Please find below the programme for Behavioural Analysis 2018, outlining the key subjects to be discussed in Cardiff.
Members of The Security Institute are able to claim CPD points for attending Behavioural Analysis 2018. Attending both days of the conference will allow you to receive 12 points.
Behavioural Analysis 2018
14th – 15th March 2018
Principality Stadium, Cardiff, Wales
Day One: Wednesday 14th March 2018
08.00 Registration & Coffee
09.00 Conference Chairman’s Opening Address
Philip Baum, Managing Director, Green Light Ltd
& Editor, Aviation Security International
Session 1: Behavioural Analysis in Practice
09.15 Behavioural Analysis: Industry Focus
Behavioural Analysis and visitor/crowd surveillance techniques are used in a broad range of different environments. Behavioural Analysis 2018 looks at some industry sectors and presenters explain how surveillance has enhanced security and addressed specific challenges beyond that of terrorism.
09.20-09.45 Places of Worship: communities protecting themselves
Jews, Christians, Bahais and minority Muslim groups are among those particularly threatened by jihadi terrorism and the government’s Action Against Hate, and the Places of Worship Security Funding Scheme recognise this and provide advice and funds to mitigate the threat. Michael Whine’s presentation will analyse the sources of threats to places of worship and illustrate how government, police and faith communities can mitigate the threats.
Michael Whine MBE, Director, Government & International Affairs, Community Security Trust, UK
09.45-10.10 Sporting Events: combatting court-siding and gambling
The threat to sporting events is not simply one of violence or physical attack. The event itself provides opportunities for many criminals and concerning individuals to access the public, professional sports stars and brands to further their own cause or to profit from illegal behaviour. This presentation looks at ‘courtsiding’ and illegal gambling: what it is, how the perpetrators operate and what can be done to combat the risk.
Andrew Wolfe Murray, Partner, Theseus Partners, UK
10.10-10.30 Transport Security: human trafficking in focus
Human Trafficking is one of the largest growing crimes in the world and transportation networks are poignant channels for the transport of victims. Sarah-Jane Prew will discuss the importance of understanding and training in behavioural indicators in order to successfully identify victims.
Sarah-Jane Prew, Wales Anti-Slavery Leadership Group, UK & Airline Ambassadors International, USA
10.30 Keynote Case Study: Mall of America
Since opening its doors in 1992, Mall of America® has revolutionised the shopping experience and is now one of the top tourist destinations in the USA, with over 40 million visitors per annum. Each year, it hosts more than 400 events, ranging from concerts, to celebrity appearances and fashion shows, generating nearly $2 billion revenue. With hotels on site and a sports stadium next door – home to this year's Super Bowl - it is a unique property and multi-faceted organisation which regards security as a priority. Mall of America Security is a nationally recognised department staffed by over 175 personnel who utilise behavioural analysis techniques in their daily operations. Ashly Helser joins us to explain the security infrastructure, the recruitment and training of its high calibre officers and the holistic approach it takes, with its industry leading programmes and practices, which include bike patrols, K9 units, special operations plain clothed officers, and monthly lockdown drills.
Ashly Helser, Security Special Operations Captain, MOA, Minnesota
11.00 Coffee & Networking
11.30 Session 2: The Biology of Fear & Deception
11.35 Fight, Flight or, Perhaps, Freeze: anxiety isn't always what it seems
What happens to the body when a person is experiencing stress, distress or fear? This paper sets out to explain to security specialists the way in which our bodies might emit indications of discomfort or anxiety. Delegates will gain a better understanding of the sympathetic and parasympathetic nervous systems, the fight or flight response and, in particular, how we might (or might not) be able to identify deception through observation of visible physiological reactions to stressors. The presentation will also consider what steps those with ill intent might take to cover up signs of stress which would otherwise be emitted and the reasons why not every liar displays signs of nervousness in the first place.
