intelligence briefs header

Analytic Briefs, Published Research, Opinion

Every once in awhile we are able to publish our findings. This is few and far between just due to the nature of our contracts with clients. We do release some findings usually found on The Cyber Shafarat (www.cybershafarat.com). The information link on this page represent those documents.

Our customers benefit from 17 years of cyber intelligence experience combined with years of boots-on-the-ground collection and analysis. Enhance your cyber and threat intelligence program with Treadstone 71.

High Level Benefits of the Cyber and Threat Intelligence Program Build Service

Our training examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Stakeholder Analysis

Understanding your stakeholders and what they need to help make decisions is more than half the battle. This brief covers the old adage “Know your professor, get an A."

Download Brief

Please provide a valid email address to access your download.

Continue... ×
النسخة العربية

Please provide a valid email address to access your download.

Continue... ×

Intelligence Games in the Power Grid

Intelligence Games in the Power Grid – Russian Cyber and Kinetic Actions Causing Risk

Unusual purchasing patterns from a Russian firm selling PLCs from a Taiwanese company with massive holes in its product software download site. What could go wrong?

Download Brief

Please provide a valid email address to access your download.

Continue... ×

The Treadstone 71 Difference

What you receive from Treadstone 71 is detailed information and intelligence on your adversary that far surpasses the technical realm. Where Treadstone 71 service excels is in the ability to provide you with techniques, methods, capabilities, functions, strategies, and programs to not only build a fully functional intelligence capability, but a sustainable program directly aligned with stakeholder requirements.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Bulletproof Vests – Make them yourself

Syrian violations of sanctions with Russian FSB assistance to manufacture ballistic vests – Not discovered by any organization other than Treadstone 71 - No sensors, no aggregation of thousands of taps – Just hard-nosed open source collection and analysis, and an interest read of false identities, dispersed purchasing, and deceit.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Statement of Cyber Counterintelligence

Statement of Cyber Counterintelligence The 10 Commandments for Cyber CounterIntel

Thou shall and thou shalt not. Own the cyber street while building creds. Follow these rules and maybe you will survive the onslaught.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

What Intelligence Can and Cannot Do

This intelligence brief explains the intricacies as well as cans and cannots with repect to the capabilities of cyber intelligence.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Middle Eastern Cyber Domain

Middle Eastern Cyber Domain – Iran/Syria/Israel

An academic review of these nation-states and their work to achieve cyber operations dominance.

Download Brief

Please provide a valid email address to access your download.

Continue... ×
النسخة العربية

Please provide a valid email address to access your download.

Continue... ×

Fallacies in Threat Intelligence

Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures

This brief covers some general taxonomy along with a review of common mistakes concerning cyber and threat intelligence and how possible to not fall into these traps while knowing how to dig out if you do.

Download Brief

Please provide a valid email address to access your download.

Continue... ×
النسخة العربية

Please provide a valid email address to access your download.

Continue... ×

Contact Treadstone 71 Today for all your Cyber Intelligence needs.

CONTACT US TODAY