• Cyber Intelligence Training
    Cyber Intelligence Training
  • Silent Warriors - Wilderness of Cyber Mirrors
    Silent Warriors - Wilderness of Cyber Mirrors
  • Interim - Virtual CISO Services
    Interim - Virtual CISO Services
  • Analytic Line of March
    Analytic Line of March
  • Denial and Deception
    Denial and Deception
  • Analysis as a Service
    Analysis as a Service
  • Methods of Analysis
    Methods of Analysis
  • Critical Thinking - Cognitive Bias
    Critical Thinking - Cognitive Bias
  • Clandestine Cyber HUMINT
    Clandestine Cyber HUMINT
  • High Value Targets - Reconnaissance
    High Value Targets - Reconnaissance

Treadstone 71 Force Multiplier Intelligence Advisory Services Available to Global Customers

Treadstone 71 trains, advises and builds cyber intelligence, threat, business, and competitive intelligence programs. Since 2002, Treadstone 71's footprint is the basis for many intelligence programs.

Half Moon Bay, CA – February 8, 2017 - Treadstone 71 announced today enhancements and expansion of their industry leading Force Multiple Intelligence Advisory Services. “Our services deliver actionable intelligence to consumers enabling proactive threat mitigation strategies,” said Jeff Bardin, Chief Intelligence Officer for Treadstone 71. “The intelligence community proven methods, structured techniques, and Kent/Heuer-based procedures increase client awareness of their threat posture while supporting rapid response to their cyber incidents.”

The Treadstone 71 Force Multiplier Intelligence Advisory Services clarifies the cyber threat intelligence strategy while illuminating a path for tactical implementation. In developing this strategy, we adhere to guiding principles. Principles validated when building-out threat intelligence programs from Arizona to Australia. The Treadstone 71 advisory services enable:

Read more ...

Cyber Security Predictions - Not Even Reality TV - Just Daytime Entertainment

The plethora of 2017 cyber security predictions do nothing but distract practitioners from executing actual controls and methods of defense and prevention. Each year we get slammed with predictions that aret71training never followed, are common sense, and serve to market and sell products and services. The so-called information and cyber security experts, many times self-proclaimed, spew predictions on all potential areas. This is not much more than fake news and methods to direct readers to vendor products. The vendor products that claim to solve these predictions and therefore, become self-fulfilling prophecies. For the most part, once the predictions are published, the follow-up to their success is non-existent. Their purposes are to market and sell, drive perception, manage the market, and drive a false sense of vendor expertise.

Treadstone 71 Training 2017

We should focus on actual problem resolution and change the failed paradigm within which security exists. We continue to propagate vendor products and services that do not work, only treating the symptoms. This is not much different from the pharmaceutical industry that markets pills to you each evening during the news and prime time. Pills that treat symptoms and cause more side effects than they do solve issues. Advertisements that drive up the cost of the product manipulating the market and those that prescribe the 'solutions' to recommend purchase.

The only way we change this paradigm, and I mean we, is to push back on these vendors to solve problems and quit selling products that treat symptoms. We must also correct our own internal behaviors. A few weeks ago, I published a potential list of 12 items to change this paradigm (the 12th is a shameless plug so 11). They are listed below.

We need to forget the Jerry Springer-like entertainment of annual cyber predictions and focus on solving the hard problems we face.

What does Treadstone 71 seek? We seek an end to the noise and an understanding that our information, our intellectual property, and our way of life is under constant siege. We are in a cyber war with skirmishes and battles occurring 24x7. We need to direct the carpetbagging vendors to cease in their war profiteering and take a moral stance in fighting our adversaries. We also need to correct and adjust how we run IT and information security. The list of 11 is below. We welcome your comments, your additions, and your assistance in this call to action to change the failed paradigm.

 

Read more ...

What is Analysis?

  • This includes integrating, evaluating, and analyzing all available data—which is often fragmented and even contradictory—and distilling it into the final intelligence products, which highlight information on topics of immediate importance or make long-range assessments.
  • Analysts, who are subject-matter specialists, absorb incoming information, evaluate it, produce an assessment of the current state of affairs within an assigned field or substantive area, and then forecast future trends or outcomes.
  • They integrate data into a coherent whole, put the evaluated information in context, and produce finished intelligence that includes assessments of events and judgments about the implications of the information for your organization.
  • Use structured analytic techniques and types of analysis
  • Analysts are encouraged to include alternative futures in their assessments and to look for opportunities to warn about developments abroad that could either provide threats to or opportunities for organizational security and policy interests.
  • Analysts also develop requirements for the collection of new information. From analysis, we move to analytic writing.

