If you really want to enhance your cyber intelligence beyond mere cyber hygiene, free yourselves from useless threat intelligence feeds, and significantly reduce your risk, collection times, and data validation efforts, then Treadstone 71 intelligence training is for you. Should you wish to continue to perform cyber hygiene activities while pouring your hard earned budget into $8k technical classes that bear little fruit, then do not take our courses. If you want to take your team to the next level of expertise in cyber intelligence, while weaning yourself off of someone elses high-priced generic data and information, then look to Treadstone 71.
Students will use virtual machines, download, and install ChatGPT, training the AI module on their data stores, and incorporate updated content during hands-on course case studies.
Learn more about our online Short Courses
Why pay hundreds of thousands of dollars for a vendors ChatGPT install over their controlled data that is not geared to you? We take you through the installation and use AI tools preparing you configure and training ChatGPT tools over your hard currated data. Stop paying someone else for what you can do.
What is cognitive war?
Cognitive warfare is a type of warfare that targets the mind, beliefs, and perceptions of individuals or groups. It involves the use of various tactics such as propaganda, disinformation, psychological manipulation, and other forms of influence to shape the opinions and behaviors of the target audience.
Cognitive warfare can be difficult to recognize as it often runs through subtle and indirect means. Signs that cognitive warfare may be occurring include:
- The spread of false or misleading information through social media or other channels.
- The use of emotionally charged language or imagery to influence public opinion.
- The promotion of extreme or polarizing views designed to create division and conflict.
- The use of fear or intimidation to control or manipulate individuals or groups.
To recognize cognitive warfare, it is important to stay informed and be critical of the information presented to you. Look for multiple sources of information, fact-check claims, and be aware of your own biases and assumptions. By staying vigilant and informed, we can better protect ourselves and our communities from the harmful effects of cognitive warfare.
There have been numerous reports and allegations of Russia using cyber psychological operations against the United States in recent years. Some of the tactics that have been attributed to Russia include:
- Social media manipulation: Russian operatives use social media platforms like Facebook, Twitter, and Instagram to spread false or misleading information, sow discord, and amplify divisive issues. They also create fake accounts and personas to manipulate public opinion.
- Hacking and data leaks: Russian hackers target political parties, government agencies, and other organizations in the United States to steal sensitive information and release it to the public. Russia uses leaks to embarrass or discredit individuals or organizations or to influence public opinion.
- Disinformation campaigns: Russian operatives spread false or misleading information through traditional media channels like television, radio, and online sources. This can include spreading conspiracy theories, promoting extremist views, and distorting the facts to suit their agenda.
- Cyber-attacks: Russian hackers launch cyber-attacks against critical infrastructure in the United States, such as power grids and water treatment facilities. These attacks disrupt services, cause damage, and create chaos.
Russian Cognitive and Information Warfare Short Course Section 1
Russian Cognitive and Information Warfare Short Course Section 2 - Information Alibi
It is important to note that while there have been numerous allegations of Russian cyber psychological operations against the United States, not all these allegations have been proven. However, cyber psychological operations are a growing concern in today's interconnected world, and it is important for individuals and organizations to be aware of the risks and take steps to protect themselves.
China use psychological operations (PSYOPs) against the United States in several ways. The tactics attributed to China include:
- Cyber espionage: Chinese hackers steal sensitive information from US government agencies and private companies. This information gains an advantage in negotiations or in developing innovative technologies.
- Propaganda: China uses state-controlled media to spread propaganda and influence public opinion in the United States. This can include promoting a positive image of China, downplaying human rights abuses, and criticizing US policies.
- Influence operations: Chinese operatives uses social media platforms to influence public opinion in the United States. This can include creating fake accounts and personas to spread false or misleading information and amplifying divisive issues to sow discord.
- Economic coercion: China uses economic coercion to influence US policy decisions. This can include threatening withholding trade or investment or using economic incentives to encourage certain actions.
