BCJ 4385, Workplace Security 1
Course Learning Outcomes for Unit VI
Upon completion of this unit, students should be able to:
1. Evaluate security problems within private and public institutions and cultivate applicable
security measures.
2. Analyze contemporary security investigation tactics.
3. Examine intellectual property and security measures taken to protect business intelligence and
proprietary information.
Reading Assignment
Chapter 9:
Investigations, Intelligence Operations, and Reporting
Chapter 10:
Institutional Security, Disaster Recovery, and Executive Protection
Unit Lesson
General Overview
When people hear the term investigation the first thing that comes to mind is what they saw on a dramatized
crime show or TV program. In actuality there are several types of investigations. There are human resource
investigations that investigate issues related to employee backgrounds, workplace violence, employment
discrimination, worker compensation, sexual harassment, sexual abuse, substance abuse, and wrongful
termination. There are also personal injury and property damage investigations, and criminal investigations
which include undercover investigations. Another aspect of criminal investigations is business crime
investigations which involves investigations concerning crimes committed against businesses by employees
(e.g., fraud and embezzlement), crimes committed against businesses by outsiders (e.g., arson and robbery),
and crimes committed by individuals on behalf of businesses (e.g., tax evasion and commercial bribery).
Information collected in investigations is derived from various sources which “include physical evidence,
specialized databases, victims, witnesses, suspects, records, informants, and the Internet” (Ortmeier, 2013, p.
212). Once information is gathered it is then analyzed. The analysis of physical evidence is associated with
forensic science and criminalistics. Such analyses are traditionally conducted in the laboratory. DNA testing is
one of several analysis techniques used by forensic scientists. Other techniques include psychological
profiling, anthropological strategies, forensic accounting, biology, chemistry, ballistics testing, and many more.
Every investigation is governed by a code of conduct. Both private and public law enforcement and security
agencies are governed by investigative statutes which govern overt and covert investigative techniques (e.g.,
the Omnibus Crime Control and Safe Streets Act of 1968 and the Employee Polygraph Protection Act of
1988). While the fourth amendment to the Constitution only restricts government conduct, private and
nongovernment employees may also have an expectation of privacy if their employers knowingly or knowingly
create an expectation of privacy among their employees.
Intelligence operations are not limited to criminal investigations. They also include business intelligence
operations, which is also ...
1. BCJ 4385, Workplace Security 1
Course Learning Outcomes for Unit VI
Upon completion of this unit, students should be able to:
1. Evaluate security problems within private and public
institutions and cultivate applicable
security measures.
2. Analyze contemporary security investigation tactics.
3. Examine intellectual property and security measures taken to
protect business intelligence and
proprietary information.
Reading Assignment
Chapter 9:
Investigations, Intelligence Operations, and Reporting
Chapter 10:
Institutional Security, Disaster Recovery, and Executive
Protection
2. Unit Lesson
General Overview
When people hear the term investigation the first thing that
comes to mind is what they saw on a dramatized
crime show or TV program. In actuality there are several types
of investigations. There are human resource
investigations that investigate issues related to employee
backgrounds, workplace violence, employment
discrimination, worker compensation, sexual harassment, sexual
abuse, substance abuse, and wrongful
termination. There are also personal injury and property damage
investigations, and criminal investigations
which include undercover investigations. Another aspect of
criminal investigations is business crime
investigations which involves investigations concerning crimes
committed against businesses by employees
(e.g., fraud and embezzlement), crimes committed against
businesses by outsiders (e.g., arson and robbery),
and crimes committed by individuals on behalf of businesses
(e.g., tax evasion and commercial bribery).
Information collected in investigations is derived from various
sources which “include physical evidence,
specialized databases, victims, witnesses, suspects, records,
informants, and the Internet” (Ortmeier, 2013, p.
212). Once information is gathered it is then analyzed. The
analysis of physical evidence is associated with
forensic science and criminalistics. Such analyses are
traditionally conducted in the laboratory. DNA testing is
one of several analysis techniques used by forensic scientists.
Other techniques include psychological
profiling, anthropological strategies, forensic accounting,
biology, chemistry, ballistics testing, and many more.
Every investigation is governed by a code of conduct. Both
3. private and public law enforcement and security
agencies are governed by investigative statutes which govern
overt and covert investigative techniques (e.g.,
the Omnibus Crime Control and Safe Streets Act of 1968 and
the Employee Polygraph Protection Act of
1988). While the fourth amendment to the Constitution only
restricts government conduct, private and
nongovernment employees may also have an expectation of
privacy if their employers knowingly or knowingly
create an expectation of privacy among their employees.
