Behavioural Analysis Week Online will begin in ...
0
0
0
0
Days
0
0
Hrs
0
0
Min
0
0
Sec

BEHAVIOURAL ANALYSIS WEEK 2020 ONLINE

We are delighted to announce our programme for Behavioural Analysis Week Online 2020.
Please note that all timings are based on British Summer Time (BST). That said, almost all presentations will be recorded and accessible to registered delegates for a period of two weeks following the conference’s conclusion. This will facilitate delegates viewing all presentations, wherever their geographical location, at a time convenient to their time zone.

Day One: Monday 5 October 2020

11:00-13:00 Session Theme: Industry Experience

Chairman’s Opening Address

Philip Baum, Managing Director, Green Light Ltd., Editor, Aviation Security International, UK & Visiting Professor, Aviation Security, Coventry University, UK

Silhouette vector image of microphone icon | Free SVG Keynote 1: Behavioural Analysis: a security perspective

Prof. Paul Gill, Professor of Security and Crime Science, University College London, UK

Behavioural analysis is part and parcel of everyday life. It is a discipline embraced in organisational management, town planning and, extensively, within the healthcare sector. Our focus is on its benefits in safeguarding our society from the variety of threats we face from those with negative intent. This keynote address provides a scene-setter for the conference outlining the emotional responses of hostiles when planning and preparing a hostile act. Military tactics would dictate that we only win our security battles by understanding the nature of the enemy and by adapting our responses to the battlefield. That battlefield, for our delegates, may be civilian crowded places, transportation hubs, tourist attractions, sports stadia, places of worship and other public venues.

Security Perspective 1: Behavioural Analysis: the United Kingdom’s perspective

Dr Sarah Knight, Principal Senior Psychologist, DSTL, UK

The United Kingdom government, through various departments – including the Department for Transport, Centre for Protection of the National Infrastructure and the Home Office – has been researching how behavioural analysis can contribute to the security of different environments. It is anticipated that a guidance paper will be published by Her Majesty’s Government (prior to the commencement of the conference) outlining what capabilities organisations should have in place and what demands should be made of suppliers. This presentation will outline the rationale behind the research and highlight some of the most significant elements of it.

Behavioural Analysis at the Coalface

How have different industries gone about utilising behavioural analysis techniques to protect their patrons and infrastructure? What are the lessons learned that impact current deployment and staff recruitment and training?

  • Operational Angle 1: Senedd Cymru/Welsh Parliament

Image result for welsh flag Stephen Carr, Head of Organisational Development, Senedd Cymru/Welsh Parliament, Wales

  • Operational Angle 2: Eurovision Song Contest

Lt. Col. (Retd.) Itzik Ashkenazi, former Head of Security, Israel Broadcasting Authority; Head of Security of Eurovision Contest 2019, Tel Aviv; Business Development Manager for VIP Security Company

  • Operational Angle 3: Casino Security

Sarina Persall, Director of Security, Crown Melbourne Limited, Australia

Panel Q&A

15:00-16:30 Session Theme: Behavioural Analysis in the Spotlight

Moderator’s Opening Remarks

Dr. Vincent Denault, LL.M., Co-Director, Center for Studies in Non-Verbal Communication Sciences, Université de Montréal, Canada

Academic Paper 1: Non-Verbal Behaviour: a scientific panorama

Prof.Pierrich Plusquellec, Professeur, Faculté des Arts et Sciences, Universite de Montreal, Canada

This overview of the science of non-verbal behaviour will set out the different forms of non-verbal communication and describe the link between non-verbal indicators and the emotional state of the person being observed. It will provide an understanding of what we can really identify in people’s non-verbal communication and set out what science can tell us about the link between non-verbal behaviours and the security threat a person might pose.

Academic Paper 2: Does Pinocchio’s Nose Actually Exist?: distilling myth from fact in the area of deception detection

Prof. Gordon Wright, Goldsmiths University of London, UK

Much is written about the way in which we can identify somebody trying to deceive us by their expression, but are we identifying the liar or simply a person who may be experiencing stress? Gaze, lip shape and facial touches may be subject to evaluation, but can micro-expressions truly indicate guilt?

Panel Q&A

17:00-17:45 Session Theme: Keynote 2

 

Silhouette vector image of microphone icon | Free SVG Obstacles and Challenges in Behavioural Analysis: Engaging the Complexity of Behaviour

Image result for usa flag Dr. David Matsumoto, Professor of Psychology, San Francisco State University (SFSU), Founder and Director, SFSU’s Culture and Emotion Research Laboratory and President & CEO, Humintell, USA

Depending on where you are in the world, this stand-alone presentation, given by one of the world’s most renowned and respected behavioural analysts will whet your appetite for dinner or energise you for the day ahead! Live from California, the organisers of Behavioural Analysis 2020 are delighted to welcome to the programme Dr. David Matsumoto.

