331-999-0071

  • Treadstone 71 releases details of hybrid operations and cognitive warfare actions by Iran

    Iran, hybrid warfare, cognitive warfare, Suppression, Oppression, Protests, Basij, MOIS, IRGC,

    Your primary source for cyber intelligence and counterintelligence training and services, released in-depth details of Iranian intelligence-backed hybrid operations and cognitive warfare actions.

  • TARGETED COLLECTION, ADVANCED ANALYTIC TECHNIQUES - We Take the Risks You Will Not

    Treadstone 71 standards-based intelligence collection and analysis

    Don't waste your time with the threat intelligence product and feed companies for collection, analysis, and analytic reporting. We have many turn to Treadstone 71 after wasting precious time and money. 

  • LAS VEGAS AUGUST 3-6, 2022 - INTELLIGENCE AND COUNTERINTELLIGENCE – CYBERSPACE LIFECYCLE AND OPERATIONS

    CUTTING EDGE NEW COURSE FROM TREADSTONE 71

    Hybrid intelligence and counterintelligence course geared towards executing cyberspace operations - gain practical hands-on skills in cyber militias and foreign legions, space operations, weaponizing conspiracy theories, using disinformation to control narratives, jihadist online operations and locations, and cryptocurrency scams and cash-out schemes

  • Cyber HUMINT from the Cyber Shafarat - DIRECT FROM ADVERSARIES

    cyber shafarat, humint, clandestine cyber, osint collection, adversary targeting

    Adversary targeting translated to collected data and information posted on our blog: The Cyber Shafarat. A combination of open sources, darknet, signals, and human intelligence posted or your consumption.

  • ONLINE CYBER INTELLIGENCE TRAINING - TRADECRAFT AT ITS FINEST

    cyber intelligence, counterintelligence, influence operations, analytic writing, structured analytic techniques, deception planning

    Original content classes started in 2008 at the Masters' level. If you want to learn cyber tradecraft, this is the place!

  • ISSA Members Receive Special Discounts for Training

    Discounts for ISSA Members - Online and In-person Training
  • Cyber Intelligence Certification September 19-23

    Regus - Forum Corporate 9160 Forum Corporate Parkway, Ft. Myers, 33905

    This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training with added extended modules on Structured Analytic Techniques (SATS) and the most important, Analytic Writing. 

  • Islamic State Online Organization Chart

    Islamic State, ISIS, Daesh,

    Download the ISIS online organization chart with technical information.

Cyber Intelligence Consulting

Effective Programs Drive Stakeholder Decision-making

Build Your Cyber Intelligence Program. Determine Your Intelligence Gaps. Effective analytic products

Cyber Intelligence Research

Targeted Adversary Research and Analysis -KNOW YOUR ADVERSARY

Who are they? What are their skills, capabilities, and motivations? What do they know about you!

Cyber Intelligence Training

Counter INTEL TRAINING - CYBER OPERATIONS - FOREIGN LEGION

Deception planning takes skill. Influence ops must be countered. Rapidly organize, counter opeations

Detect, Analyze, Expose, Counter Influence Operations

.

Triggers, operational content, tactics, and intent, respond, 

Russia Release Detailed Propaganda Instructions to Manipulate Ukrainian Nationals
Kremlin propagandists have prepared a specialized 14-page publication for supporters of "Russian peace" in Ukraine: "Handbook for Ukrainian citizens on organizing resistance to the Kyiv puppet government."
ISIS Online Organization Chart with Technical Listing

Details on the Islamic State and their online organization chart based on their information taken from within their forms and social media channels.

Iranian details of hybrid operations and cognitive warfare actions by Iran

Treadstone 71, LLC, your primary source for cyber intelligence and counterintelligence training and services, released in-depth details of Iranian intelligence-backed hybrid operations and cognitive warfare actions.

“Iranian intelligence uses social media to threaten and impersonate dissident groups, blatantly violating platform rules. Known intelligence operators openly working in cyberspace use social media for command and control,” stated Jeff Bardin, Chief Intelligence Officer at Treadstone 71.

“Basij Cyber Battalions execute plans on Twitter using pre-defined hashtags manipulating social media. These actions combined with physical infiltration of Iranian protests and demonstrations and distributed denial of service attacks shows a hybrid warfare approach to Iranian regime attacks against any opposition, internal and external.”

Treadstone 71 accessed the Iranian intelligence playbook for infiltrating protests. We found Iranian intelligence operators regularly infiltrating demonstrations, perverting protester messaging with divergent disinformation. Basij Cyber Battalions follow Telegram instructions describing how to avoid suspension on Twitter, while the regime develops devious ways to subvert and quash free speech. The plans include threatening messages and warnings on sites such as Telegram, Skype, Whatsapp, and Twitter, issuing instructions to execute cyber operations, how to create and manage fake social media accounts that impersonate media personalities, journalists, opposition leaders, and politicians while spreading false information that demonizes anything and anyone contrary to Islamic Republic’s ideals.