Iran has been known to use influence operations against dissidents domestically and abroad. The tactics attributed to Iran include:
- Cyber espionage: Iranian hackers use phishing attacks and other tactics to steal sensitive information from dissidents and opposition groups. This information finds and targets individuals who are critical of the Iranian government.
- Propaganda: Iran uses state-controlled media to spread propaganda and influence public opinion. This can include promoting a positive image of the Iranian government, downplaying human rights abuses, and criticizing opposition groups.
- Surveillance and harassment: Iranian security forces use surveillance and harassment to intimidate dissidents and opposition groups. This can include monitoring phone calls, emails, and social media accounts and detaining and interrogating individuals who are critical of the government.
- Disinformation campaigns: Iranian operatives spread false or misleading information through social media and other channels to discredit dissidents and opposition groups. This can include spreading rumors, creating fake news stories, and using bots to amplify certain messages.
We see several methods of cognitive war in the United States. The most common tactics include:
- Disinformation: The spread of false or misleading information through social media, traditional media, and other channels. This can include conspiracy theories, fake news stories, and other forms of propaganda.
- Social media manipulation: The use of social media platforms to spread disinformation, amplify divisive issues, and sow discord. This can include using bots and fake accounts to manipulate public opinion.
- Polarization: Promoting extreme or polarizing views creates division and conflict. This can include the use of emotionally charged language, the demonization of opposing views, and the promotion of conspiracy theories.
- Psychological manipulation: The use of psychological tactics to influence public opinion and behavior. This can include using fear, anger, and other emotions to manipulate individuals and groups.
- Hacking and cyber-attacks: The use of hacking and cyber-attacks to steal sensitive information, disrupt services, and cause damage. This can include attacks on critical infrastructure, government agencies, and private companies.
Important to note
While these methods of cognitive war are often associated with foreign actors, domestic groups and individuals also use them. Individuals and organizations should be aware of the risks and take steps to protect themselves from the harmful effects of cognitive war.
- Admiralty Scoring Model Evidence Verification Automation - AI
- Analyzing Targeted Cyber-HUMINT - A Short How To
- Automating Cyber Intelligence Analysis
- Automating Intelligence Source Verification
- Developing Automated Report-Generation Capabilities
- Integrating and automating SATs - Structured Analytic Techniques
- Regularly Evaluate Algorithm Performance for Report Generation and Automation
- Speeding the intelligence analysis peer review process with AI
- STEMPLES Plus as a Framework to Assess Cyber Capabilities
Cognitive Warfare training with Treadstone 71
How to distinguish between manipulative and reliable information? What poses a threat to your cybersecurity, and how can it be handled? How is traditional tradecraft extrapolated to the web environment? You are now on the cyber battlefield where adversaries are many and risks abound. Treadstone 71 can help you counter the actions that put you or your organization in jeopardy with cyber intelligence training, counterintelligence consulting, and all-embracing materials that frame the concept of cognitive warfare.
Our mission is to pack years of experience as intelligence specialists into insightful courses that go beyond basic or preliminary intel training to enable you to move up the intelligence program maturity ladder. What only scratches the surface has been eliminated. What is actionable, relevant to today’s threats, and game-changing for your intelligence expertise is spruced up by Treadstone 71’s instructors and wrapped into every training session.
Incredible training classes from this crew! Our team was amazed at the content, depth, and competency of the Treadstone 71 team. We walked out pumped and ready. Highly recommended instruction from the best we have seen! If you are tired of paying for generic information or information of little intelligence value, this course is for you. We teach you how to find relevant information that is credible, sources that are valid, and methods of data provenance. All using operationally secure methods in both OSINT and Darknet environments.
