Setting Up Sock Puppet Accounts for Counter Terrorism

Overview

Highlights:

  • 2-day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

This two-day workshop focuses on the critical role of sock puppet accounts in counter-terrorism operations. Participants will learn to create and manage convincing fake online personas, gather real-time intelligence, and infiltrate extremist networks. The workshop covers operational security (OPSEC), risk assessment, and the distinctions between passive and active accounts.  

  • DEVELOP strategies for real-time intelligence gathering within terrorist networks. 
  • UTILISE sock puppet accounts to propagate counter-narratives and support counter-radicalisation initiatives. 
  • UNDERSTAND key principles and practices to ensure operational security when using sock puppet accounts, including risk assessment and mitigation strategies. 
  • DISTINGUISH the characteristics, uses, and guidelines for employing passive and active sock puppet accounts to balance engagement and risk. 
  • DISCOVER the importance of detailed and consistent backstories in creating credible personas that can withstand scrutiny. 
  • MASTER strategies for engaging with targets, building trust, extracting information, and managing conflicts without compromising the account. 

 

Who should attend
  • Counter-Terrorism Analysts 
  • Intelligence Officers 
  • Cybersecurity Specialists 
  • Law Enforcement Agents 
  • National Security Advisors 
  • Investigative Journalists 
  • Social Media Analysts 
  • Digital Forensics Experts 
  • Government Policy Makers 
  • Anti-Radicalisation Program Coordinators 
  • Crisis Management Professionals 
  • Military Intelligence Personnel 
Trainer

About Our Expert Trainer

Our trainer brings over 17 years of dedicated service and expertise in specialised military environments and behavioural analysis.

Formerly with the Australian Signals Directorate, she has been instrumental in founding and leading Open-Source Intelligence (OSINT) teams, delivering actionable insights to government and military agencies. Her leadership has been pivotal in managing complex investigations and operations, including high-stakes scenarios involving war crimes and terrorist activities.

Case Studies

Relevant case studies will be added to this masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Setting Up Sock Puppet Accounts for Counter Terrorism

Setting Up Sock Puppet Accounts
Overview

Highlights:

  • 2-day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

This two-day workshop focuses on the critical role of sock puppet accounts in counter-terrorism operations. Participants will learn to create and manage convincing fake online personas, gather real-time intelligence, and infiltrate extremist networks. The workshop covers operational security (OPSEC), risk assessment, and the distinctions between passive and active accounts.  

  • DEVELOP strategies for real-time intelligence gathering within terrorist networks. 
  • UTILISE sock puppet accounts to propagate counter-narratives and support counter-radicalisation initiatives. 
  • UNDERSTAND key principles and practices to ensure operational security when using sock puppet accounts, including risk assessment and mitigation strategies. 
  • DISTINGUISH the characteristics, uses, and guidelines for employing passive and active sock puppet accounts to balance engagement and risk. 
  • DISCOVER the importance of detailed and consistent backstories in creating credible personas that can withstand scrutiny. 
  • MASTER strategies for engaging with targets, building trust, extracting information, and managing conflicts without compromising the account. 

 

Who should attend
  • Counter-Terrorism Analysts 
  • Intelligence Officers 
  • Cybersecurity Specialists 
  • Law Enforcement Agents 
  • National Security Advisors 
  • Investigative Journalists 
  • Social Media Analysts 
  • Digital Forensics Experts 
  • Government Policy Makers 
  • Anti-Radicalisation Program Coordinators 
  • Crisis Management Professionals 
  • Military Intelligence Personnel 
Trainer

About Our Expert Trainer

Our trainer brings over 17 years of dedicated service and expertise in specialised military environments and behavioural analysis.

Formerly with the Australian Signals Directorate, she has been instrumental in founding and leading Open-Source Intelligence (OSINT) teams, delivering actionable insights to government and military agencies. Her leadership has been pivotal in managing complex investigations and operations, including high-stakes scenarios involving war crimes and terrorist activities.

Case Studies

Relevant case studies will be added to this masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Dark Web Investigation Masterclass

Overview

Highlights:

  • 2 day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

The course is designed to take participants through the full spectrum of topics necessary to be an effective Cyber Internet investigator. If you are following the trail of cryptocurrency transactions,  tracking paedophiles by using keywords or images, or looking for historic data of your target on the Darknet or the open web, this is the course for you.

  • EQUIP yourself with latest cutting-edge tools and proactive investigation methodology.
  • ACCOMPLISH effective investigation of OSINT and Darknet investigations.
  • STRENGTHEN investigation skills to meet new challenges.
  • GET to the dark web using Tor and other browsers.
  • LOCATE common hubs and resources on the dark web and explore what they have to offer.
  • MANAGE leads from the dark web to the surface in an investigation.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

Our trainer has over 38 years of experience. A former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police, he is a globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.

