Analysis as a Service from Treadstone 71

Analysis as a Service from Treadstone 71
Retainer Targeted Research and Analysis Service

Many in the marketplace today serve up data and information as intelligence. They focus almost exclusively on collection and collection feeds to some sort of visual tool that presents pictures of links, some with trends and a few with patterns and tendencies. They call this analyzed intelligence. However, we know that intelligence analysis requires significant skill. These are skills that almost all do not have since they do not recognize what intelligence analysis really is. Treadstone 71 is experienced and skilled at intelligence analysis. Our methods followed traditional structured analytic techniques that require patience, perseverance, aptitude, and skills. Attributes highly sought after in the industry but seldom found. Treadstone 71 drives research and extracts data from both the surface internet and the darknet.

  • Treadstone 71 uses analytic tradecraft and standards, including alternative analysis, new analytic tools, and techniques, driving collaboration amongst collectors/researchers, analysts and stakeholders.
  • Provide stakeholders with collaborative and transparent views of our analysis.
  • Prepare stakeholders, principals, and clients with the intelligence needed to make decisions.
  • Use subject matter experts to fill collection and analysis gaps.
  • Treadstone 71 helps you determine the state of the collection, analysis, or intelligence operations resource gaps.
  • We develop and publish intelligence that identifies and formulates strategies to mitigate gaps; advise stakeholders of gaps, mitigation strategies, progress against the strategies, and assessment of the effectiveness of both the strategies and the closing of the intelligence gaps.
  • Treadstone 71 helps your intelligence team Influence organizational policy development and strategy implementation for information security, risk, and governance.
  • We develop analytic production strategies in concert with your cyber threat intelligence team ensuring the examination of major shortfalls on your target areas of responsibility within a collaborative community of interest.
  • We assess, evaluate, and determine the state of analysis by assessment of the quality of analysis and ensure you conduct competitive and alternative analysis on high-priority topics.
  • Identify research and developmental opportunities to defend, advocate for, and institute justifications for continued, additional or dedicated funding.
  • We help you liaise with internal intelligence communities to drive greater intelligence integration, perform outreach, and give resources and priority attention to targets.
  • We direct and oversee advocacy initiatives to integrate and optimize contributions from current and planned technical, analytic, and openly available sources.
  • We enable you to manage a professional staff in successfully defining and managing complex programs and projects that may include ill-defined requirements, ambiguity, parallel tasks, multiple dependencies, high risks, and multiple interfaces; ensure timelines, costs, deliverables, and the achievement of defined outcomes according to approved plans.
  • Treadstone 71 teaches and trains you to strive for superior analytical and critical thinking skills, including the ability to think strategically and identify needs, requirements, and develop innovative recommendations and solutions for improvement.

Treadstone 71 Collection and Analysis is not compartmentalized but directly engaged as a single unit. Continuous feedback loops and constant communication ensure rapid changes to collection plans and advanced adversary targeting.

Contact us now to learn more about our annual retainer services tiered for the level of support you need. Treadstone 71 Research, Analysis, and Reporting retainer services provide contextually detailed reports and assessments based on your intelligence requirements and stakeholder needs. We shift quickly. We do not change order you to financial ruin. We deliver intelligence and not daily news.

  • We research sets of standardized queries related to cyber threats for clients on a regular basis (daily, weekly, monthly, quarterly) while producing (peer-reviewed) finished intelligence reports addressing priority intelligence requirements.
  • We provide full cyber intelligence lifecycle support from stakeholder interfaces and management, intelligence requirements definition, collection and research management, planning and execution, data and information production, structured analysis, analysis, and analytic writing and delivery.
  • Track intelligence trends across industries and technologies and generating effective and efficient ways to collect and analyze.
  • Proactively monitor and analyze the cyber battlefield and the assessment of intelligence risk and applicability to the client.
  • We model and analyze the likelihood of emerging threats defining their motivation, impact, and capabilities relative to the organization.
  • We author intelligence advisories, estimates, warnings, executive and strategic reports, and briefs with recommendations to risk and technology team.
  • We enable intelligence sharing and engage with other functions providing input and requirements to influence threat mitigation strategies.
  • Collect and analyze information from various sources, including open-source reports, information sharing partners, and intelligence vendors.
    • We synthesize findings to assess adversary threats to the organization.
  • We develop global technical expertise on threat actors, attack trends, and attack tactics, techniques, and procedures (TTPs) while leveraging 30 years of expertise to identify novel techniques and their ability to bypass common security controls.
  • Provide situational awareness on the current threat landscape and the TTPs associated with specific threats to your business.
  • Conduct trending and correlation of cyber intelligence for the purposes of attribution and set up strategic countermeasures.
  • We create procedural, intelligence-driven internal, and external interfaces with stakeholders and teams building RACI models and clear methods of communication.

