Master the art of gathering, analyzing, and operationalizing intelligence from open sources and human networks.
In the modern security landscape, physical protection is only half the battle. This course provides a comprehensive deep-dive into Intelligence-led security operations, focusing on both digital and human intelligence gathering.
Participants will learn to use advanced OSINT tools to track digital footprints and HUMINT techniques to build local source networks, creating a multi-layered shield for their principals or organizations.
The OSINT cycle. Advanced search operators and Google Dorking. Specialized tools for social media and image verification.
Source identification and handling. Elicitation techniques. Building and maintaining source networks in high-risk zones.
Analyzing target digital footprints. Operational Security (OPSEC) for the investigator. Identifying leaks and data exposure.
Final assessment: Using gathered OSINT and mock HUMINT data to plan a secure route and identify potential ambush points.
Limited spots available for our next session in Port-au-Prince.