BEHAVIOURAL ANALYSIS WEEK 2020 ONLINE
We are delighted to announce our programme for Behavioural Analysis Week Online 2020.
Please note that all timings are based on British Summer Time (BST). That said, almost all presentations will be recorded and accessible to registered delegates for a period of two weeks following the conference’s conclusion. This will facilitate delegates viewing all presentations, wherever their geographical location, at a time convenient to their time zone.
Day One: Monday 5 October 2020
11:00-13:00 Session Theme: Industry Experience
Chairman’s Opening Address
Philip Baum, Managing Director, Green Light Ltd., Editor, Aviation Security International, UK & Visiting Professor, Aviation Security, Coventry University, UK
Keynote 1: Behavioural Analysis: a security perspective
Prof. Paul Gill, Professor of Security and Crime Science, University College London, UK
Behavioural analysis is part and parcel of everyday life. It is a discipline embraced in organisational management, town planning and, extensively, within the healthcare sector. Our focus is on its benefits in safeguarding our society from the variety of threats we face from those with negative intent. This keynote address provides a scene-setter for the conference outlining the emotional responses of hostiles when planning and preparing a hostile act. Military tactics would dictate that we only win our security battles by understanding the nature of the enemy and by adapting our responses to the battlefield. That battlefield, for our delegates, may be civilian crowded places, transportation hubs, tourist attractions, sports stadia, places of worship and other public venues.
Security Perspective 1: Behavioural Analysis: the United Kingdom’s perspective
Dr Sarah Knight, Principal Senior Psychologist, DSTL, UK
The United Kingdom government, through various departments – including the Department for Transport, Centre for Protection of the National Infrastructure and the Home Office – has been researching how behavioural analysis can contribute to the security of different environments. It is anticipated that a guidance paper will be published by Her Majesty’s Government (prior to the commencement of the conference) outlining what capabilities organisations should have in place and what demands should be made of suppliers. This presentation will outline the rationale behind the research and highlight some of the most significant elements of it.
Behavioural Analysis at the Coalface
How have different industries gone about utilising behavioural analysis techniques to protect their patrons and infrastructure? What are the lessons learned that impact current deployment and staff recruitment and training?
- Operational Angle 1: Community Protection
Stephen Carr, Safer Communities Programme Manager, Welsh Government
- Operational Angle 2: Eurovision Song Contest
Lt. Col. (Retd.) Itzik Ashkenazi, former Head of Security, European Broadcasting Union & Co-founder, Contego Security, Israel
- Operational Angle 3: Casino
Speaker Invited (Awaiting Confirmation)
15:00-16:30 Session Theme: Behavioural Analysis in the Spotlight
Moderator’s Opening Remarks
Vincent Denault, LL.M., Co-Director, Center for Studies in Non-Verbal Communication Sciences, Université de Montréal, Canada
Academic Paper 1: Non-Verbal Behaviour: a scientific panorama
Pierrich Plusquellec, Professeur, Faculté des Arts et Sciences, Universite de Montreal, Canada
This overview of the science of non-verbal behaviour will set out the different forms of non-verbal communication and describe the link between non-verbal indicators and the emotional state of the person being observed. It will provide an understanding of what we can really identify in people’s non-verbal communication and set out what science can tell us about the link between non-verbal behaviours and the security threat a person might pose.
Academic Paper 2: Does Pinocchio’s Nose Actually Exist?: distilling myth from fact in the area of deception detection
Prof. Gordon Wright, Goldsmiths University of London, UK
Much is written about the way in which we can identify somebody trying to deceive us by their expression, but are we identifying the liar or simply a person who may be experiencing stress? Gaze, lip shape and facial touches may be subject to evaluation, but can micro-expressions truly indicate guilt?
17:00-17:45 Session Theme: Before Dinner, After Breakfast Keynote!