What to know more? Sign up for Treadstone 71 Cyber Intelligence Training 

Treadstone 71 Training - 2017 Courses

The Treadstone 71 training course follow intelligence tradecraft following standard intelligence community lifecycle including collection methods, techniques, planning, PIRs, and collection tools and targeting with a focus on intelligence analysis. Intelligence production methods and process flows are covered as well as evidence credibility, reliability, denial and deception, and confidence levels. Students are required to demonstrate understanding and use structured analytic techniques as well as various types of analysis including synthesis and fusion of data and information into actionable intelligence. The class covers methods of adapting TTPs and IoCs for hunt and detect and interfaces to incident response.T71eyes

Courses from Treadstone 71 provide foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. By starting with traditional counterintelligence and progressing to cyber counterintelligence, the student will develop an appreciation for collection efforts, exploitation of potential threats, insider concerns, and the risks and benefits of counterintelligence. The Treadstone 71 courses provide foundational support to business intelligence, competitive intelligence, and behavior analysis functions. 

Organizations use our training materials to build cyber operations and intelligence collection capabilities. The cyber threat intelligence training is unique following CIA tradecraft as created by Sherman Kent and Richards Heuer. From the initial cyber intelligence tradecraft course through to clandestine cyber HUMINT, the Treadstone 71 threat intelligence training is an apprenticeship to building a reliable, sustainable, and resilient intelligence and intelligence analysis, analytic writing and dissemination program that delivers what stakeholders require.

Read more ...

Brief on Russian Hacking Activities

The Russian hacking efforts against the West is well designed and planned. The Russian concept of maskirovka has expanded from traditional military aspects of denial and deception to information warfare and cyber psychological operations. Imagine you have hacked a target not knowing exactly what you will find. The plan is to extract information from the initial target, examine the information, recalibrate, replan, while setting new actions of disinformation in play. We believe that the data inside the DNC emails has not yet been fully exploited. It would behoove the DNC and other US officials to examine every syllable of every word to determine what was exposed, determine what the Russians may do with this data, and plan to proactively counter the deception that will come from the Russians.  The hacking was but one facet of a larger plan by Putin and his inner circle to disrupt, deceive, influence, and exploit weaknesses in the US including political and social beliefs and movements. EU countries are also targeted especially those with upcoming elections. Their actions have been very effective.    Treadstone 71 Training 2017

maskirovka kartinki smeshnye kartinki fotoprikoly 4431342791

 

 

There is a collective lack of institutional memory among target audiences, namely the West – a significant proportion of which had not even been born when Soviet subversion was a concern – therefore, they don’t have the level of knowledge and subsequent paranoia of baby boomers who used to hide under their classroom desktops in atomic bomb drills. Russia has invested hugely in enabling factors to adapt the principles of subversion to the internet age. These new Russian investments cover internally and externally focused media with a substantial online presence, of which RT  and Sputnik are the best-known but only two examples; Use of social media and online forums as a force multiplier to ensure Russian narratives achieve broad reach and penetration; and language skills, to engage with target audiences on a broad front in their language.

 

Read more ...

The 12 Days of Cyber Christmas

or What I want for Cyber Security and Intelligence Christmas 2016

T71MX2

  1. All CIOs must have served as a CISO for at least 4 years before being allowed to be a CIO.
  2. All CIOs must have a CISSP, CISM, and at least 2 technical information security certifications and have been thoroughly trained and qualified to be a CIO. No more cronyism.
  3. CISOs will never report to the CIO – conflict of interest and a recipe for … what we have now.
  4. If you are the administrator for a device, you secure that device (servers, routers, appliances, etc.). You are responsible and accountable – Secure what you own. Secure what you manage.
  5. CIOs and their leadership will be held liable for deploying vulnerable systems.
  6. All new products (IoT and beyond) must be certified secure before public release. No more figure it out as we go and bolt it on after we have consumers hooked.
  7. All root access / administrative rights for production, critical, supporting, etc., systems and devices are removed and granted only for approved changes and incidents.
  8. All written code and script must be written properly. There is no such thing as secure code, only code the works correctly and does not create vulnerabilities.
  9. All operating systems will be shipped closed and installed closed with a risk rating system for each port, protocol, and/or service. Each modification reduces the security posture of the operating system providing a risk score while automatically offering advice on how to remediate that score with other controls.
  10. New regulations to enforce security and privacy, demanding disclosure of breaches, fining companies and individuals for negligence are put in place, at once.
  11. Vendors posting adversary IoCs, TTPs, and other methods that would normally be seen as ‘telling the enemy what we know, i.e., sedition’ will be fined for such activity.
  12. You will tell yourselves over and over again that contracting with Treadstone 71 to build your cyber intelligence strategy and program is the absolute right thing to do (repeat after me …).

