Certified Threat CounterIntelligence Analyst
Cyber CounterIntelligence Tradecraft
This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.
Cyber Infiltration
Information Operations
Standard Glossary and Taxonomy
Mission-Based Counterintelligence
Counter Collection and Anticipation
Denial and Deception
Counter-Denial and Deception
Open Source Intelligence in Deception Operations
VPNs and Burn Phones (US Only)
Methods of Social Media Research
Social media demographics
Cyber Target Acquisition and Exploitation
Identify Active Adversary Campaigns
Intent, Motivation, Goals, & Requirements
Passive data collection
Campaign development
Vectors of approach
Courses of action
Elicitation and exfiltration
Memetic Engineering
Content Creation
Propaganda and Fallacies
Media Manipulation
Charts, Graphs, Generators
Deception Planning
Deception Chain
Types of Denial and Deception
D&D Usage
Perception as Deception
Avoid and Deny
Shifting the Conversation
Forum Manipulation - COINTELPRO
Social Psychology
Persuasion
Differences in Culture/Diversity
Hofstede Dimensions
Reciprocity and Consistency
Social validation
Liking, Authority, and Scarcity
Rules of Disinformation
Information Warfare
Operational Security
Cyber Psychological Operations
Target analysis and manipulation
Authoring of blogs and articles for influencing
Placement of specific concepts and phrases
Cyber Persona Layer
Cyber Persona Development and Maintenance
Character archetypes
Establish the storyline
Establish the plot synopsis
Story weaving and management
Target profiles – dossiers
Target gap analysis
Clandestine Collection Operation
Surveillance and Counter Surveillance
CI Insider Threat, Investigations
Guide to Underhanded Tactics
Rules for Radicals
Case Studies
Team Presentations
Lecture, Hands-on, Apprenticeship, in class exercises, student presentations, templates, course material—32 CPEs 4.5-days
- Treadstone 71 Home
- About T71
- Course Details
- Training Subscription
- Intel Services
- Analysis As a Service
- Analysis - Reports and Briefs
- Admiralty Scoring Model Evidence Verification Automation - AI
- Analyzing Targeted Cyber-HUMINT - A Short How To
- Automating Cyber Intelligence Analysis
- Automating Intelligence Source Verification
- China Cognitive Warfare Methods Brief from Treadstone 71
- Developing Automated Report-Generation Capabilities
- Fallacies in Threat Intelligence - English
- Fallacies in Threat Intelligence - Arabic
- Information diversions from the war on Ukraine
- Iranian Influence Operations
- Iranian Link Analysis - Inside the Wire
- Integrating and automating SATs - Structured Analytic Techniques
- Middle East Cyber Domain - English
- Middle East Cyber Domain - Arabic
- Regularly Evaluate Algorithm Performance for Report Generation and Automation
- Speeding the intelligence analysis peer review process with AI
- Statement of Cyber CounterIntelligence
- STEMPLES Plus as a Framework to Assess Cyber Capabilities
- Adversary Baseball Cards
- Cyber and Threat Intelligence Program Build Service
- Cyber Intelligence Capability Maturity Model Assessments
- Products
- Course Shopping Cart
- Intelligence - AI - Our Blog
- Intel Briefs
- The Evolution of Cognitive Warfare
- Iranian Intelligence Cognitive Warfare Ops - a Rollup
- A Shift in Capabilities - Iranian Influence Operations
- ISIS Organization Chart and Technical Outline
- Russian Cyber Warfare - The Russian Cyber Army
- Iranian Influence Operations - Treadstone 71 Intelligence Advisory
- Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
- Treadstone 71 at RSA Con San Francisco
- Cyber Intelligence RFI Form
- Intelligence Games in the Power Grid
- Bulletproof Vests - Syrian Manufacturing with Russian Assistance
- Mr.Tekide - APT34 Crypters
- Chinese Cognitive Warfare Methods
- Imad Mughniyeh - Ghosts of Beirut