Skip to main content
Treadstone 71 Home
About T71
Accolades
The TreadStone 71 Difference
Benefits of Treadstone 71 Training
Videos
Affiliate Program for Training
Strategic Intelligence Analysis - Certification
Course Details
Building a Cyber Intelligence Program Training Course
Structured Analytic Techniques (Online)
Intelligence & CounterIntelligence Cyberspace Lifecycle Operations
Certified Cyber Intelligence Analyst
Cyber CounterIntelligence Tradecraft Certification
Cyber Intelligence Training Courses online and in-person
Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
Analytic Writing (Reports and Briefs) On Demand
Cognitive Warfare
Training Subscription
Intel Services
Analysis As a Service
Cyber Intelligence RFI
Analysis - Reports and Briefs
Admiralty Scoring Model Evidence Verification Automation - AI
Analyzing Targeted Cyber-HUMINT - A Short How To
Automating Cyber Intelligence Analysis
Automating Intelligence Source Verification
China Cognitive Warfare Methods Brief from Treadstone 71
Developing Automated Report-Generation Capabilities
Fallacies in Threat Intelligence - English
Fallacies in Threat Intelligence - Arabic
Information diversions from the war on Ukraine
Iranian Influence Operations
Iranian Link Analysis - Inside the Wire
Integrating and automating SATs - Structured Analytic Techniques
Middle East Cyber Domain - English
Middle East Cyber Domain - Arabic
Regularly Evaluate Algorithm Performance for Report Generation and Automation
Speeding the intelligence analysis peer review process with AI
Statement of Cyber CounterIntelligence
STEMPLES Plus as a Framework to Assess Cyber Capabilities
Adversary Baseball Cards
Mr. Tekide Baseball Card
Cyber and Threat Intelligence Program Build Service
Stakeholder Analysis - English
Stakeholder Analysis - Arabic
What Intelligence Can and Cannot Do
Cyber Intelligence Capability Maturity Model Assessments
Cyber Threat Intelligence Maturity Assessment, Strategic Planning and Program Build
Interim Head of Intelligence
Internal Intelligence Communities of Interest
Intelligence Requirements
Treadstone 71 Priority Intelligence Requirements
OPSEC Assessment - Intelligence Preparation of the Cyber Battlefield
Targeted Research - Influence Operations
Counter and Contain - Influence Operations
Threat Intelligence Platform Selection and Rollout
Products
Conscientia - The Cyber and Threat Intelligence Lifecycle Solution
Cyber Intelligence Tradecraft Reference Guides
CyberIntellipedia
Course Shopping Cart
Intelligence - AI - Our Blog
Intel Briefs
The Evolution of Cognitive Warfare
Iranian Intelligence Cognitive Warfare Ops - a Rollup
A Shift in Capabilities - Iranian Influence Operations
ISIS Organization Chart and Technical Outline
Russian Cyber Warfare - The Russian Cyber Army
Iranian Influence Operations - Treadstone 71 Intelligence Advisory
Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
Treadstone 71 at RSA Con San Francisco
Cyber Intelligence RFI Form
Intelligence Games in the Power Grid
Bulletproof Vests - Syrian Manufacturing with Russian Assistance
Mr.Tekide - APT34 Crypters
Chinese Cognitive Warfare Methods
Imad Mughniyeh - Ghosts of Beirut
331-999-0071
Treadstone 71 Home
About T71
Accolades
The TreadStone 71 Difference
Benefits of Treadstone 71 Training
Videos
Affiliate Program for Training
Strategic Intelligence Analysis - Certification
Course Details
Building a Cyber Intelligence Program Training Course
Structured Analytic Techniques (Online)
Intelligence & CounterIntelligence Cyberspace Lifecycle Operations
Certified Cyber Intelligence Analyst
Cyber CounterIntelligence Tradecraft Certification
Cyber Intelligence Training Courses online and in-person
Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