- Advanced Cyber Intelligence Tradecraft
- Advanced Strategic Intelligence Analysis
- Adversary Targeting
- Analytic Writing (Reporting and Briefs)
- Aspects of Disinformation
- Basic Cyber Intelligence Tradecraft
- Big Five in Cyber Intelligence
- Certified Cyber Counterintelligence Analyst
- Cialdini's Principles in Influence Operations
- Cognitive Warfare Definitions Part 1
- Collection Management
- Conspiracy Theories
- Critical Thinking and Cognitive Bias for Cyber Intelligence
- Cyber Cointelpro
- Dirty Tricks in CounterIntelligence and Deception
- Intelligence Requirements
- Intermediate Cyber Intelligence Tradecraft
- Iranian Cognitive and Information Warfare Section 1
- Iranian Cognitive and Information Warfare Section 2 - Measured against STEMPLES Plus
- Myers-Briggs - Under Pressure and the Destructive Mode
- Personas and OPSEC
- Psychology of the Seven Radicals
- Russian Cognitive and Information Warfare Section 1
- Russian Cognitive and Information Warfare Security 2 - Information Alibi
- Stakeholder Analysis
- STEMPLES Plus - Indicators of Change - Hofstede Principles
- Strategic Intelligence Analysis
- Strategic Source Evaluation, Credibility, Validity, Relevance and Types of Evidence
- Structured Analytic Techniques
- The Dark Triad and Pitch-Black Tetrad - Trolling
Treadstone 71 intelligence tradecraft education tools, the Reference Guide. Each laminated reference guide offers comprehensive and detailed tradecraft information. Easy to read with glossaries, diagrams, and process flows using color and illustrations. Our premium stock paper ensures long-lasting and sturdy reference guides. Our guides cover:
- Analytic Writing
- Cognitive Warfare Parts I and II
- Cyber Intelligence Lifecycle Parts I and II
- Disinformation Plus
- Stakeholder Analysis and Intelligence Requirements
- Strategic Analysis with STEMPLES Plus
- Structured Analytic Techniques
- Threat Hunting
- What is Cyber Intelligence
With others in the works that will include Cyber Counterintelligence, Color Revolutions, information Operations/Hybrid Warfare, and Chinese, Iranian, and Russian Influence Operations methods and examples. Built in lamination on 8 ½ inch by 11-inch 6 z-fold page format. Details taken directly from Treadstone 71 Training Courses. Free w/paid training course.
Information about the latest forms and methods of organizing and conducting information operations in the conditions of the war in Ukraine can be used in the work of state bodies, responsible for organizing a systemic counteraction to information aggression of foreign states, and will also be useful to political scientists, political technologists and specialists in counteracting destructive political technologies.
Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis. We will cover concepts in Cognitive Warfare, Gray Zone Tactics, Disinformation, Influence Operations, Information Operations, Color Revolutions, Neuro-Linguistic Program, Private Intelligence Firms, and more. New dates and locations to be announced this quarter.
Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational security, multiple browser configurations and containers for the alignment to and tracking of personas. Students learn how to test browsers for leakage. Students will use virtual machines, download, and install ChatGPT, train the AI module on their data stores, and incorporate updated content during hands-on course case studies. We now included AI into our content analysis and stores while working to build automated hypothesis generators outside our own capabilities. We are also working to incorporate automated intelligence analysis that incorporates structured analytic technique methods. Our final effort includes AI assistance in writing analytic reports. Students may use the AI tools over their data stores to help in:
- Threat detection: AI-powered systems can scan large volumes of data and find patterns of behavior that show potential threats. This can help security teams quickly find and respond to threats before they can cause harm.
Fraud detection: AI tools can analyze financial transactions, user behavior and other data sources to find anomalies that may indicate fraudulent activity.
Malware detection: AI algorithms can analyze code and behavior to find malware and other forms of malicious software.
Estimating future actions: AI can analyze historical data to find patterns and make forecasts about future cyber threats.
Network security: AI can check network traffic and find potential security threats, such as unauthorized access or data breaches.
Incident response: AI tools can aid security teams in responding to incidents by analyzing data and finding the source of the attack.
