Deception, Distortion, Dishonesty: The Real Story Behind the Hype – RSA Conference 2018 – San Francisco
Published: Wednesday, 11 April 2018 13:41
Dr. Khatuna Mshvidobadze
In the summer of 2008, Russia attacked Georgia in the first-ever combined kinetic and cyberwar. Sure, the 1990-1991 Gulf War was dubbed the first information war—the use of information in war is not new. What was new in 2008 was that Russia employed its cyber arm as an independent operational capability alongside its land, sea and air forces. The targets were critical infrastructure. The strategic objectives were to sap Georgia’s will to resist and to provide cover for Russia’s information campaign to deceive the west into believing that somehow little Georgia was the aggressor.
Operational security was paramount—Moscow had to keep everyone confounded about who was behind the cyber attacks. Just like the kinetic invasion, the cyber attacks were long and well-planned, but Russia did a great job covering its tracks. When the shooting stopped, well-meaning researchers investigated what had happened. However, coming from a profession that focuses on computer screens and a culture unaccustomed to the kind of deception that is part of everyday Russian life, they foundered.
The attacks led us to Russia. We noted uncanny timing. Western experts were indeed confounded when the trail led to kids and criminals. I have been following that trail ever since. Insight into Russia, all-source intelligence and a keen understanding of denial and deception were needed.
Read more ...
Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco
Published: Sunday, 18 February 2018 13:20
Foundations for a Strong Intelligence Program
April 18, 9AM-11AM RSA Conference
AJ Nash (Symantec) and Jeff Bardin (Treadstone 71) will explore key aspects of building a strong and long-lasting cyberthreat intelligence program. We'll review methods of threat intelligence platform selection and bake-off techniques as well as cover stakeholder analysis and priority intelligence requirements. Additionally, we'll practice collection planning and mission management as well as how to establish effective reporting and dissemination capabilities.
Cyber CounterIntelligence - Deception, Distortion, Dishonesty
April 18, 1:45PM-2:30PM RSA Conference
Dr. Khatuna Mshvidobadze (Cyberlight Global Associates) and Jeff Bardin (Treadstone 71) deliver a timely discussion on deception, distortion, and dishonesty; core aspects of Foreign Intelligence Service manipulation of social media. Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided. The talk will cover methods of countering their messaging while applying these tactics to protect your own organization and brand. Moving from intelligence to counterintelligence is the natural next step in our evolution.
Anomali and Treadstone 71 Announce Platform and Training Partnership
Published: Friday, 09 February 2018 16:47
Treadstone 71 Training
Provider of threat management and collaboration solutions to provide cybersecurity students and professionals access to powerful cyberintelligence software
Middle Eastern Cyber Warfare Doctrine & Iranian Cyber Capabilities
Published: Thursday, 25 January 2018 20:10
Treadstone 71 Research
WARNING! The material may be offensive to some.
High Value-Income Target - Know Your Customer Assessment
Published: Tuesday, 02 January 2018 18:37
Executive Leadership Cyber Dossier – Internet and Social Media Attack Surface Assessment – (High-Value Target Assessment (HVT-A) – Know Your Customer (KYC)
Open source findings on executives across the internet & social media
- Information disclosure
- Potential physical threats of harm
- Unsecured social network accounts
What is the complete intent of the exercise?
What does the sponsor expect to do with the information?
What is the timeline expected for delivery of each dossier?
Read more ...
Threat Intelligence Platform Assessment Services
Published: Tuesday, 02 January 2018 16:42
Treadstone 71 assists you in your Threat Intelligence Platform selection process. Based upon a foundation in intelligence community tradecraft, security operations, and threat intelligence, we craft a structured analytic techniques method to TIP assessment. Our workbook and methods are used for the review and completion of the questionnaire by the vendors and by TIP participants. Completion of the Treadstone 71 workbook is required within 5 business days after receipt and may only be shared with the client and point-of-contact for the TIP evaluation.
Read more ...
Internal Intelligence Community - Information Sharing
Published: Tuesday, 02 January 2018 02:06
Treadstone 71 advisory services for Internal Intelligence Community program build
- The Strategic Environment section portrays your organizations internal and external security environment;
- The Mission Objective section describes key mission priorities and expected outcomes;
- The Enterprise Objective section describes resource and capability outcomes needed to enable mission success; and
- The Implementing the Strategy section provides broad organizational guidance to meet the Treadstone 71 TI Team’s requirements.
Read more ...
Treadstone 71 Training and Services
Published: Sunday, 15 October 2017 12:43
Treadstone 71 - We See What Others Cannot
||Planning and Build
|Cyber Intelligence Tradecraft Certification
||Threat Intelligence Platform
||Intelligence Program Strategic Planning
||Targeted Adversaries / Dossiers / Baseball Cards
|Cyber CounterIntelligence Tradecraft Certification
||Cyber-Threat Intelligence Program Maturity
||Intelligence Program Build
|Clandestine Cyber HUMINT
|| Vendor Intelligence Feeds
||Policies, Procedures, Critical Success Factors, Key Performance Indicators, Process Flow
|| Campaign Analysis / Analysis as a Service
|Critical Thinking, Structured Analytic Techniques, Analytic Writing
||Geo-Political / Socio-Cultural Assessments
||Case Study Testing - Table Top Exercises - Scenario Development
||Threat and Attack Surface Assessments
||Stakeholder Analysis - Analytic Writing and Dissemination
||Open Source - In-Depth - Contextual
|تدريب مخابرات سيبرانية - سيبر مكافحة الذكاء التدريب
|| استخبارات سيبرانية - تخطيط استراتيجي
|| جمع مصدر مفتوح وتحليل منظم - طرق عدم كشف عن هويته
|| بحوث مستهدفة وإبلاغ - تحليل كخدمة
Training Fortune 500 and Government Organizations Since 2009
Treadstone 71 Cyber Intelligence Capability Maturity Model
Published: Monday, 14 August 2017 07:26
Treadstone 71 Cyber Intel Training 2018 Treadstone 71 developed a maturity model to help organizations determine the maturity of their cyber intelligence initiatives against the cyber intelligence common body of knowledge (CICBOK). The model provides strategic and operational aspects of your cyber intelligence maturity, where it needs to go, and where you should concentrate your attention to create more value for your business. Nearly 8 years in the making, the Treadstone 71 Cyber Intelligence Maturity Model uses traditional tradecraft as delivered by Sherman Kent and Richards Heuer, intelligence community standards, analytic standards, and experiential knowledge derived from years of training, assessing, and building cyber intelligence programs.
- BREAKING - DRAGONFLY 2.0? -
The Treadstone 71 Cyber Intelligence Capability Maturity Model (T71-CICMM) is a methodology used to develop and refine an organization’s cyber intelligence program. Not only is the model educational and practical skills for learning and developing expertise, but also a roadmap for building a cyber intelligence program. More information is available here:
Treadstone 71 Cyber Intelligence Capability Maturity Model (registered copyright 2017)
Read more ...