Intelligence operations are not limited to criminal
investigations. They also include business intelligence
operations, which is also known as competitive intelligence.
This form of intelligence is designed to assist
businesses in controlling losses that result from competition.
Business intelligence is a legitimate and ethical
activity. Both internal and external sources can be accessed to
obtain information about competing
organizations strategies such as sales promotions, employee
recruitment, pricing, distribution center
strategies, and advertising.
UNIT VI STUDY GUIDE
Security Investigations, Institutional Security,
Disaster Recovery, and Executive Protection
BCJ 4385, Workplace Security 2
UNIT x STUDY GUIDE
4. Title
Criminal intelligence is used to protect against actual criminal
activity and possible threats of criminal activity,
such as industrial espionage. An extension of criminal
intelligence is national intelligence which focuses on
collecting information about foreign entities viewed as potential
threats to the nation. Counterespionage
strategies prevent espionage using covert and overt strategies
which “involves application of appropriate
physical, personnel, and information security measures as well
as a thorough investigation of all actual intent
to security breaches” (Ortmeier, 2013, pp.220-221).
Documentation of incidents, interviews, accidents,
investigations or criminal activity is instrumental in
assisting security personnel in addressing security issues. Such
documentation is useful in the development
of reports (contact, incident, narrative, and organization –
specific) which are one of the most important
outcomes associated with investigations. To maximize the
usefulness of reports, reports must be well
organized, grammatically sound, clear and concise, free of
unnecessary jargon, and include crucial
information (e.g., how the report writer was involved in the
incident, details about what happened, information
about all the parties involved, statements from the involved
parties, descriptions of the scene where the
incident occurred, descriptions of evidence, damage or theft,
and any actions conducted by personnel on
the scene).
There are some distinctions and exceptions to general security
management principles, and loss prevention
5. philosophies and practices. For example, banking and financial
institutions are susceptible to threats and loss
of assets in physical and digital environments. Funds can now
be transferred electronically without any paper
trails. In addition, the types of financial institutions are as
diverse as the way funds move across these
entities. In 1968 the Bank Protection Act was passed by the
U.S. Congress to assist in reducing the
vulnerability of financial institutions. However, the act only
established minimal guidelines and is not effective
in controlling technological threats to financial assets.
High profile cases involving the murder of court personnel
walking to work and even the murder of court
personnel and law enforcement in the perceived security of their
homes by defendants in the cases they were
associated with exemplifies the need for courthouse and
courtroom security. To respond to these increase
threats many courthouses and courtrooms have increased
security measures such as metal detectors, state-
of-the-art surveillance systems, security glass, secured and
covered entrances and parking decks for court
personnel, and the use of sheriff deputies as courthouse and
courtroom security.
Educational institutions also require unique security
preparations. It was once believed that schools were safe
havens into which the threats from the outside world could not
penetrate. However, recent events in which
children at schools have become the victims of murder at the
hands of lone gunman and/or have died as a
result of natural disasters that have impacted schools critically
exemplify the need for special security
measures at educational institutions.
Violent crime, sexual assaults, homicides, thefts, gang and drug
6. activity, and many other threats to
institutional security exist across all levels of education.
However, the age of the students, structure of the
facilities, the number and characteristics of staff, and the access
of members of the community very across all
levels of education. Thus, different criteria must be considered
for elementary and secondary schools and
colleges and universities. Many states have created safe-school
zones. The federal government has created
informational material such as a guide entitled Threats
Assessments in Schools published by the U.S. Secret
Service. Agencies have also developed informational pages on
their websites concerning school safety.
Legislation like the Crime Awareness And Campus Security Act
of 1990, also known as the Clery Act, have
been established and require post-secondary institutions to
gather and post the current crime statistics so that
students, parents, faculty and staff all were on the status of
crime on their campuses. College and university
informational guides also include sections about safety security
measures available at their featured colleges
and universities.
Healthcare facilities also have unique security concerns.
Security must be maintained in order for healthcare
facilities to function. There are numerous international, federal,
state, and local requirements that mandate the
provision of a secure healthcare environment. Healthcare
security covers many facets such as facilities,
personnel, equipment and supplies, service provision, records,
and mobile healthcare units.
