Decisions so far:

The identity of the contributor and participant can be anonymized by self-selection and no record other than their IP will be recorded.

A presentation that demonstrates a clear weakness that can be exploited by fraudsters and thieves (in any country).

A submission that is in violation of the laws of the two countries, Iran and the United States, cannot be presented.

How to get selected and timing coming within the next 7 days.

Please email us at if you have any suggestions.

By Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service