Open source intelligence analyst module 1 (digos/osint-1) virtueel

For decades, our teachers have collected, reported and analyzed digital information for individuals, companies, the police, defense and other (inter)national government services about criminal and extremist organizations, international fugitives, hidden assets, financial backgrounds, rogue companies and risk areas. This knowledge has resulted in an exclusive recognition of the first Dutch training program in the field of digital data-driven working.

 

Digital Data-driven Operational Specialist®

 

During this modular, classroom-based post-graduate course you will learn how to combine information from public and semi-public sources and from social media sources (OSINT & SOCMINT) and supplement it with special digital research techniques, including:

 

  • C-HUMINT: Cyber-Human Intelligence
  • PFDAV: Predictive Forensic Data Analytics & Visualisation®
  • Digital Profiling and Monitoring

Combining the various techniques makes certain (sensitive) online information visible and usable. This concerns information that has remained hidden until now and that is often necessary to carry out preventive or repressive investigations or to take measures. 

 

Whom is this training designed for?

 

This practical training is extremely suitable for anyone who needs to be able to professionally collect, record and analyze digital (background) information or intelligence (IGW) about persons, (inter)national companies, organisations, activities or networks. This for the purpose of a criminal, civil, international, internal or financial investigation (undermining). This often involves protecting business interests or safeguarding national and international public order and safety. To achieve this, you will be intensively trained in the most current techniques and developments within DIGO (Digital Information-driven Detection and Action), of which OSINT (Open Source Intelligence) is an important part.

 

After you have completed this first module, you will immediately be able to collect, process and interpret digital intelligence about persons, (inter)national companies, organizations and networks with regard to, among other things, their financial integrity, secondary activities, events, places of residence or establishment, (default) performance and assets. You will also learn to follow and monitor people and organizations online in order to map out their (future) plans and activities. You can then supplement this information with the traced special research results, resulting in a more complete intelligence picture.

 

Due to the practical applicability of this training, it is extremely suitable for a wide range of professional groups. This includes employees of investigative and security services and regulators, but also mortgage and insurance advisers, KYC and CDD analysts, merchants, loss adjusters (PE accreditation NIVRE) and municipal officials.

 

Get to know our learning platform OSIDATA® and IACA Data Collection Applications

 

We have developed a digital learning platform especially for our courses. This secure platform, called OSIDATA®, includes thousands of OSINT and SOCMINT related tools, techniques, videos, scripts and references. Prior to the last module of this complete training, you will also receive access to the extra Cyber-HUMINT module in OSIDATA.

 

Overview components IACA Digital Information-driven Operational Specialist® | OSINT-1 (IACA DIGOS/OSINT-1) (IACA DIGOS/OSINT-1)

 

Part 1: Introduction ‘data-driven working, detecting, acting and monitoring’

Part 2: IACA Tactical Digital Elements

Part 3: Cybersecurity

Part 4: Operators and building effective search commands

Part 5: Capturing digital information

Part 6: Use Virtual Machines and Mobile Emulators

Part 7: The Dark and Deep Web

Part 8: Digital Business Intelligence

During this training, the participants use exclusive procedures developed by IACA and registered software. As a result, this training can only be followed at IACA.

 

Reviews OSINT training IACA:

Tientallen jaren hebben onze docenten voor zowel particulieren, bedrijven, politie, defensie en andere (inter)nationale overheidsdiensten digitale informatie verzameld, vastgelegd en geanalyseerd omtrent o.a. criminele en extremistische organisaties, voortvluchtige personen, verborgen assets, financiële achtergronden, malafide bedrijven en risicogebieden. Deze kennis heeft geresulteerd in een exclusieve erkenning van het eerste Nederlandse opleidingsprogramma op het gebied van digitaal datagedreven werken.

