Page 6 - Course Catalog & Training Products
P. 6
TACT CONSULTING, LLC.
Training Course Catalog
Segments of our society are inherently
open to the general public, and by nature
Suspicious of their purpose do not incorporate strict
Activity security measures. Given the increased
emphasis by terrorists and other
Soft Targets extremist actors to leverage less
sophisticated methods to inflict harm in
Soft targets and crowded places are public areas, it is vital that the public and
increasingly appealing to terrorists and private sectors collaborate to enhance
other extremist actors because of their security of locations such as
relative accessibility and the large transportation centers, parks,
number of potential targets. This restaurants, shopping centers, special
challenge is complicated by the prevalent event venues, and similar facilities.
use of simple tactics and less
sophisticated attacks.
Public / Special
Terrorists and other extremist actors,
who have demonstrated the intent and Events
capability to attack soft targets–crowded
places, continue to pose a risk
domestically and abroad. These
adversaries have the ability to access and Dynamic Operating Environment—
surveil potential targets with relative Public/Special Events Public and or
ease, and use various tactics to carry out Special Events are typically, readily
attacks, including: accessible by the public, mass transit and
vehicles traffic, they are frequented by
Small Arms — Require minimal large crowds, and they are likely
preparation and experience. considered appealing soft targets. The
Improvised Explosive Devices (IEDs) — physical attributes, location, and
Complexity and effectiveness of the operational and logistical considerations
devices used in explosive attacks are of Public/Special Events create security
highly variable and depended on the challenges for first responders and
expertise of the attacker and their event stakeholders.
access to explosive components.
This 3-hour course participants will learn
Edged Weapons — Require minimal the signs of suspicious activity along with
preoperational planning due to their
accessibility and ease of use. Edged terrorist attack planning cycle, suspicious
weapons have primarily been used as behavior, suspicious packages and
a secondary attack method. possible surveillance activities that can be
associated to criminal activities including
Vehicle Ramming — Require minimal terrorism while performing their daily
preparation and experience, and past
attacks have occurred with little to no duties.
warning. Contact us for further information and pricing
www.tactconsulting.org 4