Behavioural analysis programmes and research have only begun to acknowledge the full complexity of behaviour, especially expressive behaviour. Dr. Matsumoto suggests we should engage it. This complexity includes the sophistication of human anatomy and physiology, the existence of multiple mental states, the complicated neural circuitry that connects mental states to anatomy, cross-associations between verbal and non-verbal behaviour, and the various functions of behaviour. This keynote address will provide a review of these issues based on latest research findings across broad spectrums of science, and argue for incorporation of more comprehensive views of behaviour and analysis for both science and application that spans multiple modalities

Day Two: Tuesday 6 October 2020

09:30-11:00 Session Theme: In the Mind of the Profiler

Moderator’s Opening Remarks

Philip Baum, Managing Director, Green Light Ltd., Editor, Aviation Security International, UK & Visiting Professor, Aviation Security, Coventry University, UK

Security Perspective 2: The Halo Effect: good looking people and women are innocent!

Diana Nowek, Training & Research, Institute of Nonverbal Communication, Austria

Whilst many critics of behavioural analysis argue that screeners are likely to racially profile, is that the only way in which bias and stereotyping impacts effective security decision-making? The ‘halo effect’ – where good looking people are deemed to be innocent – could be an even greater concern. So, to what extent does an offender’s appearance, or for that matter, their sex, impact the likelihood of their being interdicted? We examine the issue from a border control perspective and consider the challenges faced in training border guards to avoid stereotyping and appreciate that good looking people and women can also be threats!

Operational Angle 4: Deviant Behaviour: perception driving the need for baselining

Jeanette Boland APM, Lecturer, University of Tasmania & former Det. Sgt. (Counterterrorism), Australian Federal Police, Australia

Behavioural analysis in security settings generally demands that we identify abnormal activity or deviations from our expectations. Yet the assessment is performed by individuals from a multitude of backgrounds and with an equally diverse set of perceptions as to what might be considered normal. We all have different opinions when it comes to risk-taking, care and respect for our elders, expressive styles, degrees of acceptable promiscuity, tolerance of the use of narcotics etc. This presentation highlights cultural-, gender-, age-based perceptions and how they are addressed in an operational context.

Security Perspective 3: Human profiling: an intelligence-based profiling technique

Anne-Maree Quarmby, COO Intelligence Rising, Australia

Intelligence analysts and profilers have, in the past, often had separate roles. When they do intersect, analysts often employ default criminal profiling techniques that are not always the best fit for certain cases. Human profiling – a discipline with a grounding in intelligence field collection techniques – has a far wider scope of application and can be applied to victims, perpetrators, competitive private sector business analysis, state vs state futures analysis, policy and regulation. This presentation looks at the development of intelligence-based human profiling, the importance of memory, observation and recognition, and case studies relating to human profiling’s application in missing persons investigations.

Panel Q&A

12:30-13:30 Session Theme: Questioning Behavioural Analysis

Lunch Time, Question Time

Moderator: Philip Baum

We put behavioural analysis itself in the spotlight and ask a select group of practitioners, security consultants and academics to answer our delegates’ concerns. Whether it’s about procedures, regulations, technologies or responsibilities, conference participants will be encouraged to submit questions upon registration or upon their arrival at the conference venue.

  • Louise Jupe, Department of Psychology, University of Portsmouth, UK
  • Kenneth Long, CEO, International Association of Behaviour Detection and Analysis, UK

14:30-16:30 Session Theme: Suicidal Terrorism

Moderator’s Opening Remarks

Dr. Sagit Yehoshua, Criminologist, Hebrew University of Jerusalem & Institute for Counterterrorism, Israel

Academic Paper 3: Inside the Mind of a Suicide Bomber

Dr. Ilan Diamant, Tel Aviv University, Israel

In order to identify a potential suicide bomber, marauding firearms terrorist or lone shooter prepared to die, it is important to consider what their mindset is likely to be like on the day of the attack and en route to their target. What do we know about the mindset of attackers and what behaviours might they exhibit?

Academic Paper 4: Taking on the Persona of a Suicide Bomber

Image result for usa flag Dr. Anne Speckhard, Director, International Center for the Study of Violent Extremism & Adjunct Associate Professor of Psychiatry, Georgetown University School of Medicine, USA

How would average university students, of varied nationalities and religious backgrounds, think when role playing the part of a suicide bomber in comparison to what real apprehended (due to mission failure or last minute change of heart) suicide bombers have said about themselves? Quite a challenging study, but one, as this paper describes, that was undertaken in Belgium. Aside from motivation and mindset, the study also explored how role players would pick their target, if free to do so, and what he or she would feel in imagination when “recalling” strapping on an explosive self-detonating device.

