Please find below the updated draft programme, including some of our confirmed speakers, for Behavioural Analysis 2018, outlining the key subjects to be discussed in Cardiff next March. 

If you would like us to send you a copy of the programme with speakers identified, please complete the form on this page and it will be sent to you once most speakers have been confirmed.

If you are interested in contributing your knowledge and expertise in one of the topic areas (listed on the programme) as a speaker please contact Philip Baum, the conference chairman, at Please set out the content of your proposed presentation and the benefits of the paper for conference delegates. Presentations will only be considered if delivered by end-users, academics, regulators, and/or current employees of the security services.

Behavioural Analysis 2018

14th – 15th March 2018

Principality Stadium, Cardiff, Wales

Draft Programme


Day One: Wednesday 14th March 2018


08.30 Registration & Coffee


09.30 Conference Chairman’s Opening Address

Philip Baum, Managing Director, Green Light Ltd

& Editor, Aviation Security International


Session 1: Behavioural Analysis in Practice


09.40 Keynote:

Behavioural Analysis: Lessons Learned from Recent Terrorist Attacks

Over the past two years, transportation hubs, entertainment venues, sporting events, markets, beaches, museums, places of worship and city centres have all witnessed callous acts of terrorism. We look at the behavioural traits of the, often suicidal, perpetrators and consider to what extent the early identification of such indicators might have helped prevent the attacks being successful. We further consider the barriers towards the implementation of behavioural analysis techniques.

Speaker Invited


10.10 Behavioural Analysis: Industry Focus

Behavioural Analysis and visitor/crowd surveillance techniques are used in a broad range of different environments. Behavioural Analysis 2018 looks at some industry sectors and presenters explain how surveillance has enhanced security and addressed specific challenges beyond that of terrorism.


10.10-10.30   Places of Worship: communities protecting themselves

Speaker Invited


10.30-10.50   Sporting Events: combatting court-siding and gambling

Andrew Wolfe Murray, Partner, Theseus Partners, UK


10.50-11.10   Transport Security: human trafficking in focus

Sarah-Jane Prew, CrimeStoppers, UK & Airline Ambassadors International, USA


 11.10 Coffee & Networking


Session 2: The Biology of Fear & Deception


11.40 Fight, Flight or, Perhaps, Freeze

What happens to the body when a person is experiencing stress or fear? Behavioural Analysis 2018 sets out to explain the why in which our bodies can emit clues to indicate discomfort or a deviation from the norm. Delegates will gain a better understanding of the sympathetic and parasympathetic nervous systems and the fight or flight response.

Speaker Invited


12.10 Case Study:  The Impact of Integrating Real-time, Multichannel Behaviour Analysis and Elicitation/Engagement Strategies in High-stake Contexts"

This session will share the impact of two components of behavioural analysis for those responsible for observing, targeting, engaging and responding to those who may pose a serious threat to airport safety and security. First, the challenge of primary detection; identifying and targeting those with potential malintent from a crowd of genuine airport users from behaviour alone, without racial or other discriminatory profiling practices. Secondly, testing the prediction through real-time behavioural analysis across multiple communication channels using powerful elicitation and questioning techniques. We will outline how this increased true negatives by 400% and reduced false positives by 60% in a high-stake experiment, conducted over six days in a busy airport by an integrated team of behaviour detection officers from civil, police and military agencies.

Sorin Losnita (Romanian Intelligence Service) and Cliff Lansley (EIA Group)


12.40 Panel Q&A


13.00 Lunch & Networking


Session 3: Stereotyping, Perception & Racial Profiling


14.00 Understanding Intuitive Bias

Colombian man. Thai woman. The phrases conjure up intuitive stereotypical images, often negative in nature and unfairly so. Humour is also based on such stereotypes, hence concepts such as the Irish joke or Jewish joke. The terrorist threat is often perceived to be exclusively Islamic nature, regardless of the statistics. How exactly do such intuitive judgments affect and bias our decisions?

Wim De Neys, CNRS & Université Paris Descartes, France


14.25 Good Looking People & the ‘Halo Effect’

Good looking people do good things and ugly people do bad things…or so it often seems. We examine our predisposition to view more attractive individuals as innocent and those less so as being more likely guilty of committing a crime. We share the research and consider the implications for those implementing behavioural analysis programmes as part of their security arsenal.

Speaker Invited


14.50 Panel Discussion: Religious Sensitivities in Security Decision-Making

Representatives of Jewish, Muslim and Sikh faith groups join our Conference Chairman in a discussion about the challenges their communities face, both in terms of stereotyping and subsequent screening.

Moderated by: Philip Baum

Panel Members (Confirmed): Gurmel Singh, Secretary General, Sikh Council UK

Panel Members (Invited): Representatives of Board of Deputies of British Jews, Muslim Council of Great Britain


15.30 Afternoon Tea & Networking


Session 4: Addressing, by Understanding, Specific Criminal & Anti-Social Activity

There are some anti-social and illegal activities which impact a broad range of industries; narcotics use and alcohol intoxication are classic examples. Others are particularly relevant to crowded environments, such as sexually deviant behaviour – for example frotteurism – or mob action, where assailants have a sense of safety in numbers. And then there are those cyber terrorists/criminals who, hidden in the mystique of the world wide web, prey on the vulnerable. In order to identify such threats, it is often advantageous to understand the mindset of the perpetrator, how they select their target and what steps they take in order to avoid detection.


16.00 Profile of the Fixated Threat in Action  

David James, Theseus Partners, UK


16.25 Profile of Group Offenders

Dr Jessica Woodhams, Reader in Forensic Psychology & Director of the Centre for Applied Psychology, and Co-Director of the Centre for Crime, Justice and Policing, University of Birmingham, UK


16.50 Profile of Frotteurs & Sexual Deviants

Speaker Invited, UK


17.15 Profile of a Cyber Criminal

Nadine Touzeau, Profiler, net-profiler, France


17.40 Day 1 Wrap-up


17.45 Principality Stadium: Tour


Day Two: Thursday 15th March 2018


09.00 Opening Comments


09.10 Keynote:

Case Study: Securing a Sports and Entertainment Venue

Speaker Invited, UK


Session 5: The Regulatory Challenge

09.40 Case Study: From Concept to Operation

The British Transport Police was the first police force in the UK to operationally deploy behavioural detection officers and, therefore, to train all uniformed officers in the associated techniques - a huge undertaking. Delegates will learn how behavioural detection was incorporated into security operations, alongside the force’s motivating factor for initiating the programme, the subsequent process undertaken, and the pitfalls encountered along the way.

Rae Jiggins, Polarm International Ltd., UK


10.10 Stop & Search: reasonable grounds?

In the United Kingdom, a police officer has powers to stop and search you if they have ‘reasonable grounds’ to suspect you’re carrying: illegal drugs; a weapon; stolen property; or something which could be used to commit a crime. What are ‘reasonable grounds’?

Speaker Invited, UK


10.40 Coffee & Networking


Session 6: The Role of Technology

Behavioural analysis does not necessarily mean subjective decision making! There are emerging technologies which might help security agencies identify persons with negative intent.


11.10 Intelligent CCTV: can the camera focus on unusual behaviour?

Simon Moore, Cardiff University, UK


11.30 Facial Thermographs: might heat spots identify negative intent?       

Reyer Zwiggelaar, Aberystwyth University, UK


11.50 Gait Analysis: what about the way we walk?

Speaker Invited, UK


12.10 Layered Voice Analysis: or the way we speak?

Amir Liberman, Nemesysco, Israel


12.30 The Age of the Robot: could people be screened by technology capable of analysing multiple inputs from facial expressions to pupil dilation and vocal quality to heat emissions?

Speaker Invited, USA


12.50 Lunch & Networking


Session 7: The Response

It’s all very well identifying an individual with negative intent, but how should the security services react?


13.50 The Art of Questioning: having THE conversation

The manner in which one responds to a perceived threat depends on the operating environment, but the earlier one can intervene the better. Often the first step is to initiate a conversation in a non-confrontational style. Delegates will consider the various interview styles which can be applied in protecting a venue or transportation hub. This session will include a practical demonstration of questioning techniques.

Speaker Invited, USA


14.20 Emergency Response: when you think the threat is real

Perhaps the greatest challenge for the security operative is knowing what to do when they feel that a person they initially suspected of having negative intent is actually about to commit a criminal act. At one end of the scale they may be faced with the protestor, who means no harm, or streaker who is exhibitionist in nature; at the other end is the suicidal terrorist who might, if stopped, detonate a device. How do we create the security mindset necessary to manage such a broad range of threats appropriately?

Ofir Malka, CEO SafeZones, Germany


14.45 Insider Threat Response

The insider threat, both criminal and terrorist, is one of the most significant concerns for the security services – the trusted individual morphing into the attacker. How can organisations best identify the employee who poses a threat and, having done so, how is that threat best managed?

Speaker Invited


15.10 Afternoon Tea & Networking in the Exhibition Area


Session 8: Marauding Firearms Attacks & Suicidal Terrorism

15.40 Marauding Firearms Attacks: not always by suicidal terrorists

Over the past few years there have been an abundance of attacks perpetrated by heavily armed individuals with a range of ideologies and psychological mindsets, the massacre in Las Vegas being the most recent example. Anders Behring Breivik, in Norway, Martin Bryant, in Australia, Esteban Santiago, in Florida, and a host of school-based incidents around the world illustrate that not all assailants are terrorists. How can gun crime be anticipated? We examine the profile of those who kill en masse.

Leeran Gold, Registered Psychologist, Promises Healthcare, Singapore


16.10 The Suicidal Terrorist: recruitment & training

Who becomes a suicidal terrorist and why? It’s a question often posed. More appropriately for this conference, we address the question of how is the suicidal terrorist selected and what training do they undergo?      

Dr. Sagit Yehoshua, Criminologist, Israel


16.40 The Proof of the Pudding:

attacks against aviation identified by behavioural analysis

How have behavioural analysis techniques actively prevented suicidal attacks against the aviation industry and how might the lessons be adopted by those involved in securing sports stadia, entertainment venues, festivals and tourist attractions.

Philip Baum, Managing Director, Green Light Ltd., UK


17.10 Chairman’s Closing Remarks and Close of Conference


17.30 Close

Behavioural Analysis 2018 offers valuable, practical insight into behavioural analysis techniques used to identify individuals with negative intent at large-scale sports and entertainment venues, transportation hubs and tourist attractions.

Security conference exploring non-racial profiling, stress responses, behavioural indicators and tactical risk analysis techniques