Treadstone 71 courses include all material from the OPSEC, OSINT, Darknet Collection course plus: OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war campaigns. Intelligence-driven security teaming. Students must also take a few short personality tests to share during class. For US-based course locations, Treadstone 71 provides phones for students to aid with anonymity and account creation. The course also covers social media account setup, extensive use of open-source tools, methods of finding groups, channels and chats, setting up aggregated search criteria that increases speed and is targeted for individual organizational use. during class time. The course blends cyber intelligence, counterintelligence, and cognitive warfare, from setup through passive execution. Students learn how to find adversaries in both the darknet and in open sources, while creating accounts through standardized OPSEC methods proven to be secure. The updates ensure identifying adversaries, risk rating their capabilities, intent, and maliciousness, while identifying methods to counter their hybrid warfare and influence operations against our assets.
Intelligence Tradecraft Operator – OPSEC for OSINT, The Cyber Cognitive Warfighter US dates and locations
Washington (SOLD OUT)
Miami (SOLD OUT)
New York City (Nearly full)
Cognitive Warfare Training
The weaponization of information influences your thoughts and how you perceive content. Learn to recognize it and prevent it.
Adversary Research and Analysis
Who are they? What are their skills, capabilities, and motivations? What do they know about you!
Training Subscription - All Online Courses
Two Hundred Students Per Year for Two Years - All Treadstone 71 online courses for a fraction of the cost. Selling only 20!
Detect, Analyze, Expose
Triggers, operational content, tactics, D3A / F3EAD and intent, respond,
Iranian Influence Operations - A Shift in Capabilities -
Published Internally July 2021
Download the report
IRANIAN INFLUENCE CAMPAIGN
Download the Report
LEARN MORE ABOUT OUR TRAINING
VISIT US ON TELEGRAM
Treadstone 71 on Telegram
ALL ONLINE COURSES SUBSCRIPTION
Here is the scoop
Cyber intelligence courses taught your way
If you are deeply invested in amplifying your intelligence maturity, do not let training accessibility become a headwind. Treadstone 71 turns it into a tailwind for you or your intel specialists to receive cyber intelligence training the way that works for you. All the best practices, community-validated materials, and field-tested prevention strategies can now be taught during in-person, private, or public classes.
Plunge into OPSEC methods and risk identification processes while being guided by Treadstone 71’s instructor at one of the US training venues. Let former intel professionals pass on their cognitive warfare and counterintelligence skills to you.
Couple your cyber intelligence course with confidentiality to break down your organization’s cyber risks. We can customize the materials to be analyzed to meet your specific cyber program maturity level and walk you through well-curated training, be it for OSINT or Darknet practices, ChatGPT integration, or cyberpsychological warfare.
Elevate your intel excellence as part of collaboration and networking. A public cyber intelligence course is a perfect way to boost your knowledge with hands-on techniques while discussing real-world scenarios with other professionals working in the cybersecurity and intel ecosystems.
Learn to act proactively
The cyber battlefield is riddled with external and internal threats. Their types, severity, and impact vary greatly, making the right response strategy hard to implement when your assets are in jeopardy. But it always spans prioritization and mitigation steps that should be planned and executed promptly.
You can get a round-up of the best mitigation and prioritization strategies with our cyber intelligence training. But if you need help responding to specific risks undermining specific assets and posing unexpected challenges to your organization, Treadstone 71’s advisory teams are to the rescue! With cognitive warfare and cyber intelligence consulting, we can help put the finger on the type of risk and recommend actions to augment your security and mitigation efforts. We can turn our industry-relevant expertise into effective countermeasures and strategic defense for your organization once the existing risk is settled.
Master everything cyber intelligence and learn to implement proactive measures with Treadstone 71!