Louise Jupe, Department of Psychology, University of Portsmouth, UK
12.05 Case Study: The Impact of Integrating Real-time, Multichannel Behaviour Analysis and Elicitation/Engagement Strategies in High-stake Contexts
This session will share the impact of two components of behavioural analysis for those responsible for observing, targeting, engaging and responding to those who may pose a serious threat to airport safety and security. First, the challenge of primary detection; identifying and targeting those with potential malintent from a crowd of genuine airport users from behaviour alone, without racial or other discriminatory profiling practices. Secondly, testing the prediction through real-time behavioural analysis across multiple communication channels using powerful elicitation and questioning techniques. We will outline how this increased true negatives by 400% and reduced false positives by 60% in a high-stake experiment, conducted over six days in a busy airport by an integrated team of behaviour detection officers from civil, police and military agencies.
Sorin Losnita, Romanian Intelligence Service, Romania & Cliff Lansley, EIA Group, UK
12.35 Panel Q&A
13.00 Lunch & Networking
14.00 Session 3: Stereotyping, Perception & Racial Profiling
14.05 Understanding Intuitive Bias
Colombian man. Thai woman. The phrases conjure up intuitive stereotypical images, often negative in nature and unfairly so. Humour is also based on such stereotypes, hence concepts such as the Irish joke or Jewish joke. The terrorist threat is often perceived to be exclusively Islamic nature, regardless of the statistics. How exactly do such intuitive judgments affect and bias our decisions?
Wim De Neys, CNRS & Université Paris Descartes, France
14.30 Good Looking People & the ‘Halo Effect’
Good looking people do good things and ugly people do bad things…or so it often seems. We examine our predisposition to view more attractive individuals as innocent and those less so as being more likely guilty of committing a crime. We share the research and consider the implications for those implementing behavioural analysis programmes as part of their security arsenal.
Ran Cohen, President, SDR® Academy, The Netherlands
14.55 Panel Discussion: Religious Sensitivities in Security Decision-Making
Representatives of Jewish, Muslim and Sikh faith groups join our Conference Chairman in a discussion about the challenges their communities face, both in terms of stereotyping and subsequent screening.
Moderated by: Philip Baum
Gurmel Singh, Secretary General, Sikh Council UK
Usama Hasan, Quilliam Foundation
Michael Whine MBE, Director, Government & International Affairs, Community Security Trust, UK
15.30 Afternoon Tea & Networking
Session 4: Addressing, by Understanding, Specific Criminal & Anti-Social Activity
There are some anti-social and illegal activities which impact a broad range of industries; narcotics use and alcohol intoxication are classic examples. Others are particularly relevant to crowded environments, such as sexually deviant behaviour – for example frotteurism – or mob action, where assailants have a sense of safety in numbers. And then there are those cyber terrorists/criminals who, hidden in the mystique of the world wide web, prey on the vulnerable. In order to identify such threats, it is often advantageous to understand the mindset of the perpetrator, how they select their target and what steps they take in order to avoid detection.
16.00 Profile of the Fixated Threat in Action
Whether they are sports personalities, presenters or corporate talent, individuals and brands in the public eye frequently become the focus of unwanted, concerning or threatening behaviour from the public because of who they are, what they do, or what they represent. This presentation looks at the specific risk posed by fixated individuals and what can be done to identify, assess and mitigate the risk.
Dr. Frank Farnham, Theseus Partners, UK
16.25 Profile of Group Offenders
Dr Woodhams will outline the research on group offending with regards to robbery and sexual offending, what we know about these offences compared to those committed by lone actors, and what we know about the offenders themselves. She will explain the dynamics and psychological processes that occur within groups contributing to such offending, often leading to offences of a more serious nature. She will explain what is known about leaders and followers in such groups, how they interact, and what is thought to be their relative risk.
Dr Jessica Woodhams, Reader in Forensic Psychology & Director of the Centre for Applied Psychology, and Co-Director of the Centre for Crime, Justice and Policing, University of Birmingham, UK
16.50 Responding to Overt and Covert Sexual Risk and Harm: frotteurs, voyeurs and broad spectrum deviancy
The opportunity for individuals to engage in acts of sexual harm in public/crowded spaces is vast – often fuelled by anonymity, ease of escape and limits in reporting or identification. True prevalence rates are unmeasurable, while levels of offender or technological sophistication and surveillance countermeasures can impede criminal justice processes. This presentation will outline the pertinent, often prolific, multi-paraphilic (deviant) behaviours exhibited by those who prey on victims across and within a breadth of venues which they attempt to secretly tailor as their sexual stamping grounds. This creates myriad challenges in protecting the public from highly-motivated, sexually preoccupied or fixated individuals – whether criminal or legally ambiguous (e.g. up-skirting 'creepshots'). Case examples will be discussed to provide illustrations of the psychological interpretations and policing / security options for those deployed to identify such behavioural intent and prevent these malign acts.
