Treadstone 71 is a woman and veteran-owned small business exclusively focused on cyber and threat intelligence consulting, services, and training. We are a pure-play intelligence shop.
-
Established in 2002
- Treadstone 71 delivers intelligence training, strategic, operational, and tactical intelligence consulting, and research.Roots in Middle Eastern SIGINT - 1982
-
Driving Program Maturity
- We provide a seamless extension of your organization efficiently and effectively moving your organization to cyber intelligence program maturity.
-
Intel Training Since 2008
- We follow and adapted intelligence community standards to the cyber world as applied to the ever-changing threat environment delivering forecasts and estimates as intelligence intends.
-
Pure Plan Intel Shop
- We cover the geopolitical, socio-cultural, and full-spectrum, all-source intelligence fields from baseline research to adversary targeting, advisories, and dossiers.
-
Discretion and Focused
- We do not follow the create once and deliver many model. We contextually tie our products to your needs. Intelligence is our only business.
YouTube Overviews on Cyber Intelligence
Cognitive Warfighter Training | |
The Pros and Cons of Putting Your Intelligence Function in the SOC |
Cyber Intelligence Subscription |
We use intuition, structured techniques, and years of experience.
We supply intelligence based on clearly defined requirements.
We do not assign five people to do a job only one with experience.
We do not bid base bones only to change order you to overspending.
We do not promise what we cannot deliver. We have walked in your shoes. We understand your pressures.
“Iranian intelligence uses social media to threaten and impersonate dissident groups, blatantly violating platform rules. Known intelligence operators openly working in cyberspace use social media for command and control,” stated Jeff Bardin, Chief Intelligence Officer at Treadstone 71.
“Basij Cyber Battalions execute plans on Twitter using pre-defined hashtags manipulating social media. These actions combined with physical infiltration of Iranian protests and demonstrations and distributed denial of service attacks shows a hybrid warfare approach to Iranian regime attacks against any opposition, internal and external.”
Treadstone 71 accessed the Iranian intelligence playbook for infiltrating protests. We found Iranian intelligence operators regularly infiltrating demonstrations, perverting protester messaging with divergent disinformation. Basij Cyber Battalions follow Telegram instructions describing how to avoid suspension on Twitter, while the regime develops devious ways to subvert and quash free speech. The plans include threatening messages and warnings on sites such as Telegram, Skype, Whatsapp, and Twitter, issuing instructions to execute cyber operations, how to create and manage fake social media accounts that impersonate media personalities, journalists, opposition leaders, and politicians while spreading false information that demonizes anything and anyone contrary to Islamic Republic’s ideals.
AIB, American Express, VISA, Mastercard, Capital One, PayPal, NATO, Belgian Military Intelligence, Rabobank, ABN AMRO, BNP Paribas, Commonwealth Bank, Bank of America, ING, NCSC NL, USAF, American Electric Power, Nationwide, Battelle, Standard Chartered, Columbus Collaboratory, Anomali, Defense Security Services, PNY, Dell Secureworks, National Cybersecurity Authority, HPE Security, EclecticIQ, E&Y, Authentic8, Digital14, General Electric, General Motors, PNC, Sony, Saudi Telecom Company, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Cardinal Health, Huntington, L Brands, OhioHealth, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Thrift Savings Plan, Discover, Equifax, Blackknight Financial Services, Schwab, GM, FRB, Intercontinental Exchange (ICE), Citizens Financial Group, SABIC, Cleveland Clinic, Scottrade, MetLife, NY Life, Essent, Synchrony Financial, TD Ameritrade, First Citizens Bank, M&T Bank, Western & Southern, American National Bank of TX, National Reconnaissance Office, OCBC Bank Singapore, Spentera, FBI, W.R. Berkley, People’s United Bank, Stellar Solutions, Lockheed Martin, SAIC, Harvard Pilgrim, Symantec, Kaspersky, Dragos, FireEye, Crowdstrike, State of Florida, Deloitte, Ernst and Young, Mitsubishi UFG Trust and Banking Corporation, Target, Tri Counties Bank, Mass Mutual, Tower Research, Latham and Watkins LLP, Geller & Company, KeyBank, Northern Trust, Fannie Mae, BB&T, Blue Cross Blue Shield Michigan, Farm Credit Services of America, Aviation ISAC, Regions Financial Corporation, Ahli Bank, Intercontinental Exchange (The ICE), Vista Equity Partners, Hetherington Group, JP Morgan Chase, Archer Daniels Midland, Nacha, Barclays, Options Clearing Corporation (OCC), Expo2020, Abu Dhabi Smart Solution's and Services Authority, Merck & Co., Inc Nomura International, ING, Finance CERT Norway, iPipeline, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, UBS Group, OCC, Verizon, Vantiv, Raymond James, US CyberCommand, Bridgewater Associates, Bank of America Merrill Lynch, BBVA, Promontory Interfinancial Network, Bank of Canada, Credit Suisse, HSBC, Church of Jesus Christ of Latter Day Saints, Ocean First Bank, International Exchange, Vista Equity Partners, Aetna, QBE Insurance Group, ACI Universal Payments, US Army, SOF, Betaalvereniging Nederland, Dutch Police, Motorola Solutions, Intel Corporation, Salesforce, Singapore Ministry of Defence, Australia and New Zealand Banking Group Limited (ANZ), National Australia Bank Limited, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71). We authored the Cyber Intelligence, Cyber Counterintelligence, and Cyber Crime masters courses at Utica College teaching countless others.
Jeff Bardin is the Chief Intelligence Officer for Treadstone 71 with clients on 4 continents. In 2007, Jeff received the RSA Conference award for Excellence in the Field of Security Practices. His team also won the 2007 SC Magazine Award – Best Security Team. Jeff sits or has sat on the Board of Boston Infragard, Content Raven, Journal of Law and Cyber Warfare, and Wisegate and was a founding member of the Cloud Security Alliance. Jeff served in the USAF as a cryptologic linguist and in the US Army / US Army National Guard as an armor officer, armored scout platoon leader.
Mr. Bardin has extensive experience in cyber intelligence lifecycle services, program builds, targeted research and support, cyber counterintelligence services and analysis, deception planning, and cyber operations. He teaches Cyber Intelligence and Counterintelligence (Anonymity, Cyber Personas, Collection management, Clandestine Cyber HUMINT, Socio-Cultural Aspects of Intelligence, Critical Thinking, Cognitive Bias, Methods and Types of Analysis, Mitre ATT&CK, Structured Analytic Techniques, Analytic Writing, Briefings, and Dissemination), open source intelligence, strategic intelligence, operational/tactical/technical intelligence, and methods in media manipulation identification.
He has BA in Special Studies - Middle East Studies & Language from Trinity College and an MS in Information Assurance from Norwich University. Jeff also attended the Middlebury College Language School for additional language training. Mr. Bardin also spent two+ years studying Russian history, literature, political systems, and language. He lived and worked in the Mediterranean area, Europe, Australia, Singapore, Malaysia, the Persian Gulf Region, and the Kingdom of Saudi Arabia. Jeff was an adjunct instructor of master’s programs in cyber intelligence, counterintelligence, cybercrime and cyberterrorism at Utica College. Mr. Bardin has also appeared on CNN, CBS News Live, FoxNews, BBCRadio, i24News, BBN, and several other news outlets and has contributed bylines to Business Insider non-inclusively.
We started teaching these courses in 2009 and have continued to update and hone them while maintaining true to the intelligence community standards. We have since built cyber threat intelligence programs for Fortune 500 firms and government organizations on four continents while providing targeted research against adversaries and nation-states.
Treadstone 71:
We founded the company in 2002 and started creating cyber personas and infiltrating al-Qaeda sites collecting information and sharing it with various US-based organizations in 2004. In 2009-10, we started teaching Cyber Intelligence, Cyber CounterIntelligence and Cyber Crime courses at the master’s level at Utica College where we established the intelligence program. After three years of teaching at the academic level, we switched to the commercial space honing the courses to CIA/DIA style tradecraft as aligned to the cyber environment using the skills acquired in 2004. Since that time, we have continued to update the courses using real-world case studies as part of the training.