Hospitality security, entertainment security, disaster recovery,
and executive protection are other areas which
require specific security considerations. For example, the
hospitality industry has invested significant amounts
7. of money into making its establishments attractive to its guests.
However, in so doing many internal controls
were not established. We can all think of people we know who
have come home from a hotel with linen,
BCJ 4385, Workplace Security 3
UNIT x STUDY GUIDE
Title
dishes, and other items that were not intended for guests take
home in their suitcases. In addition to loss of
assets, the hospitality industry is also susceptible to accidents,
fires, and natural disasters. To respond to
these unique threats to security key control, alarm systems,
security cameras, and the employment of security
personnel are usually implemented.
The entertainment industry (sporting events, recreation areas
and their components, racetracks, movies and
music, ships and boats, casinos) also has its set of unique
threats to security that are associated with the size
of the venue, the openness of the venue facilities, and the
number of people that attend the events.
Disaster recovery is a specialty area in the field of security
management that focuses on managing
organization-related disasters (damages that result from natural
and environmental disasters) to ensure that
services are restored quickly and customers are not loss due to
8. dissatisfaction with the services provided
during disaster recovery efforts.
Lastly, protection of executives, citizens, and political leaders
is a continual challenge. Incidences of executive
kidnapping continue to increase abroad. Acts of terrorism
against citizens is on the rise in the United States,
and political leaders are more at risk of being injured or killed
by gunfire during public appearances and at
their private residences. Therefore, it is important that effective
executive protection programs include 1) risk
assessments that accurately identify threats, the likelihood of
the threat being realized, and assessment of the
damage that would result if the threat was realized; 2) advanced
procedures that implement security
arrangements before, during, and after the executive travels;
and 3) protective operations which involve the
accompanying of the executive by executive detection personnel
who are equipped and ready to use counter
surveillance and defensive tactics to protect the executive.
Reference
Ortmeier, P.J. (2013). Introduction to security: Operations and
management (4th ed.). Upper Saddle River,
NJ: Pearson.
Questions to Consider
1. What are the different types of investigation?
2. What are the different sources of information collected in
investigations?
9. 3. What is the role of forensic science in the analysis of
evidence collected in investigations?
4. What statutes govern investigative conduct?
5. How does business intelligence different from criminal
intelligence?
6. How is business intelligence different from industrial
espionage?
7. What are the different types of reports that can be utilized in
a security investigation?
8. What are the key elements of report writing and why is report
writing important?
9. What unique threats to security do banks and financial
institutions face?
10. What unique security issues must be considered when
developing security measures for
educational institutions?
11. What statutes govern the maintenance of security in
healthcare environments?
12. What types of issues threaten safety and security in the
hospitality industry?
13. What factors complicate the maintenance of security in the
entertainment industry?
14. What is the role of disaster recovery and reducing the loss
of assets associated with organizations
that have been impacted by a disaster?
15. What are the key components of an effective executive
protection program?
Learning Activities (Non-Graded)
Non-graded Learning Activities are provided to aid students in
their course of study. You do not have to
10. submit them. If you have questions, contact your instructor for
further guidance and information.
1. Watch the local news at the same time every day for a week.
Make note of the various types of
investigations that are mentioned. Keep track of how many
investigations fall into each category, who
conducted the investigations, what information was gathered in
the investigations, and the outcome of
BCJ 4385, Workplace Security 4
UNIT x STUDY GUIDE
Title
the investigations. Review your findings to access the most
frequent types of security-related
investigations that are conducted in your community.
2. Search the Internet for any current events that talk about
industrial espionage. Review the events to
identify what business intelligence and/or counter espionage
strategies were utilized. Prepare a mock
report of your findings and include suggestions for preventing
future espionage attacks on the
organization.
3. Use the search engine of a national or local newspaper source
to chronologize the threats to security
11. that have occurred in banking and financial institutions,
courthouses and courtrooms, and educational
institutions. Assess the key components of maintaining security
that were compromised and/or
absent. Outline strategies that you think would reduce and/or
eliminate such threats in the future.
4. Conduct a historical analysis of homicides that have occurred
in courtrooms and courthouses or
educational institutions in the United States. Make note of any
trends that become evident as you
conducted your analysis. Explore whether identify threats
appear to be diminishing, staying the same
or increasing. Outline the existing strategies being used and
make note of any strategies that in your
opinion should be implemented.
5. The next time you attend and entertainment activity take note
of the various security measures that
are utilized. Assess whether the measures discussed in the text
were utilized and, in your opinion,
whether there were measures that were or were not utilized that
seemed more appropriate for the
venue than what was discussed in the text.
6. Imagine that you were the chief executive protection agent
for one of the U.S. Supreme Court justices
and that you have recently been informed that the justice will be
attending an international court
convention in London, UK and then will be going on vacation in
South Africa. You have been given a
72-hour notice of these plans and have been ordered to provide
a briefing of the executive protection
program that you will implement to the Attorney General of the
United States no later than 12 hours
prior to your departure. Clearly outline the executive protection
12. program that you implement.
Name
XXXXXXXXX
XXXXXXXXXXX
Home Phone: XXXXXXX
Email Address
SUMMARY OF QUALIFICATIONS:
Skilled at building partnerships with government, private
officials and employees at all levels of leadership to support
organizational goals. Knowledge of federal and private
personnel security procedures. Oversaw administrative
functions to include reviews of police blotters, reports and other
correspondence involving security; ability to type 55 WPM.
Possesses active Department of Defense Secret and public Trust
Clearance; MD State Hand Gun Permit; and MD State Security
Guard Clearance Card.
Experience
December, 2015 Defense Contract Management Agency
Location
To Present Management Assistant
· Compiles and maintains records and workflow charts of
Functional Group Leader planning activities and maintains cross
reference documents of unique task i.e., Mission Review Team
(MRT) Findings
· Prepares and submits timely Request for Personnel Actions
(RPAs) for Awards and other actions, and routes for approval in
the DCPDS system as requested by the Director and Deputy
13. Director.
· Assists with tracking Performance Indicators and updating the
IBM, Cognos, and Metrics Studio comments.
· Assists with management, use and maintaining the electronic
data integrity systems (MOCAS, IWMS, and E-Tools)
· Verifies employee’s DAI timecards are submitted on time and
conducts audits randomly to insure accuracy.
April, 2012 Department of the Navy
Location
To December 2015 Security Assistant
· Provides direct support to senior management on access
control policies, administrative issues and assignments.
· Acts as a Single Source Coordinator for the RAPIDGate
Credential Issuance Program through Navy Commercial Access
Control System (NCACS).
· Completed and appointed as a Trainer/Certifier for National
Crime Index Center (NCIC) system through the Department of
Justice (DOJ) to support physical security and investigative
functions of Navy District Washington (NDW).
· Completed and appointed as a Trainer/Certifier for
Washington Area Law Enforcement System (WALES) through
DC Metro Police Department to support physical security and
investigative functions of Navy District Washington.
· Updates various databases, compiles information and
completes appropriate reports referencing files and applicable
instruction.
· Serves as the principal program support assistant; performing
various administrative and clerical duties in support of the Joint
Base Anacostia Bolling (JBAB) security mission.
· Creates and edits incoming/outgoing correspondence to
include letters, reports, spreadsheets or presentations.
· Reviews and analyzes incoming correspondence to determine
proper action, assignment, and significance of correspondence,
and special distribution.
14. · Generates criminal history summary reports on behave or the
Security Director for final adjudication.
· Performs tasks to include preparing, issuing, tracking and the
destruction of security/restricted access badges for the
installation.
· Verified eligibility screened and issued over 100K base passes
to visitors and government contractors.
· Updated file management system, moving paper entry
authority request to a more efficient digital system.
· Revamped and maintained Visitor Control Center Signature
and Credential Program managing over 400 base personnel files.
· Processed over 2,988 vehicle registrations and assisted in the
facilitation of over 21k special events and distinguished visitors
· Processed criminal background checks through Washington
Area Law Enforcement System (WALES II) and NCIC before
granting access to foreign nationals, contractors and vendors.
· Processed forms for background investigation requirements
via Security Forces Information Management Information
System (SFMIS) and Navy Consolidated Law enforcement
Operations Center (CLEOC).
· Maintains, controlled forms, logs and Personally Identifiable
Information (PII).
· Tracks and inputs over 400k of the organizations workload
data into the Navy’s Command Naval Installation Command
(CNIC) regional database.
· Responds to customer inquiries regarding installation access
and security policy/regulations.
· Performs protocol assistance duties as required and shared by
JBAB Security Office.
· Coordinates and responds to requests for advice/assistance in
all matters/activities related to protocol procedures.
· Plans or coordinates various ceremonies, receptions, visits,
tours, and other events to be attended by ranking civilian and
military officials, with all appropriate support services
organizations.
· Monitors clerical support duties to ensure efficient office
15. operations in support of the Commanders/Executive office
· Maintains files as appropriate including all correspondence
and telephone log of significant calls. Coordinates office staff
activities to ensure maximum efficiency; ability to type 55
WPM.
· Hand-selected as the Naval Operation Center Command Post
Support Staff during Baltimore’s largest tourism event;
streamlined communications between Homeland Security,
Secret Service, Baltimore City Police, Naval Criminal
Investigative Service, and the National Park Service—
safeguarded over 1.5 million visitors
August, 2014 MVM (Social Security Headquarters)
Location
To Present Security Control Center Operator
· Acts as primary dispatcher for all medical, law enforcement,
and security incidents occurring on Social Security
Administration (SSA) Head Quarters property and outlined
buildings.
· Completed Social Security Administration Physical Security
Information System Management (PSIM) training. Monitored
and managed over 2300 alarm points through the Lenel (alarm
monitoring) System dispatched units and generated incident
reports in accordance with established procedures.
· Successfully managed priorities of emergency situations
within the dispatched units in accordance with established
procedures.
· Provides direct physical security support through the use of
over 300 digital and analog closed circuit television (CCTV)
devices.
· Coordinates inter agency response to incidents and emergency
situations in accordance with established procedures.
March, 2011 Paragon Systems (Social Security
Headquarters) Location
16. To August 2014 Security Control Center Operator
· Acted as primary dispatcher for all medical, law enforcement,
and security incidents occurring on SSA Head Quarter property
and outlined building.
· Successfully managed priorities of emergency situations
within the dispatched units in accordance with established
procedures.
· Monitored and managed over 2300 alarm points on the Lenel
(alarm monitoring) System dispatched units and generated
incident reports in accordance with established procedures.
· Established a comprehensive alarm checklist detailing
procedures for daily operation of the Lenel Alarm Monitoring
System.
March, 2009 United States Air Force
Location
to May, 2009 Operations Support Staff/Administrative
Manager
· Prepared and reviewed police blotters, reports, regulations,
standard operating procedures, and other correspondence,
advising senior management on security activities and
overseeing administrative functions to enhance operations and
ensure compliance with established regulations and procedures.
· Compiled, stored, and retrieved management data, using a
variety of computer programs such as Microsoft, Power Point,
Access, SFIMS, and NCIC.
· Acted as primary dispatch agent for all base security incidents.
Assist Flight Sergeant with command and control of
security/law enforcement patrols to a Full Spectrum Threat
Response (FSTR), protection level resources, alarm activations,
burglaries and anti-hijackings.
· Expertly managed $2.5M Advantor Alarm System for Shaw
AFB; monitored over 900 alarm points at 80 facilities
· Successfully managed and created database reports of police
17. performance and training data.
· Compiled, stored, and retrieved management data, using a
variety of computer programs such as Microsoft 2007, Power
Point, NCIC, and Access.
February, 2006 United States Air Force
Location
to March, 2009 Shift Supervisor/Control Center
Operator
· Directed oversight aided accurate completion of over 100
Random Anti Terrorism Measures, 300 selective traffic
enforcements, and 95 high value facility checks to ensure safety
of personnel and resources.
· Supervised and managed 44 employees, scheduled work hours,
resolved conflicts, and wrote annual performance reports.
· Successfully managed priorities of emergency situations
within the dispatched units in accordance with established
procedures.
· Completed Antiterrorism Force Protection Level II Course
curriculum provides completion certification in accordance with
baseline standards outlined in DOD 2000.16 Antiterrorism
Standards.
· Established qualification and performed duties as an
antiterrorism officer, advise leadership on the management of
AT/FP programs/maters, and administer, track and reported
Level I and pre-deployment AT/FP training.
· Received liaison training with both internal agencies and
tenants, and local civilian and host nation authorities to ensure
full integration and comprehensive AT/FP planning and
training.
· Supervised the completion of Restricted Area/high risk
Faculty checks.
· Conducted surveys of restricted areas and generated reports of
undocumented vulnerabilities.
· Prepared and reviewed police blotters, reports, regulations,
18. standard operating procedures, and other correspondence,
advised senior management on security activities while
overseeing administrative functions to enhance operations and
ensure compliance with established regulations and procedures.
· Knowledge of basic DoD and Air Force personnel security and
SCI program, JPAS, principles, policies and procedures and its
applicability to personnel security standards.
· Completed Advantor Suite Operator/Administrators Alarm
Management 4.1 course.
· Completed South Carolina Law Enforcement Division (SLED)
DUI/DWI training course utilizing the BAC/DMT DataMaster.
· Conducted convoy security operations for high value
personnel and critical supplies along main and alternate supply
routes in Iraq.
· Led an 8 member heavy weapons deployment team to Camp
Bucca, Iraq; largest internment facility, in support of Operation
IRAQI FREEDOM.
· Selected as team leader for the 13 member deployment group
during Headquarters Air Combat Command Operations
Readiness Inspection; performance led to overall "Excellent"
rating
September, 2004 United States Air Force
Location
to January, 2006 Shift Supervisor/Control Center Operator
· Directly responsible for command and control of all security
and law enforcement shift activities. Implemented security
plans policies and procedures which insured the protection of
2,800 annual transit aircraft and 3,200 assigned personnel.
· Managed and lead U.S Air Force Security Forces and 15
Portuguese civilian employees. Acted as on scene liaison
between United States and Host Nation Police during all
incidents.
· Held full accountability and exercised command and control
over emergency situations.
19. · Primary dispatch agency for all base security and Law
Enforcement incidents. Assisted the Installation Commander
with command and control of security and law enforcement
patrols to a Full Spectrum Threat Response (FSTR), protection
level resources, alarm activations burglaries and anit-
hijackings.
· Relayed information and messages to and from emergency
sites, to law enforcement agencies, and to other individuals
requiring notification.
· Monitors incident site actions and makes notifications to
commanders/first sergeants and all other key wing personnel.
Prepares all Security Forces reports, blotters and other required
correspondence
August, 2002 United States Air Force
Location
to July, 2004 Lead Patrolmen
· Detects and reports the presence of unauthorized personnel
and activities and implements security reporting and alerting
system.
· Enforced standards of conduct, discipline, and adherence to
laws and directives.
· Operates speed measuring, drug alcohol, and breathe test
devices; apprehends and detains suspects.
· Secured crime and accidents scenes; collects, seizes, and
preserves evidence.
· Conducts interviews of witnesses and suspects; obtains
statements and testifies in official judicial proceedings.
February, 2001 United States Air Force
Location
to July, 2001 Law Enforcement Patrolmen
· Structured public safety at all times by maintaining order,
responding to emergencies, protecting people and property,
20. enforcing motor vehicle and criminal laws, and promoting good
community relations.
· Evaluated complaint and emergency-request information to
determine response requirements.
· Issued citations and warnings to violators of motor vehicles.
Professional Development
· Security Forces/Police Technical School Training Lackland
AFB TX
· Microsoft Office Suite Training ability to type 55 Words Per
Minute
· Tactical Automated Security System Operator/Administrators
course 1999/2006
· US Customs Certification Training
· DUI training, CMI/INTOXILYZER 5000EN Breathalyzer
Instrument Operators course
· Supervisor Safety Training, certified through the Air Force
· Department Of Defense Firefighters Certification Hazardous
Materials Awareness course
· Texas A&M University System Terrorism Awareness
(recognized by the Department of Justice)
· Emergency Response to Terrorism Self-Study course
(presented by the National Fire Academy)
· Law Enforcement and Human Resource/Management training,
(Army Institute for Professional Development)
21. · Completed Advantor Operators course 4.0/2004 and 2006
Administrators course 4.1/2006
· Department of Defense Anti Terrorism Level II course
(certified Instructor)
· Decision Making and Problem Solving (FEMA Emergency
Management Institute) 2011
· Leadership and Influence (FEMA Emergency Management
Institute) 2011
· Emergency Planning (FEMA Emergency Management
Institute) 2011
· Effective Communication (FEMA Emergency Management
Institute) 2011
· Introduction to DoD Personnel Security Adjudications (Center
for Development of Security Excellence) 2013
· Introduction to DoD Personnel Security(Center for
Development of Security Excellence) 2013
Education
· Grantham University Associates Degree (Business
Management)
· Grantham University (BS Candidate Multi-Disciplinary
Studies)
· University of Maryland (BA Candidate Criminal Justice)
· Potomac Senior High School, Woodbridge, VA (June 98)