Russian Cyber Warfare - The Russian Cyber Army - KILLNET / Xaknet

Details and organizational chart of Russian Cyber Militia actors in cyberspace.

Enhance Your Skills

Online and In-Person Training Courses

A non-inclusive class list:

  • ANALYTIC WRITING
    BUILDING A CYBER INTELLIGENCE PROGRAM
    CERTIFIED CYBER COUNTERINTELLIGENCE ANALYST - INFLUENCE OPERATIONS
    CERTIFIED CYBER INTELLIGENCE ANALYST
    CRITICAL THINKING AND COGNITIVE BIAS
    CYBER MILITIAS - RAPID ORGANIZING AND EXECUTION AGAINST NATION-STATE AGGRESSION
    DISINFORMATION, MISINFORMATION, DECEPTION, AND NARRATIVE CONTROL
    INFORMATION OPERATIONS
    INTELLIGENCE AND COUNTERINTELLIGENCE - CYBERSPACE LIFECYCLE AND OPERATIONS
    ONLINE - BASIC CYBER INTELLIGENCE TRADECRAFT
    ONLINE ADVANCED CYBER INTELLIGENCE TRADECRAFT
    ONLINE ANALYTIC WRITING (REPORTING AND BRIEFS)
    ONLINE CERTIFIED CYBER COUNTERINTELLIGENCE ANALYST
    ONLINE CRITICAL THINKING AND COGNITIVE BIAS FOR CYBER INTELLIGENCE
    ONLINE INTERMEDIATE CYBER INTELLIGENCE TRADECRAFT
    ONLINE STRATEGIC INTELLIGENCE ANALYSIS
    ONLINE STRATEGIC INTELLIGENCE ANALYSIS PLUS BUILDING AND ENHANCING YOUR CTI PROGRAM
    ONLINE THREAT HUNTING WITH TAHITI AND MAGMA
    STRATEGIC INTELLIGENCE ANALYSIS
    STRUCTURED ANALYTIC TECHNIQUES
  • Customized training, build-to-order, and targeted adversary training.

Our Next Series of Courses

Private - discreet training

Content Provider Contact Information

Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.

Please type your full name.

Invalid Input

Invalid Input

Invalid email address.

Please tell us your area of content expertise.

Invalid Input

INTELLIGENCE AND COUNTERINTELLIGENCE – CYBERSPACE LIFECYCLE AND OPERATIONS

Cutting edge new course from Treadstone 71.

The course is a hybridized intelligence and counterintelligence course geared towards executing cyberspace operations through structured methods. Students gain practical hands-on skills in cyber militias and foreign legions, space operations, weaponizing conspiracy theories, using disinformation to control narratives, jihadist online operations and locations, and cryptocurrency scams and cash-out schemes, non-inclusively. The course concludes with a program maturity review, competency models for analysts and collectors, and a maturity tracking model for goals and objectives based on the maturity assessment.

(ISSA MEMBERS SPECIAL PRICING)

  • Anonymity and Passive Persona setup - Clandestine Cyber HUMINT
  • Glossary and Taxonomy
  • Operational Security - OPSEC
  • What Intelligence Can and Cannot Do
  • Open-Source Intelligence Techniques and Tools
  • OSINT Tools for Data Manipulation
  • Stakeholder Analysis
  • Intelligence Requirements to PIRs
    • SPECIAL TASKING
      • Strategic Intelligence Analysis
      • STEMPLES Plus - Hofstede Principles - Indicators of Change
      • Strategic Cyberspace Operations
      • Influence Operations
      • Counter-Influence Operations
      • Enhanced Situational Awareness
      • Space Operations
  • Adversary Targeting - D3A F3EAD
  • Time Sensitive Targeting
  • Collection Methods and Techniques
  • Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs
  • Collection Process Flow - Collection (OSINT) Tools and Targeting
  • SPECIAL TASKING
    • Identification and collection of adversary handles and relative data - OSINT / darknet / social media
    • Adversary Denial and Deception
    • Data assessment and analysis
    • Deception detection - Counter-deception planning and execution
    • Course of Action Decision Points
    • Offensive Cyberspace Operations Through Narrative Control
  • Hunch.ly and Use of Maltego – overview
  • Darknet Sites of Interest
    • SPECIAL TASKING
      • Social Media - Off the beaten path review of social media platforms not in the mainstream
      • Adversary use of social media for social engineering
        • Jihadist Sites and where to find them
          • Burn phones
          • Virtualbox
            • Plugins and Use
            • Open Semantic Search - Oracle Virtual Box - OVA setup – Tracelabs
            • Android emulation
          • Portable Social Media
        • Cryptocurrency Scams
          • Cash-out schemes
          • Wallet tracking
          • Social media campaigns
  • Intelligence Lifecycle Production Methods
  • Structured Analytic Techniques – Their use - Case Study - ACH
  • Extended Structured Analytic Techniques - In-depth coverage
  • Source Credibility and Relevance - The real NATO Admiralty Scoring - CRAAP Tool for Relevance
  • Source Validation - Confidence Levels
    • SPECIAL TASKING
      • Disinformation and Conspiracy Theories
      • Fake, Beyond Fake, and the Misinformation Matrix
      • Memetic Warfare
      • Patient Cyber Psyops
      • Identification, Glossary, Targeted Terminology
      • Understanding People - Cognition
      • Terms targeting YOU – The Dunning-Kruger
      • Trolls and the Dark Triad
      • The Pitch-Black Tetrad
      • Weaponizing the Message
      • Tribalism and Cultism
      • Cialdini and Social Psych
      • Vaxx Schedders
  • Types of evidence
  • Production Management
  • SPECIAL TASKING
    • Creating and using cyber militias
    • Rapid Training
    • Militia Members' Levels of Expertise
    • Point and Shoot
    • Cyber Foreign Legion RoE
    • Cyber dead drops and covert coms
    • Targeting for trolling
    • Adversary courses of action
    • Adjust your fire
    • Cognitive Warfare
    • A Cyber Foreign Legion
  • Critical and Creative Thinking
  • Cognitive Bias
  • Analysis and Analytic Writing
  • FINAL SPECIAL TASKING
    • Team Maturity Assessment
    • Skill and Competency Levels
    • Goals and Objectives – Rapid Creation
  • SPECIAL TASKINGS REVIEW
  • Class Review and Wrap-up

Validated and registered students will receive login and preparation information 1 week prior to class start.

Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors. This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome

Enrollment Means Training EULA Acceptance – Strictly Enforced

Enrollment Means Training EULA Acceptance – Strictly Enforced

Content Provider Contact Information

Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.

Please type your full name.

Invalid Input

Invalid Input

Invalid email address.

Please tell us your area of content expertise.

Invalid Input

DETECT, ANALYZE, EXPOSE, COUNTER, AND CONTAIN

Root out Influence Operations

  • Identify operational content to define the narrative(s) while examining imagery and the feelings created by such.
  • Identify potential emotions, instincts, reflexes, and passions intended to exploit.
  • Review content for lies, lander, intermixing of facts, possible conspiracy theories, and contradictory versions of the content across various platforms.
COGNITIVE WARFARE - A NEW COURSE FROM TREADSTONE 71
Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis.

Help us define new courses for 2022:

Iranian Influence Operations - A Shift in Capabilities -
Published Internally July 2021

Iranian Intelligence Services - The Sayad Project and Sayad 2 -
Dissident & Foreign Support, Internal Targeting

The RFI process includes any specific time-sensitive ad hoc
requirement for intelligence information or products to support
an ongoing event or incident.

IRANIAN INFLUENCE CAMPAIGN

    LEARN MORE ABOUT OUR TRAINING 

    Cyber Intelligence and CounterIntelligence Tradecraft Training ///
    Structured Analytic Techniques /// Strategic Intelligence Analysis -
    Forecasting, Estimative, and Warning Intelligence  /// Collection
    Manager's Course /// Analytic Writing /// Public, Private, Customized,
    Bundles and Subscriptions

    VISIT US ON TELEGRAM

    CYBER MILITIAS - RAPID ORGANIZING AND EXECUTION AGAINST NATION-STATE AGGRESSION

    The Cyber Militia course comes straight from the Ukrainian defense of its cyber borders including the creation of local cyber militias and the request for and execution of a cyber foreign legion. Taken from our first-hand knowledge of the activities, the Cyber Militia course is constantly evolving.

    In response to the Russian cyber-attacks that have accompanied its invasion of Ukraine, the Ukrainian government has begun recruiting what it calls an IT army. A more accurate term would be a cyber militia, given it will consist of civilian volunteers. In any case, it aims to repel Russian hackers’ attacks and launch cyber counterstrikes of its own. Estimates are that more than three hundred volunteers stepped forward to contribute.

    Blogs and Newsletters


    The Beacon Series on Cyber Intelligence

    Treadstone71 Video Library Contains a Wealth of Information and Media Video Related to Cyber Intelligence

    We have gathered and produced a number of videos form the Beacon Series videos on YouTube and interviews with media companies including CBSN, Fox Live, and more. Click the button to view the video library.Cyber Intelligence Training and Cyber Intelligence Training Courses from Treadstone 71

    Contact Treadstone 71 Today for all your Cyber Intelligence needs.

    CONTACT US TODAY