
Available Courses
8-Hour Counterterrorism Modules
-
We will explore in this seminar the following US terror attacks associated with international groups or ideologies: the assassination of President McKinley in 1903; the Bombing of Wall Street in 1920; Armenian terror attacks of the 1980s; the first bombing of the World Trade Center in 1993; the September 11, 2001 attacks in New York and Washington DC; and numerous other attacks, concluding with an overview of the August 12, 2021, conviction of Mark Steven Domingo for conspiracy to bomb a rally in Long Beach, California, which was motivated by revenge for Muslim terror attacks around the world.
8-Hour Seminar
Taught by Constance Huff
-
Counterterrorism is not a separate discipline but a component of counterintelligence. CT operations use centuries-old counterintelligence tradecraft against terrorist and terror groups. This seminar will examine in detail those Cl tactics, including: the organization of the Cl Team; the use of elicitation and recruitment to identify and operate agents; the various forms of surveillance; the critical role played by analysis; the value of creative public awareness programs; the necessity for law enforcement personnel training; and the important role of double agents in CT operations.
8-Hour Seminar
Taught by Constance Huff
4-Hour Counterterrorism Modules
-
This module considers the theory, definitions, typologies, and evolution of the current, worldwide terror threat and its counterintelligence implications. The evolution of terrorism from early Jewish terror groups in Roman Palestine to the present; the “terror” of the French Revolution – our first example of “state terror”; the “People’s Will” of Tsarist Russia; early Anarchists; defining and examining examples of “state terror” from Lenin to Stalin to Mao; Jewish terror groups during from the end of WWII until the formation of the state of Israel in 1948.
4-Hour Seminar
Taught by Gina Bennett
-
This module will examine the challenges and difficulties terrorists face in preparing to conduct a terrorist assault. Using the first bombing of the World Trade Center in 1993, this module will introduce the terrorist cell that operated from the Masjid al-Farooq at 552-554 Atlantic Ave., Brooklyn, NY. It will also identify the government players from the NYPD, the FBI, and the Office of the U.S. Attorney for the Southern District of New York. It will explore in detail the planning, logistics, building of the bomb, the detonation of the bomb, the efforts of cell members to avoid arrest, the investigation of the incident, and the court proceedings against the suspects as they were taken into custody.
4-Hour Seminar
Taught by Gina Bennett, and/or Cindy Storer
-
This seminar will focus on significant historical events in the Middle East, including: the impact of Jewish immigration to Palestine; the formation of the Jewish State; the Israeli-Arab wars; the formation of important Palestinian/Middle Eastern terror groups; aircraft hijackings; and the evolution of Osama bin Laden and al Qaeda; the Bojinka Conspiracy; the Africa Embassy Bombings; the Millennium Attacks – Jordan, the U.S.S. Cole and LAX; the September 11, 2001 attacks; the Arab Spring and origins and growth of ISIS.
4-Hour Seminar
Taught by Gina Bennett
-
Inherent in every counterespionage (CE) investigation are unique complexities and decision-making processes. These stem from personal, legal, and investigative concerns and requirements. One tried and true investigative strategy used to collect evidence of betrayal and to develop new investigative leads is the sting operation, formally called a false flag. This course describes this strategy which is normally used as a last resort when a person is known or highly suspected to have engaged in espionage and is believed to be inactive. Stings imitate the real handling of spies. They provide an opportunity for suspects to reengage with someone purporting to be from the foreign intelligence entity (FIE) previously in contact with them. The course examines American counterintelligence's rich and successful history using stings. We study several of these operations from the 1980s to the 21st century: James Hall, US Army SIGINT analyst; Robert Lipka, US Army soldier assigned to NSA; GS-15 (COL, US Army Reserves) George Trofimoff, interrogator; SP4 Albert Sombolay, US Army soldier attempting to spy for Iraq during Desert Storm Gulf War; FBI Special Agent Earl Pitts, spying for the Russians; SP4 Ryan Anderson, US Army soldier attempting to spy for Al-Qaeda; Jonathan Toebbe, Dept. of the Navy civilian submarine engineer attempting to spy for Brazil; and Alexander Yuk Ching Ma, former CIA and FBI employee, spying for China.
