OPSEC methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type, cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, conspiracy theories, cyber color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war campaigns.
The course covers operational security methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type Descriptions as they relate to personas and cyber HUMINT tactics through campaign development, management, and execution. Additionally, the course includes adversary targeting with cyber D3A/F3EAD and establishing PIRs through the execution of open source and darknet collection. Other material covered: Information warfare, Adversary Targeting, Collection Methods and tracking, counterintelligence deception methods, conspiracy theories, the use of ‘cyber’ color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, setting up and executing cognitive warfare campaigns. Students are required to maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during class time.
The course blends cyber intelligence, counterintelligence, and cognitive warfare, from setup through passive execution. Students learn to build and execute campaigns with hands-on delivery in live environments. We do not use sandbox setups. All execution is live, yet passive.
Pre-class setup includes building VirtualBox environments with software for anonymous collection (OSINT VMs). In addition, Treadstone 71 recommends specific VPNs, browser setup, extensions, minimum necessary laptop specifications, data provenance software, and other tools. Students must also take a few short personality tests to share during class. For US-based course locations, Treadstone 71 provides phones for students to aid with anonymity and persona development.
Students receive training materials, books, Treadstone 71 Reference Guides, CPE credits, and certificates for the work performed. We do not have students take tests based on memorization. Instead, students pass the course through full attendance and execution of all case studies. In addition, practical and pragmatic performance evaluation during the course confirms student knowledge.
The course runs from 7:45-5 PM Monday-Thursday and 7:45-3 PM on Friday. Breakfast and lunch are served daily.
Students need to have a solid understanding of browsers and the Internet.
Course eligibility is limited to US Citizens, NATO member countries, and other US-friendly countries. However, unlike others, we vet each student and do not allow adversaries access to our courses.