Cyber Reconnaissance NewsPaper
- Published: Friday, 23 August 2013 13:46
This course examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.
At Treadstone 71, we view cyberspace as a global domain within the information environment consisting of the independent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, embedded processors, controllers -- anything connected, or connected devices. It is a fifth domain of warfare that is under attack daily -- by nation states, nongovernment organizations, terrorists, criminals, and hacktivists.
The reviews for the Cyber Intelligence class taught by Treadstone 71 are rolling in. Recent comments from two students are below.
“The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks. For most scenarios we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring. He was able to answer each and every question asked with specific details, and then some. I would sign up again right away for any other classes offered by Jeff”
The legal issues notwithstanding, offensive cyber actions are the only way we are going to get our adversaries to pay attention. Whether they are cyber criminals, foreign intelligence services, cyber proxies, hackers, hacktivists, or some other such adversary, we need to do more than just stand and take a beating. Read the blog here: http://blogs.csoonline.com/security-leadership/2469/caution-not-executing-offensive-actions-against-our-adversaries-high-risk
Anyone who doubts that we are not in the midst of cyber warfare, they are not educated as to the current state of global affairs. The United States is under siege from nearly every corner of the virtual universe. The attacks are continuous. The intent clear. Read more here: http://blogs.csoonline.com/social-engineering/2316/giving-aid-and-comfort
Most organizations do not monitor their Internet and Social Networking attack surface. Online postings across multiple protocols and web functions might allow your adversaries an opportunity to interpret or piece together critical information. Adversaries use multiple and overlapping collection efforts targeted against all sources of your organizational and employee information. Treadstone 71 offers assessment and remediation services that reduces your attack surface.
Treadstone 71 researches open source information, analyzes and delivers recommendations and opportunities for actionable intelligence. After several years of data collection and analysis focusing on cyber jihadist activities, Treadstone 71 has taken this proven methodology and turned it towards other targets. We perform open source media collection and analysis, content analysis of media disseminated by key foreign media outlets and extremist sites and, assessment and countering of foreign media and extremist propaganda.
Cyber Intelligence Training
This four-day course examines Sherman Kent’s Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students will be able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course. In addition, students will understand the use methods of only anonymity, the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations to assist in online operational security and in their defense against adversaries. The course is a combination of lecture, hands-on and student deliverables seen by many as an apprenticeship.
Upon completion of the course, each student will be able to:
This class is for anyone wishing to learn about cyber intelligence concepts and methods using open source tools for operational security, infiltration, analysis, recommendations and opportunities presentations, that provide their organizations with an immediate understanding of their Internet attack surface. Students wishing to understand adversarial methods and concepts surrounding the virtual manifestation of the traditional intelligence tradecraft are urged to attend.