Introductory Course

Day 1

  1. Introduction to the development and components of the CPIR (2004-present)

  2. Review of the International Case of “Peter”

  3. Group Experience: Breakout room to code Peter on CPIR

  4. Review Peter’s CPIR & introduction to Peter on CPIR software

  5. Group Quiz using polling

  6. Homework—Review of tomorrow’s case: Violence and Cyber Hacking/Extortion threats in a Disgruntled Employee—excerpts from “Bill’s” personnel file

Day 2

  1. Review of investigation and analysis of case of computer hacking & workplace sabotage & violence threat

  2. Group Experience: Breakout rooms to code case

  3. Review of CPIR coding

  4. Group Experience: Breakout room on case management recommendations

  5. Review of actual case disposition

  6. Writing a CPIR-based report

  7. Course review and certification exam administration


Advanced Course

Day 1 (read ahead materials distributed)

  1. Overview of Advanced Training-Skill Goals:
    a. Detect the presence of CPIR variables from array of media in a complex
    case
    b. Produce a CPIR-Index risk score which takes account of frequency
    and severity of items

  2. The complex case of Dr. Bruce Ivins & the 2001 Anthrax attacks—presented by Dr. Shaw who served as an Expert Witness for student CPIR-Index Coding

  3. Introduction to the CPIR-Index—enhanced instructions to take account of event or variable severity, consequences, frequency, to produce a risk score—Dr. Mark Lenzenweger—coding the Ivins case

  4. Review of Case Coding—Dr. Lenzenweger

  5. Use of Psycholinguistics in Investigation and Management of WMD threat by unknown Suspect—Dr. Shaw


     Day 2: Special Topics in Insider Risk Assessment (read ahead materials distributed)

  6. Identifying unknown subjects from their written products—Review of author attribution criteria-Errors, organization, optional aspects of writing style, psychological states and personality issues, psycholinguistics, content themes

  7. Group Experience: review and analysis of anonymous author-extracting the author attribution criteria, Review of results

  8. How do Insider Risk Teams function in cases of suicide and/or violence risk

  9. The Psychology of Conspiracy Beliefs Vs. Extremist Risk on the CPIR

  10. Course Evaluation and Exam Administration