We collect - We organize - We decompose - We prioritize - We analyze - We think - We report - We deliver - Iterative lifecycle methods incorporating objective analysis with intuition and structured methods of analysis - Since 2002

Contact Treadstone 71 for Cyber Intelligence, Cyber Threat Intelligence, and CounterIntelligence Analysis Services

  • High Wealth Intelligence Assessments, Monitoring, and Remediation
  • Cyber Intelligence Attack Surface Assessment
  • Targeted Adversary Research - Research, Warning, Estimative Reporting
  • Targeted Adversary Mitigative and Retributive Operations
  • Information Operations
  • Anonymity and Persona Development
  • Corporate Leadership Attack Surface Assessments
  • Corporate Attack Surface Assessments
  • Customized Targeting and Reporting / Monitoring
  • Culturalnomics - Social-Linguistic-Political-Religious Subject Matter Expertise
  • Deception Planning and Management

Liability Free, Cyber Intelligence Services

Treadstone 71 is your source for Analysis as a Service. We do collect. We do organize and produce but our specialty and focus is on intelligence analysis. Many indicated that they analyze intelligence. Treadstone 71 produces intelligence after analyzing data and information. We create bottom-line-up-front recommendations and opportunities – actionable intelligence. Our process is rigorous yet flexible. Our objectivity upheld as a baseline ethos of the methodology.

Treadstone 71 provides liability free, cyber intelligence services to select clients. We will help you improve your security posture, enhance business acumen, investigate adversaries, verify and validate sources, assess the high value and high-income targets, or examine areas of compromise and exploitation. We use honed cyber intelligence and analysis tradecraft to define and execute priority intelligence requirements from operational planning through campaign execution.

The Treadstone 71 Analysis as a Service you will not find elsewhere. If you are searching for intelligence analysts, come to the shop that focuses on analysis. Uncluttered, focused, skilled – Treadstone 71 Analysis as a Service.

Below is a short listing of our Targeted Research Services:

  • Baseline and foundational research customized to client requirements.
  • Deep-dive intelligence reporting covering cyber threats that are target centric.
  • Adversary reports covering detailed assessments of threat actors, TTPs, patterns, timelines/chronologies
  • Strategic Intelligence Assessments covering business risk issues targeting senior level stakeholders assisting in their decision-making process.
  • Onsite General Intelligence Briefings on current events, actors/adversaries
  • Onsite Customer Intelligence Briefings on targeted topics which may include STEMPLES Plus and Indicators of Change
  • Onsite Report Clarification Briefings - General and Customized by Bronze/Silver/Gold
  • Sensitive Intelligence Briefs (TLP Orange and Red)

Please complete the Contact form to receive the Data Sheet

Contact Treadstone 71

Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.

Please type your full name.

Invalid Input

Invalid Input

Invalid email address.

Please tell us your area of interest.

Invalid Input

Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence

Strategic Intelligence Analysis
Forecasting, Estimative and Warning Intelligence

In-Person - 5 days

The Strategic Intelligence Analysis, Forecasting, Estimative, and Warning Intelligence (online and in-person) course follows the iterative processes of the intelligence lifecycle. Strategic analysis requires a breakdown of the complexity’s analysts face during data examination. Keeping the analysis and results relevant is difficult. Analysts need to find ways to organize, rank, and present their findings. Analyst’s always keeping a close eye on what the findings will mean to the stakeholders.

Stakeholders need to understand that analysts always work with incomplete and fragmented data. Adversaries work hard to deny analysts the data. Their methods include various types of deception.

This course provides analysts with a framework reducing many of the problems faced with fragmented data.

This course covers the following non-inclusively:

Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence  Relevant actors and their capabilities
Data, Information, Knowledge, and Intelligence Inference
Knowledge Generation Adversary Courses of Action (CoA)
Explicitly versus Tacit Knowledge CoA advantages and disadvantages
Principles of Knowledge Management Likelihood and probability in Adversary CoA
Monitoring your Business Environment Patterns, Trends, Tendencies
Analysis Projects Estimative Intelligence 
Analysis Cycle The Role of Warning Intelligence
Briefing Key Warning Factors in Preparations
Collection Planning What Is Warning?
Collecting from Unsuspecting Sources Indicator Lists: Compiling Indications
Collection from Public Domain  Fundamentals of Indications Analysis
Collection from Images Use of Indicator Lists
Collection from Things Extracting Indications Data
Collection Outsourcing Indications Chronology
Analysis Specifics of the Analytical Method
Introduction How Might they Go to Cyber War?
Attributes of strategic analysis Cyber Order of Battle Methods
Collector - Analyst Relationship Analysis of Cyber Mobilization
Collector-Analyst Differences Recognition of Cyber Buildup
Corporate Alignment Preparation for Cyber Warfare
Organizing a Strategic Analysis Function The preoccupation of Leadership / Stakeholders
Organizing a solid team Cyber Readiness
Towards a world-class strategic analysis org Magnitude and Redundancy of Preparations
Profile of an analyst Cyber Wargaming
Forecasting What is a Cyber Wargame
Multiple Scenarios Generation Why run a Cyber Wargame
Scenario analysis Principal Factors in Timing and Surprise
Influencers Examples of Assessing Timing
Link Analysis and Centrality Warning is Not a Forecast of Imminence
Estimates for future planning The Problem of Deception                                 
  Case Studies and Hands-on


