OPSEC methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type, cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, conspiracy theories, cyber color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war campaigns.
The course covers operational security methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type Descriptions as they relate to personas and cyber HUMINT tactics through campaign development, management, and execution. Additionally, the course includes adversary targeting with cyber D3A/F3EAD and establishing PIRs through the execution of open source and darknet collection. Other material covered: Information warfare, Adversary Targeting, Collection Methods and tracking, counterintelligence deception methods, conspiracy theories, the use of ‘cyber’ color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, setting up and executing cognitive warfare campaigns. Students are required to maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during class time. We cover persona creation, alignment to intelligence requirements, rules of engagement for passive collection, persona character archetypes, and AI content fillers. Course lectures demonstrate tracking of personas with browser configurations, specific VPN usage, and other heuristics.
The course covers VPN usage, browser setup, browser containers, browser testing for OPSEC leaks, extensions to use for anonymity, minimum necessary laptop specifications, data provenance software, and other tools. Students must also take a few short personality tests to share during class. For US-based course locations, Treadstone 71 provides phones for students to aid with anonymity and persona development. The course also covers social media account setup, extensive use of open-source tools, methods of finding groups, channels and chats, setting up aggregated search criteria that increases speed and is targeted for individual organizational use.
In addition, students learn how to create various text to voice audio in different languages, video/audio integration, and other methods of creating content for online posting. This includes using some of the latest online AI tools for content creation, extraction, and manipulation.
The course blends cyber intelligence, counterintelligence, and cognitive warfare, from setup through passive execution. Students learn to build and execute campaigns with hands-on delivery in live environments. We do not use sandbox setups. All execution is live, yet passive.
The course runs from 7:45-5 PM Monday-Thursday and 7:45-3 PM on Friday. Breakfast and lunch are served daily.
Students need to have a solid understanding of browsers and the Internet.
Course eligibility is limited to US Citizens, NATO member countries, and other US-friendly countries. However, unlike others, we vet each student and do not allow adversaries access to our courses.