Turning Data into Decisions: Evidence-Based Approaches That Work

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Participation upon request.

This two-day applied workshop equips public officers with the tools and techniques to apply Behavioural Insights (BI) in designing and evaluating policies, programmes, and public-facing initiatives.

What you will learn from this workshop:

  • EXPLAIN and APPLY key BI frameworks (COM-B, EAST, MINDSPACE, Boosts, Sludge, etc.).
  • IDENTIFY behavioural bottlenecks in policy or operational challenges.
  • DESIGN interventions using robust research and evaluation methodologies.
  • ANALYSE and interpret quantitative and qualitative data to assess intervention outcomes.
  • TRANSLATE behavioural evidence into actionable recommendations for policy or service improvement.
  • REFLECT critically on ethics, scalability, and contextual factors in applying BI within the public sector.
Who should attend
  • Policy Officer / Policy Analyst
  • Behavioural Insights Specialist / Behavioural Scientist
  • Research Analyst / Data Analyst
  • Programme Manager / Project Lead
  • Communications Manager / Engagement Officer
  • Regulatory or Compliance Officer
  • Evaluation Specialist / Monitoring & Evaluation Officer
  • Public Sector Strategist / Governance Advisor
Trainer

Our Expert Trainer is the Founder & Director, ForenSights Pte Ltd Expert in Behavioural Science, Threat Assessment & Operational Psychology. She has more than 17 years of public service experience across MHA, SPF, and NCSS, specialising in forensic psychology, behavioural science, and operational risk.

A  former Principal Psychologist with the Police Psychological Services Department and crisis responder with the Police Crisis Negotiation Unit, where she handled high-risk suicide and barricade incidents.

Case Studies

Our trainer will use case studies to illustrate the concepts covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

Brochure Download


Managing Radicalisation Risks in Prisons and Correctional Institutions

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

The workshop emphasises staff safety, ethical engagement, and institutional resilience, equipping participants with practical tools to mitigate radicalisation risks and strengthen correctional security outcomes.

Learn how to:

  • DIFFERENTIATE ideology-driven and identity-driven extremism within custodial settings
  • RECOGNISE and DISRUPT extremist group dynamics, gang influence, and grievance networks
  • APPLY behavioural and intelligence-led indicators to detect covert radicalisation activity
  • MANAGE high-risk extremist inmates through structured classification, segregation, and case management approaches
  • IMPLEMENT intervention and rehabilitation strategies aligned with regional best practices
  • PROTECT staff and institutional integrity against manipulation, grooming, and ideological influence
  • DEVELOP institution-specific action plans to strengthen prevention, control, and rehabilitation frameworks
Who should attend
  • Correctional and prison officers involved in inmate management or security
  • Intelligence and security personnel supporting correctional institutions
  • Counter-terrorism and extremism prevention practitioners
  • Rehabilitation, psychology, and inmate engagement officers
  • Prison supervisors, managers, and policy planners
  • Law enforcement officers coordinating with correctional intelligence units
Trainer

About Our Expert Trainer:

  • A former extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells.
  • An Expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism.
  • He testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.
  • Currently a Professor of Public Safety, Crime & Intelligence Analysis
  • Co-author of the acclaimed book, "Undercover Jihadi".
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Building Organisational Resilience Against Manipulation and Misinformation

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

This two-day masterclass equips participants with a deep understanding of how manipulation works, why people fall for it, and how to respond effectively at both personal and organisational levels.

  • IDENTIFY common manipulation and influence tactics used in scams, fraud, and misinformation.
  • RECOGNISE the psychological and cognitive biases—including persuasion tactics, complacency, and authority influence—that increase individual vulnerability.
  • STRENGTHEN personal resilience by building habits that resist pressure, emotional triggers, and undue influence.
  • ASSESS their own susceptibility through the Individual Vulnerability Assessment, gaining personalised insight into risk factors.
  • EVALUATE organisational exposure using the Organisational Vulnerability Assessment, identifying gaps in governance, processes, culture, and technical defences.
  • INTEGRATE individual and organisational insights to enhance decision-making, frontline vigilance, and protection of clients/customers.
  • FOSTER a culture of vigilance that reduces financial, reputational, and operational risks from scams and other manipulation campaigns.
Who should attend
  • Risk Manager / Risk Officer
  • Compliance Officer / Compliance Manager
  • Internal Audit Officer / Audit Manager
  • Human Resources Manager / HR Officer
  • Communications Manager / Corporate Communications Officer
  • Security Manager / Security Officer
  • Fraud Prevention Officer / Fraud Analyst
  • IT Security / Cybersecurity Specialist
  • Operations Manager / Team Leader
  • Public Sector Officer / Policy Implementation Officer
Trainer