Security Perspective 4: Suicide Bomber Intervention: when time is not on your side

Ivor Terret, Founder & General Manager, Enablement Advisors, Israel

The ability to respond to a potential suicide bomber in a timely manner depends on the approach of senior management to security. Adopt a tick-box approach and demand that staff continuously report concerns upward through a never-ending chain and one might be able to prevent petty crime and people with mental health issues. Being able to respond to a suicide bomber demands that all engaged in security are able, when the need arises, to take unilateral action. That action requires management buy-in: drafting the requisite operational protocols and countermeasures and supporting staff when they make the decision to act.

Panel Q&A

17:00-17:30 Session Theme: Sponsored Session

This session is sponsored by

23:00-00:00 Session Theme: Late Night Chat, After Work Cuppa or Early Start

Moderator: Philip Baum

No particular agenda. Just grab a late night drink if you’re in Europe, have an after-work cuppa in the USA and Canada or get day three off to an earlier start if you are in Asia or Australasia…and join Philip Baum to mull over the key issues surrounding behavioural analysis and pontificate over the future of behavioural analysis in security settings. We’re allocating an hour…but will stay online until the fat lady sings!

Day Three: Wednesday 7 October 2020

09:30-10:30 Session Theme: Airport Screening

Moderator’s Opening Remarks

Philip Baum

Operational Angle 5: Towards Unpredictability in Airport Screening: should we all be treated the same?

Related image Dr. Signe Maria Ghelfi, Head of Research & Development, Zurich State Police, Switzerland

With the prospect of increasing passenger numbers, higher global uncertainty, and decreasing ticket prices, airport security is facing the challenge of being effective, efficient, while not negatively impacting on passengers’ enjoyment of their journey. Recently, the concept of unpredictability, originating in the social sciences, has been discussed as an approach for airport security. The assumption is that by being less predictable about where, how and what type of security measures are applied, security is improved. Behaviour detection can be applied using an unpredictable approach; however, operational challenges can arise. This talk will provide an insight into the deployment and evaluation of behaviour detection at the airport from an operational as well as from a scientific perspective. Conference delegates will learn about different approaches to measuring effectiveness of behaviour detection, and possible counter-strategies that perpetrators could utilise. Implications for practice and future research will also be discussed.

11:00-13:00 Session Theme: Mental Health in the Crosshairs

Moderator’s Opening Remarks

Philip Baum

Silhouette vector image of microphone icon | Free SVG Keynote 3: Greenland’s Security Dilemmas

This png image - Greenland Large Flag, is available for free download Vittus Qujaukitsoq, Minister of Finance, Naalakkersuisut (Government of Greenland)

Security is not just an issue for those states which traditionally face the threat of terrorism. Even from a crime prevention perspective, behavioural analysis is not only to protect crowded places. Insider threats and, as we shall see in the next session, mental health are concerns for all communities. Greenland, despite its relative isolation and only having a population of 55,000, is not immune to security challenges, many of which can be addressed by the implementation of behavioural analysis. As baseline expectations are much easier to quantify in smaller communities, it’s an ideal environment to trust humans more than machines.

Academic Paper 5: Jumpers: identifying those with suicidal intent

Dr. Jay-Marie Mackenzie, University of Westminster, UK

Tourist attractions, monuments, railways, shopping centres, airports and indeed anywhere with a balcony, bridge, platform or accessible rooftop will testify to the tragic frequency with which people attempt to take their own lives in very public acts of desperation. To what extent can we identify those with suicidal intent by behaviours and, even if we do, what steps can an untrained negotiator take to prevent them acting on their intentions? The results of research into suicidal behaviours at railway stations – commissioned by the Samaritans and funded by Network Rail – conducted in conjunction with the British Transport Police, Transport for London and Network Rail, as highlighted in this presentation, may well have beneficial security applications in other environments.

Security Perspective 5: Stalkers: behavioural indicators of the fixated

Totti Karpela, Peace of Mind Threat Management, Finland

Sports stadia, concert venues, red carpet event theatres, pageants, political rallies and all locations which attract celebrity visitors, politicians and performers have to protect themselves not only from the actions of those who wish to enter without a ticket, but also from those individuals who have the right of entry but who have negative intent due to excessive adulation for an individual or, worse still, a desire to target somebody in particular. What are the indicators of those with a fixated interest in an individual?