Dr Lynsey Gozna, Department of Neuroscience, Psychology & Behaviour University of Leicester, UK
17.15 Profile of a Cyber Criminal
In the virtual space, the human being is at the heart of every act, albeit hidden from view and the opportunity for face to face evaluation. This veil enables, and even encourages, those with negative intent to entice, corrupt and groom others and/or to perform acts which are in themselves illegal.
To guard against this, companies have invested huge sums in the development and purchase of anti-malware. But in developing cyber solutions it is essential that we understand the mentality and modus operandi of those engaged in cybercrime. Humans have developed new behaviours in virtual space and it is incumbent upon us all, whether in order to protect our commercial activities or to ensure that cyberspace remains safe space for ourselves and our loved ones, to remain ahead of the game and better understand the tactics, and concealed behavioural indicators, of the cyber criminal.
Nadine Touzeau, Profiler, net-profiler, France
17.40 Day 1 Wrap-up
17.45 Principality Stadium: Tour
Day Two: Thursday 15th March 2018
09.00 Session Chairman’s Opening Comments
Session 5: Policing Perspectives
09.10 Stop & Search: reasonable grounds?
In the United Kingdom, a police officer has powers to stop and search you if they have ‘reasonable grounds’ to suspect you’re carrying: illegal drugs; a weapon; stolen property; or something which could be used to commit a crime. What are ‘reasonable grounds’?
Nick Glynn, Senior Programme Officer, Policing & Security Governance, Open Society Initiative for Europe, UK
09.35 Case Study: British Transport Police: From Concept to Operation
The British Transport Police was the first police force in the UK to operationally deploy behavioural detection officers and, therefore, to train all uniformed officers in the associated techniques - a huge undertaking. Delegates will learn how behavioural detection was incorporated into security operations, alongside the force’s motivating factor for initiating the programme, the subsequent process undertaken, and the pitfalls encountered along the way.
Rae Jiggins, Polarm International Ltd., UK
10.00 Super Recognisers
Whilst not behavioural analysis, Super Recognisers do rely on the human brain, rather than technology, to identify threats, and police forces are now deploying them in order to detect known terrorists, criminals or, in a sports stadium, hooligans. These officers have exceptional facial recognition ability. This presentation will explain the requisite skillsets to be a Super Recogniser and the ways in which Super Recognisers might be deployed.
Mick Neville, Super Recognisers International, UK
10.25 Panel Q&A
10.40 Coffee & Networking
11.10 Keynote Case Study: The O2 Arena
Paul Williams, Security Operations Manager, The O2, London, UK
Session 6: The Role of Technology
Behavioural analysis does not necessarily mean subjective decision making. There are emerging technologies which might help security agencies identify persons with negative intent.
11.45 Intelligent CCTV: can the camera focus on unusual behaviour?
Crowded late night entertainment districts are synonymous with alcohol-related harm, notably violence and disorder. Understanding crowd movements provides opportunities for practitioners to develop interventions designed to reduce harm and for surveillance systems to predict where and when harms are most likely. The goal of this work is to reduce assault-related attendances in Emergency departments.
Prof. Simon Moore, Professor of Public Health Research, Cardiff University, UK &
Prof. David Marshall, School of Computer Science & Informatics, Cardiff University, UK
12.05 Facial Thermographs: might heat spots identify negative intent?
Professor Zwiggelaar will discuss the use of thermal facial analysis in interview scenarios and the development of biometric wristbands to estimate emotions, considering how these technologies can be used in various situations and the computer science techniques which have been utilised to enable this research.
