High Level Benefits of the Cyber Intel Course
Published: Saturday, 22 June 2013 18:44
This course examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.
Read more ...
Statement of Cyber Counterintelligence
Published: Saturday, 22 June 2013 18:35
At Treadstone 71, we view cyberspace as a global domain within the information environment consisting of the independent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, embedded processors, controllers -- anything connected, or connected devices. It is a fifth domain of warfare that is under attack daily -- by nation states, nongovernment organizations, terrorists, criminals, and hacktivists.
Read more ...
The Reviews Are Rolling In! - Cyber Intelligence Classes from Treadstone 71
Published: Sunday, 13 January 2013 17:00
The reviews for the Cyber Intelligence class taught by Treadstone 71 are rolling in. Recent comments from two students are below.
“The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks. For most scenarios we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring. He was able to answer each and every question asked with specific details, and then some. I would sign up again right away for any other classes offered by Jeff”
Read more ...
Caution: Not Executing Offensive Actions Against Our Adversaries is High Risk
Published: Thursday, 29 November 2012 18:58
The legal issues notwithstanding, offensive cyber actions are the only way we are going to get our adversaries to pay attention. Whether they are cyber criminals, foreign intelligence services, cyber proxies, hackers, hacktivists, or some other such adversary, we need to do more than just stand and take a beating. Read the blog here: http://blogs.csoonline.com/security-leadership/2469/caution-not-executing-offensive-actions-against-our-adversaries-high-risk
Giving Aid and Comfort
Published: Sunday, 25 November 2012 15:49
Anyone who doubts that we are not in the midst of cyber warfare, they are not educated as to the current state of global affairs. The United States is under siege from nearly every corner of the virtual universe. The attacks are continuous. The intent clear. Read more here: http://blogs.csoonline.com/social-engineering/2316/giving-aid-and-comfort
Online OPSEC Assessment Services
Published: Monday, 23 January 2012 17:01
Most organizations do not monitor their Internet and Social Networking attack surface. Online postings across multiple protocols and web functions might allow your adversaries an opportunity to interpret or piece together critical information. Adversaries use multiple and overlapping collection efforts targeted against all sources of your organizational and employee information. Treadstone 71 offers assessment and remediation services that reduces your attack surface.
Read more ...
Published: Thursday, 12 January 2012 13:16
Treadstone 71 researches open source information, analyzes and delivers recommendations and opportunities for actionable intelligence. After several years of data collection and analysis focusing on cyber jihadist activities, Treadstone 71 has taken this proven methodology and turned it towards other targets. We perform open source media collection and analysis, content analysis of media disseminated by key foreign media outlets and extremist sites and, assessment and countering of foreign media and extremist propaganda.
Read more ...
Cyber Intelligence Training Class
Published: Wednesday, 12 January 2011 00:01
Cyber Intelligence Training
This four day course examines Sherman Kent’s Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students will be able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course. In addition, students will understand: the use methods of only anonymity, the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations to assist in online operational security and in their defense against adversaries. The course is a combination of lecture, hands-on and student deliverables seen by many as an apprenticeship.
Upon completion of the course, each student will be able to:
- Identify the differences and intersections between open source data, open source information and open source intelligence
- Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course
- Understand the use of online anonymity
- Understand collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence
- Understand the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations for prevention
- Understand the basics of Analysis of Competing Hypotheses (ACH) tool and usage
- Gain the ability to use open source intelligence tools to target, collect, produce and analyze data points into actionable intelligence.
- Understand how to quickly examine the data for new targeting and potential immediate recommendations and/or opportunities
- Understand how to gather information based upon provided targets
- Understand how to use several OSINT tools for data collection
- Understand how to collect, product and analyze data that provides my organization with a valid view of its Cyber-OPSEC posture
- Understand what type of information my adversaries know about my organization and how students can use this to enhance organizational security postures and improve prevention through situational awareness
This class is for anyone wishing to learn about cyber intelligence concepts and methods using open source tools for operational security, infiltration, analysis, recommendations and opportunities presentations, that provide their organizations with immediate understanding of their Internet attack surface. Students wishing to understand adversarial methods and concepts surrounding the virtual manifestation of the traditional intelligence tradecraft are urged to attend.
Baseball Cards - Adversary Targeting
Published: Monday, 01 February 2016 17:12
Targeting focuses on achieving stakeholder objectives. It is the function of targeting to achieve efficiently those objectives within the parameters set at the operational level, directed limitations, the rules of engagement, or rules for the use of force in the cyber world, and other guidance given by stakeholders.
Targeting seeks to create specific desired effects through adversary infiltration and data extraction. Target analysis encompasses all possible means to create desired effects, drawing from all available capabilities. The art of targeting seeks to create desired effects with the least risk and expenditure of time and resources. Targeting is a fundamental task of cyber operations that encompasses many disciplines and requires participation from skilled intelligence operators with many different capabilities that far exceed technical skills.
Read more ...