Operational Angle 6: Upskirting: non-consensual lingerie models

Det. Insp. Ashley Cooper, ViSOR Unit, British Transport Police, UK

Sexually deviant behaviour is a major concern for all crowded places. Frotteurs are active on mass transportation networks around the world. Another deviant behaviour, only recently criminalised in the UK, is that of upskirt photography where individuals, primarily men, attempt to use their mobile phones or cameras to photograph women as they are ascending escalators, sitting on hills or even simply standing on a train or in a shop. What do we know about the perpetrators of upskirting and how can they be identified and challenged? This operational perspective will share the experience of the British Transport Police in tackling upskirting along with other forms of assault.

Panel Q&A

14:00-14:30 Session Theme: Voice Analytics & the Insider Threat

This session is sponsored by

How to Identify, Confirm and Continuously Manage for Insider Threats: using voice analytics technology to address insider threats
A panel discussion on screening best practices for insider threats and interviewing techniques once potential high risk is identified. Join this panel of experts as they share real world experiences and security processes for identifying, confirming, and continuously managing for insider threats.

15:00-17:00 Session Theme: Technology to the Rescue

Moderator’s Opening Remarks

Stephen Ackroyd, Managing Director, Avsec Resilience Ltd., UK

Academic Paper 6: Assessing Behaviour in Written Communication

Image result for swedish flag Lisa Kaati, Swedish Defence Research Agency & Nazar Akrami, Uppsala University, Sweden

Before their attacks, many perpetrators have published their intentions, justifications, or ideology in writing either via letters, online diaries, forum posts, or manifestos. Hence, detecting risk behaviour signals in written communication has far-reaching implications for preventing violent attacks. This presentation will demonstrate the profile risk assessment tool (PRAT) – a tool that can be used to analyse and assess the risk in written communication. PRAT automatically identifies psychological and other relevant variables in written communication based on linguistic indicators. More specifically, it applies the latest techniques in text analysis to extract a profile of the author based on risk-behaviour-related indicators, which previous research has shown to be significant predictors of violence.

Security Perspective 6: Automating Behavioural Analysis: using technology to decrease risk in crowded places

Brandon May, DSTL, UK

Whilst aviation has long been the target of terrorist attacks, other modes of transportation and live events are only relatively recently having to consider how to better prevent a mass casualty event. One look at the queues at airports should serve to dissuade other crowded places from adopting an airport-style approach to security, even if the profiling techniques utilised are effective. The answer may lie in technology and automating risk assessment.

It’s the Way That S/He Walks, Talks and Moves

Many of the automated approaches to behavioural analysis appear to be science fiction, but new products are emerging that can assess negative intent by the way that we move, the way that we walk, our skin temperature and voice patterns. Some of the latest research is presented in a non-commercial manner.

  • Detecting Criminal Intent: identifying suspicious signs in CCTV footage

Dr. David Keatley, Senior Lecturer in Criminology, Murdoch University, and Director, Researchers in Behaviour Sequence Analysis (ReBSA), Australia

CCTV is no longer purely an evidential tool whereby footage is simply reviewed in the aftermath attack. Intelligent CCTV is already aiding safety and security professionals in identifying the ‘absence of the normal’ – an individual going the wrong way down a corridor, a person slipping or falling, or an unattended item left in the midst of a crowded zone. But the real challenge is identifying negative intent and having a CCTV system capable of alarming when far more subtle suspicious behaviours are present. Research, as presented here, is already helping system developers facilitate the identification of potential shoplifters. Does the technology have broader security applications?

  • Head Movement Vibration Analysis: already deployed at airports and the Winter Olympic Games

Prof. Yana Nikolaenko, Raoul Wallenberg Institute of Special Pedagogy and Psychology, Russia

VibraImage technology measures micro-movements a person makes and can, based on such vibrations and comparing them with the norm, aid in the detection of human emotions. Within one minute the technology can calculate a person’s levels of neuroticism, inhibition, self-confidence, energy, mental balance, stress, anxiety and, most importantly, intent. Since 2007 the technology has been successfully detecting criminals, terrorists and suspicious behaviour at airports in Russia, Japan, China and Korea, and, in 2014, it was used in security screening for the Sochi Winter Olympic Games.