Our Expert Trainer is the Founder & Director, ForenSights Pte Ltd Expert in Behavioural Science, Threat Assessment & Operational Psychology. She has more than 17 years of public service experience across MHA, SPF, and NCSS, specialising in forensic psychology, behavioural science, and operational risk.

A  former Principal Psychologist with the Police Psychological Services Department and crisis responder with the Police Crisis Negotiation Unit, where she handled high-risk suicide and barricade incidents.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Human Intelligence and Covert Human Intelligence Source

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

The workshop emphasises staff safety, ethical engagement, and institutional resilience, equipping participants with practical tools to mitigate radicalisation risks and strengthen correctional security outcomes.

Learn how to:

  • DIFFERENTIATE ideology-driven and identity-driven extremism within custodial settings
  • RECOGNISE and DISRUPT extremist group dynamics, gang influence, and grievance networks
  • APPLY behavioural and intelligence-led indicators to detect covert radicalisation activity
  • MANAGE high-risk extremist inmates through structured classification, segregation, and case management approaches
  • IMPLEMENT intervention and rehabilitation strategies aligned with regional best practices
  • PROTECT staff and institutional integrity against manipulation, grooming, and ideological influence
  • DEVELOP institution-specific action plans to strengthen prevention, control, and rehabilitation frameworks
Who should attend
  • Correctional and prison officers involved in inmate management or security
  • Intelligence and security personnel supporting correctional institutions
  • Counter-terrorism and extremism prevention practitioners
  • Rehabilitation, psychology, and inmate engagement officers
  • Prison supervisors, managers, and policy planners
  • Law enforcement officers coordinating with correctional intelligence units
Trainer

About Our Expert Trainer:

  • A former extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells.
  • An Expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism.
  • He testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.
  • Currently a Professor of Public Safety, Crime & Intelligence Analysis
  • Co-author of the acclaimed book, "Undercover Jihadi".
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Setting Up Sock Puppet Accounts for Counter Terrorism

Overview

Highlights:

  • 2-day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

This two-day workshop focuses on the critical role of sock puppet accounts in counter-terrorism operations. Participants will learn to create and manage convincing fake online personas, gather real-time intelligence, and infiltrate extremist networks. The workshop covers operational security (OPSEC), risk assessment, and the distinctions between passive and active accounts.  

  • DEVELOP strategies for real-time intelligence gathering within terrorist networks. 
  • UTILISE sock puppet accounts to propagate counter-narratives and support counter-radicalisation initiatives. 
  • UNDERSTAND key principles and practices to ensure operational security when using sock puppet accounts, including risk assessment and mitigation strategies. 
  • DISTINGUISH the characteristics, uses, and guidelines for employing passive and active sock puppet accounts to balance engagement and risk. 
  • DISCOVER the importance of detailed and consistent backstories in creating credible personas that can withstand scrutiny. 
  • MASTER strategies for engaging with targets, building trust, extracting information, and managing conflicts without compromising the account. 

 

Who should attend
  • Counter-Terrorism Analysts 
  • Intelligence Officers 
  • Cybersecurity Specialists 
  • Law Enforcement Agents 
  • National Security Advisors 
  • Investigative Journalists 
  • Social Media Analysts 
  • Digital Forensics Experts 
  • Government Policy Makers 
  • Anti-Radicalisation Program Coordinators 
  • Crisis Management Professionals 
  • Military Intelligence Personnel 
Trainer

About Our Expert Trainer

  • More than 25 Years in Intelligence & OSINT Operations
  • Delivered OSINT and intelligence training for military, police, and government bodies, including NATO, the United Nations, the UK Ministry of Defence, and foreign security agencies.
  • Specialist in Digital Investigations & Threat Analysis
  • Strategic Advisor on Intelligence & Security Operations

 

Case Studies

Relevant case studies will be added to this masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced Intelligence Analysis Masterclass

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Participation upon request.

Intelligence analysis can provide insights into important questions (e.g. why and what happens next?). In the wake of recent events, identifying abstract relationships and asymmetrical threats that maybe easily overlooked. Participate in this Masterclass to master with necessary skills for Intelligence Analysis to produce accurate information to prevent future threats and keep possible threats from arising.

What you will learn in this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and apply the steps of the Intelligence Cycle.
  • USE and APPLY multiple intelligence sources to create credible reports
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is an experienced intelligence professional, trainer, and consultant specialising in Open-Source Intelligence (OSINT), intelligence fusion, and strategic analysis. With over 25 years of service as a British Army Reserve officer in the Intelligence Corps, our trainer has worked extensively with government agencies, law enforcement, and security organisations worldwide, providing critical intelligence support and training.

Case Studies

Our trainer will use case studies to illustrate the different analytical techniques that are covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

Brochure Download


Radicalisation Through Conspiracy Theories and Misinformation

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

This 2-day course, with its focus on Asia, explores the tools that can be used to detect, disrupt, and respond to radicalisation pathways that are driven by online conspiracy narratives.

  • IDENTIFY key types of misinformation, disinformation, and conspiracy narratives relevant to Asia
  • ANALYSE how social media algorithms fuel extremist mobilisation
  • RECOGNISE early warning signs of radicalisation through digital footprints and behaviour patterns
  • EXAMINE real Southeast Asian case studies to extract radicalisation trends
  • UNDERSTAND the psychology and vulnerabilities that make individuals—especially youths susceptible
  • APPLY intervention strategies suited to the Asian context
  • ASSESS operational challenges such as platform moderation limits and evasion tactics
  • DEVELOP counter-messaging and digital literacy campaigns for targeted audiences
  • CREATE agency-specific action plans to detect, disrupt, and prevent extremist threats
Who should attend
  • Law enforcement officers involved in intelligence, investigations, or community policing
  • Counter-terrorism and homeland security personnel
  • Cybercrime and digital forensics units
  • Analysts monitoring extremist content and online threats
  • Officers engaged in youth outreach and prevention programs
  • Security and intelligence planners in government agencies
Trainer

About Our Expert Trainer:

  • A former extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells.
  • An Expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism.
  • He testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.
  • Currently a Professor of Public Safety, Crime & Intelligence Analysis
  • Co-author of the acclaimed book, "Undercover Jihadi".
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Covert and Overt HUMINT: Source handling & tactical questioning

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn from this Masterclass:

This 2-day Covert & Overt HUMINT Workshop equips defence and security personnel in the SEA region with essential skills for human intelligence (HUMINT) operations.

  • DEVELOP a foundational understanding of Human Intelligence (HUMINT) operations.
  • DIFFERENTIATE between various types of HUMINT sources and collection methods.
  • APPLY effective debriefing, interviewing, and questioning techniques in operational environments.
  • UNDERSTAND the legal and ethical considerations surrounding HUMINT operations.
  • GAIN hands-on experience in covert source handling, both in physical and online environments.
Who should attend
  • Intelligence Officers
  • Special Operations Forces (SOF) Operators
  • Military Police Investigators
  • Psychological Operations (PSYOPS) Specialists
  • Counterintelligence Officers
  • Criminal Investigators & Detectives
  • Counterterrorism Officers
  • Undercover Operatives
  • Surveillance & Covert Operations Specialists
  • National Security Analysts
  • HUMINT Officers & Case Officers
  • Border Security & Immigration Officers
  • Cyber Intelligence Analysts (OSINT & SOCMINT)
  • Interrogators & Tactical Questioning Experts
  • Corporate Security Intelligence Analysts
  • Risk & Threat Assessment Specialists
  • Private Investigators & Security Consultants
Trainer

Our Expert Trainer is an experienced intelligence practitioner, with  eighteen years miliary knowledge and eight years national and international law enforcement skills.

Chris started his military career in the Royal Anglian Regiment, serving five years and gaining experience of resource management, combat and survival skills, risk management skills and a practical understanding of warfare. Deploying overseas, Chris gained a valuable insight into the role of NATO and international defence.

Perseus Intelligence was created from a passion for sharing knowledge and experience of intelligence, to support those who wish to pursue an exciting and rewarding career.

Case Studies

Where possible, relevant case studies will be added and discussed during this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this course closer to the date of the course.

Brochure Download


Advanced OSINT Training for Law Enforcement

Overview

Highlights:

  • Intensive 3 day course
  • Certificate of Completion on request

What you will learn from this Masterclass:

This Advanced OSINT Training for Law Enforcement equips investigators with cutting edge open-source intelligence (OSINT) techniques to enhance digital investigations, intelligence gathering, and operational security. Designed for law enforcement agencies, this hands-on workshop covers advanced collection methods, social media exploitation, geospatial intelligence, and digital verification tools. Participants will learn to uncover hidden networks, track online threats, authenticate digital evidence, and conduct covert investigations while maintaining anonymity.

  • DEVELOP advanced OSINT skills to track criminal activities, uncover hidden networks, and collect actionable intelligence for law enforcement operations.
  • LEARN essential OPSEC techniques, including VPNs, sock puppets, and counter-surveillance methods, to conduct covert online investigations safely and effectively.
  • ACQUIRE techniques for metadata extraction, geolocation tracking, and source verification to counter misinformation and enhance case integrity.
  • STRUCTURE intelligence reports, conduct link analysis, and fuse OSINT with traditional intelligence disciplines (HUMINT, SIGINT, CYBINT) for more comprehensive investigations.
  • APPLY learned techniques in hands-on simulations, including suspect tracking, social media monitoring, and digital footprint analysis, to prepare for real-world law enforcement cases.
Who should attend
  • Law Enforcement & Intelligence Officers
  • Cybercrime Investigators
  • Digital Forensics Analysts
  • Counterterrorism Analysts
  • Criminal Intelligence Analysts
  • National Security Officers
  • Cyber Threat Intelligence Analysts
  • Undercover & Covert Operations Officers
  • Border Security & Immigration Officers
  • Financial Crime Investigators
  • Military Intelligence Personnel
  • Public Order & Riot Control Intelligence Officers
  • Interpol & International Law Enforcement Agents
  • Human Trafficking & Child Exploitation Investigators
  • Special Branch & Counter-Extremism Officers
Trainer

About our Expert Trainer

  • More than 25 Years in Intelligence & OSINT Operations
  • Delivered OSINT and intelligence training for military, police, and government bodies, including NATO, the United Nations, the UK Ministry of Defence, and foreign security agencies.
  • Specialist in Digital Investigations & Threat Analysis
  • Strategic Advisor on Intelligence & Security Operations
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive details about the venue closer to the date of the course. For more information, please contact us at: hello@q8asia.com.sg.

Brochure Download


FBI Behavioural Threat Analysis and Assessment

Overview

Highlights:

  • 2 day masterclass
  • Certification of Completion for participants upon request.

What will you learn from this course:

Learn more about this collaborative, multidisciplinary approach that can be used to  determine the severity of threats and plan intervention to support and protect potential victims and offenders.

  • Core Concepts of Behavioral Threat Assessment
  • Identifying Targeted Violence
  • Warning Behavior Characteristics
  • BTA Management Strategies
  • Threat Management Teams and Problem Solving
Who should attend

This course is ideal for

Counterterrorism/Law Enforcement Officers,  First Responders, Risk Managers, Security Managers, Government and Healthcare agencies. Workplace Safety Managers and Supervisors from these sectors:

  • Aviation
  • Banking and finance
  • Embassies of foreign governments
  • Government agencies
  • Healthcare
  • Maritime and shipping
  • Oil and gas
  • Private and public utilities
  • Power and energy plants
  • Schools and Universities
  • Security and defence
  • Tourism and hospitality
  • Transportation
  • City planners
Trainer

About Our Trainer: 

A Certified Fraud Examiner and Senior National Security Advisor (WMD Terrorism)

Ex FBI senior officer & CIA deputy chief

Expert on risk, insider threats, behavioural analysis, cybersecurity, social media

  • With more than 30 years of Intelligence Security Advisor experience.
  • Recipient of two CIA awards for his dedicated leadership in the takedown of two international terrorism leaders sought by the U.S. Government
  • 12 years managing joint FBI-CIA operations against transnational terrorism and organized crime.

He has worked with the Central Intelligence Agency in combatting environmental terrorism, critical infrastructure sabotage operations specifically Al-Qaeda’s conspiracies to

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

We will send out more information about the venue shortly. 

Contact us: hello@q8asia.com.sg.

Brochure Download