We have kept the company purposely small and now offer the training courses (www.treadstone71.com/cyber-intelligence-trainingand www.cyberinteltrainingcenter.com) as well as Cyber Threat Intelligence maturity assessments, strategic and program planning, active research, collection, and reporting. We also perform Threat Intel Platform assessments, selection, and rollout activities for clients. We have clients in the US, EU, Australia, and Asia with active proposals in the Middle East. My personal background is as an Arabic Linguist (USAF / NSA), Russian Linguist, and CISO financial services, government contracts, insurance, and cybersecurity vendors. We have also acted as a critical resource for government CISOs in the past authoring their agency strategic plans, program plans and responding to Congressional inquiries on their behalf.
Jeff has spoken at RSA, NATO CyCon (Estonia), the US Naval Academy, the Air Force Institute of Technology, the Johns Hopkins Research Labs, Hacker Halted, Malaysian Cyberjaya, Secureworld Expo, Hacktivity (Budapest), IS2 Prague, London (RSA), ISSA, Security Camp (Cairo), and several other conferences and organizations.
Mr. Bardin has authored books and contributed chapters to several other books most recently Current and Emerging Trends in Cyber Operations from George Washington University. Recently edited and provided content for Understanding Computers: Today and Tomorrow by Deborah Morley, Charles S Parker - 11th edition (March 2006 release). Reviewer for Building an Information Security Risk Management Program from the Ground Up (Evan Wheeler), Author Chapter 33 Computer Information Security Handbook 5th Edition - SAN Security. Author Chapter on Satellite Security - Computer Information Security Handbook 6th Edition. Author - The Illusion of Due Diligence - Notes from the CISO Underground (April 2010 release).
Treadstone 71 is a pure play intelligence company focusing on targeted research of adversaries building in-depth dossiers recording methods, tactics, techniques, procedures, known associates, memberships and psychological profiles. We author Current, Research/Foundational, Advisories, STEMPLES Plus, and Estimative Intelligence reports. We create profiles of high value targets including ‘know your customer’ profiles delivering assessments and gaps in protections with recommendations and opportunities.
We are known for building Strategic Intelligence Programs from vision, mission, guiding principles, goals, objectives, 36-month plans, policies, procedures, process flows, SOPs, KPIs, CSFs, training and awareness programs for intelligence. We also help establish internal intelligence community programs from technical and tactical to operational and strategic including physical, competitive, business, and cyber.
- Treadstone 71 Home
- About T71
- Course Details
- Training Subscription
- Intel Services
- Analysis As a Service
- Analysis - Reports and Briefs
- Admiralty Scoring Model Evidence Verification Automation - AI
- Analyzing Targeted Cyber-HUMINT - A Short How To
- Automating Cyber Intelligence Analysis
- Automating Intelligence Source Verification
- China Cognitive Warfare Methods Brief from Treadstone 71
- Developing Automated Report-Generation Capabilities
- Fallacies in Threat Intelligence - English
- Fallacies in Threat Intelligence - Arabic
- Information diversions from the war on Ukraine
- Iranian Influence Operations
- Iranian Link Analysis - Inside the Wire
- Integrating and automating SATs - Structured Analytic Techniques
- Middle East Cyber Domain - English
- Middle East Cyber Domain - Arabic
- Regularly Evaluate Algorithm Performance for Report Generation and Automation
- Speeding the intelligence analysis peer review process with AI
- Statement of Cyber CounterIntelligence
- STEMPLES Plus as a Framework to Assess Cyber Capabilities
- Adversary Baseball Cards
- Cyber and Threat Intelligence Program Build Service
- Cyber Intelligence Capability Maturity Model Assessments
- Products
- Course Shopping Cart
- Intelligence - AI - Our Blog
- Intel Briefs
- The Evolution of Cognitive Warfare
- Iranian Intelligence Cognitive Warfare Ops - a Rollup
- A Shift in Capabilities - Iranian Influence Operations
- ISIS Organization Chart and Technical Outline
- Russian Cyber Warfare - The Russian Cyber Army
- Iranian Influence Operations - Treadstone 71 Intelligence Advisory
- Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
- Treadstone 71 at RSA Con San Francisco
- Cyber Intelligence RFI Form
- Intelligence Games in the Power Grid
- Bulletproof Vests - Syrian Manufacturing with Russian Assistance
- Mr.Tekide - APT34 Crypters
- Chinese Cognitive Warfare Methods
- Imad Mughniyeh - Ghosts of Beirut