Panel Q&A

Day Four: Thursday 8 October 2020

09:30-11:00 Session Theme: Insider Threat Detection

Moderator’s Opening Remarks

Stephen Ackroyd, Managing Director, Avsec Resilience Ltd., UK

Security Perspective 7: Holistic Insider Threat Management

Elsine van Os, CEO/Founder, Signpost Six, The Netherlands

In the current threat environment, organisations cannot focus exclusively on protecting themselves from external threats; they must also be mindful of the threat posed by insiders committing acts of data theft for (commercial and state) espionage. This requires new steps for organisations as a whole, not just cyber and physical security. What can you as an employee do? What should you as an expert do? And how should organisations make a start to holistically tackle these blended threats? This paper will provide insights into the first steps to manage insider risk holistically by giving a framework for insider risk assessments applicable to all organisations.

Operational Angle 7: Insider Threat Detection in the Airport Community: the value of behavioural analysis layer

Peter Nilsson, Head of Airpol and Police Commissioner, European Union

The security of any element of a state’s critical infrastructure is often viewed in terms of multiple layers, each adding value and a degree of protection. When addressing the insider threat, such a multi-layered approach is even more essential as the vulnerability of, for example, an airport may lie at its very core. Insiders often have an advanced appreciation of the fallibilities of the technologies deployed, but it’s far harder to plot around observant employees. Airpol, the network of police and border guard units at European airports, has numerous expert groups, one of which looks at Insider Threats and another at the use of Behaviour Detection. This presentation outlines Airpol’s own work focussing on the way in which behavioural analysis has aided insider threat detection.

Academic Paper 7: Linguistic Indicators of Insider Deception

Prof. J. Mark Bishop, Director, The Centre for Intelligent Data Analytics, Goldsmiths, University of London, UK

FACT360 is a software system that deploys `transactional analytics’ to detect unusual behaviour across free-text corporate communication channels (email, etc.); its key USP is that many of its metrics work `out of the box’ in a language-neutral/ language-lite way, making the system particularly well suited for deployment across international spheres of operation (UN, EC, NATO etc). Currently, developers are able to signal subtle changes in language use (indicative of changing motivations); unusual patterns in communication behaviours (e.g. identifying high prestige actors, and flagging, say, when they abruptly begin communicating with low ranks [and vice versa] etc.) and changes in organisational `silo-isation’ (organisational structure). The software is currently being evaluated by several organisations and the [headline] results from these trials will be presented.

Panel Q&A

13:00-14:30 Session Theme: Online Behavioural Analysis

Moderator’s Opening Remarks

Security Perspective 8: Recruited Online: detectable online?

Image result for usa flag Anat Agron, Senior Terrorism and Extremism Analyst, MEMRI – The Middle East Media Research Institute, USA

We know that the internet has facilitated the radicalisation of many vulnerable individuals, but how do such people behave in their online communication? To what extent do they utilise mainstream social media platforms and, most importantly from this conference’s perspective, what might be indicators of online jihadi activity? We know, as one example, that radicalised westerners are openly chatting with ISIS widows in Syria. The presentation will include case studies of radicalised individuals being identified due to their social media postings and it will also consider current events (e.g. COVID-19 and the BLM protests) and the security impact they are having on online communication and the radicalisation process.

Operational Angle 8: Online Addictive Behaviours: offline suspicious signs

Kalliopi (Kelly) Ioannou, Clinical Criminologist & Managing Director, Cyber Security International Institute, Greece

As society becomes ever more interconnected online, so do the risks to vulnerable individuals increase. Those who have addictions, such as to online betting/gambling, pornography and webcam-based sex or even to the ‘excessive’ use of social media platforms or online shopping, can end up in financial debt, let alone suffer from mental health-related problems. Those who end up being trafficked into domestic servitude, slavery, organ donation or the sex industry often commence their journeys online. Isolation can lead to radicalisation, sexting can lead to cyberbullying and online imagery can impact self-esteem. This presentation outlines the scope of online addictive behaviours, their psychological dynamics and, most importantly, how employers, friends and family might identify causes for concern as a result of behaviour both online and offline.

Academic Paper 8: Fake News in the Aftermath of an Attack: distinguishing fact from fiction

Ken Chen Xingyu, Senior Behavioural Sciences Research Analyst, Resilience, Safety and Security Psychology Branch, Home Team Behavioural Sciences Centre, Singapore

Most of our security efforts go into preventing attacks, yet we must also be prepared to manage disasters should they occur. All contingency plans include sections on liaising with the press and media, but we must also develop competency in managing ‘fake news’ which can be rife in the aftermath of an attack, sometimes just well-intended circulation of hearsay but potentially the publishing of intentionally misleading information. This can obviously be very upsetting for relatives and friends of victims, but it can also hamper emergency response efforts. This presentation shares the research on the spread of fake news in the aftermath of a terror attack, its implications explores contingency planning and the use of behavioural analysis to distinguish between fact and fiction should an event occur.