Keynote 2: Dr. David Matsumoto
Dr. David Matsumoto, Professor of Psychology, San Francisco State University (SFSU), Founder and Director, SFSU’s Culture and Emotion Research Laboratory and President & CEO, Humintell, USA
Depending on where you are in the world, this stand-alone presentation, given by one of the world’s most renowned and respected behavioural analysts will whet your appetite for dinner or energise you for the day ahead! Live from California, the organisers of Behavioural Analysis 2020 are delighted to welcome to the programme David Matsumoto.
Day Two: Tuesday 6 October 2020
09:30-11:00 Session Theme: In the Mind of the Profiler
Moderator’s Opening Remarks
Security Perspective 2: The Halo Effect: good looking people and women are innocent!
Diana Nowek, Training & Research, Institute of Nonverbal Communication, Austria
Whilst many critics of behavioural analysis argue that screeners are likely to racially profile, is that the only way in which bias and stereotyping impacts effective security decision-making? The ‘halo effect’ – where good looking people are deemed to be innocent – could be an even greater concern. So, to what extent does an offender’s appearance, or for that matter, their sex, impact the likelihood of their being interdicted? We examine the issue from a border control perspective and consider the challenges faced in training border guards to avoid stereotyping and appreciate that good looking people and women can also be threats!
Operational Angle 4: Deviant Behaviour: perception driving the need for baselining on the Metro in Russia
Dr. Andrey Demkin, Psychophysiologist and Clinical Psychologist, Russia
Behavioural analysis in security settings generally demands that we identify abnormal activity or deviations from our expectations. Yet the assessment is performed by individuals from a multitude of backgrounds and with an equally diverse set of perceptions as to what might be considered normal. We all have different opinions when it comes to risk-taking, care and respect for our elders, expressive styles, degrees of acceptable promiscuity, tolerance of the use of narcotics etc. This presentation highlights cultural-, gender-, age-based perceptions and how they are addressed in an operational context in the setting of the Metro in Russia.
Security Perspective 3: Human profiling: an intelligence-based profiling technique
Anne-Maree Quarmby, COO Intelligence Rising, Australia
Intelligence analysts and profilers have, in the past, often had separate roles. When they do intersect, analysts often employ default criminal profiling techniques that are not always the best fit for certain cases. Human profiling – a discipline with a grounding in intelligence field collection techniques – has a far wider scope of application and can be applied to victims, perpetrators, competitive private sector business analysis, state vs state futures analysis, policy and regulation. This presentation looks at the development of intelligence-based human profiling, the importance of memory, observation and recognition, and case studies relating to human profiling’s application in missing persons investigations.
12:30-13:30 Session Theme: Questioning Behavioural Analysis
Lunch Time, Question Time
Moderator: Philip Baum
We put behavioural analysis itself in the spotlight and ask a select group of practitioners, security consultants and academics to answer our delegates’ concerns. Whether it’s about procedures, regulations, technologies or responsibilities, conference participants will be encouraged to submit questions upon registration or upon their arrival at the conference venue.
- Will Bernhjelm, Security Director, Mall of America, USA
- Louise Jupe, Department of Psychology, University of Portsmouth, UK
- Dr Sarah Knight, Principal Senior Psychologist, Defence Science and Technology Laboratory (DSTL), UK
- Kenneth Long, CEO, International Association of Behaviour Detection and Analysis, UK
14:30-16:30 Session Theme: Suicidal Terrorism
Moderator’s Opening Remarks
Dr. Sagit Yehoshua, Criminologist, Hebrew University of Jerusalem & Institute for Counterterrorism, Israel
Academic Paper 3: Inside the Mind of a Suicide Bomber
Dr. Ilan Diamant, Tel Aviv University, Israel
In order to identify a potential suicide bomber, marauding firearms terrorist or lone shooter prepared to die, it is important to consider what their mindset is likely to be like on the day of the attack and en route to their target. What do we know about the mindset of attackers and what behaviours might they exhibit?
Academic Paper 4: Taking on the Persona of a Suicide Bomber
Dr. Anne Speckhard, Director, International Center for the Study of Violent Extremism & Adjunct Associate Professor of Psychiatry, Georgetown University School of Medicine, USA
How would average university students, of varied nationalities and religious backgrounds, think when role playing the part of a suicide bomber in comparison to what real apprehended (due to mission failure or last minute change of heart) suicide bombers have said about themselves? Quite a challenging study, but one, as this paper describes, that was undertaken in Belgium. Aside from motivation and mindset, the study also explored how role players would pick their target, if free to do so, and what he or she would feel in imagination when “recalling” strapping on an explosive self-detonating device.
Security Perspective 4: Suicide Bomber Intervention: when time is not on your side
Ivor Terret, Founder & General Manager, Enablement Advisors, Israel
The ability to respond to a potential suicide bomber in a timely manner depends on the approach of senior management to security. Adopt a tick-box approach and demand that staff continuously report concerns upward through a never-ending chain and one might be able to prevent petty crime and people with mental health issues. Being able to respond to a suicide bomber demands that all engaged in security are able, when the need arises, to take unilateral action. That action requires management buy-in: drafting the requisite operational protocols and countermeasures and supporting staff when they make the decision to act.
23:00-00:00 Session Theme: Late Night Chat, After Work Cuppa or Early Start
Moderator: Philip Baum
No particular agenda. Just grab a late night drink if you’re in Europe, have an after-work cuppa in the USA and Canada or get day three off to an earlier start if you are in Asia or Australasia…and join Philip Baum to mull over the key issues surrounding behavioural analysis and pontificate over the future of behavioural analysis in security settings. We’re allocating an hour…but will stay online until the fat lady sings!
Day Three: Wednesday 7 October 2020
09:30-10:30 Session Theme: Airport Screening
Moderator’s Opening Remarks
Operational Angle 5: Towards Unpredictability in Airport Screening: should we all be treated the same?
Signe Maria Ghelfi, Head of Research & Development, Zurich State Police, Switzerland
With the prospect of increasing passenger numbers, higher global uncertainty, and decreasing ticket prices, airport security is facing the challenge of being effective, efficient, while not negatively impacting on passengers’ enjoyment of their journey. Recently, the concept of unpredictability, originating in the social sciences, has been discussed as an approach for airport security. The assumption is that by being less predictable about where, how and what type of security measures are applied, security is improved. Behaviour detection can be applied using an unpredictable approach; however, operational challenges can arise. This talk will provide an insight into the deployment and evaluation of behaviour detection at the airport from an operational as well as from a scientific perspective. Conference delegates will learn about different approaches to measuring effectiveness of behaviour detection, and possible counter-strategies that perpetrators could utilise. Implications for practice and future research will also be discussed.
11:00-13:00 Session Theme: Mental Health in the Crosshairs
Moderator’s Opening Remarks
Keynote 3: Greenland’s Security Dilemmas
Vittus Qujaukitsoq, Minister of Finance, Naalakkersuisut (Government of Greenland)
Security is not just an issue for those states which traditionally face the threat of terrorism. Even from a crime prevention perspective, behavioural analysis is not only to protect crowded places. Insider threats and, as we shall see in the next session, mental health are concerns for all communities. Greenland, despite its relative isolation and only having a population of 55,000, is not immune to security challenges, many of which can be addressed by the implementation of behavioural analysis. As baseline expectations are much easier to quantify in smaller communities, it’s an ideal environment to trust humans more than machines.
Academic Paper 5: Jumpers: identifying those with suicidal intent
Dr. Jay Mackenzie, University of Westminster, UK
Tourist attractions, monuments, railways, shopping centres, airports and indeed anywhere with a balcony, bridge, platform or accessible rooftop will testify to the tragic frequency with which people attempt to take their own lives in very public acts of desperation. To what extent can we identify those with suicidal intent by behaviours and, even if we do, what steps can an untrained negotiator take to prevent them acting on their intentions? The results of research into suicidal behaviours at railway stations – commissioned by the Samaritans and funded by Network Rail – conducted in conjunction with the British Transport Police, Transport for London and Network Rail, as highlighted in this presentation, may well have beneficial security applications in other environments.
Security Perspective 5: Stalkers: behavioural indicators of the fixated
Totti Karpela, Peace of Mind Threat Management, Finland
Sports stadia, concert venues, red carpet event theatres, pageants, political rallies and all locations which attract celebrity visitors, politicians and performers have to protect themselves not only from the actions of those who wish to enter without a ticket, but also from those individuals who have the right of entry but who have negative intent due to excessive adulation for an individual or, worse still, a desire to target somebody in particular. What are the indicators of those with a fixated interest in an individual?
Operational Angle 6: Upskirting: non-consensual lingerie models
Det. Insp. Ashley Cooper, ViSOR Unit, British Transport Police, UK
Sexually deviant behaviour is a major concern for all crowded places. Frotteurs are active on mass transportation networks around the world. Another deviant behaviour, only recently criminalised in the UK, is that of upskirt photography where individuals, primarily men, attempt to use their mobile phones or cameras to photograph women as they are ascending escalators, sitting on hills or even simply standing on a train or in a shop. What do we know about the perpetrators of upskirting and how can they be identified and challenged? This operational perspective will share the experience of the British Transport Police in tackling upskirting along with other forms of assault.
15:00-17:00 Session Theme: Technology to the Rescue
Moderator’s Opening Remarks
Security Perspective 6: Automating Behavioural Analysis: using technology to decrease risk in crowded places
Brandon May, DSTL, UK
Whilst aviation has long been the target of terrorist attacks, other modes of transportation and live events are only relatively recently having to consider how to better prevent a mass casualty event. One look at the queues at airports should serve to dissuade other crowded places from adopting an airport-style approach to security, even if the profiling techniques utilised are effective. The answer may lie in technology and automating risk assessment.
Academic Paper 6: Assessing Behaviour in Written Communication
Lisa Kaati, Swedish Defence Research Agency & Nazar Akrami, Uppsala University, Sweden
Before their attacks, many perpetrators have published their intentions, justifications, or ideology in writing either via letters, online diaries, forum posts, or manifestos. Hence, detecting risk behaviour signals in written communication has far-reaching implications for preventing violent attacks. This presentation will demonstrate the profile risk assessment tool (PRAT) – a tool that can be used to analyse and assess the risk in written communication. PRAT automatically identifies psychological and other relevant variables in written communication based on linguistic indicators. More specifically, it applies the latest techniques in text analysis to extract a profile of the author based on risk-behaviour-related indicators, which previous research has shown to be significant predictors of violence.
Technology Showcase: It’s the Way That S/He Walks, Talks and Moves
Many of the automated approaches to behavioural analysis appear to be science fiction, but new products are emerging that can assess negative intent by the way that we move, the way that we walk, our skin temperature and voice patterns. Some of the latest research is presented in a non-commercial manner.
- CCTV in Shoplifter Identification
Dr. David Keatley, Senior Lecturer in Criminology, Murdoch University, and Director, Researchers in Behaviour Sequence Analysis (ReBSA), Australia
- Head Movement Vibration Analysis (Vibraimage)
Prof. Yana Nikolaenko, Raoul Wallenberg Institute of Special Pedagogy and Psychology, Russia
- Voice Analysis
Day Four: Thursday 8 October 2020
09:30-11:00 Session Theme: Insider Threat Detection
Moderator’s Opening Remarks
Security Perspective 7: Holistic Insider Threat Management
Elsine van Os, CEO/Founder, Signpost Six, The Netherlands
In the current threat environment, organisations cannot focus exclusively on protecting themselves from external threats; they must also be mindful of the threat posed by insiders committing acts of data theft for (commercial and state) espionage. This requires new steps for organisations as a whole, not just cyber and physical security. What can you as an employee do? What should you as an expert do? And how should organisations make a start to holistically tackle these blended threats? This paper will provide insights into the first steps to manage insider risk holistically by giving a framework for insider risk assessments applicable to all organisations.
Operational Angle 7: Insider Threat Detection in the Airport Community: the value of behavioural analysis layer
Peter Nilsson, Head of Airpol and Police Commissioner, European Union
The security of any element of a state’s critical infrastructure is often viewed in terms of multiple layers, each adding value and a degree of protection. When addressing the insider threat, such a multi-layered approach is even more essential as the vulnerability of, for example, an airport may lie at its very core. Insiders often have an advanced appreciation of the fallibilities of the technologies deployed, but it’s far harder to plot around observant employees. Airpol, the network of police and border guard units at European airports, has numerous expert groups, one of which looks at Insider Threats and another at the use of Behaviour Detection. This presentation outlines Airpol’s own work focussing on the way in which behavioural analysis has aided insider threat detection.
Academic Paper 7: Linguistic Indicators of Insider Deception
Prof. J. Mark Bishop, Director, The Centre for Intelligent Data Analytics, Goldsmiths, University of London, UK
FACT360 is a software system that deploys `transactional analytics’ to detect unusual behaviour across free-text corporate communication channels (email, etc.); its key USP is that many of its metrics work `out of the box’ in a language-neutral/ language-lite way, making the system particularly well suited for deployment across international spheres of operation (UN, EC, NATO etc). Currently, developers are able to signal subtle changes in language use (indicative of changing motivations); unusual patterns in communication behaviours (e.g. identifying high prestige actors, and flagging, say, when they abruptly begin communicating with low ranks [and vice versa] etc.) and changes in organisational `silo-isation’ (organisational structure). The software is currently being evaluated by several organisations and the [headline] results from these trials will be presented.
13:00-14:30 Session Theme: Online Behavioural Analysis
Moderator’s Opening Remarks
Security Perspective 8: Recruited Online: detectable online?
Anat Agron, Senior Terrorism and Extremism Analyst, MEMRI – The Middle East Media Research Institute, USA
We know that the internet has facilitated the radicalisation of many vulnerable individuals, but how do such people behave in their online communication? To what extent do they utilise mainstream social media platforms and, most importantly from this conference’s perspective, what might be indicators of online jihadi activity? We know, as one example, that radicalised westerners are openly chatting with ISIS widows in Syria. The presentation will include case studies of radicalised individuals being identified due to their social media postings and it will also consider current events (e.g. COVID-19 and the BLM protests) and the security impact they are having on online communication and the radicalisation process.
Operational Angle 8: Online Addictive Behaviours: offline suspicious signs
As society becomes ever more interconnected online, so do the risks to vulnerable individuals increase. Those who have addictions, such as to online betting/gambling, pornography and webcam-based sex or even to the ‘excessive’ use of social media platforms or online shopping, can end up in financial debt, let alone suffer from mental health-related problems. Those who end up being trafficked into domestic servitude, slavery, organ donation or the sex industry often commence their journeys online. Isolation can lead to radicalisation, sexting can lead to cyberbullying and online imagery can impact self-esteem. This presentation outlines the scope of online addictive behaviours, their psychological dynamics and, most importantly, how employers, friends and family might identify causes for concern as a result of behaviour both online and offline.
Academic Paper 8: Fake News in the Aftermath of an Attack: distinguishing fact from fiction
Ken Chen Xingyu, Senior Behavioural Sciences Research Analyst, Resilience, Safety and Security Psychology Branch, Home Team Behavioural Sciences Centre, Singapore
Most of our security efforts go into preventing attacks, yet we must also be prepared to manage disasters should they occur. All contingency plans include sections on liaising with the press and media, but we must also develop competency in managing ‘fake news’ which can be rife in the aftermath of an attack, sometimes just well-intended circulation of hearsay but potentially the publishing of intentionally misleading information. This can obviously be very upsetting for relatives and friends of victims, but it can also hamper emergency response efforts. This presentation explores contingency planning and the use of behavioural analysis to distinguish between fact and fiction should an event occur.
15:00-17:00 Session Theme: Training & Operational Mindset
Moderator’s Opening Remarks
Operational Angle 9: Policing & Security Operative Psychology: training to detect
Bart Cappaert, Project Manager Behaviour Detection Programme, Federal Judicial Police, Belgium
This operational perspective will focus on the Belgian Integrated Police’s behavioural detection programme; its history and structure, selection of trainers, training approach and course content (specifically addressing how they ensure objectivity and prevent discrimination on grounds of ethnicity, gender or age).
Operational Angle 10: Teaching Awareness to Non-Security Staff: human trafficking in the crosshairs of the hospitality industry
Paul Betley, Director of Security EMEA, Hilton, UK
How do we get security buy-in from personnel whose primary role is customer service or safety? One of the criminal activities most identifiable within the transportation and hospitality industries is human trafficking; hotel receptionists and flight attendants alike are client-facing staff being trained to identify victims of trafficking and the traffickers themselves, whilst room cleaners and taxi drivers are also being encouraged to report unusual activity. HR departments are, likewise, being instructed to identify those employees potentially engaged in modern slavery. This presentation will look at one hotel chain’s approach to engaging their staff as behavioural analysts.
Operational Angle 11: The Customer is Not Always King: training aircrew in unruly passenger identification
Joe Carpenter, Corporate Security Specialist, Virgin Atlantic Airways Ltd., UK
Arguably no environment can benefit more from a proactive behavioural analysis regime than the aircraft cabin. Miss the threat at the airport and the result can be a violent incident taking place at 33,000 feet, two hours from the nearest airport and without access to law enforcement. Whilst flight attendants are trained in the restraint of unruly passengers, some airlines are taking steps to identify potentially unruly passengers before they even board. This presentation outlines how Virgin Atlantic’s training enables cabin crew to use behavioural detection techniques during boarding to identify not only intoxicated revellers but also victims of human trafficking and, in the worst-case scenario, potential terrorists.
Conference Takeaways: what is going to change on Monday morning?
Philip Baum, Managing Director, Green Light Ltd & Editor, Aviation Security International, UK & Visiting Professor, Aviation Security, Coventry University, UK
We want to ensure that you have some positive takeaways – action points – so that you can use the experience and knowledge gained at Behavioural Analysis 2020 to transform or, at the very least, initiate change within your organisations. This interactive session will help delegates depart with ideas as to what they are going to do first thing Monday morning!
MALL OF AMERICA, MINNEAPOLIS, USA
DAY ONE: TUESDAY 21st MAY 2019
KEYNOTE: BEHAVIOURAL ANALYSIS FEDERAL BUREAU OF INVESTIGATION
Lessons Learned from Recent Terrorist Attacks, Karie Gibson, Supervisory Special Agent, Behavioral Analysis Unit, Federal Bureau of Investigation, USA
SESSION 1: BEHAVIOURAL ANALYSIS IN THE SPOTLIGHT
Understanding the Strengths and Weaknesses of Behaviour Detection: past failures and future potential, Dr Sarah Knight, Principal Psychologist, Defence Science and Technology Laboratory, UK
Perceptions Uncovered: the science of non-verbal communication, more than 60 years of research for security practitioners, Vincent Denault, Co-director, Centre for Studies in Nonverbal Communication Sciences and Lecturer, Department of Communication, Université de Montréal, Canada
Myth-busting: dispelling fake news, Louise Jupe, Portsmouth University, UK
SESSION 2: INDUSTRY EXPERIENCE
Sports Stadium Security, Billy Langenstein, Director Security Services and Investigation, National Football League (NFL), USA
Securing Places of Worship, Michael Masters, National Director & CEO, Secure Community Network, USA
Hotel Security, Mark Walker, Senior Manager, Global Security Training, Marriott International Inc., USA
SESSION 3: XENOPHOBIA
Xenophobia & Extremist Ideology: an analysis of recent attacks and the behaviours of the perpetrators, Joanna Mendelson, Senior Investigative Researcher & Director of Special Projects, Center on Extremism, Anti-Defamation League, USA