Analytic Writing (Reports and Briefs) On Demand
Cognitive Warfare
Training Subscription
Intel Services
Analysis As a Service
Cyber Intelligence RFI
Analysis - Reports and Briefs
Admiralty Scoring Model Evidence Verification Automation - AI
Analyzing Targeted Cyber-HUMINT - A Short How To
Automating Cyber Intelligence Analysis
Automating Intelligence Source Verification
China Cognitive Warfare Methods Brief from Treadstone 71
Developing Automated Report-Generation Capabilities
Fallacies in Threat Intelligence - English
Fallacies in Threat Intelligence - Arabic
Information diversions from the war on Ukraine
Iranian Influence Operations
Iranian Link Analysis - Inside the Wire
Integrating and automating SATs - Structured Analytic Techniques
Middle East Cyber Domain - English
Middle East Cyber Domain - Arabic
Regularly Evaluate Algorithm Performance for Report Generation and Automation
Speeding the intelligence analysis peer review process with AI
Statement of Cyber CounterIntelligence
STEMPLES Plus as a Framework to Assess Cyber Capabilities
Adversary Baseball Cards
Mr. Tekide Baseball Card
Cyber and Threat Intelligence Program Build Service
Stakeholder Analysis - English
Stakeholder Analysis - Arabic
What Intelligence Can and Cannot Do
Cyber Intelligence Capability Maturity Model Assessments
Cyber Threat Intelligence Maturity Assessment, Strategic Planning and Program Build
Interim Head of Intelligence
Internal Intelligence Communities of Interest
Intelligence Requirements
Treadstone 71 Priority Intelligence Requirements
OPSEC Assessment - Intelligence Preparation of the Cyber Battlefield
Targeted Research - Influence Operations
Counter and Contain - Influence Operations
Threat Intelligence Platform Selection and Rollout
Products
Conscientia - The Cyber and Threat Intelligence Lifecycle Solution
Cyber Intelligence Tradecraft Reference Guides
CyberIntellipedia
Course Shopping Cart
Intelligence - AI - Our Blog
Intel Briefs
The Evolution of Cognitive Warfare
Iranian Intelligence Cognitive Warfare Ops - a Rollup
A Shift in Capabilities - Iranian Influence Operations
ISIS Organization Chart and Technical Outline
Russian Cyber Warfare - The Russian Cyber Army
Iranian Influence Operations - Treadstone 71 Intelligence Advisory
Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
Treadstone 71 at RSA Con San Francisco
Cyber Intelligence RFI Form
Intelligence Games in the Power Grid
Bulletproof Vests - Syrian Manufacturing with Russian Assistance
Mr.Tekide - APT34 Crypters
Chinese Cognitive Warfare Methods
Imad Mughniyeh - Ghosts of Beirut
Treadstone 71 Videos
Beacon Series Videos
Treadstone 71 Introduction - Prague
Defining Intelligence
Treadstone 71 Cyber Threat Intelligence Training - Zurich
Treadstone 71 on Yahoo News - Capital One Breach
T71 Cyber Intelligence Maturity Model
Analytic Confidence and Rigor
The Pros and Cons of Placing Your Intelligence Function in the SOC
Ten Areas to Help Get Your Intelligence Program Going
What is a PIR?
Intelligence is a Team Sport - Stakeholders
What Intelligence Can and Cannot Do
What is a TIP
The Treadstone 71 Intelligence Roadmap
In the Media and Other Videos
TreadStone 71 Interview On CBSN
TreadStone 71 Cyber Intelligence
TreadStone 71 Interview On CBSN
TreadStone 71 Interview On CBSN
Jeff Bardin BlackHat Interview - Cyber Warfare
Expanding Groundbreaking Cyber Intelligence Services
Cyber Counterintelligence Doctrine
Cyber Jihad - 2008 to 2011 Compilation Part2
Iranian Cyber Capabilities
Infiltrating ISIS on the Internet
Gaming as a Method for Jihadist Training
Secureworld | Interview with Jeff Bardin
Fox Live Interview with Jeff Bardin at Hacker Halted USA
Jeff Bardin / Hacktivity 2012
Contact Treastone 71
Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.
Contact us today!