Information, Intelligence, Data (Cyber), Knowledge
Gathering & Protection
Information/intelligence is a “Progressive Force” in the business “Battlefield“.
The vision of information/intelligence is at our fingertips, at any given time or place, which both induces and slows down processes. It is the dream of each and every businessman and organization, whether public or institutional.
Everything begins when information/intelligence falls into the right or wrong hands, and thus influences the process of decision making.
Information/intelligence of this kind can lead to the rise or fall of corporations and organizations, may hinder business transactions, or alternatively, may give a critical advantage to the opposition and competition.
The Nightmare of any leader/manager/owner is the threat of infiltration of competitors from outside and from the circle close to you, into the home field – discussions, decisions, professional secrets, conversations, phone calls (linear, cellular, fax), bids, computer, vehicle, home and family.
The major and immediate advantage in the competitive intelligence world is the tight security of information/intelligence that prevails in your business or organization, resulting from the numerous and varying threats of which we are unaware in our everyday routine, and preventing tremendous damage to your business, organization and to you, the manager/owner, on a personal level.
Critical information/intelligence is worth a lot. Companies, institutions and organizations invest high budgets in two parallel channels:
- Keeping the existing information/intelligence from leaking out, thus preventing a significant advantage to the opposition.
- Obtaining information/intelligence in order to create an advantage over the competition/opposition, according to the universal saying:
“The best defense is offence”
Security in terms of protection and collection of information/intelligence is an array of protection circles. The core of this array is a combination of procedures, skills and advanced technologies. The outer circles must account for all aspects of physical security, including entry control, communications control and infrastructure (linear, data, cellular), computer systems and network infrastructure, departmentalization, employee control, guest control, internal and external maintenance control as well as issues such as organizational awareness and employment of tools for gathering information.
Your ability to recognize and define imminent threats to the assets you are protecting, and to decide on an appropriate operational response is essential.
True professional experience in the field of information/intelligence protection is both rare and unique. Our professional experience has been accumulated through years of service to various branches of the Israeli security establishment, including:
- The Israeli Security Agency (Secret service “Shabac”)
- The “Mossad”
- Private businesses
- Political organizations
Information Security Officer (ISO) – Qualification & certification
Having an ISO or the equivalent function in the organization has become a standard in business, government, and non-profit sectors. Throughout the world, a growing number of organizations have an ISO.
In corporations, the trend is for ISO’s to have a strong balance of business acumen and technology knowledge.
ISO’s are often in high demand and compensation.
The Information Security Officer (ISO) is the executive within the organization responsible for developing and implementing the information, Intelligence, data (cyber), knowledge gathering actions & security measures required.
It includes handling up to date security surveys, permanent threat assessments, set information security policy procedures, design and use technology to protect the enterprise’s communications, systems and assets from both internal and external threats.
The ISO directs the organization’s staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks of any kind.
The ISO should prepare the organization’s staff in all levels to respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of info security policies and procedures.
Typically, the ISO’s influence reaches the entire organization. Responsibilities may include, but not be limited to:
- Information risk management
- Information regulatory compliance
- Information securityand information assurance
- Identity and access management
- Information privacy
- Security architecture
- Disaster recoveryand business continuity management
- Information technology controlsfor financial and other systems
- Computer emergency response team/computer security incident response team
- IT investigations, digital forensics, e-Discovery
- Information security operations centeroperation for better control and supervision.
Operative intelligence gathering methods & means
Module – “HUMINT – The Human Side of Intelligence”
This module will focus on the human factor in the collection of intelligence. It will cover both open and clandestine sources of information.
- Open sources of information include newspapers, magazines, commercial news clipping services, court transcripts and filings, libraries, and public records.
- Clandestine sources will analyze the history and current status of undercover agents, their recruitment, training, management, evaluation and control.
- Before the gained information can be put to work for the organization’s relevant departments, verification is necessary to ascertain its accuracy.
- Undercover activity: Building and adapting a cover, protection against undercover operators.
- Operative actions: Covert searches + information gathering from target +obtaining documents
- Recruitment and “running” of operatives: Finding, recruiting, and “running” the candidate.
