331-999-0071

Incredible training classes from this crew! Our team was amazed at the content, depth, and competency of the Treadstone 71 team. We walked out pumped and ready. Highly recommended instruction from the best we have seen!

If you are tired of paying for generic information or information of little intelligence value, this course is for you. We teach you how to find relevant information that is credible, sources that are valid, and methods of data provenance. All using operationally secure methods in both OSINT and Darknet environments.

OPSEC, OSINT, and Darknet Collection - Classes Forming - Private, Public, Customized

OPSEC, OSINT, and Darknet Collection

Intelligence organizations often overlook operational security when researching. Open-source collection activities become proforma activities without consideration for risk. Social media changes, browser shift, and general apathy lead to unknown exposures. The new course from Treadstone 71 ensures OPSEC in your passive collection. We cover browser configurations, container builds, persona alignments to technology and priority intelligence requirements, in both OSINT and Darknet environments.

Intelligence Tradecraft Operator Cyber Cognitive Warfighter Training - Austin, TX April 17-21

Cyber Cognitive Warfighter Training

April 17-21 // Monday-Thursday 7:45-5 PM, Friday 7:45-12 PM.

Austin, Texas South

$3,199.00 March Madness Price


OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war campaigns. Intelligence-driven security teaming.
Intelligence Tradecraft Operator Cyber Cognitive Warfighter Training - Arlington, Virginia May 1-5

INTELLIGENCE TRADECRAFT OPERATOR - CYBER COGNITIVE WARFIGHTER TRAINING - Arlington, Virginia May 1-5

CYBER COGNITIVE WARFIGHTER COURSE

$3,199.00 March Madness Price

OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war campaigns. Intelligence-driven security teaming.
Intelligence Tradecraft Operator Cyber Cognitive Warfighter Training - Miami/Ft Lauderdale May 15-19

INTELLIGENCE TRADECRAFT OPERATOR - CYBER COGNITIVE WARFIGHTER TRAINING - Miami/Ft Lauderdale May 15-19, 2023

CYBER COGNITIVE WARFIGHTER COURSE

$3,199.00 March Madness Price

OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war campaigns. Intelligence-driven security teaming.
Cognitive Warfare - A Series of New Trainings from Treadstone 71

Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis. We will cover concepts in Cognitive Warfare, Gray Zone Tactics, Disinformation, Influence Operations, Information Operations, Color Revolutions, Neuro-Linguistic Program, Private Intelligence Firms, and more. New dates and locations to be announced this quarter.

Intelligence Tradecraft Reference Guides

Treadstone 71 intelligence tradecraft education tools, the Reference Guide. Each laminated reference guide offers comprehensive and detailed tradecraft information. Easy to read with glossaries, diagrams, and process flows using color and illustrations. Our premium stock paper ensures long-lasting and sturdy reference guides.  Our guides cover:

  • Analytic Writing
  • Cognitive Warfare Parts I and II
  • Cyber Intelligence Lifecycle Parts I and II
  • Disinformation Plus
  • Stakeholder Analysis and Intelligence Requirements
  • Strategic Analysis with STEMPLES Plus
  • Structured Analytic Techniques
  • Threat Hunting
  • What is Cyber Intelligence

With others in the works that will include Cyber Counterintelligence, Color Revolutions, information Operations/Hybrid Warfare, and Chinese, Iranian, and Russian Influence Operations methods and examples. Built in lamination on 8 ½ inch by 11-inch 6 z-fold page format. Details taken directly from Treadstone 71 Training Courses. Free w/paid training course.


Cognitive Warfare

Cognitive Warfare Training

The weaponization of information influences your thoughts and how you perceive content. Learn to recognize it and prevent it.

Targeted Adversary Research

Adversary Research and Analysis

Who are they? What are their skills, capabilities, and motivations? What do they know about you!

Training Subscription

Training Subscription - All Online Courses

Two Hundred Students Per Year for Two Years - All Treadstone 71 online courses for a fraction of the cost. Selling only 20!

Detect Influence Operations

Detect, Analyze, Expose

.

Triggers, operational content, tactics, D3A / F3EAD and intent, respond, 

Iranian Influence Operations - A Shift in Capabilities -
Published Internally July 2021
Download the report
IRANIAN INFLUENCE CAMPAIGN
Download the Report
LEARN MORE ABOUT OUR TRAINING
Learn More

 

 

VISIT US ON TELEGRAM
Treadstone 71 on Telegram
ALL ONLINE COURSES SUBSCRIPTION
Here is the scoop


  • Training Subscription

    Training Subscription - All Online Courses for Two Years

    March Only price $89,990 (normally $99,990). We are only selling twenty (20) subscriptions. 

    The Two Year Two Hundred subscription maximizes the potential of your existing staff, guides new employees from junior level through senior. These classes include traditional cyber intelligence and counterintelligence tradecraft along with innovative Strategic Intelligence and Cognitive Warfare trainings. We create the glue that ties the physical intelligence world with the virtual.