4-Hour Seminar
Taught by Constance Huff
-
The evolution, organization, and operations of the various intelligence services of the Islamic Republic of Iran and their Lebanese surrogate, Hezbollah, from the 1979 Revolution and the rise of Ayatollah Khomeini to the present. We will focus on the Iran-lraq War; Iranian/Hezbollah terror attacks worldwide; the Arab Spring's impact on Iran; the redundancy and overlay of the Iranian military/intelligence entities: the Iranian Army; the Revolutionary Guard and its Quds Force; and the Iranian Ministry of Intelligence (SAVAMA). Lastly, we will look at the current operations of Iranian Intelligence agencies in Iraq and Syria against coalition forces, ISIS and in support of the Iraqi and Syrian governments.
4-Hour Seminar
Taught by Cindy Storer
-
Students will be presented with the evolution of al Qaeda operations in America, the intelligence in the public domain that preceded the 9/11 attack, and an in-depth examination of Osama bin Laden to provide them with a better understanding of the successes and failures of our counterterror responses to the man and his terror group. Among the several dots of intelligence we will examine are the Soviet invasion of Afghanistan; bin Laden's involvement in that conflict in support of the Mujahadeen; the assassination of Rabbi Kahani by Islamic radicals in NYC; the first bombing of the World Trade Center in 1993; the "Bojinka Plot" and hunt for Ramzi Yousef; the CIA's monitoring of the al Qaeda meeting in Malaysia; the bombing of US embassies in Africa; Bin Laden’s life, beliefs, motivation, and the threat he represented to our national security until his death in 2011.
4-Hour Seminar
Taught by Gina Bennett
-
In this seminar, we discuss the concept of double agent operations and explore two terrorist double agents (DA).
Ali Mohammad, who penetrated the US Army, FBI and CIA on orders for the al Qaeda leadership.
A DA/suicide bomber operation that targeted the CIA and the Jordanian General Intelligence Department (GID) at Forward Operating Base Chapman, Khowst, Afghanistan, on 30 December 2009. The suicide bomber, Dr. Humam al-Balawi, a Jordanian, was working for the Tehrik-i-Taliban (the Taliban of Pakistan).
This seminar defines the tradecraft of double agentry, studies various historical examples, and examines the lessons learned from these attacks.
4-Hour Seminar
Taught by Constance Huff
4-Hour CI and Intelligence Modules
-
This seminar will focus on the intelligence and counterintelligence lessons to be learned from the American Revolution, including General Washington, America's first spymaster; Paul Revere and the Mechanics; Dr. Benjamin Church, America's first traitor; the Setauket, the "Culper Ring" of spies on Long Island; and MG Benedict Arnold, America's second traitor.
4-Hour Seminar
Taught by Constance Huff
-
This seminar highlights the intelligence and counterintelligence operations of both the Union and the Confederacy during the Civil War. Because the intelligence skills and lessons learned in the Revolutionary War were not made permanent, both sides in the Civil War had to reinvent intelligence collection strategies, methodologies, and tradecraft.
4-Hour Seminar
Taught by Constance Huff
-
The impact of the Industrial Revolution, anarchism, and the violence associated with the US Labor Movement on police labor squads, federal intelligence, and law enforcement agencies. The organization and early roles of the Department of Justice, Secret Service, ONI, MID, and the Bureau of Investigation. The impact of intelligence in the Spanish-American War and German intelligence and sabotage operations in the US during WWII.
4-Hour Seminar
Taught by Constance Huff
-
This seminar will focus on the following Japanese intelligence collection operations that targeted the US and our allies: the recruitment of Harry Thompson; the treason of Navy Commander John Farnsworth; the espionage case of the "Doll Lady," Velvalee Dickinson; the joint Japanese and Nazi intelligence operations in Hawaii involving the Otto Kuehn family of spies and Japanese Naval Lt. Takeo Yoshikawa; and finally the extraordinary tale of Lucille Ball's teeth and the Japanese spy who never was that became a segment of "Myth Busters.“
4-Hour Seminar
Taught by Michael Coyne
-
This seminar will focus on the following Nazi intelligence operations in America: The early German intelligence networks in American companies following WWI; the loss of America's second most protected secret of WWII - the Norden Bomb Sight; FBI double agent, William G. Sebold, who broke the Fritz Duquesne Spy Ring; Operation PASTORIUS and the 8 Nazi saboteurs that landed in America; the operations of the FBI's Special Intelligence Service (SIS) in Latin America; and the creation of America's second civilian intelligence service, the OSS.
4-Hour Seminar
Taught by Michael Coyne
-
This module will focus on the early Soviet intelligence operations in America, the Spanish Civil War; the Bonus March; the several perpetrations of the Manhattan Project, the Army Signals Security Agency’s (a predecessor of NSA) VENONA Program; early Soviet defectors; the Rosenbergs espionage network; and “the Spies that got away,” Joel Barr and Alfred Sarant, who escaped justice by defecting and for 30+ years, worked in the defense industry of the Soviet Union.
4-Hour Seminar
Taught by Constance Huff
-
In this module we will focus on the beginnings of the Cold War; the National Security Act of 1947; the "Red Scare" and McCarthyism; the evolution of covert actions as a tool of American foreign policy, including the Bay of Pigs; Operation MONGOOSE, and CIA plots to assassinate Fidel Castro. We will also explore the USIC's failures to predict significant world events including the rise of Ayatollah Khomeini, the fall of the Berlin Wall, and the al Qaeda attacks on September 11, 2001. We will conclude with the intelligence successes that led to the raid on Abbottabad and the death of Osama bin Laden.
4-Hour Seminar
Taught by Gina Bennett
-
This module is a follow-on to - From the Cold War to the War on Terror: 1945 – 2011. It will be taught by a senior, former CIA all-source analyst who was intimately involved in the raid on Abbottabad that resulted in the death of Osama bin Laden and the period following, including the Arab Spring, the rise and fall of ISIS, and the US withdrawal from Afghanistan.
In this module, students explore the typical lifecycle of terrorism to better anticipate the emergence and resurgence of socio-political violence of a scale that would require a USG response. The complex and diverse national security challenges posed by an increasingly interconnected global environment demand efficient use of limited, and costly, Intelligence resources. We will explore the stages of terrorism, agnostic of ideology, and discover the most effective sources of indicators along the lifecycle, as well as how to build important collaboration and partnerships to create more seamless coverage. Anticipating the disruptive impact of terrorism on otherwise more important or strategic intelligence efforts is a critical part of the IC’s warning mission.
4-Hour Seminar
Taught by Gina Bennett
-
Ethical approaches to the use of intelligence are the responsibility of everyone in the IC. The potential for adverse, long-term consequences of short-term, well-intended decisions is unavoidable. By using an ethical process for decision-making, we can reduce the severity and surprise of such unintended outcomes. In this module, we will examine a four-part ethical decision-making cycle designed specifically for the Intelligence profession. We will also practice with past and future case studies to become more familiar with the process. By understanding how to apply classical ethical frameworks and identify key paradigm tensions, participants will be better equipped to communicate and make good decisions when faced with bad options.
4-Hour Seminar
Taught by Gina Bennett
-
This course introduces students to the field of intelligence, particularly as practiced in the United States. After a brief overview of the historical foundations of modern intelligence, it discusses how intelligence is conducted including collection, analysis, counterintelligence, covert action, and oversight. It also discusses intelligence ethics, as well as the disruptive influences of September 11, new technologies, and emerging social trends.
4-Hour Seminar
Taught by Cindy Storer
-
An overview of the espionage cases, the foreign intelligence officers, and the traitors who operated in our nation’s Capital, in and around Ft. Meade and rural Maryland and in Northern Virginia.
4-Hour Seminar
Taught by Constance Huff
-
In 1862, Frederick Douglass wrote: "The true history of this war [Civil War] will show that the loyal army found no friends at the South so faithful, active, and daring in their efforts to sustain the government as the Negroes. Negroes have repeatedly threaded their way through the lines of the rebels exposing themselves to bullets to convey important information to the loyal army of the Potomac."
African Americans have taken an incredible, and mostly unknown, overlooked, or understated, journey from the 18th Century into the intelligence world of the 21st Century. This course highlights interesting cases demonstrating race and gender implications, motivations, risk-taking, sacrifices, contributions, and accomplishments of African Americans throughout our intelligence and nation's history. We discuss intelligence tradecraft and collection techniques that were developed without the benefit of training or mentoring from intelligence professionals and daring feats as spies (both for and against America) and as double agents. The course reveals significant cryptologic contributions during peace and war. This presentation celebrates the courage, dedication, and personal commitment African Americans made in securing the freedom of a people, but also in securing and sustaining America's freedom.
