0 0
Read Time:2 Minute, 21 Second

AUGUST 3-6, 2022 – LAS VEGAS, NEVADA

COURSE OUTLINE – NON-INCLUSIVE

vegas.jpg

The course is a hybridized intelligence and counterintelligence course geared towards executing cyberspace operations through structured methods. Students gain practical hands-on skills in cyber militias and foreign legions, space operations, weaponizing conspiracy theories, using disinformation to control narratives, jihadist online operations and locations, and cryptocurrency scams and cash-out schemes, non-inclusively. The course concludes with a program maturity review, competency models for analysts and collectors, and a maturity tracking model for goals and objectives based on the maturity assessment.

LAS VEGAS AUGUST 3-6, 2022

Anonymity and Passive Persona setup – Clandestine Cyber HUMINT
Glossary and Taxonomy
Operational Security – OPSEC
What Intelligence Can and Cannot Do
Open-Source Intelligence Techniques and Tools
OSINT Tools for Data Manipulation
Stakeholder Analysis
Intelligence Requirements to PIRs
SPECIAL TASKING
Strategic Intelligence Analysis
STEMPLES Plus – Hofstede Principles – Indicators of Change
Strategic Cyberspace Operations
Influence Operations
Counter-Influence Operations
Enhanced Situational Awareness
Space Operations
Adversary Targeting – D3A F3EAD
Time Sensitive Targeting
Collection Methods and Techniques
Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs
Collection Process Flow – Collection (OSINT) Tools and Targeting
SPECIAL TASKING
Identification and collection of adversary handles and relative data – OSINT / darknet / social media
Adversary Denial and Deception
Data assessment and analysis
Deception detection – Counter-deception planning and execution
Course of Action Decision Points
Offensive Cyberspace Operations Through Narrative Control
Hunch.ly and Use of Maltego – overview
Darknet Sites of Interest
SPECIAL TASKING
Social Media – Off the beaten path review of social media platforms not in the mainstream
Adversary use of social media for social engineering
Jihadist Sites and where to find them
Burn phones
Virtualbox
Plugins and Use
Open Semantic Search – Oracle Virtual Box – OVA setup – Tracelabs
Android emulation
Portable Social Media
Cryptocurrency Scams
Cash-out schemes
Wallet tracking
Social media campaigns
Intelligence Lifecycle Production Methods
Structured Analytic Techniques – Their use – Case Study – ACH
Extended Structured Analytic Techniques – In-depth coverage
Source Credibility and Relevance – The real NATO Admiralty Scoring – CRAAP Tool for Relevance
Source Validation – Confidence Levels
SPECIAL TASKING
Disinformation and Conspiracy Theories
Fake, Beyond Fake, and the Misinformation Matrix
Memetic Warfare
Patient Cyber Psyops
Identification, Glossary, Targeted Terminology
Understanding People – Cognition
Terms targeting YOU – The Dunning-Kruger
Trolls and the Dark Triad
The Pitch-Black Tetrad
Weaponizing the Message
Tribalism and Cultism
Cialdini and Social Psych
Vaxx Schedders
Types of evidence
Production Management
SPECIAL TASKING
Creating and using cyber militias
Rapid Training
Militia Members’ Levels of Expertise
Point and Shoot
Cyber Foreign Legion RoE
Cyber dead drops and covert coms
Targeting for trolling
Adversary courses of action
Adjust your fire
Cognitive Warfare
A Cyber Foreign Legion
Critical and Creative Thinking
Cognitive Bias
Analysis and Analytic Writing
FINAL SPECIAL TASKING
Team Maturity Assessment
Skill and Competency Levels
Goals and Objectives – Rapid Creation
SPECIAL TASKINGS REVIEW
Class Review and Wrap-up

SIGN UP HERE

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence