BEHAVIOURAL ANALYSIS WEEK 2020 ONLINE
We are delighted to announce our programme for Behavioural Analysis Week Online 2020.
Please note that all timings are based on British Summer Time (BST). That said, almost all presentations will be recorded and accessible to registered delegates for a period of two weeks following the conference’s conclusion. This will facilitate delegates viewing all presentations, wherever their geographical location, at a time convenient to their time zone.
Day One: Monday 5 October 2020
11:00-13:00 Session Theme: Industry Experience

Prof. Paul Gill, Professor of Security and Crime Science, University College London, UK
Behavioural analysis is part and parcel of everyday life. It is a discipline embraced in organisational management, town planning and, extensively, within the healthcare sector. Our focus is on its benefits in safeguarding our society from the variety of threats we face from those with negative intent. This keynote address provides a scene-setter for the conference outlining the emotional responses of hostiles when planning and preparing a hostile act. Military tactics would dictate that we only win our security battles by understanding the nature of the enemy and by adapting our responses to the battlefield. That battlefield, for our delegates, may be civilian crowded places, transportation hubs, tourist attractions, sports stadia, places of worship and other public venues.
Security Perspective 1: Behavioural Analysis: the United Kingdom’s perspective Dr Sarah Knight, Principal Senior Psychologist, DSTL, UK
The United Kingdom government, through various departments – including the Department for Transport, Centre for Protection of the National Infrastructure and the Home Office – has been researching how behavioural analysis can contribute to the security of different environments. It is anticipated that a guidance paper will be published by Her Majesty’s Government (prior to the commencement of the conference) outlining what capabilities organisations should have in place and what demands should be made of suppliers. This presentation will outline the rationale behind the research and highlight some of the most significant elements of it.
Behavioural Analysis at the CoalfaceHow have different industries gone about utilising behavioural analysis techniques to protect their patrons and infrastructure? What are the lessons learned that impact current deployment and staff recruitment and training?
- Operational Angle 1: Senedd Cymru/Welsh Parliament
Stephen Carr, Head of Organisational Development, Senedd Cymru/Welsh Parliament, Wales
- Operational Angle 2: Eurovision Song Contest
- Operational Angle 3: Casino Security
Sarina Persall, Director of Security, Crown Melbourne Limited, Australia
Panel Q&A
15:00-16:30 Session Theme: Behavioural Analysis in the Spotlight
Academic Paper 1: Non-Verbal Behaviour: a scientific panorama
Prof.Pierrich Plusquellec, Professeur, Faculté des Arts et Sciences, Universite de Montreal, Canada
This overview of the science of non-verbal behaviour will set out the different forms of non-verbal communication and describe the link between non-verbal indicators and the emotional state of the person being observed. It will provide an understanding of what we can really identify in people’s non-verbal communication and set out what science can tell us about the link between non-verbal behaviours and the security threat a person might pose.
Academic Paper 2: Does Pinocchio’s Nose Actually Exist?: distilling myth from fact in the area of deception detection Prof. Gordon Wright, Goldsmiths University of London, UK
Much is written about the way in which we can identify somebody trying to deceive us by their expression, but are we identifying the liar or simply a person who may be experiencing stress? Gaze, lip shape and facial touches may be subject to evaluation, but can micro-expressions truly indicate guilt?
Panel Q&A
17:00-17:45 Session Theme: Keynote 2

Depending on where you are in the world, this stand-alone presentation, given by one of the world’s most renowned and respected behavioural analysts will whet your appetite for dinner or energise you for the day ahead! Live from California, the organisers of Behavioural Analysis 2020 are delighted to welcome to the programme Dr. David Matsumoto.
Behavioural analysis programmes and research have only begun to acknowledge the full complexity of behaviour, especially expressive behaviour. Dr. Matsumoto suggests we should engage it. This complexity includes the sophistication of human anatomy and physiology, the existence of multiple mental states, the complicated neural circuitry that connects mental states to anatomy, cross-associations between verbal and non-verbal behaviour, and the various functions of behaviour. This keynote address will provide a review of these issues based on latest research findings across broad spectrums of science, and argue for incorporation of more comprehensive views of behaviour and analysis for both science and application that spans multiple modalities
Day Two: Tuesday 6 October 2020
09:30-11:00 Session Theme: In the Mind of the Profiler
Moderator’s Opening Remarks
Security Perspective 2: The Halo Effect: good looking people and women are innocent! Diana Nowek, Training & Research, Institute of Nonverbal Communication, Austria
Whilst many critics of behavioural analysis argue that screeners are likely to racially profile, is that the only way in which bias and stereotyping impacts effective security decision-making? The ‘halo effect’ – where good looking people are deemed to be innocent – could be an even greater concern. So, to what extent does an offender’s appearance, or for that matter, their sex, impact the likelihood of their being interdicted? We examine the issue from a border control perspective and consider the challenges faced in training border guards to avoid stereotyping and appreciate that good looking people and women can also be threats!
Operational Angle 4: Deviant Behaviour: perception driving the need for baselining
Behavioural analysis in security settings generally demands that we identify abnormal activity or deviations from our expectations. Yet the assessment is performed by individuals from a multitude of backgrounds and with an equally diverse set of perceptions as to what might be considered normal. We all have different opinions when it comes to risk-taking, care and respect for our elders, expressive styles, degrees of acceptable promiscuity, tolerance of the use of narcotics etc. This presentation highlights cultural-, gender-, age-based perceptions and how they are addressed in an operational context.
Security Perspective 3: Human profiling: an intelligence-based profiling technique Anne-Maree Quarmby, COO Intelligence Rising, Australia
Intelligence analysts and profilers have, in the past, often had separate roles. When they do intersect, analysts often employ default criminal profiling techniques that are not always the best fit for certain cases. Human profiling – a discipline with a grounding in intelligence field collection techniques – has a far wider scope of application and can be applied to victims, perpetrators, competitive private sector business analysis, state vs state futures analysis, policy and regulation. This presentation looks at the development of intelligence-based human profiling, the importance of memory, observation and recognition, and case studies relating to human profiling’s application in missing persons investigations.
Panel Q&A
12:30-13:30 Session Theme: Questioning Behavioural Analysis
Lunch Time, Question Time
We put behavioural analysis itself in the spotlight and ask a select group of practitioners, security consultants and academics to answer our delegates’ concerns. Whether it’s about procedures, regulations, technologies or responsibilities, conference participants will be encouraged to submit questions upon registration or upon their arrival at the conference venue.
14:30-16:30 Session Theme: Suicidal Terrorism
Moderator’s Opening Remarks
Academic Paper 3: Inside the Mind of a Suicide Bomber
Dr. Ilan Diamant, Tel Aviv University, Israel
In order to identify a potential suicide bomber, marauding firearms terrorist or lone shooter prepared to die, it is important to consider what their mindset is likely to be like on the day of the attack and en route to their target. What do we know about the mindset of attackers and what behaviours might they exhibit?
Academic Paper 4: Taking on the Persona of a Suicide Bomber
How would average university students, of varied nationalities and religious backgrounds, think when role playing the part of a suicide bomber in comparison to what real apprehended (due to mission failure or last minute change of heart) suicide bombers have said about themselves? Quite a challenging study, but one, as this paper describes, that was undertaken in Belgium. Aside from motivation and mindset, the study also explored how role players would pick their target, if free to do so, and what he or she would feel in imagination when “recalling” strapping on an explosive self-detonating device.
Security Perspective 4: Suicide Bomber Intervention: when time is not on your side
Ivor Terret, Founder & General Manager, Enablement Advisors, Israel
The ability to respond to a potential suicide bomber in a timely manner depends on the approach of senior management to security. Adopt a tick-box approach and demand that staff continuously report concerns upward through a never-ending chain and one might be able to prevent petty crime and people with mental health issues. Being able to respond to a suicide bomber demands that all engaged in security are able, when the need arises, to take unilateral action. That action requires management buy-in: drafting the requisite operational protocols and countermeasures and supporting staff when they make the decision to act.
Panel Q&A
17:00-17:30 Session Theme: Sponsored Session
This session is sponsored by
The three main pillars of Behavioural and Forensic Sciences: training, scientific research, and dissemination
Silvestre Cabezas García, International Sales Manager and Marketing Director, Behavior & Law, Spain
Behavior & Law specialises in behaviour analysis and has three main pillars: training, scientific research, and dissemination of behavioural sciences and forensic sciences. This conference will present all the work it has carried out over the last ten years, mainly in the areas of Non-Verbal Communication, Lie Detection, Criminal Profiling, Personality Profiling and Negotiation, Written Behaviour, Fraud Management, and Behavioural Economics.
23:00-00:00 Session Theme: Late Night Chat, After Work Cuppa or Early Start
Moderator: Philip Baum
No particular agenda. Just grab a late night drink if you’re in Europe, have an after-work cuppa in the USA and Canada or get day three off to an earlier start if you are in Asia or Australasia…and join Philip Baum to mull over the key issues surrounding behavioural analysis and pontificate over the future of behavioural analysis in security settings. We’re allocating an hour…but will stay online until the fat lady sings!
Day Three: Wednesday 7 October 2020
09:30-10:30 Session Theme: Airport Screening
Moderator’s Opening Remarks
Dr. Signe Maria Ghelfi, Head of Research & Development, Zurich State Police, Switzerland
With the prospect of increasing passenger numbers, higher global uncertainty, and decreasing ticket prices, airport security is facing the challenge of being effective, efficient, while not negatively impacting on passengers’ enjoyment of their journey. Recently, the concept of unpredictability, originating in the social sciences, has been discussed as an approach for airport security. The assumption is that by being less predictable about where, how and what type of security measures are applied, security is improved. Behaviour detection can be applied using an unpredictable approach; however, operational challenges can arise. This talk will provide an insight into the deployment and evaluation of behaviour detection at the airport from an operational as well as from a scientific perspective. Conference delegates will learn about different approaches to measuring effectiveness of behaviour detection, and possible counter-strategies that perpetrators could utilise. Implications for practice and future research will also be discussed.
11:00-13:00 Session Theme: Mental Health in the Crosshairs
Moderator’s Opening Remarks

Vittus Qujaukitsoq, Minister of Finance, Naalakkersuisut (Government of Greenland)
Security is not just an issue for those states which traditionally face the threat of terrorism. Even from a crime prevention perspective, behavioural analysis is not only to protect crowded places. Insider threats and, as we shall see in the next session, mental health are concerns for all communities. Greenland, despite its relative isolation and only having a population of 55,000, is not immune to security challenges, many of which can be addressed by the implementation of behavioural analysis. As baseline expectations are much easier to quantify in smaller communities, it’s an ideal environment to trust humans more than machines.
Academic Paper 5: Jumpers: identifying those with suicidal intent Dr. Jay-Marie Mackenzie, University of Westminster, UK
Tourist attractions, monuments, railways, shopping centres, airports and indeed anywhere with a balcony, bridge, platform or accessible rooftop will testify to the tragic frequency with which people attempt to take their own lives in very public acts of desperation. To what extent can we identify those with suicidal intent by behaviours and, even if we do, what steps can an untrained negotiator take to prevent them acting on their intentions? The results of research into suicidal behaviours at railway stations – commissioned by the Samaritans and funded by Network Rail – conducted in conjunction with the British Transport Police, Transport for London and Network Rail, as highlighted in this presentation, may well have beneficial security applications in other environments.
Security Perspective 5: Stalkers: behavioural indicators of the fixated Totti Karpela, Peace of Mind Threat Management, Finland
Sports stadia, concert venues, red carpet event theatres, pageants, political rallies and all locations which attract celebrity visitors, politicians and performers have to protect themselves not only from the actions of those who wish to enter without a ticket, but also from those individuals who have the right of entry but who have negative intent due to excessive adulation for an individual or, worse still, a desire to target somebody in particular. What are the indicators of those with a fixated interest in an individual?
Operational Angle 6: Upskirting: non-consensual lingerie models Det. Insp. Ashley Cooper, ViSOR Unit, British Transport Police, UK
Sexually deviant behaviour is a major concern for all crowded places. Frotteurs are active on mass transportation networks around the world. Another deviant behaviour, only recently criminalised in the UK, is that of upskirt photography where individuals, primarily men, attempt to use their mobile phones or cameras to photograph women as they are ascending escalators, sitting on hills or even simply standing on a train or in a shop. What do we know about the perpetrators of upskirting and how can they be identified and challenged? This operational perspective will share the experience of the British Transport Police in tackling upskirting along with other forms of assault.
Panel Q&A
14:00-14:30 Session Theme: Voice Analytics & the Insider Threat
This session is sponsored by
How to Identify, Confirm and Continuously Manage for Insider Threats: using voice analytics technology to address insider threats
A panel discussion on screening best practices for insider threats and interviewing techniques once potential high risk is identified. Join this panel of experts as they share real world experiences and security processes for identifying, confirming, and continuously managing for insider threats.
15:00-17:00 Session Theme: Technology to the Rescue
Moderator’s Opening Remarks
Stephen Ackroyd, Managing Director, Avsec Resilience Ltd., UK
Lisa Kaati, Swedish Defence Research Agency & Nazar Akrami, Uppsala University, Sweden
Before their attacks, many perpetrators have published their intentions, justifications, or ideology in writing either via letters, online diaries, forum posts, or manifestos. Hence, detecting risk behaviour signals in written communication has far-reaching implications for preventing violent attacks. This presentation will demonstrate the profile risk assessment tool (PRAT) – a tool that can be used to analyse and assess the risk in written communication. PRAT automatically identifies psychological and other relevant variables in written communication based on linguistic indicators. More specifically, it applies the latest techniques in text analysis to extract a profile of the author based on risk-behaviour-related indicators, which previous research has shown to be significant predictors of violence.
Security Perspective 6: Automating Behavioural Analysis: using technology to decrease risk in crowded placesWhilst aviation has long been the target of terrorist attacks, other modes of transportation and live events are only relatively recently having to consider how to better prevent a mass casualty event. One look at the queues at airports should serve to dissuade other crowded places from adopting an airport-style approach to security, even if the profiling techniques utilised are effective. The answer may lie in technology and automating risk assessment.
It’s the Way That S/He Walks, Talks and MovesMany of the automated approaches to behavioural analysis appear to be science fiction, but new products are emerging that can assess negative intent by the way that we move, the way that we walk, our skin temperature and voice patterns. Some of the latest research is presented in a non-commercial manner.
- Detecting Criminal Intent: identifying suspicious signs in CCTV footage
CCTV is no longer purely an evidential tool whereby footage is simply reviewed in the aftermath attack. Intelligent CCTV is already aiding safety and security professionals in identifying the ‘absence of the normal’ – an individual going the wrong way down a corridor, a person slipping or falling, or an unattended item left in the midst of a crowded zone. But the real challenge is identifying negative intent and having a CCTV system capable of alarming when far more subtle suspicious behaviours are present. Research, as presented here, is already helping system developers facilitate the identification of potential shoplifters. Does the technology have broader security applications?
- Head Movement Vibration Analysis: already deployed at airports and the Winter Olympic Games
Prof. Yana Nikolaenko, Raoul Wallenberg Institute of Special Pedagogy and Psychology, Russia
VibraImage technology measures micro-movements a person makes and can, based on such vibrations and comparing them with the norm, aid in the detection of human emotions. Within one minute the technology can calculate a person’s levels of neuroticism, inhibition, self-confidence, energy, mental balance, stress, anxiety and, most importantly, intent. Since 2007 the technology has been successfully detecting criminals, terrorists and suspicious behaviour at airports in Russia, Japan, China and Korea, and, in 2014, it was used in security screening for the Sochi Winter Olympic Games.
Panel Q&A
Day Four: Thursday 8 October 2020
09:30-11:00 Session Theme: Insider Threat Detection
Moderator’s Opening Remarks
Stephen Ackroyd, Managing Director, Avsec Resilience Ltd., UK
Elsine van Os, CEO/Founder, Signpost Six, The Netherlands
In the current threat environment, organisations cannot focus exclusively on protecting themselves from external threats; they must also be mindful of the threat posed by insiders committing acts of data theft for (commercial and state) espionage. This requires new steps for organisations as a whole, not just cyber and physical security. What can you as an employee do? What should you as an expert do? And how should organisations make a start to holistically tackle these blended threats? This paper will provide insights into the first steps to manage insider risk holistically by giving a framework for insider risk assessments applicable to all organisations.
Operational Angle 7: Insider Threat Detection in the Airport Community: the value of behavioural analysis layer Peter Nilsson, Head of Airpol and Police Commissioner, European Union
The security of any element of a state’s critical infrastructure is often viewed in terms of multiple layers, each adding value and a degree of protection. When addressing the insider threat, such a multi-layered approach is even more essential as the vulnerability of, for example, an airport may lie at its very core. Insiders often have an advanced appreciation of the fallibilities of the technologies deployed, but it’s far harder to plot around observant employees. Airpol, the network of police and border guard units at European airports, has numerous expert groups, one of which looks at Insider Threats and another at the use of Behaviour Detection. This presentation outlines Airpol’s own work focussing on the way in which behavioural analysis has aided insider threat detection.
Academic Paper 7: Linguistic Indicators of Insider DeceptionFACT360 is a software system that deploys `transactional analytics’ to detect unusual behaviour across free-text corporate communication channels (email, etc.); its key USP is that many of its metrics work `out of the box’ in a language-neutral/ language-lite way, making the system particularly well suited for deployment across international spheres of operation (UN, EC, NATO etc). Currently, developers are able to signal subtle changes in language use (indicative of changing motivations); unusual patterns in communication behaviours (e.g. identifying high prestige actors, and flagging, say, when they abruptly begin communicating with low ranks [and vice versa] etc.) and changes in organisational `silo-isation’ (organisational structure). The software is currently being evaluated by several organisations and the [headline] results from these trials will be presented.
Panel Q&A
13:00-14:30 Session Theme: Online Behavioural Analysis
Moderator’s Opening Remarks
Security Perspective 8: Recruited Online: detectable online?We know that the internet has facilitated the radicalisation of many vulnerable individuals, but how do such people behave in their online communication? To what extent do they utilise mainstream social media platforms and, most importantly from this conference’s perspective, what might be indicators of online jihadi activity? We know, as one example, that radicalised westerners are openly chatting with ISIS widows in Syria. The presentation will include case studies of radicalised individuals being identified due to their social media postings and it will also consider current events (e.g. COVID-19 and the BLM protests) and the security impact they are having on online communication and the radicalisation process.
Operational Angle 8: Online Addictive Behaviours: offline suspicious signsAs society becomes ever more interconnected online, so do the risks to vulnerable individuals increase. Those who have addictions, such as to online betting/gambling, pornography and webcam-based sex or even to the ‘excessive’ use of social media platforms or online shopping, can end up in financial debt, let alone suffer from mental health-related problems. Those who end up being trafficked into domestic servitude, slavery, organ donation or the sex industry often commence their journeys online. Isolation can lead to radicalisation, sexting can lead to cyberbullying and online imagery can impact self-esteem. This presentation outlines the scope of online addictive behaviours, their psychological dynamics and, most importantly, how employers, friends and family might identify causes for concern as a result of behaviour both online and offline.
Academic Paper 8: Fake News in the Aftermath of an Attack: distinguishing fact from fiction Ken Chen Xingyu, Senior Behavioural Sciences Research Analyst, Resilience, Safety and Security Psychology Branch, Home Team Behavioural Sciences Centre, Singapore
Most of our security efforts go into preventing attacks, yet we must also be prepared to manage disasters should they occur. All contingency plans include sections on liaising with the press and media, but we must also develop competency in managing ‘fake news’ which can be rife in the aftermath of an attack, sometimes just well-intended circulation of hearsay but potentially the publishing of intentionally misleading information. This can obviously be very upsetting for relatives and friends of victims, but it can also hamper emergency response efforts. This presentation shares the research on the spread of fake news in the aftermath of a terror attack, its implications explores contingency planning and the use of behavioural analysis to distinguish between fact and fiction should an event occur.
Panel Q&A
15:00-17:00 Session Theme: Training & Operational Mindset
Nina Brooks, Director, Security, Facilitation and IT, Airports Council International (ACI) World, Canada
Bart Cappaert, Project Manager Behaviour Detection Programme, Federal Judicial Police, Belgium
This operational perspective will focus on the Belgian Integrated Police’s behavioural detection programme; its history and structure, selection of trainers, training approach and course content (specifically addressing how they ensure objectivity and prevent discrimination on grounds of ethnicity, gender or age).
Operational Angle 10: Teaching Awareness to Non-Security Staff: human trafficking in the crosshairs of the hospitality industry Paul Betley, Director of Security EMEA, Hilton, UK
How do we get security buy-in from personnel whose primary role is customer service or safety? One of the criminal activities most identifiable within the transportation and hospitality industries is human trafficking; hotel receptionists and flight attendants alike are client-facing staff being trained to identify victims of trafficking and the traffickers themselves, whilst room cleaners and taxi drivers are also being encouraged to report unusual activity. HR departments are, likewise, being instructed to identify those employees potentially engaged in modern slavery. This presentation will look at one hotel chain’s approach to engaging their staff as behavioural analysts.
Operational Angle 11: The Customer is Not Always King: training aircrew in unruly passenger identification Joe Carpenter, Corporate Security Specialist, Virgin Atlantic Airways Ltd., UK
Arguably no environment can benefit more from a proactive behavioural analysis regime than the aircraft cabin. Miss the threat at the airport and the result can be a violent incident taking place at 33,000 feet, two hours from the nearest airport and without access to law enforcement. Whilst flight attendants are trained in the restraint of unruly passengers, some airlines are taking steps to identify potentially unruly passengers before they even board. This presentation outlines how Virgin Atlantic’s training enables cabin crew to use behavioural detection techniques during boarding to identify not only intoxicated revellers but also victims of human trafficking and, in the worst-case scenario, potential terrorists.
Conference Takeaways: what is going to change on Monday morning?
We want to ensure that you have some positive takeaways – action points – so that you can use the experience and knowledge gained at Behavioural Analysis 2020 to transform or, at the very least, initiate change within your organisations. This interactive session will help delegates depart with ideas as to what they are going to do first thing Monday morning!
Stop Press: In fact, we are not even going to wait until Monday morning to get the ball rolling. Behavioural Analysis Week Online will conclude with the official launch of:The International Association of Behaviour Detection & Analysis is being formed to create an internationally recognised professional body that can further advance the standards and science in relation to behavioural detection, analysis and awareness, and help regulate a previously unregulated industry. All delegates to Behavioural Analysis Week Online 2020, providing they are currently employed in full-time roles that utilise behavioural analysis techniques, will qualify for their first year’s membership of the association for free. Join us online for the official launch and then, hopefully in person, at Behavioural Analysis 2021 for the launch party.
PREVIOUS CONFERENCES
MALL OF AMERICA, MINNEAPOLIS, USA
DAY ONE: TUESDAY 21st MAY 2019
KEYNOTE: BEHAVIOURAL ANALYSIS FEDERAL BUREAU OF INVESTIGATION
Lessons Learned from Recent Terrorist Attacks, Karie Gibson, Supervisory Special Agent, Behavioral Analysis Unit, Federal Bureau of Investigation, USA
SESSION 1: BEHAVIOURAL ANALYSIS IN THE SPOTLIGHT
Understanding the Strengths and Weaknesses of Behaviour Detection: past failures and future potential, Dr Sarah Knight, Principal Psychologist, Defence Science and Technology Laboratory, UK
Perceptions Uncovered: the science of non-verbal communication, more than 60 years of research for security practitioners, Vincent Denault, Co-director, Centre for Studies in Nonverbal Communication Sciences and Lecturer, Department of Communication, Université de Montréal, Canada
Myth-busting: dispelling fake news, Louise Jupe, Portsmouth University, UK
SESSION 2: INDUSTRY EXPERIENCE
