• Cyber Intelligence Training
    Cyber Intelligence Training
  • Silent Warriors - Wilderness of Cyber Mirrors
    Silent Warriors - Wilderness of Cyber Mirrors
  • Interim - Virtual CISO Services
    Interim - Virtual CISO Services
  • Analytic Line of March
    Analytic Line of March
  • Denial and Deception
    Denial and Deception
  • Analysis as a Service
    Analysis as a Service
  • Methods of Analysis
    Methods of Analysis
  • Critical Thinking - Cognitive Bias
    Critical Thinking - Cognitive Bias
  • Clandestine Cyber HUMINT
    Clandestine Cyber HUMINT
  • High Value Targets - Reconnaissance
    High Value Targets - Reconnaissance

Cyber CounterIntelligence Tradecraft Certification

Registration Information - Treadstone 71 Cyber Counterintelligence Training
Dates TBD for 2017

https://cybershafarat.com/2016/07/31/intelligenceanalysis/  

We recommend that students take the Cyber Intelligence Tradecraft Certification course first - http://www.planetreg.com/E1029143956169750

This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. By starting with traditional counterintelligence and progressing to cyber counterintelligence, the student will develop an appreciation for collection efforts, exploitation of potential threats, insider concerns, and the risks and benefits of counterintelligence.

With the expanding importance of the comprehensive and timely need for intelligence for nations as well as businesses, the student will explore the essential elements that make up the intelligence cycle with a focus on how these pivotal points are exploited. As part of this class, the exploration of the continued importance of critical thinking as well as out-of¬the-box analysis will be heavily leveraged to improve the critical-thinking skills of the students.  As cyber topics continue to evolve, the increased importance of cyber intelligence is growing and as such the protection of our intelligence cycles will expand as well; emphasizing the growing need to ensure our processes are not compromised in a cyber-dominated landscape.  Cyber Counterintelligence is one aspect and possibly one of the most crucial topics at the core of protecting our collection efforts. The potential for active defense or offensive cyber counterintelligence operations will be covered.

The course will rely heavily on individual research and group discussion to explore the world of cyber counterintelligence, and where applicable, make use of the student’s ability to do independent thinking and analysis of in-class problems assigned through weekly discussion threads. This course focuses on open source intelligence and adversaries while creating online personas to assist in data collection and information extraction. This introductory course examines open source intelligence collection as well as the availability and use of OSINT tools. Students will be able to understand the use methods of only anonymity, the fundamentals behind cyber persona development, enrollment in various social media sites and applications, and how these current methods can be employed in their organizations to assist in operational cyber security, their defense against adversaries, and passive data collection.  The establishment of cyber personas takes patience and time to create a credible resource. Parallel activities occur through the outline above. Treadstone 71 maintains separation from the client as required maintaining confidentiality of methods and processes.

Sitreps and current intelligence may redirect activities. The intent is to establish a program of cyber and open source intelligence that creates data streams for analysis. Data streams take the time to develop to establish links, trends, tendencies and eventually, anticipatory and predictive analysis. The desire is to move from a detective approach to one that is preventive while moving too predictive.  








Cyber CounterINT1 - Cyber Infiltration, Information Operations, Information Support Operations National Counterintelligence Strategy, Standard Glossary and Taxonomy, Mission Based Counterintelligence, Counter Collection and Anticipation, Denial and Deception, Counter-Denial and Deception, Cyberspace, Open Source Intelligence, Methods of collection, Specific tools, Social media sites and enrollment, Methods of Social Media Research, Tools and Techniques, Social media demographics, Establish Priority Intelligence Requirements, Establish Information Requirements, Cyber Target Acquisition and Exploitation, Validation of target, Identify active adversary campaigns, Intent, Motivation, Goals, & Requirements, Passive data collection, Campaign development, Target sites, Enrollment, Tactics, techniques, and procedures, Intent, motivation, goals, and requirements, Vectors of approach, Courses of action, Elicitation and exfiltration

Cyber CounterINT2 - Perception as Deception, Social Psychology, Differences in Culture, Diversity, Hofstede Dimensions, Social Psychology, Reciprocity, Consistency, Social validation, Liking, Authority, Scarcity, Big 5 Theory of Personality, Information Warfare and Cyber Psychological Operations, Target analysis and message manipulation where applicable, Persona creation, establishment, maintenance, expansion (depending upon taking Cyber Intelligence Course), Data collection – recycle for Cyber CI updates/improvements, Authoring of blogs and articles for influencing, Placement of specific concepts and phrases

