0 0
Read Time:54 Second

TBOCBack in September of 2011 not long after the 10th anniversary of 9/11, I was afforded an opportunity by Secureworld Expo to give a luncheon keynote on Online Gaming as a Method for Jihadist Training. The presentation had been sitting gathering dust for nearly two years prior to the keynote and has been sitting gathering more dust since the delivery in Santa Clara.

Cyber Jihadists, the Taliban and other extremist organizations continue to hone their skills and have been using online gaming as a method to improve operational efficiencies in the field. This presentation discusses the brief history of this evolution and the use (as Treadstone 71 has been stating for years) of our infrastructure and technology against us.  What should be of significant interest is the evolution to highly effective and efficient technologies that are used to train for missions and analyze mission results. The same methods and tools used by Western Military.

The file is in PowerPoint Show format.

Regards,

Treadstone 71

Gaming as a Method for Jihadist Training (downloadable PowerPoint Show)

http://youtu.be/J4Ra5wl0saY (YouTube version)

tbocganjgalvbs2

t71arabic

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence