0 0
Read Time:2 Minute, 15 Second
Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - Washington Dulles - 3/20-24

WASHINGTON DULLES – 3/20-24

CYBER COGNITIVE WARFIGHTER COURSE

OPSEC methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type, cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, conspiracy theories, cyber color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war campaigns.

Quantity discounts available


Cyber Cognitive Warfighter Training

March 20-24 // Monday-Thursday 7:45-5 PM, Friday 7:45-3 PM.

Washington Dulles Airport Marriott


The course covers operational security methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type Descriptions as they relate to personas and cyber HUMINT tactics through campaign development, management, and execution. Additionally, the course includes adversary targeting with cyber D3A/F3EAD and establishing PIRs through the execution of open source and darknet collection. Other material covered: Information warfare, counterintelligence deception methods, conspiracy theories, the use of ‘cyber’ color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, setting up and executing cognitive warfare campaigns. The course covers the intelligence life cycle from a cyber warfighter perspective.

The course blends cyber intelligence, counterintelligence, and cognitive warfare, from setup through passive execution. Students learn to build and execute campaigns with hands-on delivery in live environments. We do not use sandbox setups. All execution is live, yet passive.

Pre-class setup includes building VirtualBox environments with software for anonymous collection (OSINT VMs). In addition, Treadstone 71 recommends specific VPNs, browser setup, extensions, minimum necessary laptop specifications, data provenance software, and other tools. Students must also take a few short personality tests to share during class. For US-based course locations, Treadstone 71 provides phones for students to aid with anonymity and persona development.

Students receive training materials, books, Treadstone 71 Reference Guides, CPE credits, and certificates for the work performed. We do not have students take tests based on memorization. Instead, students pass the course through full attendance and execution of all case studies. In addition, practical and pragmatic performance evaluation during the course confirms student knowledge.

The course runs from 7:45-5 PM Monday-Thursday and 7:45-3 PM on Friday. Breakfast and lunch are served daily.

Students need to have a solid understanding of browsers and the Internet.

Course eligibility is limited to US Citizens, NATO member countries, and other US-friendly countries. However, unlike others, we vet each student and do not allow adversaries access to our courses.


About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence