OSINT Course: Non-Physical Infiltration

Page 1

NPI Non-Physical Infiltration Program

How to extract useful intelligence from radical forums and websites

OSINT Open Source Intelligence Course for the Global Intelligence Community

2009/2010


Non-Physical Infiltration Program Infiltration-technique for intelligence gathering on radical Islamic forums and websites. OSINT (Open Source Intelligence) is the art of collecting intelligence from open sources like the internet & media. NPI, (Non-Physical Infiltration) is a technique to gather intelligence from online communities by infiltration with fake identities (profiles). PART I (6 weeks / ± 30 hours) An introduction to the online world of terrorism and the current global events 1.1 1.2 1.3 1.4 1.5 1.6

What is Jihad, where did it start and where will this end? Jihad in the Koran and Sunnah Current global jihad, where do we stand today Reading, learning and collecting information from regular sites, blogs and forums Defining the threats to your country and its allies Definably understanding the Global Jihad

PART II (6 weeks / ± 30 hours) Learning the basics in jihad, the background and the way to adopt them 2.1 2.2 2.3 2.4 2.5 2.6

Basics in Islam (in general) and Jihad (particular) Starting a ‘test-profile’, start reading and gaining access to closed websites How to become a ‘Salafiyya-Jihadiyya’ with knowledge and the right ‘mindset’ Manners, Arabic lines and the adoption of the jihadi’s way of working and communication Using your ‘Test-profile’ the proper way Security, security and security again. Protecting yourself from getting exposed

PART III (7 weeks / ± 35 hours) Gathering intelligence and forming usable reports. What to look for and how to record it 3.1 3.2 3.3 3.4 3.5 3.6 3.7

How to receive answers on questions you can’t ask directly How to build a contact, how to gain trust and get a friendship with (possible-) targets How to protect yourself from difficult questions and/or difficult situations How to stay in a online-relationship and how to avoid ‘live’ contacts with radicals How to create a personal database of findings, recordings, screenshots and other info How to select what is useful for yourself and what is useful for an intelligence service How to use web-based tools, software, hardware and other equipment

PART IV (6 weeks / ± 30 hours) Planning, forming and starting an NPI-operation, the creation of your profile 4.1 4.2 4.3 4.4 4.5 4.6

Creation of your profile, your online identity with checkable background Target selection (sites, persons or groups) Defining a research-protocol and the selection of goals Starting the NPI operation, gaining trust from your targets Evaluation, target connections and redesigning the research-protocol Building a long-term profile to become a well trusted Jihadi

Duration: 25 weeks, 5 hours per week. Including: Full training-program, secured laptop, (encrypted communication-)software, tools and intensive guidance. Your privacy is extremely important to us. We do not provide any information to third parties Please contact us at: npi-course @ osint.nl


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.