• Home
  • In-Person
  • Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - Austin, Texas April 17-21
Sold out
Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - Austin, Texas April 17-21 Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - Austin, Texas April 17-21

Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - Austin, Texas April 17-21

Cyber Cognitive Warfighter Course



Cyber Cognitive Warfighter Training // //

April 17-21 // Monday-Thursday 7:45-5 PM, Friday 7:45-12 PM.

Austin, Texas South

Students must maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during class time. VPNs are needed and we do provide preferred VPN lists. We cover persona creation, alignment to intelligence requirements, rules of engagement for passive collection, persona character archetypes, and ChatGPT style AI content fillers. Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational security, multiple browser configurations and containers for the alignment to and tracking of personas. Students learn how to test browsers for leakage.

This course includes all material from the OPSEC, OSINT, Darknet Collection course plus:

As previously stated:

OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war campaigns. Intelligence-driven security teaming. 

Students must also take a few short personality tests to share during class. For US-based course locations, Treadstone 71 provides phones for students to aid with anonymity and account creation. The course also covers social media account setup, extensive use of open-source tools, methods of finding groups, channels and chats, setting up aggregated search criteria that increases speed and is targeted for individual organizational use. during class time.

The course blends cyber intelligence, counterintelligence, and cognitive warfare, from setup through passive execution. Students learn how to find adversaries in both the darknet and in open sources, while creating accounts through standardized OPSEC methods proven to be secure.

The course covers operational security methods, online anonymity, persona creation and management with:

  • Myers-Briggs,
  • the Big 5,
  • the Dark Triad/Pitch Black Tetrad,
  • the Psychological Techniques of the Seven Radicals,
  • the Nine Enneagram Type Descriptions

Students learn about themselves, their own behaviors in optimal operating mode, under stress, and in an evil mode. We work with students to relate these modes to created personas and cyber HUMINT tactics.

Additionally, the course includes adversary targeting with cyber D3A/F3EAD. Many times, it is difficult to determine the who, what and why of those who may wish ill to your organization. The course covers adversary determination, what data is needed to find them, what tools are needed to facilitate the search, and methods to passively execute this process. This is in conjunction with priority intelligence requirements.  

In addition, students learn how to create various text to voice audio in different languages, video/audio integration, and other methods of creating content for online posting. This includes using the latest online AI tools for content creation, extraction, and manipulation. We teach enabling the understanding of the methods used against students as opposed to having to engage directly in deception campaigns.

The course also covers areas of:

  • Adversary target assessments,
  • Stakeholder analysis,
  • Structured analysis,
  • Collection methods and tracking,
  • Counterintelligence deception methods,
  • Conspiracy theories,
  • Russian/Chinese/Iranian cyber warfare models,
  • Information warfare,
  • Aspects of cognitive warfare

Prior to the course, we send out minimum necessary laptop specifications, data provenance software to install along with other pre-course tools for setup. Pre-class setup includes building VirtualBox environments with software for anonymous collection (OSINT VMs), and USB operated stand-online platforms.

Students receive training materials, books, Treadstone 71 Reference Guides, CPE credits, and certificates for the work performed. We do not have students take tests based on memorization. Instead, students pass the course through full attendance and execution of all case studies. In addition, practical and pragmatic performance evaluation during the course confirms student knowledge.

The course runs from 7:45-5 PM Monday-Thursday and 7:45-12 PM on Friday. Breakfast and lunch are served daily.

Students need to have a solid understanding of browsers and the Internet. Students may also provide organizational gaps and possible targeting needs prior to class to help personalize the course. Treadstone 71 will sign mutual NDAs to facilitate this process.

Course eligibility is limited to US Citizens, NATO member countries, and other US-friendly countries. However, unlike others, we vet each student and do not allow adversaries access to our courses.


 The OPSEC, OSINT, Darknet Collection Course:

OPSEC, OSINT, and Darknet Collection 

Classes Forming Now (private and public)

Intelligence organizations often overlook operational security when researching. Open-source collection activities become proforma activities without consideration for risk. Social media changes, browser shift, and general apathy lead to unknown exposures. The new course from Treadstone 71 ensures OPSEC in your passive collection. We cover browser configurations, container builds, persona alignments to technology and priority intelligence requirements, in both OSINT and Darknet environments.

We explore the tools used in OSINT by hackers from adversary countries. Students learn their usage, methods, tactics, and sites they regularly visit. From nation-state threat actors to cyber criminals, the course includes hands on setup and proving of browser configuration, extension use, and container builds. Students leave with the confidence that their collection activities are always secure. No leakage of any type!

Passive collection is, by nature, risk adverse. Create rules-of-engagement aligned to legal needs and corporate risk appetites. Ensure your data maintains provenance with a patient and pragmatic approach to data collection. Perform initial data reviews for credibility and source analysis for validation. Keep your collection relevant to your intelligence requirements.

This course follows a crawl-walk-run in-class methodology with hands-on validation of skill. Each student walks away with ready-built, proven configurations they can use on day one. We also provide ROE and RACI(S) examples for collection and analysis.

 This course is for any organization who needs to up their skills. Enhance your cyber intelligence teams with this 3-day intensive course from Treadstone 71.

 Brief Outline

  1. OPSEC Methods, Tools, Configurations, Containers
  2. Use of Virtual Tools and Setup
  3. Anonymity and Trust Heuristics
  4. Browser Extension Selections and Segmentation
  5. Leak Checking
  6. OSINT Methods of collection – Tools
  8. Adversary OSINT Toolkits
  9. Methods for Research
  10. Darknet collection methods
  11. Find out where they hang their hats
  12. Maintaining Data Provenance
  13. Searching the non-standard Social Media Platforms
  14. Indicators Cyber DECIDE, DETECT, DELIVER and ASSESS (D3A) framework
  15. Validation of adversaries - Socio-Cultural Cyber Analysis – STEMPLES Plus
  16. Adversary Profiling for Risk Assessment and Prioritization – Baseball Cards
  17. Adversary Risk Models
  18. What they are saying about you and where
  19. Source Validation Credibility Relevance
  20. Intelligence Requirements Management
  21. Passive collection cyber personas
  22. Rules of Engagement (RoE)
  23. Personality Reviews – Yours and your teams
  24. False Virtual Persona Checklists
  25. Tracking Activities
  26. Content Creation when and where needed
  27. Threat Intelligence feeds assessment and analysis
  28. AI and other tools
  29. Case studies
  30. Hands-on Practical Exercises

Main Specifications


Product reviews (0)

Contact Treastone 71

Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.

Contact us today!