INSA Opens Nominations for 2017 Achievement Awards

Members of the intelligence and national security communities are encouraged to nominate their peers and partners from government, private industry, and academia for the 2017 Achievement Awards, the Intelligence and National Security Alliance (INSA) has announced. The Achievement Awards recognize up-and-coming leaders and mentors serving or supporting the U.S. national security mission.

Read More
Heading - T71

Treadstone 71 Cyber Intelligence, Counterintelligence, and Target-Centric OSINT Course Overviews

“With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real world scenarios establishing a solid understanding on utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional.”

Read More
kstateU

Drone Attack! Swarm with Hazardous Waste Payload

Prepare drone swarm operators before handling radioactive payloads
Begin taking iodine pills
Saturate thyroid to block uptake of radioactive iodine
Drink red wine before and after exposure
Protects chromosomes from radiation damage
Drink green tea before and after exposure
Inhibits intestinal absorption of Strontium-90
Apply essential oils to exposed skin on the day the radioactive payloads are placed in the attack drones

The Treadstone 71 Difference

What Treadstone 71 provides is a full-spectrum solution that takes the information you provide in your SOC and incident response functions combining that with complete political, economic, social, technological, environmental, legislative, industrial, educational, and religious aspects of the adversary as well as adversary dossiers and organizational structures.

Read More
cyberintelprogram

The Treadstone 71 Cyber Intelligence Program

Threat Intelligence Program Development
Improve and provide feeds for automation and remediation
Security operations
Enhance and improve remediation actions
Centralize threat intelligence – Intelligence as a Service – Analysis as a Service
Drive improvements to risk management
Effective
Efficient
Improve workflow through well-defined roles and responsibilities
People, process and technology enhancements
Drive the quality improvements of your intelligence
Credibility and relevance