Training Subscription - All Online Courses for Two Years
We are only selling twenty (20) subscriptions. $99,990.00 (less than $11/class/student)
The Two Year Two Hundred subscription maximizes the potential of your existing staff, guides new employees from junior level through senior. These classes include traditional cyber intelligence and counterintelligence tradecraft along with innovative Strategic Intelligence and Cognitive Warfare trainings. We create the glue that ties the physical intelligence world with the virtual.
What you get:
Instant and unlimited access to the Treadstone 71 course catalog (existing and anything created during the two -year period.
Each course includes:
- Multiple video lessons (number of lessons varies by course).
- Supplemental videos and materials, templates, and real-world assignments.
- Artifacts, documents, readings, and related documents.
- A Treadstone 71 Reference Guide (see Figure 1 below)
- Some courses require books delivered by Amazon Kindle to each student.
- Learning assessments (quizzes) used to evaluate knowledge (we assess course content skill by way of practical exercises as opposed to memorized question and answer tests).
- Certificates of completion with every completed course, Certifications for Courses named as such with CPE credits.
Targeted Research to Uncover Influence Operations
Detect, Analyze, Expose, Counter, and Contain
The Treadstone 71 Service for Influence OperationsCounter campaign development
Identify operational content to define the narrative(s) while examining imagery and the feelings created by such.
Identify potential emotions, instincts, reflexes, and passions intended to exploit.
Review content for lies, lander, intermixing of facts, possible conspiracy theories, and contradictory versions of the content across various platforms.
- Anticipate key target or threat activities that are likely to prompt a leadership decision.
- Aid in coordinating, validating, and managing collection requirements, plans, and activities.
- Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
- Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
- Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
- Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
- Recognize and mitigate deception in reporting and analysis.
Assess intelligence, recommend targets to support operational objectives.
- Assess target vulnerabilities and capabilities to determine a course of action.
- Assist in the development of priority information requirements.
- Enable synchronization of intelligence support plans across the supply chain.
- ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.
Cognitive Warfare Training
The new course that centralizes information operations through cognitive methods. We provide hands-on learning and real-world execution using unique techniques taken from both allies and adversaries.
We will cover concepts in Cognitive Warfare, Gray Zone Tactics, Disinformation, Influence Operations, Information Operations, Color Revolutions, Neuro-Linguistic Program, Private Intelligence Firms, and more. We include review of cognitive warfare approaches, a potential framework, historical examples, rational processes, bias in perception and cognition, decision making and time pressures, domains of conflict and combatants, factors influencing decisions, speed and overload, manipulating situational awareness, inducing behavioral change using deception, distraction, distrust, chaos, and confusion. Students learn to assess adversaries for susceptiblity to cogntive weapons and what to observe for potential impacts. Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis.
- Identify operational content to define the narrative(s) while examining imagery and the feelings created by such.
- Identify potential emotions, instincts, reflexes, and passions intended to exploit.
- Review content for lies, lander, intermixing of facts, possible conspiracy theories, and contradictory version
Russian Cyber Warfare - The Russian Cyber Army - KILLNET / Xaknet
- Details and organizational chart of Russian Cyber Militia actors in cyberspace.
China is also removing negative historical narratives unsuitable to its interests and rooted in old stereotypes. At the same time, China amplifies its achievements as justified, given historical imperial Chinese leadership combined with current global strength. One such industry is the entertainment business and particularly Hollywood. China does not hide its investment strategies, as evidenced by the Belts and Roads initiative. Notice the investments in movies with an influx of production companies and characters all showing China as a hero as part of the movie funding requirements.
“Iranian intelligence uses social media to threaten and impersonate dissident groups, blatantly violating platform rules. Known intelligence operators openly working in cyberspace use social media for command and control,” stated Jeff Bardin, Chief Intelligence Officer at Treadstone 71.
Details on the Islamic State and their online organization chart based on their information taken from within their forms and social media channels.
Kremlin propagandists have prepared a specialized 14-page publication for supporters of "Russian peace" in Ukraine: "Handbook for Ukrainian citizens on organizing resistance to the Kyiv puppet government."