Most cyber intelligence analysis still happens on whiteboards. Half-finished Word docs. The Tuesday risk-committee meeting that ends in a ranking debate because nobody wrote down the math.
Treadstone 71’s Integrated Decision-Support Workspace at treadstone71.com/is2 replaces all of it.
Six structured analytic techniques, designed to feed each other, live in a single browser-based case file:
- ACS models the adversary on their terms. What counts as a win for them? What hurts them? What triggers escalation?
- DUM decomposes the threat into intent, capability, access, and supply chain. Grade your confidence on each. The pattern of unknowns becomes the briefing.
- ATCRI ranks live threats by ARI = Wt × R. New intelligence reweights the queue with a timestamped audit trail. No committee required.
- CARM tests your proposed response before you ship it. For each adversary capability, what is the reflex? Which reflex breaks your recovery?
- CRS gates the action against your own resilience. Above threshold, execute. Below, reduce blast radius and wait.
- HET tracks how the estimate evolves as new reporting arrives. The judgment is never frozen.
Each method captures structured input and produces structured output. Earlier outputs auto-populate later inputs. Capabilities listed in ACS appear in CARM as reaction prompts. The threat you decompose in DUM becomes the named subject in ATCRI. The workspace forces the connections analysts usually skip.
Free. No registration. Browser-local persistence. Your case stays on your device until you export, print, or email it. Print to PDF for the board pack. Email yourself a permanent copy. Send the case to Treadstone 71 for a deep-dive review.
Most useful when the clock is running and the room is split. You leave with a defended ranking, a tested action, a gate verdict, and an audit trail that survives the next reporting cycle.
Begin at treadstone71.com/is2
