According to Jeff Bardin, Chief Intelligence Officer at Treadstone 71, “Iran for years has used physical proxies to perform its dirty work (Lebanon, Syria, South America,Saudi, etc.). With the tight hold on the country that the IRGC and Basij have, these groups are most likely tied to one or the other or both. In fact, their methods of delivering highly structured and managed programs such as those their proxies deliver (education, healthcare, religious order), makes it very easy to believe this is an institutionalized effort that runs from the fingertips of the hackers all the way to Iranian senior leadership.” - See the HP Report at https://h30499.www3.hp.com/hpeb/attachments/hpeb/off-by-on-software-security-blog/177/1/Companion%20to%20HPSR%20Threat%20Intelligence%20Briefing%20Episode%2011%20Final.pdf
TIMELINESS - ACCURACY - USABILITY - COMPLETENESS - RELEVANCE
Treadstone 71 – SYNCSTATE Join Forming Expert Cyber Operations Solutions
SAN FRANCISCO, Calif., Feb. 19, 2014 (SEND2PRESS NEWSWIRE) -- Treadstone 71 announced today its partnership with SYNCSTATE, Inc. The partnership utilizes the cyber intelligence methods and structured analytic techniques of Treadstone 71 in supporting the newly announced SYNCSTATE Cyber Threat Targeting Center. The partnership combines the collection, organization and analysis expertise of Treadstone 71 with the operational execution and in depth technical prowess of SYNCSTATE delivering one of the most potent offensive cyber programs on the market. In fact, the Treadstone 71 – SYNCSTATE partnership may be the only offensive cyber program openly communicated.
HALF MOON BAY, Calif., Dec. 3, 2013 (SEND2PRESS NEWSWIRE) - Treadstone 71 announced today the expansion of its pioneering cyber intelligence services used to methodically and systematically collect, organize and analyze data. Treadstone 71 integrates, evaluates, and interprets information from all data sources delivering a range of opportunities and recommendations key to decision making. The new services assist analysts to comprehend complicated and uncertain situations leading to comprehensive situational awareness while teaching analysts to be their own collectors.
(COURSE REVIEWS AS OF JULY 5, 2013) This course examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students will be able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.
Corporations and other private sector agencies and organizations, increasingly aware of cyber threats, are adding departments and employees to help anticipate and fight cyber crimes, hacktivists, state and non-state actors. This can cost clients more than €8 million per day.