Advanced Influence Operations Attribution Training Program

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

The objective of this advanced training program is to equip participants with an in-depth understanding of advanced methodologies, emerging trends, and cutting-edge technologies in influence operations attribution. 

The course will emphasize advanced and technical methods for attribution.

Participants will also gain hands-on experience in complex attribution scenarios and explore strategies for countering sophisticated influence campaigns effectively.

 

Who should attend

This training program is designed for:

  • Senior intelligence analysts
  • Cybersecurity experts
  • Law enforcement officials
  • Policymakers, and professionals involved in countering advanced influence operations.
Trainer

About Our Expert Trainer

Our trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information about the venue will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Disinformation Campaigns against Critical Infrastructures with AI

Overview

Highlights:

  • 1 day in-person course
  • Certificate of Completion

What you will learn from this Masterclass:

This workshop prepares you to recognise and act upon malicious campaigns and how best to proactively investigate and counter disinformation campaigns and malign interests by threat actors.

  • APPLY advanced analytical frameworks for identifying cognitive deception and threats.
  • UTILIZE necessary strategies and tactics to understand the risks and build a structured defence against hostile Disinformation and Deception Campaigns.
  • UNDERSTAND emerging threat vectors, such as AI-generated disinformation campaigns and the utilization of authentic .
  • IDENTIFY the key tell-tale signs of digital forgeries and false narratives.
  • MEASURE your cognitive awareness and judgement to implement effective heuristics and decision-making.
  • NAVIGATE the dynamic threat actor landscape of the world of Information Warfare.
  • PERFORM Disinformation Network Analysis and   against future attacks.
Who should attend

Directors, Head of Departments, Key Stakeholders with responsibilities in:

  • Military Intelligence Investigations
  • LE and Intelligence Analysts
  • National Security Analysts
  • Journalists
  • Academic Researchers
  • Policy Managers
  • Diplomats
  • Liaison Officers
  • Crisis Communications and PR Departments
  • Information Security Analysts
  • Insider Threat Analysts
  • Legal
  • Network Administration
  • Physical Security
  • AI/ML Engineers
Trainers

Our Expert Trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

The course will include high-level Academic studies with practical, hands-on experience. 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date.

For assistance, write to hello@q8asia.com.sg

Brochure Download


Setting Up Sock Puppet Accounts for Counter Terrorism

Overview

Highlights:

  • 2-day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

This two-day workshop focuses on the critical role of sock puppet accounts in counter-terrorism operations. Participants will learn to create and manage convincing fake online personas, gather real-time intelligence, and infiltrate extremist networks. The workshop covers operational security (OPSEC), risk assessment, and the distinctions between passive and active accounts.  

  • DEVELOP strategies for real-time intelligence gathering within terrorist networks. 
  • UTILISE sock puppet accounts to propagate counter-narratives and support counter-radicalisation initiatives. 
  • UNDERSTAND key principles and practices to ensure operational security when using sock puppet accounts, including risk assessment and mitigation strategies. 
  • DISTINGUISH the characteristics, uses, and guidelines for employing passive and active sock puppet accounts to balance engagement and risk. 
  • DISCOVER the importance of detailed and consistent backstories in creating credible personas that can withstand scrutiny. 
  • MASTER strategies for engaging with targets, building trust, extracting information, and managing conflicts without compromising the account. 

 

Who should attend
  • Counter-Terrorism Analysts 
  • Intelligence Officers 
  • Cybersecurity Specialists 
  • Law Enforcement Agents 
  • National Security Advisors 
  • Investigative Journalists 
  • Social Media Analysts 
  • Digital Forensics Experts 
  • Government Policy Makers 
  • Anti-Radicalisation Program Coordinators 
  • Crisis Management Professionals 
  • Military Intelligence Personnel 
Trainer

About Our Expert Trainer

Our trainer brings over 17 years of dedicated service and expertise in specialised military environments and behavioural analysis.

Formerly with the Australian Signals Directorate, she has been instrumental in founding and leading Open-Source Intelligence (OSINT) teams, delivering actionable insights to government and military agencies. Her leadership has been pivotal in managing complex investigations and operations, including high-stakes scenarios involving war crimes and terrorist activities.

Case Studies

Relevant case studies will be added to this masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced Strategies & Tools against AI-Driven Threats

AIthreats
Overview

Highlights:

  • 2 days in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

This course will equip participants with the knowledge and skills to identify, analyse, and combat AI-generated disinformation as well as actively test defences
via red-teaming

  • Get an overview on influence operations, forgeries, disinformation and AI
  • Learn the tools and techniques that are used to detect AI generated threats
  • Understand the role of LLMs in influence ops
  • Learn how to use AI tools to create online assets for blue-teaming and red teaming.
Who should attend

This training program is designed for senior intelligence analysts, cybersecurity experts, law enforcement officials, policymakers, and professionals involved in countering advanced influence operations.

Trainer

About Our Expert Trainer

Our trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information about the venue will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Setting Up Sock Puppet Accounts for Counter Terrorism

Setting Up Sock Puppet Accounts
Overview

Highlights:

  • 2-day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

This two-day workshop focuses on the critical role of sock puppet accounts in counter-terrorism operations. Participants will learn to create and manage convincing fake online personas, gather real-time intelligence, and infiltrate extremist networks. The workshop covers operational security (OPSEC), risk assessment, and the distinctions between passive and active accounts.  

  • DEVELOP strategies for real-time intelligence gathering within terrorist networks. 
  • UTILISE sock puppet accounts to propagate counter-narratives and support counter-radicalisation initiatives. 
  • UNDERSTAND key principles and practices to ensure operational security when using sock puppet accounts, including risk assessment and mitigation strategies. 
  • DISTINGUISH the characteristics, uses, and guidelines for employing passive and active sock puppet accounts to balance engagement and risk. 
  • DISCOVER the importance of detailed and consistent backstories in creating credible personas that can withstand scrutiny. 
  • MASTER strategies for engaging with targets, building trust, extracting information, and managing conflicts without compromising the account. 

 

Who should attend
  • Counter-Terrorism Analysts 
  • Intelligence Officers 
  • Cybersecurity Specialists 
  • Law Enforcement Agents 
  • National Security Advisors 
  • Investigative Journalists 
  • Social Media Analysts 
  • Digital Forensics Experts 
  • Government Policy Makers 
  • Anti-Radicalisation Program Coordinators 
  • Crisis Management Professionals 
  • Military Intelligence Personnel 
Trainer

About Our Expert Trainer

Our trainer brings over 17 years of dedicated service and expertise in specialised military environments and behavioural analysis.

Formerly with the Australian Signals Directorate, she has been instrumental in founding and leading Open-Source Intelligence (OSINT) teams, delivering actionable insights to government and military agencies. Her leadership has been pivotal in managing complex investigations and operations, including high-stakes scenarios involving war crimes and terrorist activities.

Case Studies

Relevant case studies will be added to this masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced Open Source Intelligence & Social Media Intelligence

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples will be included as part of this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Covert Surveillance and Intelligence Techniques in the Digital Era

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

In today's digital era, it's crucial for intelligence professionals to stay abreast of advanced covert surveillance techniques. The global connectivity of the digital age also underscores the need for comprehensive surveillance strategies that can operate seamlessly across diverse digital landscapes. By emphasising operational security, data privacy, and ethical considerations, the workshop ensures that participants are equipped to conduct surveillance activities ethically and responsibly while maximising operational efficiency in intelligence gathering and analysis. 

  • IDENTIFY advanced techniques for evading and neutralising tracking devices.
  • GAIN INSIGHTS into signal manipulation for gaining an upper hand in surveillance.
  • UNDERSTAND advanced techniques for evading and neutralising tracking devices.
  • MASTER signal manipulation for gaining an upper hand in surveillance.
  • EXPLORE techniques to manipulate device identifiers and evade digital footprints.
  • DISCOVER concealed communication and device concealment for operational security.
  • ANALYSE online activity tracking and utilize open-source intelligence for analysis.
  • LEARN strategies for covert technology deployment and monitoring online forums for insights.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples will be added to this course.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Dark Web Investigation Masterclass

Overview

Highlights:

  • 2 day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

The course is designed to take participants through the full spectrum of topics necessary to be an effective Cyber Internet investigator. If you are following the trail of cryptocurrency transactions,  tracking paedophiles by using keywords or images, or looking for historic data of your target on the Darknet or the open web, this is the course for you.

  • EQUIP yourself with latest cutting-edge tools and proactive investigation methodology.
  • ACCOMPLISH effective investigation of OSINT and Darknet investigations.
  • STRENGTHEN investigation skills to meet new challenges.
  • GET to the dark web using Tor and other browsers.
  • LOCATE common hubs and resources on the dark web and explore what they have to offer.
  • MANAGE leads from the dark web to the surface in an investigation.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

Our trainer has over 38 years of experience. A former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police, he is a globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.

He has also has been involved in the tracking of high profile cases, murder and major crime data analysis, and persons and vessel track and trace. He is also an open source expert (SME) and lead advisor for forces and government agencies both domestic and abroad.

Case Studies

Relevant and real world applications and examples will be added as examples in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Combating AI Disinformation via Red Teaming LLMs & Advanced IO Attribution

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

  • An overview of the global online influence operations.
  • Understand the role of domains in influence operations

  • Learn advanced tools and techniques through hands-on activities.

  • Develop attribution strategies as a group.

Who should attend

This training program is designed for participants with a strong background in intelligence analysis, cybersecurity, or related fields. It will delve into advanced
concepts and technologies, requiring a high level of engagement and critical thinking

Trainer

About Our Expert Trainer

Our trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Covert Surveillance and Intelligence Techniques in the Digital Era

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

In today's digital era, it is crucial for intelligence professionals to stay abreast of advanced covert surveillance techniques. The global connectivity of the digital age also underscores the need for comprehensive surveillance strategies that can operate seamlessly across diverse digital landscapes. By emphasising operational security, data privacy, and ethical considerations, the workshop ensures that participants are equipped to conduct surveillance activities ethically and responsibly while maximising operational efficiency in intelligence gathering and analysis. 

  • IDENTIFY advanced techniques for evading and neutralising tracking devices.
  • GAIN INSIGHTS into signal manipulation for gaining an upper hand in surveillance.
  • UNDERSTAND advanced techniques for evading and neutralising tracking devices.
  • MASTER signal manipulation for gaining an upper hand in surveillance.
  • EXPLORE techniques to manipulate device identifiers and evade digital footprints.
  • DISCOVER concealed communication and device concealment for operational security.
  • ANALYSE online activity tracking and utilize open-source intelligence for analysis.
  • LEARN strategies for covert technology deployment and monitoring online forums for insights.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

  • He has over 38 years of experience.
  • A former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download