Pittsburgh: a reflection on the ‘Tree of Life’ attack of October 2018, Michael Masters, National Director & CEO, Secure Community Network, USA
SESSION 4: QUESTIONING BEHAVIOURAL ANALYSIS
The Mall of America: our hosts perspective, Ashly Helser, Security Special Operations Captain, Mall of America, USA
SESSION 5: SUICIDAL TERRORISM
Suicide Bomber Intervention: when time is not on your side, Michael Rozin, President, Rozin Security Consulting LLC, USA
Case Study: Stade de France, 13 November 2015
Day 2: WEDNESDAY 22nd MAY 2019
SESSION 6: AVIATION SECURITY
Operational Angle 5: Behavioural Analysis within the US Transportation System, Michael Silata, Specialized Screening Program Branch Chief, Transportation Security Administration, USA
Gatwick Airport: challenges in, and the successes of, implementing behavioural analysis in the UK, Andy Palmer, Border Security Manager, Gatwick Airport, UK
Israeli Profiling: new challenges in aviation security require an old approach, Roni Tidhar, Head of International Consulting Services, Israel Airports Authority, Israel
Transportation Screening Personnel: coping with increased cognitive load, Amir Neeman, Founder & Principal, Amir Neeman Consulting, USA
SESSION 7: QUESTIONING TECHNIQUES AND DECEPTION INDICATORS
The Art of Questioning: developing rapport, effective strategies and countering resistance, Dr. Christian Meissner, Professor of Psychology, Iowa State University, USA
New methods for training in deception detection: Advantages of Game-Based Learning, Prof. Norah Dunbar, Department of Communication, University of California Santa Barbara
Forensic Linguistics: warning signs in speech patterns, Frédéric Tomas, Univeristé de Paris 8, France
SESSION 8: SEXUAL ASSAULT AND SEXUALLY DEVIANT BEHAVIOUR
Contextual and Behavioural Risk Factors for Sexual Harassment and Assault in Public Venues, Zoë Peterson, Director of the Sexual Assault Research Initiative, Kinsey Institute, USA
SESSION 9: MENTAL HEALTH
Behavioural Indicators of Mental Health Issues, Karina Mesarosova, Aviation Psychologist and Managing Partner KM Flight Research & Training, Slovenia & Adjunct Professor at Embry-Riddle Aeronautical University, USA
Suicide Intervention: City of Malmo, Stefan Landenberg, Head of Unit, Culture Department, City of Malmö, Sweden
SESSION 10: THE COUNTERARGUMENT
Profiling and the Threat to Civil Liberties, Hugh Handeyside, Senior Staff Attorney, American Civil Liberties Union, USA
SESSION 11: HUMAN TRAFFICKING AND FLIGHT ATTENDANT ROLE IN AVIATION SECURITY
Human Trafficking; flight attendants observing behaviour, Nancy Rivard, President and Founder, Airline Ambassadors International, USA
Day 3: THURSDAY 23rd MAY 2019
SESSION 12: ARTIFICIAL INTELLIGENCE AND TECHNOLOGY’S ROLE IN BEHAVIOURAL ANALYSIS
Extremist Risk Assessment in the Workplace, Dr. Sagit Yehoshua, Criminologist, Israel
Automated Credibility Assessment: AI in border security, Prof. Aaron C. Elkins, Director, Artificial Intelligence Lab, San Diego State University, USA
CCTV: how can behavioural analysis techniques enhance surveillance operations, Prof. Craig Donald, Adjunct Associate Professor at Edith Cowan University, Perth, Australia
Behavioural Analysis: future applications of technology, Andrew Tatrai, University of Technology, Sydney, Australia
SESSION 13: MEGA EVENTS AND CROWDED PLACES
School Shootings: on scene behaviour of perpetrators, Kenneth Trump, President, National School Safety and Security Services, USA
Joining the Dots: avoiding the silo mentality, Neville Hay, INTERPORT POLICE and Green Light Limited, UK
The Importance of Behavioural Analysis During an Actual Emergency, Andy Peloquin, Redrock Entertainment Services, USA
SESSION 14: CONCLUDING THOUGHTS
