OSINT Course: Non-Physical Infiltration

2
NPI Non-Physical Infiltration Program How to extract useful intelligence from radical forums and websites OSINT Open Source Intelligence Course for the Global Intelligence Community 2009/2010

description

NPI - Non-Physical Infiltration Program How to extract useful intelligence from radical forums and websites. Course for the Intelligence community.

Transcript of OSINT Course: Non-Physical Infiltration

Page 1: OSINT Course: Non-Physical Infiltration

NPI Non-Physical Infiltration

Program

How to extract useful intelligence from radical forums and websites

OSINT Open Source Intelligence

Course for the Global

Intelligence Community

2009/2010

Page 2: OSINT Course: Non-Physical Infiltration

Non-Physical Infiltration Program

Infiltration-technique for intelligence gathering on radical Islamic forums and websites. OSINT (Open Source Intelligence) is the art of collecting intelligence from open sources like the internet & media. NPI, (Non-Physical Infiltration) is a technique to gather intelligence from online communities by infiltration with fake identities (profiles). PART I (6 weeks / ± 30 hours) An introduction to the online world of terrorism and the current global events 1.1 What is Jihad, where did it start and where will this end? 1.2 Jihad in the Koran and Sunnah 1.3 Current global jihad, where do we stand today 1.4 Reading, learning and collecting information from regular sites, blogs and forums 1.5 Defining the threats to your country and its allies 1.6 Definably understanding the Global Jihad PART II (6 weeks / ± 30 hours) Learning the basics in jihad, the background and the way to adopt them 2.1 Basics in Islam (in general) and Jihad (particular) 2.2 Starting a ‘test-profile’, start reading and gaining access to closed websites 2.3 How to become a ‘Salafiyya-Jihadiyya’ with knowledge and the right ‘mindset’ 2.4 Manners, Arabic lines and the adoption of the jihadi’s way of working and communication 2.5 Using your ‘Test-profile’ the proper way 2.6 Security, security and security again. Protecting yourself from getting exposed PART III (7 weeks / ± 35 hours) Gathering intelligence and forming usable reports. What to look for and how to record it 3.1 How to receive answers on questions you can’t ask directly 3.2 How to build a contact, how to gain trust and get a friendship with (possible-) targets 3.3 How to protect yourself from difficult questions and/or difficult situations 3.4 How to stay in a online-relationship and how to avoid ‘live’ contacts with radicals 3.5 How to create a personal database of findings, recordings, screenshots and other info 3.6 How to select what is useful for yourself and what is useful for an intelligence service 3.7 How to use web-based tools, software, hardware and other equipment PART IV (6 weeks / ± 30 hours) Planning, forming and starting an NPI-operation, the creation of your profile 4.1 Creation of your profile, your online identity with checkable background 4.2 Target selection (sites, persons or groups) 4.3 Defining a research-protocol and the selection of goals 4.4 Starting the NPI operation, gaining trust from your targets 4.5 Evaluation, target connections and redesigning the research-protocol 4.6 Building a long-term profile to become a well trusted Jihadi Duration: 25 weeks, 5 hours per week. Including: Full training-program, secured laptop, (encrypted communication-)software, tools and intensive guidance.

Your privacy is extremely important to us. We do not provide any information to third parties

Please contact us at: npi-course @ osint.nl