2-Day Workshop · 30–31 Jul 2026 · Amara Singapore

Spycraft
Basic

The Covert Art of Information Collection & Verification on the Internet

The internet holds vast publicly available intelligence — but harvesting it ethically, legally, and reliably requires skill. This two-day OSINT workshop gives you the techniques, tools, and tradecraft to find what others cannot, without compromising your identity or your evidence.

Hands-on · Practice-based No pre-requisites Bring your laptop Govt billing via Vendors@Gov
2Full Days
8Programme Modules
INTERPOLTrainer Experience
★★★★★Past Participants
Upcoming run
30–31 Jul 2026
9 am – 5 pm · Amara Singapore
Following run 03–31 Jul 2026
Fees (SGD, nett, per person)
Normal rate (from 10 Jul)$ 1,977.00
Early bird (by 09 Jul)$ 1,733.00
Group of 3+ (by 09 Jul)$ 1,597.00
GST not applicable · Govt billing via Vendors@Gov / InvoiceNow
Past participants from
Cyber Security Agency GovTech Urban Redevelopment Authority HTX Singapore Police Force

What Past Participants Say

Hear from Professionals Who Have Attended

★★★★★

"The trainer was clearly very knowledgeable and went through all the materials in great detail. She is also very patient answering our questions."

Analyst

Cyber Security Agency (CSA)

★★★★★

"Thank you for your effort in answering all our questions and finding many examples for your demo, and investigation tools & techniques."

Engineer

HTX

★★★★☆

"The organizer has listened to our queries pre-course and I appreciate the effort put in the slides — content and case studies were comprehensive."

Executive Planner

Urban Redevelopment Authority (URA)

★★★★★

"Very practical and immediately applicable. I came in with limited knowledge of OSINT and left with a clear framework I can use on real investigations."

Investigation Officer

Singapore Government Agency

Why This Matters

The Intelligence Is Out There.
Most People Don't Know How to Find It.

Open-source intelligence is the discipline of finding, verifying, and preserving publicly available information — but without proper tradecraft, investigators expose themselves, compromise evidence, and collect misinformation.

Information You Can't Find — or Can't Trust

The internet holds almost limitless publicly available intelligence. Without structured OSINT techniques, investigators struggle to locate what they need, waste time on dead ends, and have no reliable way to distinguish verified fact from planted misinformation.

Identity Exposure and Legal Risk

Searching without anonymity leaves digital footprints that alert subjects, compromise ongoing investigations, and in some cases expose the investigator to legal liability. Untrained practitioners unknowingly create risks that undermine the entire operation.

Evidence That Won't Hold Up

Collecting information is only half the challenge. Without proper protocols for capturing, preserving, and documenting digital evidence — including chain of custody considerations — OSINT findings may be inadmissible or easily challenged in legal proceedings.

About This Workshop

Intelligence from the internet.
Collected properly. Used confidently.

Spycraft Basic is a two-day cutting-edge workshop designed to equip investigators, compliance professionals, and intelligence practitioners with open-source intelligence skills and tools to seek information on people and organisations on the internet.

Led by a top cybersecurity expert with collaborative experience with INTERPOL & EUROPOL, the programme moves from tradecraft fundamentals through live OSINT tools to advanced techniques — including the Dark Web, network infrastructure analysis, and court-ready evidence preservation.

  • 01Hands-on throughout — every module involves real OSINT tasks. You practise finding, verifying, and preserving information live.
  • 02No pre-requisites required — the course starts from first principles. Bring a laptop that can connect to the internet.
  • 03Taught by a practitioner with real-world experience disrupting major cybersecurity attacks and scams covered by international media.
  • 04Evidence-focused — you will learn not just how to collect intelligence, but how to preserve it in a form that is legally defensible.

Who Should Attend

Anyone who needs to investigate people or organisations online — and needs to do so legally, safely, and effectively

This course is designed for investigators, compliance officers, intelligence analysts, and security professionals who need to collect and verify online information as part of their work — and who understand that untrained OSINT carries real risk.

No prior experience in cybersecurity or open-source intelligence is required. Participants need only an internet-enabled laptop.

Investigation Officers Compliance Professionals Intelligence Analysts Audit Officers Law Enforcement Risk & Fraud Teams Corporate Security HR Investigators

Key Take-aways

Four Capabilities You Leave With

Each take-away is a practised skill — not a concept to remember, but an ability you can apply to real investigations the moment you return to your desk.

Find Information Others Cannot

A structured approach to open-source intelligence — using search engines, social networks, cached pages, and specialist OSINT tools — to locate information on people, organisations, and their digital footprints that standard searches miss entirely.

Operate Anonymously and Legally

The tradecraft to protect your identity online during investigations — avoiding exposure, understanding Singapore's legal framework for online intelligence collection, and navigating privacy legislation without inadvertently creating liability for yourself or your agency.

Verify and Preserve Evidence

The methods to assess collected information for reliability, capture web-based evidence in a forensically sound manner, and preserve OSINT findings as digital evidence that meets the requirements for legal proceedings.

Build a Complete Digital Profile

The intelligence-building technique to assemble a comprehensive subject profile — bio, education, location, social connections, financial activity, and network infrastructure — from publicly available sources, enriched with contact details and behavioural patterns.

Programme Outline

Eight Modules, Two Full Days

The programme moves from anonymity principles and OSINT fundamentals through live intelligence tasks, culminating in a full digital profile of a subject — built from open sources and preserved as court-ready evidence.

Module 1 Anonymity, Principles & Infrastructure
  • Anonymity principles and operational security for investigators
  • Understanding infrastructure: DarkWeb, Messengers, Social Networks, and the Surface Internet
  • Avoiding identity exposure and digital footprints during investigations
  • Legal and ethical framework for online intelligence collection
Module 2 OSINT Basics & Instruments
  • Search engine techniques beyond basic queries
  • Social networks as intelligence sources
  • Open-source tools, cached pages, and archived content
  • Social media intelligence: platforms, privacy settings, and extraction methods
Module 3 Solving OSINT Tasks
  • Geolocation — pinpointing a subject's physical location from digital signals
  • Establishing real identity from online personas
  • Identifying and documenting fraudulent activity
  • Practical OSINT task exercise: investigate a live case scenario
Module 4 Enriching Contact Details
  • Email address tracing — from address to source
  • Phone number intelligence and reverse lookup techniques
  • Username correlation across platforms
  • Payment details and financial footprint analysis
Module 5 Preserving OSINT as Digital Evidence
  • Standards for capturing web-based evidence
  • Chain of custody requirements for digital intelligence
  • Preservation tools and methods recognised by courts
  • Common errors that render OSINT inadmissible
Module 6 Building the Digital Profile of a Subject
  • Constructing a comprehensive subject profile: bio, education, location, and interests
  • Mapping social connections: close friends, colleagues, and associates
  • Cross-referencing sources for accuracy and completeness
  • Hands-on exercise: build a full profile from open sources
Module 7 Network Infrastructure Analysis
  • Domain registrar intelligence and WHOIS analysis
  • Hosting provider and web infrastructure mapping
  • IP address and server fingerprinting
  • Linking online entities through infrastructure connections
Module 8 Basics of DarkWeb & Cryptocurrency
  • DarkWeb infrastructure: what it is and how it works
  • Safe search capabilities on the DarkWeb
  • Cryptocurrency transaction tracing fundamentals
  • Identifying and documenting DarkWeb activity for investigations

Pre-Requisites

  • ·No prior experience in OSINT or cybersecurity required
  • ·Internet-enabled laptop (hotel WiFi provided)

Included in This Course

  • ·Soft copy course materials and tool reference guides
  • ·Refreshments and lunch on both days
  • ·Certificate of participation

Good to Know

How this programme differs from
SkillsFuture-funded courses

Our programme is not SkillsFuture-funded. Here is why that works in your favour.

Typical SkillsFuture-Funded Courses
Spycraft Basic
OSINT and cybersecurity content is often outdated by the time a course reaches accreditation — tools, platforms, and threat landscapes change faster than approval cycles.
Content reviewed and updated before every run to reflect current tools, platforms, and live OSINT techniques — not what was current two years ago.
Curricula typically focus on theory and tool awareness — rarely covering operational security, live evidence preservation, or the DarkWeb.
Built around operational output — anonymity tradecraft, live OSINT tasks, forensic evidence capture, and hands-on profile-building from real sources.
Generic exercises using illustrative examples, not real-world investigation scenarios relevant to government or corporate contexts.
All exercises use realistic investigation scenarios — subject tracing, fraud detection, network mapping, and evidence chain of custody.
Large cohort sizes limit hands-on practice time and reduce access to trainer guidance during exercises.
Small cohort. Direct, personalised guidance from a practitioner with INTERPOL and EUROPOL collaborative experience throughout both days.

What You'll Gain

Leave with Skills You Use
the Very Next Day

After two days, you will have practised every skill — not just observed it demonstrated. Each learning outcome maps directly to investigative capability you can apply immediately.

01

Collect Information Ethically and Legally

Apply a structured, legally sound approach to online intelligence collection — understanding Singapore's privacy legislation, evidence rules, and the boundaries of ethical OSINT practice.

