• Online Training - Cyber Intelligence - Certified Threat Intelligence Analyst

    Collection Management - Intelligence Requirements - Adversary Targeting

    Certified Threat Intelligence Analyst Course /// Collection Management-Intelligence Requirements-Adversary Targeting Course /// Certified Threat CounterIntelligence Analyst Course /// Structured Analytic Techniques Course /// Analytic Writing Course /// FREE Short Course

  • Adversary Focused  Analysis as a Service

    Adversary Focused Analysis as a Service

    Analysis as a Service Retainer, cyber intelligence, cyber intelligence training, Adversary and Campaign Analysis, Baseball Cards

    Targeted research and analysis using iterative intelligence lifecycle methods incorporating objective intuition and structured techniques. Our collectors are our analysts maintaining context and closeness to the issues. Adversary and Campaign pattern, trending, and tendency assessments. Intelligence Tradecraft applied to the online world.

  • Request for Information - Free Form From Treadstone 71

    Request for Information - Free Form from Treadstone 71

    Request for Information, RFI, Admiralty Scoring, Cyber Intelligence, CounterIntelligence Training, Threat Intelligence, Strategic Intelligence

    The RFI process includes any specific time-sensitive ad hoc requirement for intelligence information or products to support an ongoing event or incident not necessarily related to standing requirements or scheduled intelligence production. Standard requirements for the context and quality of the data requested.

  • Cyber Counterintelligence

    Cyber Counterintelligence Training and Services

    Denial and Deception, Target Acquisition and Exploitation, Elicitation, Memetic Engineering,

    Cyber CounterIntelligence programs using operational security measures, persuasion, reciprocity, the rules of disinformation, target analysis and manipulation, and clandestine operations.

  • Cyber Intelligence Lifecycle Management

    Cyber Intelligence Lifecycle Management - Conscientia

    Cyber Intelligence, Intelligence Lifecycle, Collection, CyberIntellipedia, Cyber Intelligence WIKI, OSINT, Analysis, Reporting

    Complete cyber threat intel program solution enabling information sharing while empowering lifecycle management with a continuous and iterative feedback loop. CounterIntelligence deception planning and execution.Cyber Threat Intelligence Common Body of Knowledge and Capability Maturity Model all driven by Conscientia.

  • Washington, DC Trifecta - September 28 - October 16, 2020

    Cyber Intelligence, Cyber Counterintelligence, Structured Analytic Techniques, Analytic Writing

    Four Courses - Three Weeks - Cyber Intelligence Tradecraft - Enroll one student at full price, all others at 50% off!

  • Strategic Analysis That Drives Prevention

    Intelligence Estimates and Forecasting, STEMPLES Plus, Hofstede Principles, Socio-Cultural Analysis, Geo-Political Event Analysis

    Social, Technical, Economic, Military, Political, Legal, Education, Security, Religion, Demographics, Psychological Country Profiles that feed Quarterly tracked indicators of change. Our collectors are our analysts maintaining context and closeness to the issues. STEMPLES Plus

  • Link Analysis of Various Iran Cyber Operators and Academics

    From indictments and commercial organizations to academia

    The indicted Mojtaba Masoumpour maintained a company with current Iranian academics and cyber security professionals accepted as experts in the field in the US and Europe. (Direct PDF View)

  • The Iranian hacker “Mr.Tekide”

    Crypters used to hide malware used in APT33/34 and others

    For years, “Mr. Tekide” has been well-known as a red flag within international cybersecurity communities. The alias managed to evade being publicly identified despite being deemed a top malware developer and hacker whose crypters –used to conceal malware attacks – used in cyber espionage attacks.

  • CyberIntellipedia - The Treadstone 71 Knowledgebase

    CyberIntellipedia, Wiki, Communities of Interest, Intelligence Sharing, Cyber & Threat Intelligence

    CyberIntellipedia delivers the tools necessary to build a sustainable program. The wiki gives users access to twelve years of effort demonstrating proven success for cyber threat intelligence strategies, operational efficiencies, tactical methods, and technical alignment.

  • Iranian ISP Working for the Ministry of Intelligence

    Iran, MOIS, VAJA, ArvanCloud

    Controlling internet and cell phone access in and out of the country under the guise of DDoS protection and content distribution networks - ArvanCloud

  • Treadstone71 has much more viable intelligence...

    More Viable intelligence over Fireeye and Recorded Future

    After reading several of our postings on cybershafarat.com regarding Iran, we received this:  "I read your article on the discussion with Farzin Karami. That was really eye-opening. Treadstone71 has much more viable intelligence on the Iranian cyber threat landscape than even larger organizations like FireEye and Recorded Future."

Cyber Intelligence Consulting

: Cyber Intelligence Consulting

Maturity assessments, intelligence preparation of the cyber battlefield, cyber threat intelligence program reviews cyber threat intelligence strategic planning, program builds, cyber threat intelligence internal communities of interest, information, stakeholder assessment, intelligence sharing, tabletop exercises, intelligence lifecycle assessment, analytic writing reviews, analysis assessments, and requirements-driven intelligence analysis delivering forecasts and estimates for proactive defense. Up to 36-month cyber intelligence capability maturity model planning. Threat Intelligence Platform RFP development and lifecycle support. At Treadstone 71, our collectors are our analysts maintaining context and closeness to the issues.

Cyber Intelligence Research

: Cyber Intelligence Research

Baseline and Research Intelligence development, Warning Intelligence services, Estimative and Forecasting Intelligence, and High-Value Target research including STEMPLES Plus. Treadstone 71 Intelligence Research Retainer Service - Risk Transference for Passive and Active Collection, Cyber Threat Intelligence Research, Analysis, and Reporting, Adversary and Campaign Research including pattern, trend, tendency, semiotic, analysis and reporting. Adversary Baseball Card (dossier) development, Threat Matrix Development (from research and analysis), Executive Summary Intelligence Reporting. Our Finished Intelligence products directly align to client intelligence requirements and are contextually accurate.

Cyber Intelligence Training

: Cyber Intelligence Training

Lifecycle intelligence tradecraft training since 2008. Cyber Intelligence Training, Cyber CounterIntelligence Training: Analytic Writing, Reporting, & Dissemination, Cyber CounterIntelligence Tradecraft, Certified Threat CounterIntelligence Analyst - Cyber Intelligence Tradecraft, Certified Threat Intelligence Analyst - Collection Manager's Course, Intelligence for the C-Suite - Open Source Intelligence - Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence - Cyber Intelligence Training Course, Structured Analytic Techniques. Intelligence Lifecycle Process Improvement Training. Cyber CounterIntelligence Training Course, Persona Development and Clandestine Cyber HUMINT. Specialized training on request.

Treadstone71 Cyber Threat Intelligence and CounterIntelligence Video Library

Treadstone71 Video Library Contains a Wealth of Information and Media Video Related to Cyber Intelligence

We have gathered and produced a number of videos form the Beacon Series videos on YouTube and interviews with media companies including CBSN, Fox Live, and more. Click the button to view the video library.Cyber Intelligence Training and Cyber Intelligence Training Courses from Treadstone 71

Contact Treadstone 71 Today for all your Cyber Intelligence needs.