    What you get: 

    Instant and unlimited access to the Treadstone 71 course catalog (existing and anything created during the two -year period.

    Each course includes:

    • Multiple video lessons (number of lessons varies by course).
    • Supplemental videos and materials, templates, and real-world assignments.
    • Artifacts, documents, readings, and related documents.
    • A Treadstone 71 Reference Guide (see Figure 1 below)
    • Some courses require books delivered by Amazon Kindle to each student.
    • Learning assessments (quizzes) used to evaluate knowledge (we assess course content skill by way of practical exercises as opposed to memorized question and answer tests).
    • Certificates of completion with every completed course, Certifications for Courses named as such with CPE credits.

    https://youtu.be/jfv-AiHooYw

  • Targeted Research to Uncover Influence Operations

    Detect, Analyze, Expose, Counter, and Contain

    The Treadstone 71 Service for Influence OperationsCounter campaign development

    Identify operational content to define the narrative(s) while examining imagery and the feelings created by such.
    Identify potential emotions, instincts, reflexes, and passions intended to exploit.
    Review content for lies, lander, intermixing of facts, possible conspiracy theories, and contradictory versions of the content across various platforms.

    • Anticipate key target or threat activities that are likely to prompt a leadership decision.
    • Aid in coordinating, validating, and managing collection requirements, plans, and activities.
    • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
    • Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
    • Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
    • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
    • Recognize and mitigate deception in reporting and analysis.
      Assess intelligence, recommend targets to support operational objectives.
    • Assess target vulnerabilities and capabilities to determine a course of action.
    • Assist in the development of priority information requirements.
    • Enable synchronization of intelligence support plans across the supply chain.
    • ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.
  • Cognitive Warfare Training

    The new course that centralizes information operations through cognitive methods. We provide hands-on learning and real-world execution using unique techniques taken from both allies and adversaries.

    We will cover concepts in Cognitive Warfare, Gray Zone Tactics, Disinformation, Influence Operations, Information Operations, Color Revolutions, Neuro-Linguistic Program, Private Intelligence Firms, and more. We include review of cognitive warfare approaches, a potential framework, historical examples, rational processes, bias in perception and cognition, decision making and time pressures, domains of conflict and combatants, factors influencing decisions, speed and overload, manipulating situational awareness, inducing behavioral change using deception, distraction, distrust, chaos, and confusion. Students learn to assess adversaries for susceptiblity to cogntive weapons and what to observe for potential impacts. Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis.


Influence Operations Detection, Analysis, and Countering

Root out Influence Operations

  • Identify operational content to define the narrative(s) while examining imagery and the feelings created by such.
  • Identify potential emotions, instincts, reflexes, and passions intended to exploit.
  • Review content for lies, lander, intermixing of facts, possible conspiracy theories, and contradictory version
Russian Cyber Warfare Brief - The Russian Cyber Army

Russian Cyber Warfare - The Russian Cyber Army - KILLNET / Xaknet

  • Details and organizational chart of Russian Cyber Militia actors in cyberspace.
Chinese Cognitive Warfare Methods

China is also removing negative historical narratives unsuitable to its interests and rooted in old stereotypes. At the same time, China amplifies its achievements as justified, given historical imperial Chinese leadership combined with current global strength. One such industry is the entertainment business and particularly Hollywood. China does not hide its investment strategies, as evidenced by the Belts and Roads initiative. Notice the investments in movies with an influx of production companies and characters all showing China as a hero as part of the movie funding requirements.

Iranian details of hybrid operations and cognitive warfare actions by Iran

“Iranian intelligence uses social media to threaten and impersonate dissident groups, blatantly violating platform rules. Known intelligence operators openly working in cyberspace use social media for command and control,” stated Jeff Bardin, Chief Intelligence Officer at Treadstone 71.

ISIS Online Organization Chart with Technical Listing

Details on the Islamic State and their online organization chart based on their information taken from within their forms and social media channels.

Russia Release Detailed Propaganda Instructions to Manipulate Ukrainian Nationals

Kremlin propagandists have prepared a specialized 14-page publication for supporters of "Russian peace" in Ukraine: "Handbook for Ukrainian citizens on organizing resistance to the Kyiv puppet government."

All Online Classes Sale

All Online Courses Subscription

Subscribe to all online courses. 2 years 200 students per year $99k. Virtually unlimited enrollment. 99k/18classes/400students. Who cannot afford to signup. $13.75 per class. And, any class we develop within the 2 years is also part of the subscription. For corporations, ISACs, other intelligence sharing groups, and affiliates.

The Reseller Program - PLR

DMCA.com Protection Status

Treadstone71 Video Library Contains a Wealth of Information and Media Video Related to Cyber Intelligence

Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.

Since 2002  CONTACT US TODAY