Panel Q&A

15:00-17:00 Session Theme: Training & Operational Mindset

Moderator’s Opening Remarks

Nina Brooks, Director, Security, Facilitation and IT, Airports Council International (ACI) World, Canada

Operational Angle 9: Policing & Security Operative Psychology: training to detect

Image result for belgium flag Bart Cappaert, Project Manager Behaviour Detection Programme, Federal Judicial Police, Belgium

This operational perspective will focus on the Belgian Integrated Police’s behavioural detection programme; its history and structure, selection of trainers, training approach and course content (specifically addressing how they ensure objectivity and prevent discrimination on grounds of ethnicity, gender or age).

Operational Angle 10: Teaching Awareness to Non-Security Staff: human trafficking in the crosshairs of the hospitality industry

Paul Betley, Director of Security EMEA, Hilton, UK

How do we get security buy-in from personnel whose primary role is customer service or safety? One of the criminal activities most identifiable within the transportation and hospitality industries is human trafficking; hotel receptionists and flight attendants alike are client-facing staff being trained to identify victims of trafficking and the traffickers themselves, whilst room cleaners and taxi drivers are also being encouraged to report unusual activity. HR departments are, likewise, being instructed to identify those employees potentially engaged in modern slavery. This presentation will look at one hotel chain’s approach to engaging their staff as behavioural analysts.

Operational Angle 11: The Customer is Not Always King: training aircrew in unruly passenger identification

Joe Carpenter, Corporate Security Specialist, Virgin Atlantic Airways Ltd., UK

Arguably no environment can benefit more from a proactive behavioural analysis regime than the aircraft cabin. Miss the threat at the airport and the result can be a violent incident taking place at 33,000 feet, two hours from the nearest airport and without access to law enforcement. Whilst flight attendants are trained in the restraint of unruly passengers, some airlines are taking steps to identify potentially unruly passengers before they even board. This presentation outlines how Virgin Atlantic’s training enables cabin crew to use behavioural detection techniques during boarding to identify not only intoxicated revellers but also victims of human trafficking and, in the worst-case scenario, potential terrorists.

Conference Takeaways: what is going to change on Monday morning?

Philip Baum, Managing Director, Green Light Ltd & Editor, Aviation Security International, UK & Visiting Professor, Aviation Security, Coventry University, UK

We want to ensure that you have some positive takeaways – action points – so that you can use the experience and knowledge gained at Behavioural Analysis 2020 to transform or, at the very least, initiate change within your organisations. This interactive session will help delegates depart with ideas as to what they are going to do first thing Monday morning!

Stop Press: In fact, we are not even going to wait until Monday morning to get the ball rolling. Behavioural Analysis Week Online will conclude with the official launch of:

The International Association of Behaviour Detection & Analysis is being formed to create an internationally recognised professional body that can further advance the standards and science in relation to behavioural detection, analysis and awareness, and help regulate a previously unregulated industry. All delegates to Behavioural Analysis Week Online 2020, providing they are currently employed in full-time roles that utilise behavioural analysis techniques, will qualify for their first year’s membership of the association for free. Join us online for the official launch and then, hopefully in person, at Behavioural Analysis 2021 for the launch party.

Andrew Palmer, Border Security Manager, Gatwick Airport Limited, & Chief Operating Officer, International Association of Behaviour Detection and Analysis, UK

PREVIOUS CONFERENCES 

MALL OF AMERICA, MINNEAPOLIS, USA 

DAY ONE: TUESDAY 21st MAY 2019

KEYNOTE: BEHAVIOURAL ANALYSIS FEDERAL BUREAU OF INVESTIGATION
Lessons Learned from Recent Terrorist Attacks, Karie Gibson, Supervisory Special Agent, Behavioral Analysis Unit, Federal Bureau of Investigation, USA

SESSION 1: BEHAVIOURAL ANALYSIS IN THE SPOTLIGHT
Understanding the Strengths and Weaknesses of Behaviour Detection: past failures and future potential, Dr Sarah Knight, Principal Psychologist, Defence Science and Technology Laboratory, UK
Perceptions Uncovered: the science of non-verbal communication, more than 60 years of research for security practitioners, Vincent Denault, Co-director, Centre for Studies in Nonverbal Communication Sciences and Lecturer, Department of Communication, Université de Montréal, Canada
Myth-busting: dispelling fake news, Louise Jupe, Portsmouth University, UK