This course teaches students how to think independently and stay away from the low level tactical approaches we see in daily reports. Strategic, big-picture reviews and assessments that incorporate the social, technical, economic, military, political, legislative, educational, and security, plus demographics, religion and the psychometric (STEMPLES Plus) aspects of an adversary are lost in today's world of current news posing as intelligence.  Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations, analytic products, templates, course material—40 CPEs. Books provided by Treadstone 71 with some required read-ahead activities.

In-Person - 5 days

Treadstone 71 Training Justification

Subject: Request to Attend the Treadstone 71 NAME OF COURSE training

Dear [Decision Maker Name],

The Treadstone 71 Certified Threat Intelligence Analyst training takes place INSERT START DATE through INSERT END DATE at the LOCATION NAME in CITY, STATE, or COUNTRY. The training offers INSERT NUMBER OF DAYS of educational training from a former intelligence community professional. Intelligence professionals regard this class as the world’s leading training program for cyber and threat intelligence professionals. Therefore, I would like to request approval to attend, as I believe it will further develop my threat intelligence skills and build knowledge around greatly improving our cyber threat intelligence program.

The training offers comprehensive, innovative educational sessions following Intelligence Community standards from the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training:

  1. Introduction to Intelligence
  2. Critical Thinking
  3. Analytic Writing
  4. Creative Thinking
  5. Analytic Briefing
  6. Structured Analytic Techniques.
  7. Analytic Issues
  8. Argument Mapping
  9. Case Studies

The course covers critical intelligence skill areas and emerging threat intelligence concepts facing our organization.

If I attend, I’ll receive:

  • Over INSERT NUMBER OF HOURS of educational training and INSERT NUMBER OF CPEs.
  • Hands-on with the latest open-source intelligence tools.
  • Review of normally paid threat intelligence feed solutions (Intel471 and Recorded Future) while in the class.
  • Operational security concepts, including a 30-day VPN license.
  • Intensive training on:
    • Stakeholder Analysis
    • Collection Planning
    • Collection Activities and Targeted Collection
    • Intelligence Requirements Development
    • Open Source Intelligence Methods
    • Adversaries and Campaign Analysis
    • Structured Analytic Techniques for Intelligence
    • Methods and Types of Analysis
    • Analytic Writing and Peer Review
    • Analysis, Reporting, and Dissemination
    • Mitre ATT&CK Analysis and Comparisons
    • Forecasting and Estimative Reporting
    • STEMPLES Plus Strategic Intelligence
    • Synthesis and Fusion Methods.
    • Advanced Adversary Targeting and Campaign Analysis
    • Strategic Intelligence Analysis
  • I’ll also have the chance to understand the methods used in intelligence agencies from an intelligence professional who has been teaching this course for 11 years.
  • I’ll benefit from the instructor’s years of passive data collection on adversaries while maintaining operational security while networking with other students on their experiences in intelligence.


The approximate investment for my attendance is as follows (complete the information as appropriate):

Travel costs


Accommodation (### nights at (DOLLARS xxx/night*)


Full Training Pass (for ### days)


Payback: Our ROI

I believe the insights learned by Treadstone 71 Training will help speed incident response resolution, assist security operations in gaining insights into our cyber adversaries, and enhance our cyber threat intelligence program with intelligence community skills and knowledge. The cost of the course seems a small price to pay for actionable intelligence to help our business combat cyber threats and the reputational damage that results from even a minor compromise. Other courses from other companies in this field charge at least 25% more and usually 30-35% more and you get less from those courses.

When I return from the Treadstone 71 training, I will compile a short presentation covering what we covered in the class, applicable functions to consider for immediate use, methods of collection, how best to use analytic methods, and ways to quickly improve our written products.

[Add standard sign off]

Contact Treadstone 71 Today for all your Cyber Intelligence needs.