Technical Exploitation

Even with the best counter-threat training, technology and equipment, it may not be always possible to prevent attacks and incidents from occurring, but what can be done is this: Ensure proper prevention and preparation measures are in place. In order to achieve this efficiently and effectively, military and law enforcement personnel must first understand how and why the perpetrators were able to breach existing security measures.

Post incident technical exploitation is a vital tool in helping to prevent further attacks, but also in ensuring that those responsible can be identified and brought to justice. An appropriately trained and equipped response to conduct this exploitation is a critical capability. Worldwide Counter Threat Solutions (WCTS) is highly experienced in this area, and will work with your organization to guarantee an appropriately trained counter-threat team with an equipped response strategy. Develop an exploitation capability from the start or to improve an existing one, with a little help from WCTS.

Knowledge Areas

Dependent upon the type of training being delivered WCTS Technical Exploitation Training includes some or all of the following areas of competence:

  • Introduction to Tech Exploitation
  • Exploitation Equipment
  • Planning and Assessments
  • Device Type
  • Actions on Task
  • Electronics
  • Explosives
  • Tech Exploitation procedures
  • Terrorist and Other TTPs
  • Exploitation and Forensics
  • Documentation
  • Post Task Actions
  • Practical Exercises

Training Packages

The following courses are examples of training that can be carried out by WCTS. Course duration and content will be tailored to suit individual client requirements.

  • Post Incident Investigations
  • Exploitation Consultancy and Doctrine Support
  • Train The Trainer