What is going to change on Monday morning? Philip Baum, Managing Director, Green Light Ltd & Editor, Aviation Security International, UK & Visiting Professor, Aviation Security, Coventry University, UK
Afternoon Optional Programme: Security Tours Mall of America
PRINCIPALITY STADIUM, CARDIFF
DAY ONE: WEDNESDAY 14TH MARCH 2018
KEYNOTE: BEHAVIOURAL ANALYSIS
Lessons Learned from Recent Terrorist Attacks
SESSION 1: BEHAVIOURAL ANALYSIS IN PRACTICE: INDUSTRY FOCUS
Places of Worship: communities protecting themselves – Michael Whine MBE, Community Security Trust, UK
Sporting Events: combating court-siding and gambling – Andrew Wolfe Murray, Partner, Theseus Partners, UK
Transport Security: human trafficking in focus – Sarah-Jane Prew, Wales Anti-Slavery Leadership Group, UK & Airline Ambassadors International, USA
SESSION 2: THE BIOLOGY OF FEAR & DECEPTION
Fight, Flight or, Perhaps, Freeze: anxiety isn’t always what it seems – Louise Jupe, Department of Psychology, University of Portsmouth, UK
Case Study: The Impact of Integrating Real-time, Multichannel Behaviour Analysis and Elicitation/Engagement Strategies in
High-stake Contexts – Sorin Losnita, Romanian Intelligence Service, Romania, and Cliff Lansley, EIA Group, UK
SESSION 3: STEREOTYPING, PERCEPTION & RACIAL PROFILING
Understanding Intuitive Bias – Wim De Neys, CNRS & Université Paris Descartes, France
Good Looking People & the ‘Halo Effect’ – Ran Cohen, SDR® Academy, The Netherlands
Panel Discussion: Religious Sensitivities in Security Decision-Making
Moderated by: Philip Baum
Panel Members: Gurmel Singh, Secretary General, Sikh Council UK
Usama Hasan, Quilliam Foundation
Michael Whine MBE, Community Security Trust, UK
SESSION 4: ADDRESSING, BY UNDERSTANDING, SPECIFIC CRIMINAL & ANTI-SOCIAL ACTIVITY
Profile of the Fixated Threat in Action – David James, Theseus Partners, UK
Profile of Group Offenders – Dr Jessica Woodhams, University of Birmingham, UK
Profile of Frotteurs & Sexual Deviants – Dr Lynsey Gozna, University of Leicester, UK
Profile of a Cyber Criminal – Nadine Touzeau, Profiler, net-profiler, France
DAY 2: THURSDAY 15TH MARCH 2018
SESSION 5: POLICING PERSPECTIVES
Stop & Search: reasonable grounds? – Nick Glynn, Senior Programme Officer, Policing & Security Governance, Open Society Initiative for Europe, UK
Case Study: British Transport Police from concept to operation – Rae Jiggins, Polarm International Ltd., UK
Super Recognisers – Mick Neville, Super Recognisers International, UK
Securing The O2 Arena
Paul Williams, Security Operations Manager, The O2, London, UK
SESSION 6: THE ROLE OF TECHNOLOGY
Intelligent CCTV: can the camera focus on unusual behaviour? – Simon Moore, Cardiff University, UK
Facial Thermographs: might heat spots identify negative intent? – Reyer Zwiggelaar, Aberystwyth University, UK
Layered Voice Analysis: the way we speak? – Amir Liberman, Nemesysco, Israel
SESSION 7: THE RESPONSE
The Art of Questioning: having THE conversation – Charlotte Hudson, Department of Psychology, University of Portsmouth, UK
Emergency Response: when you think the threat is real – Ofir Malka, CEO SafeZones, Germany
Insider Threat Response: identifying radicalisation in the workplace – Usama Hasan, Quilliam Foundation, UK
SESSION 8: MARAUDING FIREARMS ATTACKS & SUICIDAL TERRORISM
Marauding Firearms Attacks: not always by suicidal terrorists – Leeran Gold, Registered Psychologist, Promises Healthcare, Singapore
The Suicidal Terrorist: recruitment & training – Dr. Sagit Yehoshua, Criminologist, Israel
The Proof of the Pudding: attacks against aviation identified by behavioural analysis – Philip Baum, Managing Director, Green Light Ltd., UK
SESSIONS WERE CHAIRED BY:
Neville Hay, Brooklyn Associates, UK
Katharine Ng, OneCrew Limited, Hong Kong