• Seeing is not always believing
    Seeing is not always believing
  • Cyber Intelligence Maturity
    Cyber Intelligence Maturity Cyber Intelligence Maturity Management Cyber Intelligence Common Body of Knowledge
  • Information Sharing through your own ISAC
    Information Sharing through your own ISAC
  • Maskirovka - Non-Linear Warfare
    Maskirovka - Non-Linear Warfare Cyber Maskirovka - Non-Linear Warfare
  • Middle Eastern Cyber Warfare Assessments - Analysis
    Middle Eastern Cyber Warfare Assessments - Analysis Middle Eastern Cyber Warfare Doctrine
  • Cyber Influence Operations
    Cyber Influence Operations Treadstone 71 Cyber Counterintelligence and Clandestine Cyber HUMINT
  • To win at non-linear warfare you must first understand what it is
    To win at non-linear warfare you must first understand what it is
  • Patterns, trends, information inside data, intelligence created to prevent
    Patterns, trends, information inside data, intelligence created to prevent
  • Analysis as a Service - Light the fire for targeted analysis
    Analysis as a Service - Light the fire for targeted analysis
  • High-Value Target - Know Your Customer Risk and Attack Surface Assessment
    High-Value Target - Know Your Customer Risk and Attack Surface Assessment

Online OPSEC Assessment Services

Most organizations do not monitor their Internet and Social Networking attack surface. Online postings across multiple protocols and web functions might allow your adversaries an opportunity to interpret or piece together critical information. Adversaries use multiple and overlapping collection efforts targeted against all sources of your organizational and employee information. Treadstone 71 offers assessment and remediation services that reduces your attack surface.


The adversary devotes significant resources to monitor your operations and activities on a daily basis.  They can produce reliable information on your capabilities, intentions, and vulnerabilities.  Adversaries are also shifting the emphasis in targeting.  Foreign targeting of American technology is increasing for economic as well as military reasons.  Technology transfer will continue to remain a major concern now and in the future. What you do about can either make or break your current and future strategies.

Treadstone 71 provides O-OPSEC risk assessments that measure the adversarial threat targeting your organization and the potential for existing online information to act as a roadmap for penetration and data exfiltration.  The assessment examines data points as indicators, patterns, or signatures.  Treadstone 71 then balances the risk of operational failure against the cost of O-OPSEC measures.  The assessment includes the:

Consideration of the impact of an OPSEC measure on operational efficiency.

Considering the probable risk to strategic mission success (effectiveness) if your organization does not implement O-OPSEC countermeasures.

Considering the probable risk to mission success if O-OPSEC countermeasures do not work.

Deciding which, if any, O-OPSEC measures to implement and when to do so.

Checking the interaction of O-OPSEC measures. Ensure that a measure to protect a specific piece of critical information does not unwittingly provide an indicator of another.

Apply appropriate countermeasures to deny information of specific intentions, capabilities, and activities.

               Detect credible threats

               Detect instances of deception in intent or action

               Develop assessments for the target area of interest

               Develop pattern matrices

               Create reference documents

Implement measures that require immediate action.  This applies to current operations as well as planning and preparation for future ones.

Document or task O-OPSEC measures

Brief O-OPSEC requirements to senior leadership, stakeholders, marketing sales, and other personnel.

Monitoring of O-OPSEC measures during execution and after.

Monitoring is a continuous process of evaluating intelligence and counterintelligence.  It is necessary to monitor countermeasures for effectiveness because unevaluated countermeasures can lead to a false and dangerous sense of security.

Making adjustments to improve the effectiveness of existing measures.  These adjustments are necessary to obtain the best protection for your online persona.

Contact Treadstone 71 to learn more about the Online Operational Security Assessment Service – This email address is being protected from spambots. You need JavaScript enabled to view it. – 888.714.0071


Search Our Site

Treadstone 71 YouTube Channel 



The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Online Cyber Intelligence Training Center for online courses

Jan 14-18, 2019 Cyber Intelligence - Amsterdam, NL

Cyber Intelligence Tradecraft Certification - Reston, VA March 4-8, 2019           

Cyber CounterIntelligence Tradecraft Certification - Reston, VA March 11-14, 2019

Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively): AIB, American Express, Capital One, NATO, Belgian Military Intelligence, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, Dutch Police, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA



"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”


Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks



Treadstone 71 Cyber Intelligence Services

Treadstone 71 at Blackhat


Treadstone 71 New Services - Analysis as a Service

Cyber Jihad - 2008-2011 Compilation Part 1

Cyber CoiunterIntelligence Doctrine

Iran Cyber Proxies and Capabilities 

The Irari Report

Gaming as a Method of Jihadist Training

Treadstone 71 Keynote

Treadstone 71 Fox News

Treadstone 71 Hacktivity