• cryptoAI
  • Cyber ​​HUMINT

    IHUM201

    Cyber ​​HUMINT

    As users increasingly protect their personal information on social media, it becomes increasingly challenging to gather and monitor the necessary digital information from these sources. This means that OSINT is no longer sufficient as an intelligence source. In addition, various social media platforms are increasingly shifting their focus to the exclusive use of mobile applications, responding to the growing group of young users. Platforms such as Snapchat, KIK, TikTok, Instagram and Tinder are clear examples of this.

    The solution for these developments? Cyber ​​HUMINT!

    The tailor-made training for Cyber-HUMINT Strategic Operator (Virtual Agent) can be divided into the following operational components:

    Component 1: Creating an online, covert 'alter ego'

    Within the limits of legislation and regulations, you will be taught the subtle art of unobtrusively collecting digital information about people and organizations. While this may seem simple at first glance, the reality is often more complex; Creating and maintaining covert social media accounts (Sock Puppets) and a reliable 'digital network of friends' often turns out to be more complicated than expected in practice. This training also goes further than just various social media sources and focuses on the development of an integral online 'alias'.

    Component 2: Aggregating digital analyses

    In addition to the preparation, development and implementation of the aforementioned 'covert' social media accounts and a digital 'alter ego', the focus during this training is also on producing a professional digital text, profile and group analysis. You will acquire the ability to 'read' and 'understand' individuals online, allowing you to adapt more effectively to the online situation. Such analyzes provide insight into online infiltration and increase the chance of success.

    Component 3: Protecting your own identity and digital information

    Your knowledge of the latest tools and techniques for online digital infiltration will make it easier for you to recognize and unmask a surreptitious fake account that is trying to obtain personal, business or organizational information from you.

    This unique training is followed by American investigation services, among others. (references on request)

    This intensive training is dedicated to advanced, special research techniques. In the context of Information-Driven Action and Investigation, it is crucial to have access to all possible digital information in order to make and substantiate well-founded decisions. Therefore, you will be given access to IACA's Cyber-HUMINT platform prior to this module.

    This is the ultimate training for Data Driven Detection. This training is open to those who need to have the relevant skills in the context of their (future) work.

    Overview of parts IHUM201:

    Part 1: Digital Text Analysis

    Part 2: Cyber ​​Human Intelligence

    Part 3: Predictive Forensic Data Analytics & Visualization®

    Part 4: Digital Profile and Group Analysis

    Part 5: Creating social media infiltration accounts

    Part 6: Protection and awareness of your own identity and digital information

    Unit 7: Artificial Intelligence, information collection and analysis > Cyber ​​HUMINT

    Unit 8: Cyberpsychology

    During this module, participants will have access to a unique toolset, specially developed by IACA. This IACA toolset includes exclusive OSINT tools that are optimal for quickly searching social media sources such as Facebook and Telegram, visualizing geolocations, optimizing search engines and clearly mapping online networks and connections. In addition, participants are also taught the unique OSINT methodologies and procedures developed by IACA, which enables them to collect and analyze information in a structured and efficient manner. Due to the integration of the specific IACA toolset and methods, this training is unique and can be followed exclusively at IACA.

    Who is this training developed for?

    This hands-on training is highly recommended for professionals involved in gathering information from closed sources. This includes reading in private groups, chats and blogs, and in some situations, engaging in online interactions. The training is an essential step for those who want to obtain the 'Registered Cyber ​​HUMINT Strategic Operator®' diploma, with a focus on internet infiltration and covert operations. Due to its practical approach, this training is particularly suitable for a specific group of professionals, such as employees of investigation and security services and other researchers, who are involved in various aspects of investigation and investigation.

    Lesson format: tailor-made
    This specific tailor-made training is only offered in a closed form, given the specific needs and nature of the work of our participants. We can provide a private training at our location for a minimum of twelve participants. We are happy to provide you with a tailor-made proposal.

    All our instructors have been screened and have concluded confidentiality agreements with various government services. A specific confidentiality agreement for your organization or service is also possible.

    Certification & Recognition
    Our training institute has been tested by and registered with the CRKBO (Central Register for Short Vocational Education).

    This training is a recognized registered training that has been tested and accredited. For more information about recognition and registration, please select the training course below. Our training institute is therefore the only civil organization in Europe that is authorized and entitled to award this diploma. After completing this training you will receive the SPEN diploma:

    Registered Cyber ​​HUMINT Strategic Operator®

    Our courses and diplomas are widely recognized and highly regarded by various government services, as well as by a wide range of international organizations outside the government. Whether you already work for such an organization or are pursuing a position with one of these employers, our training courses are a valuable addition to your CV.

    Number of teaching days

    Minimum prior education

    Training costs

    Start training

    Vacancies

    Flowchart

    OSIDATA