Advanced HUMINT and Tactical Interrogation Techniques

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn from this Masterclass:

In an increasingly complex and unpredictable world, intelligence professionals face evolving challenges, from counter-terrorism threats to the growing sophistication of criminal networks. Recent global incidents highlight the critical need for advanced HUMINT and interrogation techniques to uncover actionable intelligence swiftly and ethically.

This workshop addresses these challenges by equipping participants with the skills to navigate high-pressure situations, build trust in diverse cultural contexts, and handle resistant targets effectively. By focusing on real-world scenarios and ethical operations, this training prepares professionals to confront modern security threats head-on, making it an indispensable tool for those on the frontlines of global intelligence efforts.

  • GAIN advanced skills in HUMINT and tactical interrogation to excel in intelligence gathering and counter-terrorism operations.
  • LEARN practical, field-tested techniques through interactive drills, role-plays, and case studies from real operations.
  • MASTER ethical intelligence practices that build trust, ensure cultural sensitivity, and deliver results without coercion.
  • DEVELOP tools to handle resistant targets, leverage vulnerabilities, and extract actionable intelligence in high-stakes scenarios.
Who should attend

This training is ideal for professionals involved in countering radicalisation and extremism, including: 

  • Intelligence Officers
  • HUMINT Operatives
  • Counter-Terrorism Specialists
  • Security and Law Enforcement Personnel
  • Military Intelligence Analysts
  • Tactical Interrogators
  • Special Operations Forces (SOF) Personnel
  • Counterintelligence Agents
  • Criminal Investigators
  • Threat Assessment Analysts
  • Border Security Officers
  • Risk Management Professionals
  • National Security Advisors
Trainer

About Our Expert Trainer:

Our trainer has more than 30 years of experience in Emergency Management, Security Counterterrorism with extensive operational and tactical background in high-level security operations, both regionally and internationally. He has also served as the Counter-Terrorist First Response Officer (and shift supervisor) at Sydney Airport from the 2000 Olympics.
He has conducted operational security and consulting contracts in conflict zones in the Middle East. He is also a veteran of both the Australian Defense Force (ADF) and the Australian Federal Police (AFP) 
Case Studies

Relevant case studies will be added to this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced OSINT Training for Law Enforcement

Overview

Highlights:

  • Intensive 3 day course
  • Certificate of Completion on request

What you will learn from this Masterclass:

This Advanced OSINT Training for Law Enforcement equips investigators with cutting edge open-source intelligence (OSINT) techniques to enhance digital investigations, intelligence gathering, and operational security. Designed for law enforcement agencies, this hands-on workshop covers advanced collection methods, social media exploitation, geospatial intelligence, and digital verification tools. Participants will learn to uncover hidden networks, track online threats, authenticate digital evidence, and conduct covert investigations while maintaining anonymity.

  • DEVELOP advanced OSINT skills to track criminal activities, uncover hidden networks, and collect actionable intelligence for law enforcement operations.
  • LEARN essential OPSEC techniques, including VPNs, sock puppets, and counter-surveillance methods, to conduct covert online investigations safely and effectively.
  • ACQUIRE techniques for metadata extraction, geolocation tracking, and source verification to counter misinformation and enhance case integrity.
  • STRUCTURE intelligence reports, conduct link analysis, and fuse OSINT with traditional intelligence disciplines (HUMINT, SIGINT, CYBINT) for more comprehensive investigations.
  • APPLY learned techniques in hands-on simulations, including suspect tracking, social media monitoring, and digital footprint analysis, to prepare for real-world law enforcement cases.
Who should attend
  • Law Enforcement & Intelligence Officers
  • Cybercrime Investigators
  • Digital Forensics Analysts
  • Counterterrorism Analysts
  • Criminal Intelligence Analysts
  • National Security Officers
  • Cyber Threat Intelligence Analysts
  • Undercover & Covert Operations Officers
  • Border Security & Immigration Officers
  • Financial Crime Investigators
  • Military Intelligence Personnel
  • Public Order & Riot Control Intelligence Officers
  • Interpol & International Law Enforcement Agents
  • Human Trafficking & Child Exploitation Investigators
  • Special Branch & Counter-Extremism Officers
Trainer

About our Expert Trainer

  • More than 25 Years in Intelligence & OSINT Operations
  • Delivered OSINT and intelligence training for military, police, and government bodies, including NATO, the United Nations, the UK Ministry of Defence, and foreign security agencies.
  • Specialist in Digital Investigations & Threat Analysis
  • Strategic Advisor on Intelligence & Security Operations
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive details about the venue closer to the date of the course. For more information, please contact us at: hello@q8asia.com.sg.

Brochure Download


Advanced Influence Operations Attribution Training Program

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

The objective of this advanced training program is to equip participants with an in-depth understanding of advanced methodologies, emerging trends, and cutting-edge technologies in influence operations attribution. 

The course will emphasize advanced and technical methods for attribution.

Participants will also gain hands-on experience in complex attribution scenarios and explore strategies for countering sophisticated influence campaigns effectively.

