Social network targeting, data collection, production, analysis and reporting is very much center stage at Treadstone 71. Intelligence of any type must be applied if it is to be useful, and it needs to be actionable. In most cases, this implies that the intelligence has to be transmitted, communicated, shared and delivered with clear recommendations and opportunities to the client.
Treadstone 71 integrates counterintelligence and cyber counterintelligence as extracted and analyzed from social networking and other Web 2.0 sites. We have taken the physical tradecraft of intelligence and applied cyber methods to this mature discipline. We help organizations recognize how they are being targeted for intelligence collection purposes and, provide cyber counterintelligence support and services to defend against this threat.
Cyber Security Predictions - Not Even Reality TV - Just Daytime Entertainment
Published: Monday, 09 January 2017 17:02
The plethora of 2017 cyber security predictions do nothing but distract practitioners from executing actual controls and methods of defense and prevention. Each year we get slammed with predictions that are never followed, are common sense, and serve to market and sell products and services. The so-called information and cyber security experts, many times self-proclaimed, spew predictions on all potential areas. This is not much more than fake news and methods to direct readers to vendor products. The vendor products that claim to solve these predictions and therefore, become self-fulfilling prophecies. For the most part, once the predictions are published, the follow-up to their success is non-existent. Their purposes are to market and sell, drive perception, manage the market, and drive a false sense of vendor expertise.
We should focus on actual problem resolution and change the failed paradigm within which security exists. We continue to propagate vendor products and services that do not work, only treating the symptoms. This is not much different from the pharmaceutical industry that markets pills to you each evening during the news and prime time. Pills that treat symptoms and cause more side effects than they do solve issues. Advertisements that drive up the cost of the product manipulating the market and those that prescribe the 'solutions' to recommend purchase.
The only way we change this paradigm, and I mean we, is to push back on these vendors to solve problems and quit selling products that treat symptoms. We must also correct our own internal behaviors. A few weeks ago, I published a potential list of 12 items to change this paradigm (the 12th is a shameless plug so 11). They are listed below.
We need to forget the Jerry Springer-like entertainment of annual cyber predictions and focus on solving the hard problems we face.
What does Treadstone 71 seek? We seek an end to the noise and an understanding that our information, our intellectual property, and our way of life is under constant siege. We are in a cyber war with skirmishes and battles occurring 24x7. We need to direct the carpetbagging vendors to cease in their war profiteering and take a moral stance in fighting our adversaries. We also need to correct and adjust how we run IT and information security. The list of 11 is below. We welcome your comments, your additions, and your assistance in this call to action to change the failed paradigm.
When should you strike back? Is attribution the onliy factor?
Ten Commandments of Cyber Counterintelligence
Published: Tuesday, 10 January 2012 19:55
Be Offensive Cyber CI that is passive and defensive will fail. We cannot hunker down in a defensive mode and wait for things to happen. We are spending far too much money on signature-based solutions, incident response, event monitoring, and other purely defensive measures to protect our sensitive data. That is not how we have been hurt in recent years. Cyber espionage is destroying us. Our Cyber CI mindset should be relentlessly offensive. We need to go after our Cyber CI adversaries. They are not prepared for this. It is not cost effective for many of them to defend.
Treadstone 71 Force Multiplier Intelligence Advisory Services Available to Global Customers
Published: Monday, 06 February 2017 16:19
Treadstone 71 trains,advisesand builds cyber intelligence, threat, business, and competitive intelligence programs. Since 2002, Treadstone 71's footprint is the basis for many intelligence programs.
Half Moon Bay, CA – February 8, 2017 - Treadstone 71announced today enhancements and expansion of their industry leading Force Multiple Intelligence Advisory Services. “Our services deliver actionable intelligence to consumers enabling proactive threat mitigation strategies,” said Jeff Bardin, Chief Intelligence Officer for Treadstone 71. “The intelligence community proven methods, structured techniques, and Kent/Heuer-based procedures increase client awareness of their threat posture while supporting rapid response to their cyber incidents.”
The Treadstone 71 Force Multiplier Intelligence Advisory Services clarifies the cyber threat intelligence strategy while illuminating a path for tactical implementation. In developing this strategy, we adhere to guiding principles. Principles validated when building-out threat intelligence programs from Arizona to Australia. The Treadstone 71 advisory services enable:
Treadstone 71 on CBS News Live with Vlad Duthiers:
Well designed and planned! The Russian concept of maskirovka has expanded from traditional military aspects of denial and deception to information warfare and cyber psychological operations. Imagine you have hacked a target not knowing exactly what you will find. The plan is to extract information from the initial target, examine the information, recalibrate, replan, while setting new actions of disinformation in play. The data inside the DNC emails has not yet been fully exploited. Who knows what data was in those emails. It would be smart for the DNC and other US officials to examine every syllable of every word to determine what was exposed, determine what the Russians may do with this data, and plan to counter the deception that will come from the Russians proactively. The hacking was but one facet of a larger plan by Putin and his inner circle to disrupt, deceive, influence, and exploit weaknesses in the US including political and social beliefs and movements. Their actions have been very useful to Putin and his oligarchs.
Daesh Specific News - CyberReconnaissance
Published: Thursday, 20 November 2014 19:25
Cyber Shafarat - Blog - CyberReconnaissance Daily News
Published: Thursday, 20 November 2014 14:46
The Cyber Shafarat - Check out what is trending. Syrian Electronic Army Posts 1-11 with a 80GB data dump - Cyber Remediation of Daesh, Urban Cyber Warfare. The Cyber Shafarat
One stop news source includes data points, open source intelligence, cyber intelligence with a focus on the Middle East. Customized advisory services, research/warning/estimative/threat and targeted intelligence. Structured analytic techniques and offensive cyber actions. Subject matter expertise in cyber socio-cultural techniques and methods. Follow Cyber Reconnaissance to stay abreast of the latest info. At your fingertips for free. Timely, Relevant, Useful.
The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers. Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft. This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team. – Antonio
Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly
Students and organizations taught (non-inclusively):
AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).
ON THE TREADSTONE 71 CYBER INTELLIGENCE TRADECRAFT TRAINING:
"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS. SANS does not compare. They are more of a class mill today. The Treadstone 71 course material is unique, focused, and timely."
“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”
Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’
He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.