Reyer Zwiggelaar, Aberystwyth University, UK
12.25 Layered Voice Analysis: the way we speak
Amir Liberman will summarise 20 years of research into the depths of the human voice and the mission therein to reveal truth and/or deception, as well as to identify genuine emotional states concealed behind the 'facial mask'. His presentation will show practical examples of threat detection and personality assessment in various settings.
Amir Liberman, Nemesysco, Israel
12.50 Lunch & Networking
Session 7: The Response
It’s all very well identifying an individual with negative intent, but how should the security services react?
13.50 The Art of Questioning: having THE conversation
The manner in which one responds to a perceived threat can depend on the operating environment, but the earlier one can intervene the better. Often the first step is to initiate a conversation in a non-confrontational style. With time pressures and potentially uncooperative individuals, the objective is often to acquire and analyse the maximum amount of accurate information in as little time as possible. Delegates will consider the various interview styles which can be applied in protecting a venue or transportation hub, and how to best protect eyewitness memory should an attack occur.
Charlotte Hudson, Department of Psychology, University of Portsmouth, UK
14.20 Emergency Response: when you think the threat is real
Perhaps the greatest challenge for the security operative is knowing what to do when they feel a person they initially suspected of having negative intent is actually about to commit a criminal act. All too often responses become watered down by either excessive reporting channels or a preference for keeping people under surveillance...potentially until it's too late. At one end of the scale the observer may be faced with the protestor, who means no harm, or streaker who is exhibitionist in nature, yet at the other end is the suicidal terrorist who must be stopped before reaching their intended target. This presentation looks at the more ominous behavioural indicators, based on specific case references, and sets out a tactical plan for organisations wishing to actively deploy crowd surveillance techniques. Using Munich's 2017 Oktoberfest as a case study, we show how an event can be better secured by empowering security officers to take appropriate action when faced with an imminent threat.
Ofir Malka, CEO SafeZones, Germany
14.45 Insider Threat Response: identifying radicalisation in the workplace
The insider threat is one of the most significant concerns for the security services – the trusted individual morphing into the attacker. How can organisations best identify the employee who poses a threat – particularly those who may been radicalised - and, having done so, how is that threat best managed?
Usama Hasan, Quilliam Foundation, UK
15.10 Afternoon Tea & Networking in the Exhibition Area
Session 8: Marauding Firearms Attacks & Suicidal Terrorism
15.40 Marauding Firearms Attacks: not always by suicidal terrorists
Over the past few years there have been an abundance of attacks perpetrated by heavily armed individuals with a range of ideologies and psychological mindsets, the massacre in Las Vegas being the most recent example. Anders Behring Breivik, in Norway, Martin Bryant, in Australia, Esteban Santiago, in Florida, and a host of school-based incidents around the world illustrate that not all assailants are terrorists. How can gun crime be anticipated? We examine the profile of those who kill en masse.
Leeran Gold, Registered Psychologist, Promises Healthcare, Singapore
16.10 The Suicidal Terrorist: recruitment & training
Who becomes a suicidal terrorist and why? It’s a question often posed. More appropriately for this conference, we address the question of how is the suicidal terrorist selected and what training do they undergo?
Dr. Sagit Yehoshua, Criminologist, Israel
16.40 The Proof of the Pudding: attacks against aviation identified by behavioural analysis
How have behavioural analysis techniques actively prevented suicidal attacks against the aviation industry and how might the lessons be adopted by those involved in securing sports stadia, entertainment venues, festivals and tourist attractions.
Philip Baum, Managing Director, Green Light Ltd., UK
17.10 Chairman’s Closing Remarks and Close of Conference
Sessions will be chaired by:
Neville Hay, Brooklyn Associates, UK
Katharine Ng, OneCrew Limited, Hong Kong
Behavioural Analysis 2018 offers valuable, practical insight into behavioural analysis techniques used to identify individuals with negative intent at large-scale sports and entertainment venues, transportation hubs and tourist attractions.
Security conference exploring non-racial profiling, stress responses, behavioural indicators and tactical risk analysis techniquesBEHAVIOURAL ANALYSIS 2018