- How to prevent mishaps, pre-hiring checks.
- Planting an operative: How it is done?
Module – Social engineering
Module – questioning, overt- covert, interrogation
Module – Surveillance
In this module the student will get acquainted with the techniques of physical and technical surveillance, for the purpose of obtaining information and/or evidence while conducting an investigation. The student will learn the difference between covert vs. overt surveillance and the means by which they are carried out depending upon the situation.
The module will cover the various methods used in the field as well as the applications of modern technology to expand the field agent’s reach.
- Covert vs. overt surveillance
- Types of surveillance
- Observation – day/night, quiet/crowded area, urban/suburban area
- Surveillance on foot and per vehicle
- Stationary surveillance and observation posts
- Operational disguises and make-up
- Communication – overt/covert, concealed on person or in vehicle, familiarity with equipment and its operation
- Surveillance technology
- Identification – by picture or description
- Report writing
Module – Technical surveillance equipment &electronic countermeasures
In this module, different surveillance methods will be reviewed, including mechanical, electronic, visual and optical attacks. Mechanical attacks comprise everything from tape recording to physical capture of the information through oral or written form. Visual and optical attacks perhaps present the most common, least suspected form of intelligence collection.
- Various countermeasures to RF and wave transmitters, including infrared, laser and air techniques for intelligence collection.
- Detection, through systematic methods of conducting a physical search, electronic countermeasures and nullification including a practical understanding of how to conduct electronic sweeps to detect radio transmitters.
- How to conduct a physical search.
- Nullification of all surveillance methods.
Module – Phone line tapping countermeasures
- Basic electricity and measurement, transmitters, overt and clandestine, telephone analyzers, and non-linear junction detectors.
- Electronic switching systems, central office procedures, telephone testing, line tapping and tracing.
- Telephone system design, security practices, and devices like scramblers.
- Effective methods of nullification and all methods of telephonic intercepts.
Module – Covert video technology and sting operations
This module will teach the student basic theory, application and the technology available for covert video surveillance.
- Equipment, from light source to final monitoring, recording and printing for legal documentation.
- Developments in video technology miniaturization and remote transmission, video motion detectors, VCRs and frame storage devices.
- The practical application of video surveillance in retail stores as well as open-air surveillance.
- “Sting operations”: how they are set up, site selection, security operatives, video camera selection and operation, identification of suspects, evidence preservation and documentation. (While the course is focused on criminal surveillance for the law enforcement community, there are numerous private security applications of sting operations).
Module – Electronic tracking technology
- Tracking theory and its application in an urban environment, field-tracking problems, placement of transmitters, and re-acquisition of lost signals.
- New technologies and their potential use in the security field such as satellite communication networks. Such technologies have potential use for tracking everything from stolen property to kidnap victims.
Module – Computer intelligence collection and security
Intelligence collection by computer is a rapidly expanding technology and service that is readily available to a growing number of private investigators, security officers and law enforcement investigators.
This module will cover many databases that can be accessed by computer, including: personal and business records, assets location and local address searches.
- The essentials of computer security, including security software programs, operational security systems, protection of hardware devices, protection of software and data, transmission security, audit trails and standard practice procedures for computer systems.
Module – Internal security
This module will cover issues including personnel, document and physical security.
- Personnel security refers to the policies and procedures intended to determine that an individual is not currently a security risk, and are not likely to become one. A personnel security program is intended to prevent criminal activities by employees, espionage attempts by external intelligence forces and unintentional acts by employees that could lead to a compromising situation.
- Document security, classification management, reproduction, disposal and transmission of sensitive or classified documents.
- Physical security includes issues like access control, security patrols, personnel identification and visitor control, as well as methods of detecting unauthorized intrusion or activity, alarm systems and facility clearances.
- Simulative drills and practice of information, Data and knowledge protection planning (field exercises)
Shalom and Welcome,
We are in the security instruction domain, maybe more than the age of most of our students that have joined us; our institute was established in 1987 by a group of senior retired officers, after completing long careers in the Israeli finest security establishment, together with younger veterans from those organizations we do our best to share our know how and expertise accumulated by the Israeli and other security experts worldwide.