Sports Stadium Security, Billy Langenstein, Director Security Services and Investigation, National Football League (NFL), USA
Securing Places of Worship, Michael Masters, National Director & CEO, Secure Community Network, USA
Hotel Security, Mark Walker, Senior Manager, Global Security Training, Marriott International Inc., USA
SESSION 3: XENOPHOBIA
Xenophobia & Extremist Ideology: an analysis of recent attacks and the behaviours of the perpetrators, Joanna Mendelson, Senior Investigative Researcher & Director of Special Projects, Center on Extremism, Anti-Defamation League, USA
Pittsburgh: a reflection on the ‘Tree of Life’ attack of October 2018, Michael Masters, National Director & CEO, Secure Community Network, USA
SESSION 4: QUESTIONING BEHAVIOURAL ANALYSIS
The Mall of America: our hosts perspective, Ashly Helser, Security Special Operations Captain, Mall of America, USA
SESSION 5: SUICIDAL TERRORISM
Suicide Bomber Intervention: when time is not on your side, Michael Rozin, President, Rozin Security Consulting LLC, USA
Case Study: Stade de France, 13 November 2015
Day 2: WEDNESDAY 22nd MAY 2019
SESSION 6: AVIATION SECURITY
Operational Angle 5: Behavioural Analysis within the US Transportation System, Michael Silata, Specialized Screening Program Branch Chief, Transportation Security Administration, USA
Gatwick Airport: challenges in, and the successes of, implementing behavioural analysis in the UK, Andy Palmer, Border Security Manager, Gatwick Airport, UK
Israeli Profiling: new challenges in aviation security require an old approach, Roni Tidhar, Head of International Consulting Services, Israel Airports Authority, Israel
Transportation Screening Personnel: coping with increased cognitive load, Amir Neeman, Founder & Principal, Amir Neeman Consulting, USA
SESSION 7: QUESTIONING TECHNIQUES AND DECEPTION INDICATORS
The Art of Questioning: developing rapport, effective strategies and countering resistance, Dr. Christian Meissner, Professor of Psychology, Iowa State University, USA
New methods for training in deception detection: Advantages of Game-Based Learning, Prof. Norah Dunbar, Department of Communication, University of California Santa Barbara
Forensic Linguistics: warning signs in speech patterns, Frédéric Tomas, Univeristé de Paris 8, France
SESSION 8: SEXUAL ASSAULT AND SEXUALLY DEVIANT BEHAVIOUR
Contextual and Behavioural Risk Factors for Sexual Harassment and Assault in Public Venues, Zoë Peterson, Director of the Sexual Assault Research Initiative, Kinsey Institute, USA
SESSION 9: MENTAL HEALTH
Behavioural Indicators of Mental Health Issues, Karina Mesarosova, Aviation Psychologist and Managing Partner KM Flight Research & Training, Slovenia & Adjunct Professor at Embry-Riddle Aeronautical University, USA
Suicide Intervention: City of Malmo, Stefan Landenberg, Head of Unit, Culture Department, City of Malmö, Sweden
SESSION 10: THE COUNTERARGUMENT
Profiling and the Threat to Civil Liberties, Hugh Handeyside, Senior Staff Attorney, American Civil Liberties Union, USA
SESSION 11: HUMAN TRAFFICKING AND FLIGHT ATTENDANT ROLE IN AVIATION SECURITY
Human Trafficking; flight attendants observing behaviour, Nancy Rivard, President and Founder, Airline Ambassadors International, USA
Day 3: THURSDAY 23rd MAY 2019
SESSION 12: ARTIFICIAL INTELLIGENCE AND TECHNOLOGY’S ROLE IN BEHAVIOURAL ANALYSIS
Extremist Risk Assessment in the Workplace, Dr. Sagit Yehoshua, Criminologist, Israel
Automated Credibility Assessment: AI in border security, Prof. Aaron C. Elkins, Director, Artificial Intelligence Lab, San Diego State University, USA
CCTV: how can behavioural analysis techniques enhance surveillance operations, Prof. Craig Donald, Adjunct Associate Professor at Edith Cowan University, Perth, Australia
Behavioural Analysis: future applications of technology, Andrew Tatrai, University of Technology, Sydney, Australia
SESSION 13: MEGA EVENTS AND CROWDED PLACES
School Shootings: on scene behaviour of perpetrators, Kenneth Trump, President, National School Safety and Security Services, USA