SESSION 2: INDUSTRY EXPERIENCE
Sports Stadium Security, Billy Langenstein, Director Security Services and Investigation, National Football League (NFL), USA
Securing Places of Worship, Michael Masters, National Director & CEO, Secure Community Network, USA
Hotel Security, Mark Walker, Senior Manager, Global Security Training, Marriott International Inc., USA

SESSION 3: XENOPHOBIA
Xenophobia & Extremist Ideology: an analysis of recent attacks and the behaviours of the perpetrators, Joanna Mendelson, Senior Investigative Researcher & Director of Special Projects, Center on Extremism, Anti-Defamation League, USA
Pittsburgh: a reflection on the ‘Tree of Life’ attack of October 2018, Michael Masters, National Director & CEO, Secure Community Network, USA

SESSION 4: QUESTIONING BEHAVIOURAL ANALYSIS
The Mall of America: our hosts perspective, Ashly Helser, Security Special Operations Captain, Mall of America, USA

SESSION 5: SUICIDAL TERRORISM
Suicide Bomber Intervention: when time is not on your side, Michael Rozin, President, Rozin Security Consulting LLC, USA

Case Study: Stade de France, 13 November 2015

Day 2: WEDNESDAY 22nd MAY 2019

SESSION 6: AVIATION SECURITY
Operational Angle 5: Behavioural Analysis within the US Transportation System, Michael Silata, Specialized Screening Program Branch Chief, Transportation Security Administration, USA
Gatwick Airport: challenges in, and the successes of, implementing behavioural analysis in the UK, Andy Palmer, Border Security Manager, Gatwick Airport, UK
Israeli Profiling: new challenges in aviation security require an old approach, Roni Tidhar, Head of International Consulting Services, Israel Airports Authority, Israel
Transportation Screening Personnel: coping with increased cognitive load, Amir Neeman, Founder & Principal, Amir Neeman Consulting, USA

SESSION 7: QUESTIONING TECHNIQUES AND DECEPTION INDICATORS
The Art of Questioning: developing rapport, effective strategies and countering resistance, Dr. Christian Meissner, Professor of Psychology, Iowa State University, USA
New methods for training in deception detection: Advantages of Game-Based Learning, Prof. Norah Dunbar, Department of Communication, University of California Santa Barbara
Forensic Linguistics: warning signs in speech patterns, Frédéric Tomas, Univeristé de Paris 8, France

SESSION 8: SEXUAL ASSAULT AND SEXUALLY DEVIANT BEHAVIOUR
Contextual and Behavioural Risk Factors for Sexual Harassment and Assault in Public Venues, Zoë Peterson, Director of the Sexual Assault Research Initiative, Kinsey Institute, USA

SESSION 9: MENTAL HEALTH
Behavioural Indicators of Mental Health Issues, Karina Mesarosova, Aviation Psychologist and Managing Partner KM Flight Research & Training, Slovenia & Adjunct Professor at Embry-Riddle Aeronautical University, USA
Suicide Intervention: City of Malmo, Stefan Landenberg, Head of Unit, Culture Department, City of Malmö, Sweden

SESSION 10: THE COUNTERARGUMENT
Profiling and the Threat to Civil Liberties, Hugh Handeyside, Senior Staff Attorney, American Civil Liberties Union, USA

SESSION 11: HUMAN TRAFFICKING AND FLIGHT ATTENDANT ROLE IN AVIATION SECURITY
Human Trafficking; flight attendants observing behaviour, Nancy Rivard, President and Founder, Airline Ambassadors International, USA

Day 3: THURSDAY 23rd MAY 2019

SESSION 12: ARTIFICIAL INTELLIGENCE AND TECHNOLOGY’S ROLE IN BEHAVIOURAL ANALYSIS
Extremist Risk Assessment in the Workplace, Dr. Sagit Yehoshua, Criminologist, Israel
Automated Credibility Assessment: AI in border security, Prof. Aaron C. Elkins, Director, Artificial Intelligence Lab, San Diego State University, USA
CCTV: how can behavioural analysis techniques enhance surveillance operations, Prof. Craig Donald, Adjunct Associate Professor at Edith Cowan University, Perth, Australia
Behavioural Analysis: future applications of technology, Andrew Tatrai, University of Technology, Sydney, Australia

SESSION 13: MEGA EVENTS AND CROWDED PLACES
School Shootings: on scene behaviour of perpetrators, Kenneth Trump,  President, National School Safety and Security Services, USA
Joining the Dots: avoiding the silo mentality, Neville Hay, INTERPORT POLICE and Green Light Limited, UK
The Importance of Behavioural Analysis During an Actual Emergency, Andy Peloquin, Redrock Entertainment Services, USA

