Certified Cyber CounterIntelligence Analyst

By starting with traditional counterintelligence and progressing to cyber counterintelligence, the student will develop an appreciation for collection efforts, exploitation of potential threats, insider concerns, and the risks and benefits of counterintelligence.

With the expanding importance of the comprehensive and timely need for intelligence for nations as well as businesses, the student will explore the essential elements that make up the intelligence cycle with a focus on how these pivotal points are exploited. As part of this class, the exploration of the continued importance of critical thinking, as well as out-of¬the-box analysis, will be heavily leveraged to improve the critical-thinking skills of the students. As cyber topics continue to evolve, the increased importance of cyber intelligence is growing and as such the protection of our intelligence cycles will expand as well; emphasizing the growing need to ensure our processes are not compromised in a cyber-dominated landscape. Cyber Counterintelligence is one aspect and possibly one of the most crucial topics at the core of protecting our collection efforts. The potential for active defense or offensive cyber counterintelligence operations will be covered.

The course will rely heavily on individual research and group discussion to explore the world of cyber counterintelligence, and where applicable, make use of the student’s ability to do independent thinking and analysis of in-class problems assigned through weekly discussion threads. This course focuses on open source intelligence and adversaries while creating online personas to assist in data collection and information extraction. This introductory course examines open-source intelligence collection as well as the availability and use of OSINT tools. Students will be able to understand the use methods of only anonymity, the fundamentals behind cyber persona development, enrollment in various social media sites and applications, and how these current methods can be employed in their organizations to assist in operational cybersecurity, their defense against adversaries, and passive data collection. The establishment of cyber personas takes patience and time to create a credible resource. Parallel activities occur through the outline above. Treadstone 71 maintains separation from the client as required maintaining confidentiality of methods and processes.

What we cover non-inclusively:

Cyber Infiltration, Information Operations, Information Support Operations National Counterintelligence Strategy, Standard Glossary and Taxonomy, Mission-Based Counterintelligence, Counter Collection and Anticipation, Denial and Deception, Counter-Denial and Deception, Cyberspace, Open Source Intelligence, Methods of collection, Specific tools, Social media sites, and enrollment, Methods of Social Media Research, Tools and Techniques, Social media demographics, Establish Priority Intelligence Requirements, Establish Information Requirements, Cyber Target Acquisition and Exploitation, Validation of target, Identify active adversary campaigns, Intent, Motivation, Goals, & Requirements, Passive data collection, Campaign development, Target sites, Enrollment, Tactics, techniques, and procedures, Intent, motivation, goals, and requirements, Vectors of approach, Courses of action, Elicitation and exfiltration. Generative Adversarial Networks – Deep Fakes

Perception as Deception, Social Psychology, Differences in Culture, Diversity, Hofstede Dimensions, Social Psychology, Reciprocity, Consistency, Social validation, Liking, Authority, Scarcity, Big 5 Theory of Personality, Information Warfare and Cyber Psychological Operations, Target analysis and message manipulation where applicable, Persona creation, establishment, maintenance, expansion (depending upon taking Cyber Intelligence Course), Data collection – recycle for Cyber CI updates/improvements, Authoring of blogs and articles for influencing, Placement of specific concepts and phrases. Myers-Briggs with the Evil Side and Under Pressure manipulation

The Cyber Persona Layer, Persona creation and implementation, Cyber Persona Development and Maintenance, Character archetypes, leveraging existing, create new, Establish the storyline, Establish the plot synopsis, Story weaving, and management, Snuggling, Collection, Linkages, trends, tendencies. Forum manipulation, fabrication, and controlling the narrative.

Target profiles – dossiers, Target gap analysis, Define the mission so that it aligns with organizational objectives, Clandestine Collection Operation, Surveillance, Counter Surveillance, CI Activities, CI Analysis and Production, CI Analysis Reporting, Support Brief, Source Evaluation, Operational analysis report, Asset Evaluation, Support Package, CI Assessment, CI Campaign, Mission, Mission Management, Operations, Effects-Based Operations, Functions and Services

Socio-cultural awareness, Forty-Four online dirty tricks, Methods to Disagree, Avoid/Deny/Invoke, Cialdini’s Principles, Rules of Disinformation, Social Engineering, Propaganda, Fallacies and Prejudices, Conversation Manipulation, Deception Planning, Deception Cycle/Chain, Deception Objective, Deception Methods, Target’s Vulnerabilities, Deception Effects, Target’s Decisions, and Actions, Deception Principles, 10 Steps to Planning, Deceptive Course of Action, Denial and Deception Tactics and Techniques, Rules for Radicals, COINTELPRO, Iterative Feedback, Addressing Failure, Unwanted Effects.

CI Insider Threat, Investigations, Prepare an estimate of the situation, Prepare the plan, Support Plan, CyberMedia selection, Internet OPSEC, Product development, Pretesting – determines the probable impact on the target audience, Production, and dissemination of material, Implementation, Post-testing – evaluates audience responses, Feedback, Ten Commandments of Cyber Counterintelligence, Research and analyze methods of influencing adversaries from a variety of information sources. Case Study Deliverables.



1 Comment

Comments are closed.