• logo
  • Cyber ​​HUMINT

    IHUM201

    Cyber ​​HUMINT

    Registration

    As users increasingly shield their personal information on social media, it becomes increasingly challenging to gather and monitor the necessary digital information from these sources. This makes OSINT no longer a sufficient source of intelligence. Furthermore, various social media platforms are increasingly shifting their focus to the exclusive use of mobile applications, capitalizing on the growing group of young users. Platforms like Snapchat, KIK, TikTok, Instagram, and Tinder are clear examples of this.

    The solution to these developments? Cyber ​​HUMINT!

    The tailor-made training for Cyber-HUMINT Strategic Operator (Virtual Agent) can be divided into the following operational components:

    Component 1: Creating an online, covert 'alter ego'

    Within the confines of laws and regulations, you will be taught the subtle art of discreetly gathering digital information about individuals and organizations. While this may seem simple at first glance, the reality is often more complex; creating and maintaining covert social media accounts (sock puppets) and a reliable "digital network" often proves more complicated than anticipated. This training course goes beyond simply covering various social media sources and focuses on developing a comprehensive online "alias.".

    Component 2: Compiling digital analyses

    In addition to preparing, developing, and implementing the aforementioned "covert" social media accounts and a digital "alter ego," this course also focuses on creating professional digital text, profile, and group analyses. You'll acquire the ability to "read" and "understand" individuals online, enabling you to adapt more effectively to online situations. Such analyses provide insight into online infiltration and increase the likelihood of success.

    Component 3: Protecting your own identity and digital information

    By understanding the latest tools and techniques for online digital infiltration, you can more easily identify and expose a surreptitious fake account that is trying to obtain personal, business, or organizational information from you.

    This unique training is also used by American law enforcement agencies. (References available upon request)

    This intensive training course focuses on advanced, specialized investigative techniques. Within the framework of Intelligence-Driven Operations and Investigations, it is crucial to have access to all possible digital information to make and substantiate well-founded decisions. Therefore, before this module, you will be given access to the IACA Cyber-HUMINT platform.

    This is the ultimate training for Data-Driven Investigation. It is open to those who need the relevant skills for their (future) work.

    Overview of IHUM201 components:

    Part 1: Digital Text Analysis

    Part 2: Cyber ​​Human Intelligence

    Part 3: Predictive Forensic Data Analytics & Visualization®

    Part 4: Digital Profile and Group Analysis

    Part 5: Creating social media infiltration accounts

    Part 6: Protection and awareness of your own identity and digital information

    Part 7: Artificial Intelligence, Information Gathering and Analysis > Cyber ​​HUMINT

    Part 8: Cyberpsychology

    During this module, participants will have access to a unique toolset, specially developed by IACA. This IACA toolset includes exclusive OSINT tools optimized for quickly searching social media sources like Facebook and Telegram, visualizing geolocations, optimizing search engines, and clearly mapping online networks and connections. Participants will also be trained in the unique OSINT methodologies and procedures developed by IACA, enabling them to gather and analyze information in a structured and efficient manner. The integration of the specific IACA toolset and methodologies makes this training unique and exclusive to IACA.

    Who is this course developed for?

    This hands-on training is highly recommended for professionals engaged in gathering information from closed sources. This includes, among other things, reading private groups, chats, and blogs, and in some situations, engaging in online interactions. The training is an essential step for those seeking the "Registered Cyber ​​HUMINT Strategic Operator®" credential, with a focus on internet infiltration and covert operations. Due to its practical approach, this training is particularly well-suited for a specific group of professionals, such as law enforcement and security services and other researchers involved in various aspects of investigation and detection.

    Course format: customized.
    This specific customized training is offered exclusively in private format, due to the specific needs and nature of our participants' work. With a minimum of twelve participants, we can provide a private training course at our location. We are happy to provide a customized proposal.

    All our instructors have been screened and have signed confidentiality agreements with various government agencies. A specific confidentiality agreement for your organization or agency is also possible.

    Certification & Recognition
    Our training institute has been assessed by and registered with the CRKBO (Central Register for Short Vocational Education).

    This training is a recognized, registered training program that has been assessed and accredited. For more information about recognition and registration, please select the training program below. Our training institute is therefore the only civil organization in Europe authorized and entitled to award this diploma. After completing this training, you will receive the SPEN diploma:

    Registered Cyber ​​HUMINT Strategic Operator®

    Our programs and diplomas are widely recognized and highly regarded by various government agencies, as well as a wide range of international organizations outside of government. Whether you already work for such an organization or are pursuing a position with one of these employers, our programs are a valuable addition to your resume.

    Number of teaching days

    Minimum prior education

    Cost of training

    Start training

    Vacancies

    Flowchart

    OSIDATA

    € 2295,-