4-Hour Seminar
Taught by Constance Huff
-
“Therein lies the fascination with espionage—the weird mixture of high endeavor and sordid treachery, cleverness and stupidity, bravery and cowardice, to be found among agents and spies of both sexes.” —E.H. Cookridge, Sisters of Delilah
Since the beginning of recorded history, women have been spies, traitors, heroines, saboteurs, terrorists, and espionage enablers. An ancient Indian philosopher and strategist, Kautilya, wrote in the 4th Century BC about using women as spies because of their ability to be unnoticed, to be nonthreatening, and to blend into the world of men because of gender expectations. Universal stereotypes make women very effective weapons in the world of intelligence and espionage. Few have studied and fewer still appreciate the contributions of women in this field. This course introduces attendees to capable, cunning, and dedicated spies and heroines, some of whom made the ultimate sacrifice, from pre-Biblical times to the present 21st Century. We explore motivations, risk-taking, sacrifices, accomplishments and failures of women while debunking myths and the glamorization of the stereotypical female spy Mata Hari. Join us in the journey of significant contributions to the history of intelligence and espionage by women like Ana Montes, Ethel Rosenberg, Rose Greenhow, Lydia Darragh, Sara Edmonds, Virginia Hall, Ruth Werner, Lona Cohen, and many others.
4-Hour Seminar
Taught by Constance Huff
-
This presentation will explore both current and past threats to our nation’s economic security, including the following topics:
Industrial espionage by foreign companies
Target of US intellectual property by the intelligence services of China, Russia, other adversaries, and some allies
Recent cases prosecuted by DOJ using the Economic Espionage Law of 1996
4-Hour Seminar
Taught by Constance Huff
-
This seminar explores the evolution of cryptology, identifying and discussing the critical importance of ciphers, codes, cryptanalysis, and invisible ink in diplomacy and conflicts from the American Revolution to the present. We will discuss the impact and lessons learned from both our cryptologic successes and our failures.
4-Hour Seminar
Taught by Constance Huff
-
This course will examine the impact of intelligence on the conduct of war by nation-states. It will explore the role of intelligence in the preparation, conduct, and cessation of armed conflict. The course traces the evolution of modern military organizations and the use of intelligence in their past success and failures. It will consider the strengths and weaknesses of the various intelligence collection disciplines on the conduct of military operations and seek to understand how factors other than intelligence can affect the decision-making process.
4-Hour Seminar
Taught by Cindy Storer
-
Focus on the operational doctrine of the Russian intelligence services that target Western intelligence agencies - “Operativnaya Ingra” (Aggressive” Operational Games”). Participants will study both Russian and Western CI doctrine and tradecraft, including a series of inter-related Soviet intelligence operations involving the recruitment and handling of “penetrations” (Moles), double agents, and recruited agents.
4-Hour Seminar
Taught by Constance Huff
-
This seminar will present a general overview of the Chinese espionage threat to the US, the organization of their intelligence services, their intelligence doctrine and tactics. It will then pivot to focus on the Los Angeles FBI’s Chinese-American double agent, Katrina Leung, her access, her recruitment by the FBI, her intimate involvement with two senior FBI counterintelligence agents and the court cases that followed her unmasking as a Chinese agent.
4-Hour Seminar
Taught by Constance Huff
-
“The Cuban intelligence service has always been against the United States. Exclusively. All the other countries where they work, they do it to direct the activity against the United States.” - 1982 Senate Testimony, Gerardo Peraza, Cuban Defector
Beginning in January 1959 when Fidel Castro seized power in Cuba to the present day, the Cuban Directorate of Intelligence (DI) (formerly DGI) has had one dedicated intelligence target: America. This course introduces the Cuban intelligence service through penetrations of America’s intelligence apparatus and government entities by spies and double agents, and studies America’s counterintelligence responses to this threat. We will discuss recruitment techniques, tradecraft, and missions, illustrated by rich case examples. The Cubans successfully used illegal agents embedded in our society to spot, assess, and target Americans, as well as collect intelligence. The DI has proven its mettle through several long-term penetrations of the US Government and military such as Ana Belen Montes; Kendall Myers; and a stable of dozens of double agents who tied up valuable American intelligence resources, time, and manpower for over two decades. They have been successful with their Active Measures Department whose goal is the manipulation of worldwide public opinion. Case examples demonstrate the dedication, professionalism, and capabilities of this historically underestimated intelligence service when conducting espionage against our nation.
