• Cyber Intelligence Training
    Cyber Intelligence Training
  • Silent Warriors - Wilderness of Cyber Mirrors
    Silent Warriors - Wilderness of Cyber Mirrors
  • Interim - Virtual CISO Services
    Interim - Virtual CISO Services
  • Analytic Line of March
    Analytic Line of March
  • Denial and Deception
    Denial and Deception
  • Analysis as a Service
    Analysis as a Service
  • Methods of Analysis
    Methods of Analysis
  • Critical Thinking - Cognitive Bias
    Critical Thinking - Cognitive Bias
  • Clandestine Cyber HUMINT
    Clandestine Cyber HUMINT
  • High Value Targets - Reconnaissance
    High Value Targets - Reconnaissance

Brief on Russian Hacking Activities

The Russian hacking efforts against the West is well designed and planned. The Russian concept of maskirovka has expanded from traditional military aspects of denial and deception to information warfare and cyber psychological operations. Imagine you have hacked a target not knowing exactly what you will find. The plan is to extract information from the initial target, examine the information, recalibrate, replan, while setting new actions of disinformation in play. We believe that the data inside the DNC emails has not yet been fully exploited. It would behoove the DNC and other US officials to examine every syllable of every word to determine what was exposed, determine what the Russians may do with this data, and plan to proactively counter the deception that will come from the Russians.  The hacking was but one facet of a larger plan by Putin and his inner circle to disrupt, deceive, influence, and exploit weaknesses in the US including political and social beliefs and movements. EU countries are also targeted especially those with upcoming elections. Their actions have been very effective.    Treadstone 71 Training 2017

maskirovka kartinki smeshnye kartinki fotoprikoly 4431342791

 

 

There is a collective lack of institutional memory among target audiences, namely the West – a significant proportion of which had not even been born when Soviet subversion was a concern – therefore, they don’t have the level of knowledge and subsequent paranoia of baby boomers who used to hide under their classroom desktops in atomic bomb drills. Russia has invested hugely in enabling factors to adapt the principles of subversion to the internet age. These new Russian investments cover internally and externally focused media with a substantial online presence, of which RT  and Sputnik are the best-known but only two examples; Use of social media and online forums as a force multiplier to ensure Russian narratives achieve broad reach and penetration; and language skills, to engage with target audiences on a broad front in their language.

 

 

You may even find funding through shell companies that eventually use Western PR firms to place pro-Russian ads in US media. (Ketchum)

Past examples of maskirovka that are not to be forgotten:

  • Soviet military units designated for the Cuban assignment were told that they were going to a cold region. They were outfitted with skis, felt boots, fleece-lined parkas, and other winter equipment.
  • Officers and missile specialists traveled to Cuba as machine operators, irrigation specialists, and agricultural specialists.
  • Missiles were shipped from 8 Soviet ports to hide the size of the effort (loaded at night)
  • Missile crates and launchers were shielded with metal sheets to defeat infrared photos.
  • Ships had autos, tractors, and harvesters top deck.
  • False bills of lading and cargo records – tonnage declared well below actual weight. Cuba is not listed as the destination.
  • All agricultural gear unloaded in Cuba – daytime
  • All else unloaded in Cuba – nighttime
  • Radio Moscow regularly report USSR supplying Cuba with machine tools, wheat, and agricultural machinery – fertilizer
  • Soviets leaked accurate information through counterrevolutionary Cuban groups in the US. Information the US discounted since groups were not seen to be credible.Maskirokva principles
  • Soviet diplomats assured the US no intention of offensive weaponry in Cuba

Russia under Putin is a large business conglomerate looking to establish political hegemony over oil producing companies in the Middle East.  Putin drives his economy through oil and gas. Establishing business relationships with large US and other Western companies is part of his plan to influence US policy.

The Syrian effort was as much to protect Assad as it was to ensure the Russian version of the oil and gas pipelines were preserved.

The populist movements serve to drive isolationism in Western countries and NATO at a time when Russia is expanding its footprint.

Going back to maskirovka, Putin is maneuvering to gain a positional advantage against the West. 

Maskirovka—the art of deception—to elevate the complete set of actions and conditions that fall short of war that enables battlefield victories to be decided before tanks and infantry close in battle, what he did in the Crimea.  It is Maskirovka, and the complementary technological changes related to the Internet, social media, lies and propaganda that somehow is being called ‘fake news,’ to be taken as gospel.

Treadstone 71

Search Our Site

Treadstone 71 - We See What Others Cannot

The Cyber Intelligence Training delivered and created by Jeff Bardin adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio, 

Fortune 100 Company

line2

Use HOLIDAY2018 as a Coupon Code at checkout to save big! November 20-December 8

January 8-12 Cyber Intelligence- Amsterdam, NL
February 5-9 Cyber Intelligence- Reston, VA
March 19-23 Cyber Intelligence- Columbia, Maryland
April 9-13 Cyber Intelligence- London, UK
April 30 – May 3 Cyber Intelligence - Los Angeles California
May 14-18 Cyber Intelligence- San Jose, CA
June 18-22 Cyber Intelligence- Annapolis Junction, Maryland
Aug 13-17 Cyber Intelligence- Reston, VA
Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland

Students and organizations taught (non-inclusively):

AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

  Treadstone 71 Cyber Intelligence Services

  Treadstone 71 Expands Groundbreaking Services

 

Cyber Jihad - 2008-2011 Compilation Part 1

 

Cyber Jihad - 2008-2011 Compilation Part II

 

Iran Cyber Proxies and Capabilities 

Gaming as a Method of Jihadist Training

 

 

 

 

 

 

 

Treadstone 71 Cyber Intel Services / Training

Stuxnet