Merry Cyber Christmas from Treadstone 71

Treadstone 71 on CBS News Live

Treadstone 71 on CBS News Live with Vlad Duthiers:

Well designed and planned! The Russian concept of maskirovka has expanded from traditional military aspects of denial and deception to information warfare and cyber psychological operations. Imagine you have hacked a target not knowing exactly what you will find. The plan is to extract information from the initial target, examine the information, recalibrate, replan, while setting new actions of disinformation in play. The data inside the DNC emails has not yet been fully exploited. Who knows what data was in those emails. It would be smart for the DNC and other US officials to examine every syllable of every word to determine what was exposed, determine what the Russians may do with this data, and plan to counter the deception that will come from the Russians proactively.  The hacking was but one facet of a larger plan by Putin and his inner circle to disrupt, deceive, influence, and exploit weaknesses in the US including political and social beliefs and movements. Their actions have been very useful to Putin and his oligarchs. 

Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures

Treadstone 71 Training 2017  Organizations follow inaccurate definitions of threat intelligence leading to poorly conceived cyber threat intelligence programs. Vendors communicate threat intelligence Reflectionsdefinitions supporting their offerings propagating the fallacy that threat intelligence solves numerous security problems.

Cyber Threat Intelligence functions being built on a foundation that is not supported by standard intelligence tradecraft. Many programs support a fraction of the intelligence needs, yet stakeholders hold unrealistic expectations based upon expenditures.

Information security capabilities marginally improve as spending skyrockets and security posture improvement is limited to after-the-fact discoveries communicated as prevention.  

Continued purchases of ‘threat intelligence’ tools based on the see-detect-and arrest paradigm ensure slow improvement and loss of data expansion. Intelligence program builds focused on technology capabilities repeats the historical problems of information security when firewalls and anti-virus represented the core of security programs.

Access to organizations who may be more advanced presents gaps in data available for this article. We based evidence upon direct access to some Fortune 500 organizations, discussions during cyber intelligence training classes, and actual intelligence program build activities.

Upcoming Classes

Cyber CounterIntelligence Tradecraft Certification

Registration Information - Treadstone 71 Cyber Counterintelligence Training
Dates TBD for 2017

https://cybershafarat.com/2016/07/31/intelligenceanalysis/  

We recommend that students take the Cyber Intelligence Tradecraft Certification course first - http://www.planetreg.com/E1029143956169750

This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. By starting with traditional counterintelligence and progressing to cyber counterintelligence, the student will develop an appreciation for collection efforts, exploitation of potential threats, insider concerns, and the risks and benefits of counterintelligence.

Search Our Site

Treadstone 71 - We See What Others Cannot

The Cyber Intelligence Training delivered and created by Jeff Bardin adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio, 

Fortune 100 Company

line2

Upcoming Classes

  • 2017 Training Dates (www.planetreg.com/T71IntelTraining)
    • 1/30-2/3 Amsterdam - Class Completed
    • 2/20-2/24-Chantilly
    • 3/13-3/17-Indianapolis area
      • https://stimulusengineering.regfox.com/cyber-series-course-1-cyber-intelligence-tradecraft-certification
      • https://stimulusengineering.regfox.com/cyber-series-course-2-cyber-counterintelligence-tradecraft-certification
      • https://stimulusengineering.regfox.com/cyber-series-course-3-clandestine-cyber-humint-osint
      • https://stimulusengineering.regfox.com/cyber-series-course-4-cyber-intelligence-analyst-certification
    • 4-10-4/14-Palo Alto
    • 5/1-5/5-Denver
    • 6/5-6/10-Chantilly
    • 7/17-7/21-Palo Alto
    • 8/7-8/11-Chantilly
    • 10/2-10/6-Palo Alto 
    (or on demand including in-house or by location)

    Treadstone 71 is working with FS-ISAC for training in London, Singapore, Malaysia, and Australia.

    FS-ISAC Sponsored Courses:

    http://www.cvent.com/events/fs-isac-cyber-intelligence-tradecraft-training-march-20-24-2017-/event-summary-71488381fe6e43808406e06f00eb6bfe.aspx

    Look for London training May 8-12 at www.fsisac.com/events
    Monday, June 19, 2017 to Friday, June 23, 2017
    Cyber Intelligence Tradecraft Training
    Reston, VA
    Monday, August 21, 2017 to Friday, August 25, 2017
    Cyber Intelligence Tradecraft Training
    Reston, VA

Students and organizations taught (non-inclusively):

AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

  Treadstone 71 Cyber Intelligence Services

  Treadstone 71 Expands Groundbreaking Services

 

Cyber Jihad - 2008-2011 Compilation Part 1

 

Cyber Jihad - 2008-2011 Compilation Part II

 

Iran Cyber Proxies and Capabilities 

Gaming as a Method of Jihadist Training

 

 

 

 

 

 

 

Treadstone 71 Cyber Intel Services / Training

Stuxnet