4-Hour Seminar
Taught by Constance Huff
-
A review of the Hanssen case from a “lessons learned” perspective focusing on previously unexplained details of the tradecraft he used from the late 1970s until his arrest in 2001, the massive damage to US National Security he caused, and the FBI tradecraft used to identify, arrest and obtain his guilty plea.
4-Hour Seminar
Taught by Constance Huff
-
This presentation provides an overview of the most damaging US spy cases over the last 4 decades. Each case will focus on: his or her motivations; agent handling and tradecraft utilized by the adversary service; how the traitor was discovered; security failures and lessons learned; and finally, an assessment of damage done to our national security.
4-Hour Seminar
Taught by Constance Huff
-
This 4-hour seminar examines the diverse threats to U.S. national security posed by countries that often receive less public attention but have a proven track record of successful operations. Using a 10-point framework to assess the capabilities of adversary intelligence services, we explore the current threats from nations such as India, Pakistan, Rwanda, South Africa, Venezuela, and others beyond the traditional “big five” (China, Russia, Iran, North Korea, and Cuba). Topics include their activities in traditional espionage, foreign malign influence (FMI), transnational repression (TNR), targeting dissidents in the U.S., and other violations that require response from the U.S. Counterintelligence community and law enforcement. The course features numerous real-world examples illustrating these ongoing threats.
4-Hour Seminar
Taught by Michael Coyne
-
This 4-hour seminar explores the evolution of U.S. counterintelligence (CI) through four distinct historical periods:
The First Era (1916–1940): America’s entry into multipolar rivalry, marked by the initial expansion of CI following events like the sabotage of Black Tom Island, NJ.
The Second Era (1940–1991): The bipolar strategic competition of the Cold War era.
The Third Era (1991–mid-2010s): The age of American global dominance.
The Fourth Era (early-2010s to present): A renewed multipolar rivalry.
Participants will analyze how CI capabilities, organizations, policies, laws, and missions have evolved across these periods in response to shifting foreign intelligence threats. Special emphasis is placed on comparing the capabilities of U.S. CI efforts with those of our adversaries, highlighting key differences and ongoing challenges.
4-Hour Seminar
Taught by Michael Coyne
-
This 4-hour seminar analyzes key scholarly, literary, and historical works to deepen understanding of the U.S. intelligence community (USIC), its evolution, and major foreign adversaries. The course examines these works along three axes: their place in the broader arc of history, their enduring relevance, and their significance in explaining agency functions and interactions. Emphasizing a blend of recent publications and older, underappreciated works, the seminar offers valuable insights for contemporary CI practitioners seeking a comprehensive perspective on the field’s foundational and evolving concepts.
4-Hour Seminar
Taught by Michael Coyne
-
“In many cases, the symptoms of this crisis (espionage) have been observable,identifiable, and even treatable before the damage was done.”
Exploring the Mind of the Spy , Dr. Mike Gelles, NCIS
This 4-hour course reviews several studies, to include SLAMMER, by psychologists, psychiatrists, and CI practitioners who have explored the motivations, rationales, and justifications of those who have betrayed their country, organizations, family, friends, and colleagues. Leakage, which consists of signs of anomalies and changes in behavior and lifestyle, often was noticed by colleagues but not recognized as possible indicators that a person may be contemplating betrayal until after an arrest was made. Personality traits, access, motivations, and life crises have been described as a “complexity of motivational and psychosocial factors that intersect at just the wrong time to result in espionage. ” Weaving these insights into myriad spy cases, we strive to enlighten attendees to the complex psychological stressors, decision making processes to betray, and demonstrate that motivations are a combination of intrinsic and extrinsic factors unique to each spy. We help answer the question: What does this mean to us as employees, investigators, adjudicators, analysts, CI and security officers, and managers?
4-Hour Seminar
Taught by Constance Huff