SESSION 14: CONCLUDING THOUGHTS
 What is going to change on Monday morning? Philip Baum, Managing Director, Green Light Ltd & Editor, Aviation Security International, UK & Visiting Professor, Aviation Security, Coventry University, UK
Afternoon Optional Programme: Security Tours Mall of America

PRINCIPALITY STADIUM, CARDIFF

DAY ONE: WEDNESDAY 14TH MARCH 2018

KEYNOTE: BEHAVIOURAL ANALYSIS
Lessons Learned from Recent Terrorist Attacks

SESSION 1: BEHAVIOURAL ANALYSIS IN PRACTICE: INDUSTRY FOCUS
Places of Worship: communities protecting themselves – Michael Whine MBE, Community Security Trust, UK
Sporting Events: combating court-siding and gambling – Andrew Wolfe Murray, Partner, Theseus Partners, UK
Transport Security: human trafficking in focus – Sarah-Jane Prew, Wales Anti-Slavery Leadership Group, UK & Airline Ambassadors International, USA

SESSION 2: THE BIOLOGY OF FEAR & DECEPTION
Fight, Flight or, Perhaps, Freeze: anxiety isn’t always what it seems – Louise Jupe, Department of Psychology, University of Portsmouth, UK
Case Study: The Impact of Integrating Real-time, Multichannel Behaviour Analysis and Elicitation/Engagement Strategies in
High-stake Contexts – Sorin Losnita, Romanian Intelligence Service, Romania, and Cliff Lansley, EIA Group, UK

SESSION 3: STEREOTYPING, PERCEPTION & RACIAL PROFILING
Understanding Intuitive Bias – Wim De Neys, CNRS & Université Paris Descartes, France
Good Looking People & the ‘Halo Effect’ – Ran Cohen, SDR® Academy, The Netherlands

Panel Discussion: Religious Sensitivities in Security Decision-Making
Moderated by: Philip Baum
Panel Members: Gurmel Singh, Secretary General, Sikh Council UK
Usama Hasan, Quilliam Foundation
Michael Whine MBE, Community Security Trust, UK

SESSION 4: ADDRESSING, BY UNDERSTANDING, SPECIFIC CRIMINAL & ANTI-SOCIAL ACTIVITY
Profile of the Fixated Threat in Action – David James, Theseus Partners, UK
Profile of Group Offenders – Dr Jessica Woodhams, University of Birmingham, UK
Profile of Frotteurs & Sexual Deviants – Dr Lynsey Gozna, University of Leicester, UK
Profile of a Cyber Criminal – Nadine Touzeau, Profiler, net-profiler, France

DAY 2: THURSDAY 15TH MARCH 2018

SESSION 5: POLICING PERSPECTIVES
Stop & Search: reasonable grounds? – Nick Glynn, Senior Programme Officer, Policing & Security Governance, Open Society Initiative for Europe, UK
Case Study: British Transport Police from concept to operation – Rae Jiggins, Polarm International Ltd., UK
Super Recognisers – Mick Neville, Super Recognisers International, UK

CASE STUDY:
Securing The O2 Arena
Paul Williams, Security Operations Manager, The O2, London, UK

SESSION 6: THE ROLE OF TECHNOLOGY
Intelligent CCTV: can the camera focus on unusual behaviour? – Simon Moore, Cardiff University, UK
Facial Thermographs: might heat spots identify negative intent? – Reyer Zwiggelaar, Aberystwyth University, UK
Layered Voice Analysis: the way we speak? – Amir Liberman, Nemesysco, Israel

SESSION 7: THE RESPONSE
The Art of Questioning: having THE conversation – Charlotte Hudson, Department of Psychology, University of Portsmouth, UK
Emergency Response: when you think the threat is real – Ofir Malka, CEO SafeZones, Germany
Insider Threat Response: identifying radicalisation in the workplace – Usama Hasan, Quilliam Foundation, UK

SESSION 8: MARAUDING FIREARMS ATTACKS & SUICIDAL TERRORISM
Marauding Firearms Attacks: not always by suicidal terrorists – Leeran Gold, Registered Psychologist, Promises Healthcare, Singapore
The Suicidal Terrorist: recruitment & training – Dr. Sagit Yehoshua, Criminologist, Israel
The Proof of the Pudding: attacks against aviation identified by behavioural analysis – Philip Baum, Managing Director, Green Light Ltd., UK

SESSIONS WERE CHAIRED BY:
Neville Hay, Brooklyn Associates, UK
Katharine Ng, OneCrew Limited, Hong Kong

 Conference Organiser:                          Headline Sponsor:                           Main Media Sponsor:

                        

Supporting Organisations:

                                                     

Media Sponsors: