, cleverness and stupidity, bravery and cowardice, to be found among agents and spies of both sexes.” —E.H. Cookridge, Sisters of Delilah

    Since the beginning of recorded history, women have been spies, traitors, heroines, saboteurs, terrorists, and espionage enablers. An ancient Indian philosopher and strategist, Kautilya, wrote in the 4th Century BC about using women as spies because of their ability to be unnoticed, to be nonthreatening, and to blend into the world of men because of gender expectations. Universal stereotypes make women very effective weapons in the world of intelligence and espionage. Few have studied and fewer still appreciate the contributions of women in this field. This course introduces attendees to capable, cunning, and dedicated spies and heroines, some of whom made the ultimate sacrifice, from pre-Biblical times to the present 21st Century. We explore motivations, risk-taking, sacrifices, accomplishments and failures of women while debunking myths and the glamorization of the stereotypical female spy Mata Hari. Join us in the journey of significant contributions to the history of intelligence and espionage by women like Ana Montes, Ethel Rosenberg, Rose Greenhow, Lydia Darragh, Sara Edmonds, Virginia Hall, Ruth Werner, Lona Cohen, and many others.

    4-Hour Seminar

    Taught by Connie Huff

  • This presentation will explore both current and past threats to our nation’s economic security, including the following topics:

    • Industrial espionage by foreign companies

    • Target of US intellectual property by the intelligence services of China, Russia, other adversaries, and some allies

    • Recent cases prosecuted by DOJ using the Economic Espionage Law of 1996

    4-Hour Seminar

    Taught by Connie Huff

  • This seminar explores the evolution of cryptology, identifying and discussing the critical importance of ciphers, codes, cryptanalysis, and invisible ink in diplomacy and conflicts from the American Revolution to the present. We will discuss the impact and lessons learned from both our cryptologic successes and our failures.

    4-Hour Seminar

    Taught by Connie Huff

  • In Russian, активные мероприятия, is a term used to describe political warfare conducted by the Soviet Union and the Russian Federation. The term dates to the 1920s and includes espionage, propaganda, sabotage, and assassination operations. The mission goals of AM are based on foreign policy objectives of the Soviet and Russian governments and (continued) today to be run by the Putin government.

    From its beginning, the USSR required a powerful intelligence and security organization to collect HUMINT and conduct operations to exert influence, mislead, disrupt, and weaken the foreign policies of their numerous adversaries. The SVR, FSB, and GRU, continue to excel at classic intelligence collection operations, but this mission is frequently subordinated to the chief goal of soviet intelligence agencies – the subversion of adversaries, through the implementation of AM.

    Active measures are both the overt and covert tactics of political warfare and include: the creation and funding of front groups and organizations: overt and covert media manipulation; disinformation: forgeries; the infiltration of political parties, advocacy organizations, and movements; the “Kompromat” of officers of adversarial governments and their occasional assassinations. Modern advances in technology, cyber capabilities, the use of Hacker proxies, and the expansion of social media have only increased the reach, speed, and impact of AM operations.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • An overview of NSA’s British partner – GCHQ, the UK’s SIGINT service. Beginning with GCHQ operations in WWII we will examine the following: GCHQ’s VENONA operations; the Five Eyes and CAZAB cooperation between English-speaking intelligence services; examples of how British SIGINT has assisted senior police officers in their decision-making process; and current British SIGINT collection operations against Islamist Extremists. We will also name several recently identified Soviet spies until recently known only by their VENONA code names.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • A highly classified “forum” in which the most senior counterintelligence leadership of the intelligence services of Canada, Australia, New Zealand, the United States, and Great Britain met periodically to exchange/discuss the latest information and cooperate relating to KGB and GRU operational activities. Created in 1964 by James Angleton, then the Central Intelligence Agency’s chief of counterintelligence, the service’s leadership met periodically in secure locations in their respective countries.

    Coordinated counterintelligence programs and activities, both jointly and individually, were carried out by indoctrinated, compartmented operational personnel in each service. Indoctrination into this exclusive group was governed by strict rules. Proposed candidates were screened by all five services. A single “blackball” objection from any service was sufficient to exclude any candidate. CAZAB’s existence was revealed publicly for the first time by senior MI5 officer Peter Wright in his 1986 book Spy Catcher.

    Subsequently, slightly more was revealed by Stella Remington, a former Chief of MI5, in her memoir Open Secret. The name CAZAB was subsequently changed. Presented by a CAZAB-indoctrinated operational officer, this presentation will take you inside CAZAB and detail a number of their counterespionage operations targeting the Russian services.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • This overview presentation is based on a broad array of Russian sources, including interviews with both KGB defectors and retired KGB intelligence officers. It is also documented by the Official History of Russian Foreign Intelligence [Five volumes; Published 2003]; “The History of Soviet State Security Organs” published by the KGB F.E. Dzerzhinskiy Red Banner Higher School in 1977, classified TOP SECRET, and “The Mitrokhin Archive”, a vast collection of classified KGB documents smuggled out of Russian in 1992, with MI6 assistance, by the defecting KGB Chief Archivist, Col. Vasilie Mitrokhin.

    In addition to these Russian documents and memoirs, this seminar is further augmented by the presenter’s detailed interviews of a number of IOs who served in the KGB elements discussed and/or were involved in the described activities and operations. In particular, the presentation will focus on the activities/operations and personnel of the little-known but important Group North, and the Coordination Unit of Directorate K, both of which directly targeted the “Main Adversary, ” (US intelligence agencies) and our allied intelligence service with recruitment operations, Double Agents, and Operational Games.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • This course will examine the impact of intelligence on the conduct of war by nation-states. It will explore the role of intelligence in the preparation, conduct, and cessation of armed conflict. The course traces the evolution of modern military organizations and the use of intelligence in their past success and failures. It will consider the strengths and weaknesses of the various intelligence collection disciplines on the conduct of military operations and seek to understand how factors other than intelligence can affect the decision-making process.

    4-Hour Seminar

    Taught by Cindy Storer

  • Focus on the operational doctrine of the Russian intelligence services that target Western intelligence agencies - “Operativnaya Ingra” (Aggressive” Operational Games”). Participants will study both Russian and Western CI doctrine and tradecraft, including a series of inter-related Soviet intelligence operations involving the recruitment and handling of “penetrations” (Moles), double agents, and recruited agents.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • This module will focus on the Russian Intelligence Services’ long use of illegals in foreign espionage operations. The concept of the illegal intelligence officer will be defined, placed in a historical context, and described in detail using a wide variety of case examples. Module topics: the profile of an illegal, their mission, training, targeting, and field COVCOM; the role of “the Centre” (SVRHQ in Moscow) in illegal operations; the role of the “Rezidentura” in Russian embassies; the evolution of illegal tradecraft, agent handling, communications with the Centre and support from Line N officers; the vulnerabilities of the illegal, including historical tradecraft and operational failures.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • This presentation will explore the cases of Aldrich Ames, Brian Kelley, Felix Bloch, and Robert Hanssen investigations. After the arrest of AMES (a KGB spy inside CIA) in Feb 1994, it became apparent that there was at least one more “penetration” of the USIC. This module will discuss the initially misguided counterintelligence operations by the FBI which eventually identified Robert Hanssen, an FBI agent, and one of the most damaging KGB penetrations of the USIC, as that mole.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • This seminar will present a general overview of the Chinese espionage threat to the US, the organization of their intelligence services, their intelligence doctrine and tactics. It will then pivot to focus on the Los Angeles FBI’s Chinese-American double agent, Katrina Leung, her access, her recruitment by the FBI, her intimate involvement with two senior FBI counterintelligence agents and the court cases that followed her unmasking as a Chinese agent.

    4-Hour Seminar

    Taught by Dan Mulvenna

  • “The Cuban intelligence service has always been against the United States. Exclusively. All the other countries where they work, they do it to direct the activity against the United States.” - 1982 Senate Testimony, Gerardo Peraza, Cuban Defector

    Beginning in January 1959 when Fidel Castro seized power in Cuba to the present day, the Cuban Directorate of Intelligence (DI) (formerly DGI) has had one dedicated intelligence target: America. This course introduces the Cuban intelligence service through penetrations of America’s intelligence apparatus and government entities by spies and double agents, and studies America’s counterintelligence responses to this threat. We will discuss recruitment techniques, tradecraft, and missions, illustrated by rich case examples. The Cubans successfully used illegal agents embedded in our society to spot, assess, and target Americans, as well as collect intelligence. The DI has proven its mettle through several long-term penetrations of the US Government and military such as Ana Belen Montes; Kendall Myers; and a stable of dozens of double agents who tied up valuable American intelligence resources, time, and manpower for over two decades. They have been successful with their Active Measures Department whose goal is the manipulation of worldwide public opinion. Case examples demonstrate the dedication, professionalism, and capabilities of this historically underestimated intelligence service when conducting espionage against our nation.

    4-Hour Seminar

    Taught by Constance Huff

  • A review of the Hanssen case from a “lessons learned” perspective focusing on previously unexplained details of the tradecraft he used from the late 1970s until his arrest in 2001, the massive damage to US National Security he caused, and the FBI tradecraft used to identify, arrest and obtain his guilty plea.

    4-Hour Seminar

    Taught by Constance Huff

  • In Oct 1974 Colonel Oleg Gordievsky began spying for MI6. Nine years later he was recalled to Moscow from London where he had been acting chief of the KGB's Rezidentura. In May 1985, he reluctantly returned to Russia and received an extremely hostile reception from the KGB. His apartment had been searched, he was drugged, subjected to lengthy interrogations, but refused to confess. He was able to fly a distress signal to his M16 handlers, which activated a complex exfiltration plan. This module will discuss in detail what happened next!

    4-Hour Seminar

    Taught by Dan Mulvenna

  • This presentation provides an overview of the most damaging US spy cases over the last 4 decades. Each case will focus on: his or her motivations; agent handling and tradecraft utilized by the adversary service; how the traitor was discovered; security failures and lessons learned; and finally, an assessment of damage done to our national security.

    4-Hour Seminar

    Taught by Dan Mulvenna