He has also has been involved in the tracking of high profile cases, murder and major crime data analysis, and persons and vessel track and trace. He is also an open source expert (SME) and lead advisor for forces and government agencies both domestic and abroad.

Case Studies

Relevant and real world applications and examples will be added as examples in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


[Expert-Led Digital Masterclass] Digital Surveillance Techniques Course

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hours of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely. Our onboarding package will ensure a smooth learning experience.
Not to worry, we're ready to answer any questions, reach us at hello@q8asia.com.sg.

Brochure Download


[Expert Led Digital Masterclass] The Intelligence Cycle [Fundamentals course]

Overview

This four half-day interactive, detailed and practical workshop will provide the students a solid understanding of the Intelligence Cycle, so that they can apply it in a practical setting. The course will develop the students understanding of the various stages of the Intelligence Cycle – exploring in depth, Direction, Collection, Processing and Dissemination. The course will explore various intelligence collection disciplines, introducing the participants to new concepts for exploitation.

  • Learn the four phases of the Intelligence Cycle and how they function together.
  • Understand the roles and responsibilities of intelligence analysts and officers in the role of the Intelligence Cycle.
  • Develop your understanding of intelligence collection disciplines.
  • Learn and practice valuable processes such as developing intelligence collection plans.
Who should attend
  • The workshop is designed for a range of specialists from across the intelligence community, private sector, Government, Military and Law Enforcement specialists, and those wanting to expand their understanding of the role of intelligence analysts and officers in their field.

    • Law enforcement intelligence specialists
    • Military intelligence specialists
    • Government intelligence specialists
    • Intelligence specialists, officers and analysts
    • Private sector intelligence specialists – for example, those engaged in oil and gas exploration, risk management and security
    • Risk management professionals
    • Those interested in the intelligence community and the role of intelligence in decision-making
Trainer

Our Expert Facilitator

Chris Proops LLB (Hons) PgDip VR is an experienced intelligence practitioner, with  eighteen years miliary knowledge and eight years national and international law enforcement skills.

Chris started his military career in the Royal Anglian Regiment, serving five years and gaining experience of resource management, combat and survival skills, risk management skills and a practical understanding of warfare. Deploying overseas, Chris gained a valuable insight into the role of NATO and international defence.

Perseus Intelligence was created from a passion for sharing knowledge and experience of intelligence, to support those who wish to pursue an exciting and rewarding career. 

Case Studies

Where possible, our facilitator will add relevant case studies during this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this online course closer to the date of the course.

Brochure Download


[Expert-Led Digital Masterclass] Digital Surveillance Techniques Course

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hours of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely. Our onboarding package will ensure a smooth learning experience.
Not to worry, we're ready to answer any questions, reach us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Advanced Open Source and Social Media Intelligence

Overview

Highlights:

  • Intensive 24-Hour Course
  • More than 12 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will online on Zoom. Participants will receive login details closer to the date of the course.

If you have questions about the course, please contact us at: hello@q8asia.com.sg.

Brochure Download


[Expert Led Masterclass] CCTV Operator Surveillance for Security with CPTED Principles

Overview

Highlights:

  • DETECT suspicion indicators relating to their operational environment using CCTV.
  • ASSESS suspicion indicators based on known and predicted criminal and/or terrorist methods of operation.
  • CONDUCT, deploy, interact and communicate using criminal threat mitigation techniques.
  • AUGMENT the human element of security framework and enhance the safety and security of the people and the assets they serve.
  • INCREASE the perceived risk of being detected, captured and possibly arrested,
  • IMPLEMENT effective CCTV Deterrence strategies.
  • MASTER the principles of Security Surveillance through proper CCTV placement.
Who should attend

This Masterclass is ideal for the:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

About the Expert Trainer

  • Over 40 years of experience handling high-profile cases and investigations with the Singapore Police Force.
  • Recipient of awards and accolades for outstanding achievements and long service in the police force.
Case Studies

Our trainer will incorporate relevant case examples of real, local cases solved by CCTV and detective ground work  in this masterclass.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive information about the venue closer to the date of the event.

Brochure Download


[Expert-Led Digital Masterclass] Counter Improvised Explosive Devices (CIED)

Overview

Highlights:

This online Masterclass is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this Masterclass:

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainer

Our expert trainer has 30 years’ experience in both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances. He has extensive experience of IEDD, Explosive Ordnance Disposal (EOD) and Conventional Munitions Disposal (CMD) operations.

Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This class will be conducted online on Zoom. Participants will receive Zoom details  closer to the date of the course.

For enquiries, please write to hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Counter Improvised Explosive Devices (C-IED) in Today’s Terror Threat Environment

Overview

Highlights:

This in-person Masterclass is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this Masterclass:

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainer

Expert Trainer has 30 years’ experience in both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances. He has extensive experience of IEDD, Explosive Ordnance Disposal (EOD) and Conventional Munitions Disposal (CMD) operations.

Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore

Brochure Download