Calendar of Events

December 2024
SunMonTueWedThuFriSat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31
Events available for Registration...

Events in the month of December 2024
12/16/2024 - 12/18/2024

As users increasingly safeguard their personal information on social media, it becomes more challenging to gather and monitor the necessary digital information from these sources. Consequently, Open Source Intelligence (OSINT) alone is no longer sufficient as an intelligence source. Additionally, various social media platforms are shifting their focus more towards exclusive use of mobile applications, catering to the growing demographic of younger users. Platforms such as Snapchat, KIK, TikTok, Instagram, and Tinder are prime examples of this trend.

The solution to these developments? Cyber HUMINT!
 

The training program for becoming a Cyber-HUMINT Strategic Operator (Virtual Agent) can be divided into the following operational components:
 

Component 1: Creating an Online, Covert ‘Alter Ego‘

Within the boundaries of laws and regulations, you will be taught the subtle art of inconspicuously gathering digital information about individuals and organizations. While this may seem straightforward at first glance, the reality is often more complex; creating and maintaining covert social media accounts (Sock Puppets) and a reliable ‘digital network of friends’ is typically more challenging in practice than expected. Furthermore, this training goes beyond merely using various social media sources and focuses on the development of a comprehensive online ‘alias’.

 

Component 2: Combining Digital Analyses

In addition to preparing, developing, and implementing the aforementioned ‘covert’ social media accounts and a digital ‘alter ego’, this training also focuses on creating professional digital text, profile, and group analyses. You will acquire the skill to ‘read’ and ‘understand’ individuals online, enabling you to adapt more effectively to the online environment. Such analyses make online infiltration transparent and increase the likelihood of success.

 

Component 3: Protecting Your Own Identity and Digital Information

Thanks to your knowledge of the latest tools and techniques for online digital infiltration, you’ll be better equipped to identify and unmask covert fake accounts attempting to acquire personal, business, or organizational information from you. This knowledge not only enhances your defensive capabilities but also enriches your overall skill set in digital intelligence operations.

This unique training is also undertaken by American law enforcement agencies (references available upon request)

This intensive training is dedicated to advanced, specialized investigative techniques. In the context of Information-Driven Tactics and Analysis, it’s essential to have access to all possible digital information to make and substantiate well-founded decisions. Therefore, prior to this module, you will gain access to the Cyber-HUMINT platform of the International Anti Crime Academy (IACA).

This is the ultimate training for Information-Driven Investigations. The course is open to those who, in the course of their current or future professional activities, need to possess these skills.

Overview of Components IHUM201: 

  • Digital Text Analysis
  • Cyber Human Intelligence
  • Predictive Forensic Data Analytics & Visualization®
  • Digital Profile and Group Analysis
  • Creating social media infiltration accounts
  • Protection and Awareness of Your Own Identity and Digital Information
  • Artificial Intelligence, Information Gathering, and Analysis > Cyber Human Intelligence (Cyber HUMINT)
  • Cyberpsychology
     

During this module, participants will gain access to a unique toolset developed specifically by IACA. This IACA toolset includes exclusive OSINT tools that are optimized for quickly searching social media sources such as Facebook and Telegram, visualizing geolocations, enhancing search engines, and effectively mapping online networks and connections. Additionally, participants will be instructed in the unique OSINT methodologies and procedures developed by IACA, enabling them to gather and analyze information in a structured and efficient manner. The integration of the specific IACA toolset and methodologies makes this training program unique and exclusively available at IACA.
 

For whom is this training developed?

This hands-on training is highly recommended for professionals involved in gathering information from private sources. This includes activities such as monitoring private groups, chats, and blogs, and in some cases, engaging in online interactions. The training is an essential step for those aiming to achieve the ‘Registered Cyber HUMINT Strategic Operator®’ certification, with a focus on internet infiltration and covert operations. 


The following list of IALEIA seminars, meetings, and various intelligence training events is posted for our membership to improve their analytical skill sets and resource network.