5 years ago, we upgraded and successfully reached a solution to overcome the language barrier that we faced during our multinational students training periods in Israel, Switzerland and other countries.
We have successfully developed a very sophisticated and most up to date Israeli instruction platform translated to various languages (English, French, Russian, German,Spanish, Arabic, Italian, Serbian, Portuguese) in order to provide our students (prior to their arrival to our training) a unique and comprehensive Security Instruction Manual that we call the “SECURITY BIBLE”.
Today, we are proud to see tremendous professional achievements by all our candidates who are reaching the peak of our practical completion training. Because of these achievements, we can double up the time of practice and drilling instead of spending time on Academic/ Theoretical lectures that are not always understood by all due to language barriers. With this upgrade we have managed to reduce the qualification’s duration which poses as a critical economic barrier for many candidates from the Civilian Security Industry.
The Mental and Physical prior preparedness and full understanding of all the requirements needed to become a successful security operative, Team leader or Manager delivered successful “WINNERS” that were educated to a very high standard on what to expect, and were able to reduce for themselves the course’s difficulties, to pass all exams with ease, gained very high scores with an unforgettable life experience!
✔ COURSE FEES INCLUDE
✔ ACCOMMODATION AND LODGING
✔ REQUIREMENTS/SECURITY KIT
✔ REQUIRED DOCUMENTS
✔ PARTICIPATION ADMISSION
✔ PHYSICAL FITNESS REQUIREMENTS
✔ PACKING LIST FOR PRACTICAL COURSES
✔ DOWNLOAD REGISTRATION FORM
95% of our graduates improved their status in the security industry!
“Fresh” Graduates of ISA ISRAEL are directed to active Members that are
Established and operate Security firms worldwide and can offer
Course fees Include:
- Receiving via internet the “SECURITY BIBLE” – The ultimate instruction manual for Elite personnel & Management.
- Attendance at the professional course.
- All of the instruction equipment, vehicles, weapons.
- T-Shirts & special gifts.
- Exploring the country while participating in the training.
- Participation Certificate.
Course’s fees do not include flight & lodging !!!
Accommodation and Lodging
“Boarding Style Lodging”
- A trainee needs to calculate 65-75 Euro for his/her own expenses for accommodation & meals per day.
- ISA-Israel will book the accommodation automatically after registration for the trainee. The trainee will cover the cost of accommodation in the hotel on his/her arrival.
- Israeli Emergency Tactical Defense Methods (Krav Maga + Combat Shooting) – no previous formal training is required, however the candidate should have basic skills and knowledge in martial arts and shooting
- VIP / Close Protection Specialization practical course – no previous formal training is required, however better to have former protection qualification/experience or certificate issued by any other training center in the last 3 years in the security industry.
- Protection and Counter Terrorism Specialization – Elite Protection Operative practical course – better to have former protection qualification/experience or certificate issued by any other training center in the last 3 years in the security industry.
- Protection and Counter Terrorism Management Specialization course – the candidate should have former protection qualification/experience – certificate issued by any other training center in the last 3 years in the security industry.
- VIP / Close Protection & Counter Terrorism INSTRUCTOR course – the candidate should be a former graduate of ISA – Israel OR have former protection qualification/experience in the security industry or police/army background. The candidate should be between the ages of 25-60 (Exceptions possible), reasonable physical fitness, and have records of past or present occupation in the protection service domain.
Required Documents for ISA – ISRAEL Practical Courses:
These specialized courses are heavily regulated by the Ministry of Defense and Homeland Security of Israel and Switzerland.
Participants must bring to ISA the following documents in order to be accepted for enrollment.
- Health Certificate– stating that the candidate is physically and mentally fit for the training.
- Medical Insurance– each candidate must be covered by his own medical insurance throughout all course activities.
- Criminal Background Check/ Security Clearance- certifying that the candidate has no criminal record.