Joining the Dots: avoiding the silo mentality, Neville Hay, INTERPORT POLICE and Green Light Limited, UK
The Importance of Behavioural Analysis During an Actual Emergency, Andy Peloquin, Redrock Entertainment Services, USA
SESSION 14: CONCLUDING THOUGHTS
What is going to change on Monday morning? Philip Baum, Managing Director, Green Light Ltd & Editor, Aviation Security International, UK & Visiting Professor, Aviation Security, Coventry University, UK
Afternoon Optional Programme: Security Tours Mall of America
PRINCIPALITY STADIUM, CARDIFF
DAY ONE: WEDNESDAY 14TH MARCH 2018
KEYNOTE: BEHAVIOURAL ANALYSIS
Lessons Learned from Recent Terrorist Attacks
SESSION 1: BEHAVIOURAL ANALYSIS IN PRACTICE: INDUSTRY FOCUS
Places of Worship: communities protecting themselves – Michael Whine MBE, Community Security Trust, UK
Sporting Events: combating court-siding and gambling – Andrew Wolfe Murray, Partner, Theseus Partners, UK
Transport Security: human trafficking in focus – Sarah-Jane Prew, Wales Anti-Slavery Leadership Group, UK & Airline Ambassadors International, USA
SESSION 2: THE BIOLOGY OF FEAR & DECEPTION
Fight, Flight or, Perhaps, Freeze: anxiety isn’t always what it seems – Louise Jupe, Department of Psychology, University of Portsmouth, UK
Case Study: The Impact of Integrating Real-time, Multichannel Behaviour Analysis and Elicitation/Engagement Strategies in
High-stake Contexts – Sorin Losnita, Romanian Intelligence Service, Romania, and Cliff Lansley, EIA Group, UK
SESSION 3: STEREOTYPING, PERCEPTION & RACIAL PROFILING
Understanding Intuitive Bias – Wim De Neys, CNRS & Université Paris Descartes, France
Good Looking People & the ‘Halo Effect’ – Ran Cohen, SDR® Academy, The Netherlands
Panel Discussion: Religious Sensitivities in Security Decision-Making
Moderated by: Philip Baum
Panel Members: Gurmel Singh, Secretary General, Sikh Council UK
Usama Hasan, Quilliam Foundation
Michael Whine MBE, Community Security Trust, UK
SESSION 4: ADDRESSING, BY UNDERSTANDING, SPECIFIC CRIMINAL & ANTI-SOCIAL ACTIVITY
Profile of the Fixated Threat in Action – David James, Theseus Partners, UK
Profile of Group Offenders – Dr Jessica Woodhams, University of Birmingham, UK
Profile of Frotteurs & Sexual Deviants – Dr Lynsey Gozna, University of Leicester, UK
Profile of a Cyber Criminal – Nadine Touzeau, Profiler, net-profiler, France
DAY 2: THURSDAY 15TH MARCH 2018
SESSION 5: POLICING PERSPECTIVES
Stop & Search: reasonable grounds? – Nick Glynn, Senior Programme Officer, Policing & Security Governance, Open Society Initiative for Europe, UK
Case Study: British Transport Police from concept to operation – Rae Jiggins, Polarm International Ltd., UK
Super Recognisers – Mick Neville, Super Recognisers International, UK
CASE STUDY:
Securing The O2 Arena
Paul Williams, Security Operations Manager, The O2, London, UK
SESSION 6: THE ROLE OF TECHNOLOGY
Intelligent CCTV: can the camera focus on unusual behaviour? – Simon Moore, Cardiff University, UK
Facial Thermographs: might heat spots identify negative intent? – Reyer Zwiggelaar, Aberystwyth University, UK
Layered Voice Analysis: the way we speak? – Amir Liberman, Nemesysco, Israel
SESSION 7: THE RESPONSE
The Art of Questioning: having THE conversation – Charlotte Hudson, Department of Psychology, University of Portsmouth, UK
Emergency Response: when you think the threat is real – Ofir Malka, CEO SafeZones, Germany
Insider Threat Response: identifying radicalisation in the workplace – Usama Hasan, Quilliam Foundation, UK
SESSION 8: MARAUDING FIREARMS ATTACKS & SUICIDAL TERRORISM
Marauding Firearms Attacks: not always by suicidal terrorists – Leeran Gold, Registered Psychologist, Promises Healthcare, Singapore
The Suicidal Terrorist: recruitment & training – Dr. Sagit Yehoshua, Criminologist, Israel
The Proof of the Pudding: attacks against aviation identified by behavioural analysis – Philip Baum, Managing Director, Green Light Ltd., UK
SESSIONS WERE CHAIRED BY:
Neville Hay, Brooklyn Associates, UK
Katharine Ng, OneCrew Limited, Hong Kong