02

Find and Verify Intelligence Online

Locate information on people and organisations using advanced search techniques, open-source tools, social media intelligence, cached and archived content — and verify what you find.

03

Protect Your Identity During Investigations

Operate with anonymity across the surface internet, social networks, and the DarkWeb — avoiding exposure, protecting operational security, and preventing subjects from detecting your inquiry.

04

Trace Email Addresses, Phone Numbers & Usernames

Enrich subject contact details — tracing email addresses to their source, linking usernames across platforms, and identifying payment details and financial footprints from open sources.

05

Preserve Evidence for Legal Proceedings

Capture and preserve web-based evidence in a forensically sound manner, maintaining chain of custody and meeting the standards required for digital evidence to be used in investigations and proceedings.

06

Navigate and Investigate the DarkWeb

Understand DarkWeb infrastructure, apply safe search techniques, and trace basic cryptocurrency transactions — extending your investigative reach beyond the surface internet.

Your Facilitator

A Cybersecurity Practitioner with
INTERPOL & EUROPOL Experience

Jennifer Soh
Cyber Investigation Lead, APAC · Group-IB · Former GovTech DFIR Team Lead
10+ Years in Cybersecurity Top 30 Women in Security ASEAN 2022 & 2023 INTERPOL & EUROPOL Collaboration Digital Forensics & Incident Response Threat Intelligence Former GovTech Cyber Security Group

Jennifer Soh is the Cyber Investigation Lead for the Asia-Pacific region at Group-IB, a leading global threat intelligence company known for its partnerships with INTERPOL and EUROPOL. She was voted among the Top 30 Women in Security in the ASEAN Region in both 2022 and 2023.

Jennifer brings over a decade of experience across cybersecurity domains including threat intelligence, digital forensics, and incident response. Prior to her current role, she served as a Digital Forensics and Incident Response team lead within the Cyber Security Group at GovTech — Singapore's Government Technology Agency — where she played a pivotal role in disrupting major cybersecurity attacks and scams that attracted worldwide news coverage.

Her training approach is grounded in live operational experience. Every OSINT technique, tool, and tradecraft principle she teaches is drawn from real investigations — not textbook frameworks. Participants benefit directly from the perspective of a practitioner who has worked at the intersection of cybersecurity, digital forensics, and international law enforcement cooperation.

Trainer's Institutional Collaborations
INTERPOL EUROPOL Group-IB GovTech Singapore

Frequently Asked Questions

Common Questions

No prior experience in cybersecurity or open-source intelligence is required. The course is built for working professionals who need to find and verify information online — not for technical specialists. It starts from first principles and builds systematically from anonymity fundamentals to advanced OSINT tasks.
Bring a laptop that can connect to the internet. Hotel WiFi is provided at Amara Singapore. No software installation is required in advance — you will be guided through tool setup during the course. If your agency restricts access to certain websites or tools on work devices, please contact us ahead of the session so we can advise on the best approach.
OSINT — when conducted correctly — operates entirely within the law. The course covers Singapore's legal and regulatory framework in detail, including PDPA considerations and the boundaries of lawful online intelligence collection. A significant portion of Day 1 is dedicated to ethical principles, operational security, and understanding exactly where the legal lines are. The goal is to make you a more effective investigator precisely because you understand and respect these boundaries.
The course teaches you how to collect and preserve evidence to a standard that can withstand legal scrutiny. Module 5 specifically covers chain of custody, forensic capture methods, and the common preservation errors that render digital evidence inadmissible. Whether your role requires evidence for internal disciplinary proceedings or formal legal action, you will leave with the protocols to do it correctly.
A pre-filled justification letter is available. Click the button to download.
Government agencies and statutory boards are invoiced through Vendors@Gov or InvoiceNow on 30-day payment terms. Include your BU code in the registration form and we will handle the rest. No upfront payment is required for government entities.
Substitution is allowed at any time at no charge. Postponement is allowed free of charge before the course is confirmed to run, but is subject to approval after confirmation. Cancellation is free before the course is confirmed to run. After confirmation, a withdrawal fee applies based on notice period: 21+ days (15%), 20–14 days (25%), 13–7 days (50%), 6 days or fewer (100%). Absentee, no-show, or medical leave — the full fee is due.
Yes. In-house runs are available and can be customised to your agency's investigation types, internal compliance requirements, and specific threat scenarios. This is particularly effective for teams that conduct regular online investigations or due diligence work. Email info@maitreallianz.com or call +65 6100 0621 to discuss.

Secure Your Place

Register for Spycraft Basic

30–31 Jul 2026 · Amara Singapore · 9:00 am – 5:00 pm

Booking Person

Invoice Attention To (leave blank if same as booking person)
Government agencies only

Participant(s) Attending