As users increasingly shield their personal information on social media, it becomes increasingly challenging to gather and monitor the necessary digital information from these sources. This makes OSINT no longer a sufficient source of intelligence. Furthermore, various social media platforms are increasingly shifting their focus to the exclusive use of mobile applications, capitalizing on the growing group of young users. Platforms like Snapchat, KIK, TikTok, Instagram, and Tinder are clear examples of this.
The solution to these developments? Cyber HUMINT!
The tailor-made training for Cyber-HUMINT Strategic Operator (Virtual Agent) can be divided into the following operational components:
Component 1: Creating an online, covert 'alter ego'
Within the confines of laws and regulations, you will be taught the subtle art of discreetly gathering digital information about individuals and organizations. While this may seem simple at first glance, the reality is often more complex; creating and maintaining covert social media accounts (sock puppets) and a reliable "digital network" often proves more complicated than anticipated. This training course goes beyond simply covering various social media sources and focuses on developing a comprehensive online "alias.".
Component 2: Compiling digital analyses
In addition to preparing, developing, and implementing the aforementioned "covert" social media accounts and a digital "alter ego," this course also focuses on creating professional digital text, profile, and group analyses. You'll acquire the ability to "read" and "understand" individuals online, enabling you to adapt more effectively to online situations. Such analyses provide insight into online infiltration and increase the likelihood of success.
Component 3: Protecting your own identity and digital information
By understanding the latest tools and techniques for online digital infiltration, you can more easily identify and expose a surreptitious fake account that is trying to obtain personal, business, or organizational information from you.
This unique training is also used by American law enforcement agencies. (References available upon request)
This intensive training course focuses on advanced, specialized investigative techniques. Within the framework of Intelligence-Driven Operations and Investigations, it is crucial to have access to all possible digital information to make and substantiate well-founded decisions. Therefore, before this module, you will be given access to the IACA Cyber-HUMINT platform.
This is the ultimate training for Data-Driven Investigation. It is open to those who need the relevant skills for their (future) work.
Overview of IHUM201 components:
Part 1: Digital Text Analysis
Part 2: Cyber Human Intelligence
Part 3: Predictive Forensic Data Analytics & Visualization®
Part 4: Digital Profile and Group Analysis
Part 5: Creating social media infiltration accounts
Part 6: Protection and awareness of your own identity and digital information
Part 7: Artificial Intelligence, Information Gathering and Analysis > Cyber HUMINT
Part 8: Cyberpsychology
During this module, participants will have access to a unique toolset, specially developed by IACA. This IACA toolset includes exclusive OSINT tools optimized for quickly searching social media sources like Facebook and Telegram, visualizing geolocations, optimizing search engines, and clearly mapping online networks and connections. Participants will also be trained in the unique OSINT methodologies and procedures developed by IACA, enabling them to gather and analyze information in a structured and efficient manner. The integration of the specific IACA toolset and methodologies makes this training unique and exclusive to IACA.
Who is this course developed for?
This hands-on training is highly recommended for professionals engaged in gathering information from closed sources. This includes, among other things, reading private groups, chats, and blogs, and in some situations, engaging in online interactions. The training is an essential step for those seeking the "Registered Cyber HUMINT Strategic Operator®" credential, with a focus on internet infiltration and covert operations. Due to its practical approach, this training is particularly well-suited for a specific group of professionals, such as law enforcement and security services and other researchers involved in various aspects of investigation and detection.
Course format: customized.
This specific customized training is offered exclusively in private format, due to the specific needs and nature of our participants' work. With a minimum of twelve participants, we can provide a private training course at our location. We are happy to provide a customized proposal.
All our instructors have been screened and have signed confidentiality agreements with various government agencies. A specific confidentiality agreement for your organization or agency is also possible.
Certification & Recognition
Our training institute has been assessed by and registered with the CRKBO (Central Register for Short Vocational Education).
This training is a recognized, registered training program that has been assessed and accredited. For more information about recognition and registration, please select the training program below. Our training institute is therefore the only civil organization in Europe authorized and entitled to award this diploma. After completing this training, you will receive the SPEN diploma:
Registered Cyber HUMINT Strategic Operator®
Our programs and diplomas are widely recognized and highly regarded by various government agencies, as well as a wide range of international organizations outside of government. Whether you already work for such an organization or are pursuing a position with one of these employers, our programs are a valuable addition to your resume.
Experiences Cyber HUMINT Training IACA:

Frank
Government
Extremely interesting!
Education: IHUM201
Review: "The instructor teaches well and clearly. The material is practical and includes many clever tips and tricks.
Extremely interesting."

Andre
Financial services provider
Very interesting!
Education: IHUM201
Review: "The instructor teaches in a very pleasant way.
The content was very interesting, and much of it was new and practical."

Greg
US government
Outstanding instructor!
Education: IHUM201
Review: “IACA offers fantastic training programs. We had an outstanding instructor, and I'm eager to enroll in more courses.”

Karen
US government
Truly excellent!
Education: IHUM201
Review: “The organization of everything was impeccable, and the training itself was truly excellent.”

Steven
US government
Valuable!
Education: IHUM201
Review: “The instructor excels in effectively conveying information and possesses vast expertise in this domain. The section on Cyber Psychology was particularly valuable to me.”

Raven
US government
Exceptional training!
Education: IHUM201
Review: “This was the most exceptional training I have ever received. Thank you!”

Leonard
US government
Immense benefits!
Training: IHUM201 (in-company)
Review: “We will derive immense benefits from this in our day-to-day work.”
€ 2295,-