 

Who should attend

This training program is designed for:

  • Senior intelligence analysts
  • Cybersecurity experts
  • Law enforcement officials
  • Policymakers, and professionals involved in countering advanced influence operations.
Trainer

About Our Expert Trainer

Our trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information about the venue will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Setting Up Sock Puppet Accounts for Counter Terrorism

Overview

Highlights:

  • 2-day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

This two-day workshop focuses on the critical role of sock puppet accounts in counter-terrorism operations. Participants will learn to create and manage convincing fake online personas, gather real-time intelligence, and infiltrate extremist networks. The workshop covers operational security (OPSEC), risk assessment, and the distinctions between passive and active accounts.  

  • DEVELOP strategies for real-time intelligence gathering within terrorist networks. 
  • UTILISE sock puppet accounts to propagate counter-narratives and support counter-radicalisation initiatives. 
  • UNDERSTAND key principles and practices to ensure operational security when using sock puppet accounts, including risk assessment and mitigation strategies. 
  • DISTINGUISH the characteristics, uses, and guidelines for employing passive and active sock puppet accounts to balance engagement and risk. 
  • DISCOVER the importance of detailed and consistent backstories in creating credible personas that can withstand scrutiny. 
  • MASTER strategies for engaging with targets, building trust, extracting information, and managing conflicts without compromising the account. 

 

Who should attend
  • Counter-Terrorism Analysts 
  • Intelligence Officers 
  • Cybersecurity Specialists 
  • Law Enforcement Agents 
  • National Security Advisors 
  • Investigative Journalists 
  • Social Media Analysts 
  • Digital Forensics Experts 
  • Government Policy Makers 
  • Anti-Radicalisation Program Coordinators 
  • Crisis Management Professionals 
  • Military Intelligence Personnel 
Trainer

About Our Expert Trainer

Our trainer brings over 17 years of dedicated service and expertise in specialised military environments and behavioural analysis.

Formerly with the Australian Signals Directorate, she has been instrumental in founding and leading Open-Source Intelligence (OSINT) teams, delivering actionable insights to government and military agencies. Her leadership has been pivotal in managing complex investigations and operations, including high-stakes scenarios involving war crimes and terrorist activities.

Case Studies

Relevant case studies will be added to this masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Cryptocurrencies Tracking and Investigation

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What will you learn in this Masterclass?

  • MASTER network understanding around cryptocurrencies. 
  • CAPTURE data relating to transactions and analysis. 
  • EQUIP yourself with the latest and updated methods and tradecraft to proactive investigation. 
  • ADOPT the latest cutting-edge tools in relation to crypto monitoring. 
  • STEP UP investigative skills to meet the new challenges offered by online tools and techniques. 
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations when deployed. 
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence. 
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Blockchain Analyst
  • Cryptocurrency Crime Investigator
  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information to follow about the venue. 

For assistance, please write to hello@q8asia.com.sg

Brochure Download


https://www.youtube.com/watch?v=9uOETcuFjbE

Social Media and Radicalisation Masterclass

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn from this Masterclass:

This workshop provides an in-depth understanding of the processes driving online radicalisation. Over two days, participants will explore the psychological, social, political, and economic factors contributing to radicalisation, supported by real-world case studies. The critical role of social media in spreading extremist ideologies through echo chambers, peer influence, and propaganda will be examined. 

Gain hands-on experience with Open Source Intelligence (OSINT) tools like Maltego, Geofeedia, and ChatGPT, learning to monitor social media, map networks, and analyze extremist content effectively. Learn about the legal and ethical considerations to ensure there is a balance between effective monitoring and respect for privacy. 

Participants will also work on strategies for countering radicalisation, including intervention tactics and community engagement. By the end of the workshop, attendees will be equipped with the skills and knowledge to detect, analyse, and counteract radicalisation efforts on social media. 

  • GAIN a comprehensive understanding of the radicalisation process and the various factors contributing to it. 
  • LEARN how social media influences radicalisation and how to identify the mechanisms extremists use to spread their ideologies. 
  • DEVELOP the ability to recognise and analyse extremist content, including language, symbols, and multimedia used in radical propaganda. 
  • ACQUIRE hands-on experience with powerful OSINT tools like Maltego, Geofeedia, and ChatGPT, enhancing your capability to detect and monitor radicalisation. 
  • UNDERSTAND the legal and ethical considerations involved in monitoring and countering online extremism, ensuring your practices are both effective and responsible. 
  • IMPLEMENT effective counter-radicalisation strategies by learning intervention tactics, engaging communities, and analysing successful case studies. 
Who should attend

This training is ideal for professionals involved in countering radicalisation and extremism, including: 

  • Intelligence Analysts 
  • Counterterrorism Specialists 
  • Law Enforcement Officers 
  • Social Media Analysts 
  • Cybersecurity Professionals 
  • OSINT Analysts 
  • Policy Makers 
  • Security Consultants 
  • Community Outreach Coordinators 
  • Academic Researchers in Extremism and Terrorism Studies 

 

Trainer

About Our Expert Trainer:

Our trainer brings over 17 years of dedicated service and expertise in specialised military environments and behavioural analysis.

