0 0
Read Time:2 Minute, 55 Second

Cutting edge new course from Treadstone 71.

The course is a hybridized intelligence and counterintelligence course geared towards executing cyberspace operations through structured methods. Students gain practical hands-on skills in cyber militias and foreign legions, space operations,weaponizing conspiracy theories,using disinformation to control narratives, jihadist online operations and locations, and cryptocurrency scams and cash out schemes, non-inclusively. The course concludes with a program maturity review, competency models for analysts and collectors, and a maturity tracking model for goals and objectives based on the maturity assessment.

(ISSA MEMBERS SPECIAL PRICING)

  • Anonymity and Passive Persona setup – Clandestine Cyber HUMINT
  • Glossary and Taxonomy
  • Operational Security – OPSEC
  • What Intelligence Can and Cannot Do
  • Open-Source Intelligence Techniques and Tools
  • OSINT Tools for Data Manipulation
  • Stakeholder Analysis
  • Intelligence Requirements to PIRs
    • SPECIAL TASKING
      • Strategic Intelligence Analysis
      • STEMPLES Plus – Hofstede Principles – Indicators of Change
      • Strategic Cyberspace Operations
      • Influence Operations
      • Counter-Influence Operations
      • Enhanced Situational Awareness
      • Space Operations
  • Adversary Targeting – D3A F3EAD
  • Time Sensitive Targeting
  • Collection Methods and Techniques
  • Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs
  • Collection Process Flow – Collection (OSINT) Tools and Targeting
  • SPECIAL TASKING
    • Identification and collection of adversary handles and relative data – OSINT / darknet / social media
    • Adversary Denial and Deception
    • Data assessment and analysis
    • Deception detection – Counter-deception planning and execution
    • Course of Action Decision Points
    • Offensive Cyberspace Operations Through Narrative Control
  • Hunch.ly and Use of Maltego – overview
  • Darknet Sites of Interest
    • SPECIAL TASKING
      • Social Media – Off the beaten path review of social media platforms not in the mainstream
      • Adversary use of social media for social engineering
        • Jihadist Sites and where to find them
          • Burn phones
          • Virtualbox
            • Plugins and Use
            • Open Semantic Search – Oracle Virtual Box – OVA setup – Tracelabs
            • Android emulation
          • Portable Social Media
        • Cryptocurrency Scams
          • Cash out schemes
          • Wallet tracking
          • Social media campaigns
  • Intelligence Lifecycle Production Methods
  • Structured Analytic Techniques – Their use – Case Study – ACH
  • Extended Structured Analytic Techniques – In-depth coverage
  • Source Credibility and Relevance – The real NATO Admiralty Scoring – CRAAP Tool for Relevance
  • Source Validation – Confidence Levels
    • SPECIAL TASKING
      • Disinformation and Conspiracy Theories
      • Fake, Beyond Fake, and the Misinformation Matrix
      • Memetic Warfare
      • Patient Cyber Psyops
      • Identification, Glossary, Targeted Terminology
      • Understanding People – Cognition
      • Terms targeting YOU – The Dunning-Kruger
      • Trolls and the Dark Triad
      • The Pitch-Black Tetrad
      • Weaponizing the Message
      • Tribalism and Cultism
      • Cialdini and Social Psych
      • Vaxx Schedders
  • Types of evidence
  • Production Management
  • SPECIAL TASKING
    • Creating and using cyber militias
    • Rapid Training
    • Militia Members Levels of Expertise
    • Point and Shoot
    • Cyber Foreign Legion RoE
    • Cyber dead drops and covert coms
    • Targeting for trolling
    • Adversary courses of action
    • Adjust your fire
    • Cognitive Warfare
    • A Cyber Foreign Legion
  • Critical and Creative Thinking
  • Cognitive Bias
  • Analysis and Analytic Writing
  • FINAL SPECIAL TASKING
    • Team Maturity Assessment
    • Skill and Competency Levels
    • Goals and Objectives – Rapid Creation
  • SPECIAL TASKINGS REVIEW
  • Class Review and Wrap-up

Validated and registered students will receive login and preparation information 1 week prior to class start.

Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors. This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome

Enrollment Means Training EULA Acceptance – Strictly Enforced

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
100 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence