
This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.
- Cyber Infiltration
- Information Operations
- Standard Glossary and Taxonomy
- Mission-Based Counterintelligence
- Counter Collection and Anticipation
- Denial and Deception
- Counter-Denial and Deception
- Open Source Intelligence in Deception Operations
- VPNs and Burn Phones (US Only)
- Methods of Social Media Research
- Social media demographics
- Cyber Target Acquisition and Exploitation
- Identify Active Adversary Campaigns
- Intent, Motivation, Goals, & Requirements
- Passive data collection
- Campaign development
- Vectors of approach
- Courses of action
- Elicitation and exfiltration
- Memetic Engineering
- Content Creation
- Propaganda and Fallacies
- Media Manipulation
- Charts, Graphs, Generators
- Deception Planning
- Deception Chain
- Types of Denial and Deception
- D&D Usage
- Perception as Deception
- Avoid and Deny
- Shifting the Conversation
- Forum Manipulation – COINTELPRO
- Social Psychology
- Persuasion
- Differences in Culture/Diversity
- Hofstede Dimensions
- Reciprocity and Consistency
- Social validation
- Liking, Authority, and Scarcity
- Rules of Disinformation
- Information Warfare
- Operational Security
- Cyber Psychological Operations
- Target analysis and manipulation
- Authoring of blogs and articles for influencing
- Placement of specific concepts and phrases
- Cyber Persona Layer
- Cyber Persona Development and Maintenance
- Character archetypes
- Establish the storyline
- Establish the plot synopsis
- Story weaving and management
- Target profiles – dossiers
- Target gap analysis
- Clandestine Collection Operation
- Surveillance and Counter Surveillance
- CI Insider Threat, Investigations
- Guide to Underhanded Tactics
- Rules for Radicals
- Case Studies
- Team Presentations
Lecture, Hands-on, Apprenticeship, in class exercises, student presentations, templates, course material—32 CPEs 4.5-days
- Home
- About T71
- Course Information
- Training Subscription
- Intel Services
- Products
- The Cyber Shafarat
- Intel Briefs
Contact Treastone 71
Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.
Contact us today!
: Contact

: Quick Links
Cyber Intelligence Training Center
Cyber Shafarat Blog
CyberShafarat on Telegram