Formerly with the Australian Signals Directorate, she has been instrumental in founding and leading Open-Source Intelligence (OSINT) teams, delivering actionable insights to government and military agencies. Her leadership has been pivotal in managing complex investigations and operations, including high-stakes scenarios involving war crimes and terrorist activities

Case Studies

Relevant case studies will be added to this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced Strategies & Tools against AI-Driven Threats

AIthreats
Overview

Highlights:

  • 2 days in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

This course will equip participants with the knowledge and skills to identify, analyse, and combat AI-generated disinformation as well as actively test defences
via red-teaming

  • Get an overview on influence operations, forgeries, disinformation and AI
  • Learn the tools and techniques that are used to detect AI generated threats
  • Understand the role of LLMs in influence ops
  • Learn how to use AI tools to create online assets for blue-teaming and red teaming.
Who should attend

This training program is designed for senior intelligence analysts, cybersecurity experts, law enforcement officials, policymakers, and professionals involved in countering advanced influence operations.

Trainer

About Our Expert Trainer

Our trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information about the venue will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Setting Up Sock Puppet Accounts for Counter Terrorism

Setting Up Sock Puppet Accounts
Overview

Highlights:

  • 2-day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

This two-day workshop focuses on the critical role of sock puppet accounts in counter-terrorism operations. Participants will learn to create and manage convincing fake online personas, gather real-time intelligence, and infiltrate extremist networks. The workshop covers operational security (OPSEC), risk assessment, and the distinctions between passive and active accounts.  

  • DEVELOP strategies for real-time intelligence gathering within terrorist networks. 
  • UTILISE sock puppet accounts to propagate counter-narratives and support counter-radicalisation initiatives. 
  • UNDERSTAND key principles and practices to ensure operational security when using sock puppet accounts, including risk assessment and mitigation strategies. 
  • DISTINGUISH the characteristics, uses, and guidelines for employing passive and active sock puppet accounts to balance engagement and risk. 
  • DISCOVER the importance of detailed and consistent backstories in creating credible personas that can withstand scrutiny. 
  • MASTER strategies for engaging with targets, building trust, extracting information, and managing conflicts without compromising the account. 

 

Who should attend
  • Counter-Terrorism Analysts 
  • Intelligence Officers 
  • Cybersecurity Specialists 
  • Law Enforcement Agents 
  • National Security Advisors 
  • Investigative Journalists 
  • Social Media Analysts 
  • Digital Forensics Experts 
  • Government Policy Makers 
  • Anti-Radicalisation Program Coordinators 
  • Crisis Management Professionals 
  • Military Intelligence Personnel 
Trainer

About Our Expert Trainer

Our trainer brings over 17 years of dedicated service and expertise in specialised military environments and behavioural analysis.

Formerly with the Australian Signals Directorate, she has been instrumental in founding and leading Open-Source Intelligence (OSINT) teams, delivering actionable insights to government and military agencies. Her leadership has been pivotal in managing complex investigations and operations, including high-stakes scenarios involving war crimes and terrorist activities.

Case Studies

Relevant case studies will be added to this masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Using OSINT To Develop Network Analysis Diagrams of Terrorist Cells

Using OSINT To Develop Network Analysis
Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

In this masterclass,  participants will learn to harness Open Source Intelligence (OSINT) to create detailed network diagrams that map out relationships, hierarchies, and communication channels within terrorist networks.

The workshop will also cover techniques of data collection from open sources, the processing and analysis of information to identify key players, and detecting patterns through temporal and geospatial analysis.  By the end of the workshop, attendees will be proficient in using network diagrams to anticipate threats and develop effective counter-terrorism strategies.

  • LEARN to utilise OSINT to create detailed network diagrams that reveal the structure, hierarchy, and operational dynamics of terrorist cells.
  • MASTER techniques for collecting, processing, and analysing data from open sources.
  • PINPOINT influential individuals within terrorist networks, enabling precise targeting for surveillance, arrests, and other interventions.
  • DEVELOP skills in temporal and geospatial analysis to uncover patterns and trends, anticipate potential threats, and respond proactively.
  • CREATE clear and concise network diagrams that enhance collaboration and information sharing among different agencies and international partners.
  • UNDERSTAND how to use network diagrams to guide operational planning, allocate resources effectively, and enhance overall counter-terrorism efforts.
Who should attend

This training is ideal for professionals involved in countering radicalisation and extremism, including: 

  • Intelligence Analysts 
  • Counterterrorism Specialists 
  • Law Enforcement Officers 
  • Security and Defence Personnel
  • Cybersecurity Analysts 
  • OSINT Analysts 
  • Military Intelligence Officer
  • Homeland Security Professionals

 

Trainer

About Our Expert Trainer:

Our trainer brings over 17 years of dedicated service and expertise in specialised military environments and behavioural analysis.

Formerly with the Australian Signals Directorate, she has been instrumental in founding and leading Open-Source Intelligence (OSINT) teams, delivering actionable insights to government and military agencies. Her leadership has been pivotal in managing complex investigations and operations, including high-stakes scenarios involving war crimes and terrorist activities

Case Studies

Relevant case studies will be added to this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced Open Source Intelligence & Social Media Intelligence

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples will be included as part of this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download