Local authority permitted certifying that the candidate has no criminal record. One of these can also be accepted:
- Active police or Military service or any government department employee identification card or official statements
- A lawyer statement
- Valid firearm license
- Security company employee identification card
- Please send via internet:
- Copy of your Passport with your details on
- Up-to-date passport picture
- Health Certificate
- Criminal Background Check/ Security Clearance
*Those joining the courses in Switzerland may expect to exploring Switzerland, Germany, Italy and France while drilling and practicing.
*Those coming from countries that are required to get a visa to enter Israel or Switzerland be sure to be advised to obtain a Multiple Entry Visa.
PRIOR TO YOUR PRACTICAL TRAINING START !!!
Upon receiving your registration form + 50% of the training fee and the requiered security kit documents no later than 90 days prior to the start of the course, You will receive via email from the ISA – Israel office the “SECURITY BIBLE” ISA – ISRAEL’s instruction manual of your program that you should study (and be prepared for theoretical exams) prior to reaching us.
About 2 weeks prior to your course, ISA-Israel office will send you a letter with practical instructions for arrival to our training site.
Course Language- English
- The course is taught in very basic English- there is NO need to speak fluently.
Recommended- Self Preparatory Training
- From past experience, we believe that it is vital for the trainee who wishes to take part in our courses to partake in self preparatory training prior to his arrival to our course.
Physical Fitness Requirements for ISA’s Practical Courses (for graduating the course)
- Horizontal bars- 12 or more (Pull ups)
- 3000 meters- less than 17 minutes
- Parallel Bars- more then 16 (dips)
- Sit- ups, cross-legged against the wall, minimum 60 sit ups- less than one and a half minutes
- 400 meters- Maximum 75 seconds- running in pairs
Packing List for Practical Courses:
- International driving license
- 2 sets of “Tactical” pens , khaki, black, gray or dark blue- not camouflage
- 1 pair of running shoes
- 2 sets of corporate casual wear (must have collar)
- 1 sturdy belt for use of holsters and pistol
- 1 pair of street shoes (no sneakers)
- 2 rolls of ? inch medical tape
- 1 set each ear (foamiest, not muffs) and eye protection
- 2 knee protectors + 2 elbow protectors
- 1 set of formal wear, dark colors (suit and tie)
- 2 passport pictures
- Digital camera- recommended
Additional Packing List for High Risk & Maritime Protections Courses Only
- 1 Compass
- 1 Flash Light
- 2 long sleeve shirts suitable for desert environment
Packing List for the Management Course- Physical Fitness is NOT Mandatory
- Casual Wear
- 2 Passport photographs
- Laptop- recommended
- Digital Camera- recommended
- If you come from a country that requires a visa to enter Israel or Europe, then please complete your registration and participation payment 45 days prior to the training and apply to the relevant consulate in your country to start the visa process.
- As your training provider, we are not and cannot be held responsible for any applications for entry into the country you wish to arrive for our courses. We will assist with providing an invitation and addition letters only after receiving full course fee payment in order to help shorten the visa process.
- Consulate staff will require your employment status and organization, a clean criminal record, and the financial mans to pay for your stay during your visit in Israel.
- Cancellations by ISA-Israel- we reserve the right to postpone, cancel, or alter the dates or provisions of a course and/or the venue of the course.
- Cancellations by the client- in the event of a cancellation by the delegate, the delgate’s manager or any representative of the delegate’s organization, bookings will be transferred to the next available course, or to a future date that meets the candidate’s request. A substitute delegate may be sent at no additional cost provided the substitute meets all necessary pre-entry conditions for that course. If a booking is cancelled or transferred to a different course by the delegate or their representative, the following fees will be payable:
- Notice Given: (1) more than 30 days, 50% fee returned. (2) Less than 30 days, 0% of fee returned, however, you can transfer to another future date, if places are available. Telephone cancellations are accepted but most be confirmed immediately in writing (by post, fax, or email).
- Placement Deposit: Your booking must be accompanied by a 50% deposit in order to guarantee a spot in the course- if you are not able to make this deposit now, do not place an order.
- No refund after receive of the Instruction book and manual.