 

Digitaal Informatiegestuurd Operationeel Specialist®

 

Gedurende deze modulaire, klassikale post-hbo-opleiding leert u op welke wijze u informatie uit openbare en semi-openbare bronnen en uit socialemediabronnen (OSINT & SOCMINT) kunt combineren en aanvullen met bijzondere digitale onderzoekstechnieken waaronder:

 

  • C-HUMINT: Cyber-Human Intelligence
  • PFDAV: Predictive Forensic Data Analytics & Visualisation®
  • Digital Profiling and Monitoring

Het samenvoegen van de verschillende technieken maakt bepaalde (gevoelige) online informatie zichtbaar en bruikbaar. Dit betreft informatie die tot nu toe verborgen bleef en die vaak noodzakelijk is om preventief of repressief onderzoek te plegen of om maatregelen te treffen. 

 

Voor wie is deze opleiding ontwikkeld?

 

Deze praktische opleiding is uitermate geschikt voor iedereen die beroepsmatig digitale (achtergrond)informatie of inlichtingen moet kunnen verzamelen, vastleggen en analyseren (IGW) omtrent personen, (inter)nationale bedrijven, organisaties, activiteiten of netwerken. Dit ten behoeve van een strafrechtelijk, civielrechtelijk, internationaal, intern of financieel onderzoek (ondermijning). Het gaat hierbij vaak om bescherming van bedrijfsmatige belangen, dan wel het waarborgen van de (inter)nationale openbare orde en veiligheid. Om dit te bewerkstelligen wordt u intensief onderwezen in de meest actuele technieken en ontwikkelingen binnen DIGO (Digitaal Informatiegestuurd Opsporen en Optreden) waarvan OSINT (Open Source Intelligence) een belangrijk onderdeel is.

 

Nadat u deze eerste module heeft gevolgd bent u direct in staat om digitale inlichtingen te verzamelen, verwerken en duiden over personen, (inter)nationale bedrijven, organisaties en netwerken met betrekking tot o.a. hun financiële integriteit, nevenactiviteiten, gebeurtenissen, verblijf- of vestigingsplaatsen, (wan)prestaties en assets. Bovendien leert u personen en organisaties online te volgen en te monitoren om zodoende hun (toekomstige) plannen en activiteiten in kaart te brengen. Deze informatie kunt u vervolgens aanvullen met de getraceerde bijzondere onderzoeksresultaten waardoor er een completer inlichtingenbeeld ontstaat.

 

Vanwege de praktische toepasbaarheid van deze opleiding, is deze uitermate geschikt voor een breed scala aan beroepsgroepen. Zo kunt u denken aan medewerkers van opsporings- en veiligheidsdiensten en toezichthouders, maar ook aan bijvoorbeeld hypotheek- en verzekeringsadviseurs, KYC en CDD analisten, acceptanten, schade-experts (PE-accreditatie NIVRE) en gemeenteambtenaren.

 

Maak kennis met het het leerplein OSIDATA® en IACA Data Collection Applications

 

Speciaal voor onze opleidingen hebben wij een digitaal leerplein ontwikkeld. Dit beveiligde platform, genaamd OSIDATA®, omvat duizenden aan OSINT en SOCMINT gerelateerde tools, technieken, video’s, scripts en naslagwerken. Voorafgaande aan de laatste module van deze complete opleiding krijgt u tevens toegang tot de extra Cyber-HUMINT module in OSIDATA.

 

Overzicht onderdelen IACA Digitaal Informatiegestuurd Operationeel Specialist® | OSINT-1 (IACA DIGOS/OSINT-1)

 

Onderdeel 1: Inleiding ‘datagedreven werken, opsporen, optreden en toezichthouden’

Onderdeel 2: IACA Tactische Digitale Elementen

Onderdeel 3: Cybersecurity

Onderdeel 4: Operators en het samenstellen van effectieve zoekopdrachten

Onderdeel 5: Vastleggen van digitale informatie

Onderdeel 6: Gebruik Virtual Machines en Mobile Emulators

Onderdeel 7: Het dark- en deepweb

Onderdeel 8: Digital Business Intelligence

Gedurende deze opleiding maken de deelnemers gebruik van exclusieve door IACA ontwikkelde procedures én geregistreerde software. Hierdoor is deze opleiding uitsluitend te volgen bij IACA.