Cyber CounterINT3 – The Cyber Persona Layer, Persona creation and implementation, Cyber Persona Development and Maintenance, Character archetypes, Leveraging existing, Create new, Establish the storyline, Establish the plot synopsis, Story weaving and management, Snuggling, Collection, Linkages, trends, tendencies

Cyber CounterINT4 - Target profiles – dossiers, Target gap analysis, Define the mission so that it aligns with organizational objectives, Clandestine Collection Operation, Surveillance, Counter Surveillance, CI Activities, CI Analysis and Production, CI Analysis Reporting, Support Brief, Source Evaluation, Operational analysis report, Asset Evaluation, Support Package, CI Assessment, CI Campaign, Mission, Mission Management, Operations, Effects-Based Operations, Functions and Services

Cyber CounterINT5 - CI Insider Threat, Investigations, Prepare an estimate of the situation, Prepare the plan,  Support Plan, Cyber Media selection, Internet OPSEC, Product development, Pretesting - determines the probable impact on the target audience, Production and dissemination of material, Implementation, Post-testing - evaluates audience responses, Feedback, Ten Commandments of Cyber Counterintelligence,  Research and analyze methods of influencing adversaries from a variety of information sources
Team/Individual Presentations

Lecture, Hands-on, Apprenticeship, in class exercises (Live Case Studies), student presentations, templates, course material—40 CPEs 5-days

All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real world experience during the class.

The course runs over five consecutive days covering Monday through Friday afternoon.  Students are expected to attend each hour of each day since the course is comprehensive with each day building upon the next. Days may start at 7:45AM. Breakfast, lunch, and afternoon snacks/tea are provided. Lunches are usually working lunches. Class minimum is 15 with a maximum of 25. 

Send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo and the like).

Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).
$4990.00 required 
This course combines lecture, research, and hands-on team assignments. Students need to bring a laptop (PC or MAC) that does not have corporate controls (tablets will not suffice). PCs work best

Breakfast and lunch served daily
Afternoon snack provided

Course material is not for resale or commercial use outside the end user license agreement. Course material may not be used for competitive purposes. 

https://cybershafarat.com/2016/07/31/intelligenceanalysis/

You must attend the full class in order to receive all course material and the certification. Certification is granted after completion of course instruction and hands-on application of the concepts in 3 to 4 team exercises. If a student leaves the class prior to course completion, neither the certification is granted nor is the course material covered after the student leaves made available.  Lectures and associated material is posted each day after each lecture. This method supports the student in a just-in-time manner. This method ensures full understanding of the material without discovering course plot lines until the proper time. The course is architected to support a particular process flow and learning method.

Search Our Site

Treadstone 71 - We See What Others Cannot

The Cyber Intelligence Training delivered and created by Jeff Bardin adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio, 

Fortune 100 Company

line2

Upcoming Classes

Current Courses (dates, locations, topics subject to change):
Cyber Intelligence Reston - October 2017 (October 16-20)


2018 Course Dates - Locations TBD
January 22-26 Cyber Intel - Amsterdam, NL

February 5-9 Cyber Intel - Tysons Corners Virginia
March 19-23 Cyber Intel - Chantilly Virginia
April 2-6 Cyber Intel - London, UK

April 30 – May 4 Cyber Counter - Los Angeles California

May 14-18 Cyber Intel - San Jose, CA
June 18-22 Cyber Intel - Reston, Virginia
Aug 13-17 Cyber Intel - Chicago, IL
Sep 17-21 - Cyber Intel - Boston, MA
Oct 15-19 Cyber Counter - Reston, VA
Nov 5-9 Cyber Intel - Denver, CO
Dec 3-7 Cyber Counter

Students and organizations taught (non-inclusively):

AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

  Treadstone 71 Cyber Intelligence Services

  Treadstone 71 Expands Groundbreaking Services

 

Cyber Jihad - 2008-2011 Compilation Part 1

 

Cyber Jihad - 2008-2011 Compilation Part II

 

Iran Cyber Proxies and Capabilities 

Gaming as a Method of Jihadist Training

 

 

 

 

 

 

 

Treadstone 71 Cyber Intel Services / Training

Stuxnet