K-9 Drug Detection Enhancement
This course is designed for the advanced training of Drug Detector Dog and Handler Teams, which will improve the teams' search ability and help them become both more effective and efficient. Practical exercises will include a variety of buildings and vehicles.
Selection and training of drug detecting dogs
Search strategies and patterns
Theory of odor dispersion
Setting up training aid containers
Vehicular contraband concealment
Canine drives and communication
The pages within this World Wide Web site are provided by the National Guard Counterdrug Program as a service to the public. They do not necessarily reflect the views or opinions of the National Guard and are not guaranteed to be correct, complete, or up to date. Some links within the site may lead to other sites. The National Guard Counterdrug Program website does not incorporate any materials appearing in such linked sites by reference, nor does the National Guard Counterdrug Program necessarily sponsor, endorse, or otherwise approve of such linked material.The courses listed are in the final funding process and open for registration. Registering for a course does not guarantee enrollment, but your registration signals your intent and you should plan on attending the course as indicated. We will contact you as soon as possible if the course is cancelled.
The Chief, National Guard Bureau Counterdrug Office, provides the Counterdrug Office Website as a public service. Information presented on the NGB J3-CD Website is considered public information and may be distributed or copied for non-commercial purposes. Use of appropriate byline/photo/image credits is requested. This government computer system uses software programs to create summary statistics, which are used for website planning and maintenance, determining technical design specifications, and analyzing system performance. For security purposes, and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic, to identify unauthorized attempts to upload or change information, to cause damage, or to deny service to authorized users. Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Server logs are scheduled for regular destruction IAW National Archives and Records Administration General Schedule 20. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.