 

Ervaring OSINT opleiding IACA:

Normally, this training is taught in a classroom setting. Nevertheless, we can imagine that, given your work, you would like to ask questions freely. In that case it is possible to provide a private training at our location for a minimum of twelve participants. We also provide, as you are used to from us, completely customized training courses based on (parts of) this module. We are happy to make you a suitable offer.

 

Our instructors have been screened and have entered into a confidentiality agreement with various government departments. Creating a specific non-disclosure agreement for the benefit of your organization or service is of course no problem.

 

Certification and Recognition

 

Our training institute has been audited by and registered with the CRKBO (Central Register of Short Vocational Education). This module (IACA DIGOS/OSINT-2) is part of the recognized course Digital Data-driven Operational Specialist®. This IGO training is a recognized registered training that has been audited and accredited by the Center for Post Initial Education (CPION) and by the Netherlands Post Higher Professional Education Foundation (SPHBO). Our training institute is therefore the only civil organization in Europe that can and may issue this registered diploma. After you have completed this module you will receive the registered SPEN diploma:

 

  • DIGOS | Registered Open Source Intelligence Analyst®

 

In addition to the above diploma, you will be registered in the Dutch Abituriëntenregister.

More information about the recognition of the diploma can be found here.

 

Successive modules

 

If you have successfully completed IACA DIGOS/OSINT-2 and you have the necessary work experience and pre-education, you can participate in the post-graduate module IACA DIGOS/OSINT-3.

 

View the Flow Chart of the IACA OSINT / DIGOS / Cyber HUMINT courses:

 

 

Because the personal information in social media sources is more and more protected by the user, it is becoming an increasing challenge to collect and monitor the correct digital information via these sources. As a result, OSINT is no longer sufficient as a source of information. Also, more and more social media platforms are focusing on the (full) use of mobile platforms and the associated increasing group of young users. Just think of Snapchat, KIK,  TikTok, Instagram or Tinder! 

 

The answer to these developments? Cyber HUMINT!

 

The Cyber-HUMINT Strategic Operator (Virtual Agent) training can be divided into the following operational components:

 

Component 1: Creating an online covert alter ego

You will learn, within the rules and legal frameworks,  how you can collect digital information about people and organizations without being noticed. This sounds simple, but in practice, creating and maintaining online covert social media accounts (Sock Puppets) and stable ‘digital circle of friends’ often turns out to be more difficult than expected. Moreover, this training is not only limited to the various social media sources, but focuses on a total online ‘alias’. 

 

Component 2: Compiling digital analytics

In addition to preparing, creating and implementing the aforementioned ‘covert’ social media accounts and a digital ‘alter ego’, much attention is paid during this training to the compilation of a professional, digital text-, profile-, and group analysis. You will learn to ‘read’ and ‘understand’ people, so that you can better adapt to the online situation. With such analyses, an online infiltration becomes clear and successful.

 

Component 3: Protection of your own identity and digital information

Because the most current tools and techniques in the field of online, digital infiltration are taught, it is easier for you to recognize and unmask a clandestine fake account that tries to collect private-, business-, or organizational information. 

 

This unique training program is also followed by US Criminal Intelligence Units. (references on request)

 

This intensive training focuses on progressive, special investigation techniques. In the context of Information-driven action and investigation, you naturally want to have access to all possible available digital information. Only then you can make a sound and substantiated decision. Prior to this module you will have access to the additional Cyber-HUMINT module in OSIDATA. 

 

This is the ultimate training in the field of Data Driven Investigation. You can participate in this training if you need the relevant skills in the context of your (future) work.  

 

Overview components Cyber HUMINT Strategic Operator | IACA DIGOS Module 4

 

Part 18: Digital Text Analysis

Part 19: Cyber Human Intelligence

Part 20: Predictive Forensic Data Analytics & Visualisation®

Part 21: Digital Profile and Group Analysis

Part 22: Creating Social Media Infiltration Accounts

Part 23: Protection and awareness of your own identity and digital information

 

During this training, the participants use exclusive procedures developed by IACA and registered software. As a result, this training can only be followed at IACA.

 

This combined learning path will be eligible for the STAP budget

Written by Jane