Brief on Russian Hacking Activities

The Russian hacking efforts against the West is well designed and planned. The Russian concept of maskirovka has expanded from traditional military aspects of denial and deception to information warfare and cyber psychological operations. Imagine you have hacked a target not knowing exactly what you will find. The plan is to extract information from the initial target, examine the information, recalibrate, replan, while setting new actions of disinformation in play. We believe that the data inside the DNC emails has not yet been fully exploited. It would behoove the DNC and other US officials to examine every syllable of every word to determine what was exposed, determine what the Russians may do with this data, and plan to proactively counter the deception that will come from the Russians.  The hacking was but one facet of a larger plan by Putin and his inner circle to disrupt, deceive, influence, and exploit weaknesses in the US including political and social beliefs and movements. EU countries are also targeted especially those with upcoming elections. Their actions have been very effective.    Treadstone 71 Training 2017

maskirovka kartinki smeshnye kartinki fotoprikoly 4431342791



There is a collective lack of institutional memory among target audiences, namely the West – a significant proportion of which had not even been born when Soviet subversion was a concern – therefore, they don’t have the level of knowledge and subsequent paranoia of baby boomers who used to hide under their classroom desktops in atomic bomb drills. Russia has invested hugely in enabling factors to adapt the principles of subversion to the internet age. These new Russian investments cover internally and externally focused media with a substantial online presence, of which RT  and Sputnik are the best-known but only two examples; Use of social media and online forums as a force multiplier to ensure Russian narratives achieve broad reach and penetration; and language skills, to engage with target audiences on a broad front in their language.



You may even find funding through shell companies that eventually use Western PR firms to place pro-Russian ads in US media. (Ketchum)

Past examples of maskirovka that are not to be forgotten:

  • Soviet military units designated for the Cuban assignment were told that they were going to a cold region. They were outfitted with skis, felt boots, fleece-lined parkas, and other winter equipment.
  • Officers and missile specialists traveled to Cuba as machine operators, irrigation specialists, and agricultural specialists.
  • Missiles were shipped from 8 Soviet ports to hide the size of the effort (loaded at night)
  • Missile crates and launchers were shielded with metal sheets to defeat infrared photos.
  • Ships had autos, tractors, and harvesters top deck.
  • False bills of lading and cargo records – tonnage declared well below actual weight. Cuba is not listed as the destination.
  • All agricultural gear unloaded in Cuba – daytime
  • All else unloaded in Cuba – nighttime
  • Radio Moscow regularly report USSR supplying Cuba with machine tools, wheat, and agricultural machinery – fertilizer
  • Soviets leaked accurate information through counterrevolutionary Cuban groups in the US. Information the US discounted since groups were not seen to be credible.Maskirokva principles
  • Soviet diplomats assured the US no intention of offensive weaponry in Cuba

Russia under Putin is a large business conglomerate looking to establish political hegemony over oil producing companies in the Middle East.  Putin drives his economy through oil and gas. Establishing business relationships with large US and other Western companies is part of his plan to influence US policy.

The Syrian effort was as much to protect Assad as it was to ensure the Russian version of the oil and gas pipelines were preserved.

The populist movements serve to drive isolationism in Western countries and NATO at a time when Russia is expanding its footprint.

Going back to maskirovka, Putin is maneuvering to gain a positional advantage against the West. 

Maskirovka—the art of deception—to elevate the complete set of actions and conditions that fall short of war that enables battlefield victories to be decided before tanks and infantry close in battle, what he did in the Crimea.  It is Maskirovka, and the complementary technological changes related to the Internet, social media, lies and propaganda that somehow is being called ‘fake news,’ to be taken as gospel.

Treadstone 71

Search Our Site

Treadstone 71 YouTube Channel 



The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Online Cyber Intelligence Training Center for online courses

Jan 14-18, 2019 Cyber Intelligence - Amsterdam, NL

Cyber Intelligence Tradecraft Certification - Reston, VA March 4-8, 2019           

Cyber CounterIntelligence Tradecraft Certification - Reston, VA March 11-14, 2019

Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively): AIB, American Express, Capital One, NATO, Belgian Military Intelligence, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, Dutch Police, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA



"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”


Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks



Treadstone 71 Cyber Intelligence Services

Treadstone 71 at Blackhat


Treadstone 71 New Services - Analysis as a Service

Cyber Jihad - 2008-2011 Compilation Part 1

Cyber CoiunterIntelligence Doctrine

Iran Cyber Proxies and Capabilities 

The Irari Report

Gaming as a Method of Jihadist Training

Treadstone 71 Keynote

Treadstone 71 Fox News

Treadstone 71 Hacktivity