persona,

  • The legal issues notwithstanding, offensive cyber actions are the only way we are going to get our adversaries to pay attention. Whether they are cyber criminals, foreign intelligence services, cyber proxies, hackers, hacktivists, or some other such adversary, we need to do more than just stand and take a beating. Read the blog here: http://blogs.csoonline.com/security-leadership/2469/caution-not-executing-offensive-actions-against-our-adversaries-high-risk 

  • Cyber Intelligence Training

    This five-day course examines Sherman Kent’s Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students will be able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course. In addition, students will understand the use methods of only anonymity, the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations to assist in online operational security and in their defense against adversaries. The course is a combination of lecture, hands-on and student deliverables seen by many as an apprenticeship.

    Upon completion of the course, each student will be able to:

    T71Training

    1. Identify the differences and intersections between open source data, open source information and open source intelligence
    2. Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course
    3. Understand the use of online anonymity
    4. Understand collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence
    5. Understand the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations for prevention
    6. Understand the basics of Analysis of Competing Hypotheses (ACH) tool and usage
    7. Gain the ability to use open source intelligence tools to target, collect, produce and analyze data points into actionable intelligence.
    8. Understand how to quickly examine the data for new targeting and potential immediate recommendations and/or opportunities
    9. Understand how to gather information based upon provided targets
    10. Understand how to use several OSINT tools for data collection
    11. Understand how to collect, product and analyze data that provides my organization with a valid view of its Cyber-OPSEC posture
    12. Understand what type of information my adversaries know about my organization and how students can use this to enhance organizational security postures and improve prevention through situational awareness

    This class is for anyone wishing to learn about cyber intelligence concepts and methods using open source tools for operational security, infiltration, analysis, recommendations and opportunities presentations, that provide their organizations with an immediate understanding of their Internet attack surface. Students wishing to understand adversarial methods and concepts surrounding the virtual manifestation of the traditional intelligence tradecraft are urged to attend.

    Call today 1-888-714-0071 or email us at This email address is being protected from spambots. You need JavaScript enabled to view it.

  • Treadstone 71 Training 2017  Organizations follow inaccurate definitions of threat intelligence leading to poorly conceived cyber threat intelligence programs. Vendors communicate threat intelligence Reflectionsdefinitions supporting their offerings propagating the fallacy that threat intelligence solves numerous security problems. (updated)

    Cyber Threat Intelligence functions being built on a foundation that is not supported by standard intelligence tradecraft. Many programs support a fraction of the intelligence needs, yet stakeholders hold unrealistic expectations based upon expenditures.

  • This course examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services. 

    T71new2

  • The Beacon Series

     

  • Treadstone 71 Cyber Intelligence Program - Align with the needs of leadership - Force Multiplier Advisory Services

    Years ago, Treadstone 71 crafted a series of training classes at the Master's level for students eager to learn about cyber intelligence. Since then, Treadstone 71 continued to hone the courses to current events and organizational needs.  Organizations need training in cyber intelligence. All too often we find a dire lack of understanding outside of collection. Most organizations have staff that are proficient at collecting data well. But the next steps in the cyber intelligence lifecycle is lacking. Our training solves that problem providing students with the tools necessary to organize, produce, analyze and deliver recommendations and opportunities to leadership.  

     

  • Treadstone 71 trains, advises and builds cyber intelligence, threat, business, and competitive intelligence programs. Since 2002, Treadstone 71's footprint is the basis for many intelligence programs.

    Half Moon Bay, CA – February 8, 2017 - Treadstone 71 announced today enhancements and expansion of their industry leading Force Multiple Intelligence Advisory Services. “Our services deliver actionable intelligence to consumers enabling proactive threat mitigation strategies,” said Jeff Bardin, Chief Intelligence Officer for Treadstone 71. “The intelligence community proven methods, structured techniques, and Kent/Heuer-based procedures increase client awareness of their threat posture while supporting rapid response to their cyber incidents.”

    The Treadstone 71 Force Multiplier Intelligence Advisory Services clarifies the cyber threat intelligence strategy while illuminating a path for tactical implementation. In developing this strategy, we adhere to guiding principles. Principles validated when building-outthreat intelligence programs from Arizona to Australia. The Treadstone 71 advisory services enable:

  • ONLINE and CLASSROOM OPTIONS

    Online sign up coming soon (www.planetreg.com/T71inteltraining)

    The Treadstone 71 Cyber Intelligence, Threat Intelligence, Cyber CounterIntelligence training courses follow standard intelligence community lifecycle including collection methods, techniques, planning, PIRs, and collection tools and targeting with a focus on intelligence analysis. Intelligence production methods and process flows are covered as well as evidence credibility, reliability, denial and deception, and confidence levels. Students are required to demonstrate understanding and use structured analytic techniques as well as various types of analysis including synthesis and fusion of data and information into actionable intelligence. Learn the tradecraft taught in the US Intelligence Community. 

     Sign up for courses here

Search Our Site

Treadstone 71 YouTube Channel 

T71Circle

 

The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Online Cyber Intelligence Training Center for online courses
June 18-22 Cyber Intelligence - London
Jul 31-Aug 3 Cyber Intelligence Tradecraft Las Vegas - PRE-BLACKHAT
Aug 13-17 Cyber Intelligence- Reston, VA
Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland

Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively): AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

T71new3

ON THE TREADSTONE 71 CYBER INTELLIGENCE TRADECRAFT TRAINING:

"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”

T71new4

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks

 

 

Treadstone 71 Cyber Intelligence Services

Treadstone 71 at Blackhat

  

Treadstone 71 New Services - Analysis as a Service

Cyber Jihad - 2008-2011 Compilation Part 1

Cyber CoiunterIntelligence Doctrine

Iran Cyber Proxies and Capabilities 

The Irari Report

Gaming as a Method of Jihadist Training

Treadstone 71 Keynote

Treadstone 71 Fox News

Treadstone 71 Hacktivity