adversaries

Iranian MOIS Dissident Crackdown in Europe?

A team of Islamic Republic of Iran’s intelligence ministry operatives were dispatched for second round of terrorist activity in Europe according to sources. Iranian assassination teams The May 6, 2019…

Coincidences Take A Lot of Planning – RSA Conference 2018 – San Francisco

The RSA Conference is soon upon us! The expectation to see old friends and make new acquaintances. The show will once again be great with new technologies displayed, new ideas…

Zapad Exercises – 2nd/3rd Order Effects

  The recent Russian Zapad wargaming exercises included a plethora of electronic capabilities demonstration and potentially more. Russia is known to recently been involved in illegal immigration efforts in Sweden, Finland,…

Drone Wars! Threats, Vulnerabilities and Hostile Use

References Adamy, D. (2001) EW 101 A First Course in Electronic Warfare, Boston: Artech House. Adamy, D. (2004) EW 102 A Second Course in Electronic Warfare, Boston: Artech House. Adamy,…

Dru’a al-Waaqiah lil-Bedoon – Syrian Sanctions Busting with Russian Help

Past report on Syrian Government collusion with Russia to bypass sanctions against Syria. This instance involves acquiring materials and machines to manufacture their own body armor in Latakia by way…

Intelligence for the C-Suite and Stakeholders

This is a one-day course designed to educate corporate leadership and stakeholders in cyber and threat intelligence.  There is a general awareness of the need to establish intelligence functions. Many organizations…

Training Report – Treadstone 71 Cyber Intelligence Tradecraft Professional Certification

I would highly recommend this course to anyone looking to further their knowledge in the cyber area. It will also allow you to become a better intelligence analyst, as a…

2017 Training Courses – Treadstone 71

2017 Training Dates Main Page to Treadstone 71 Training - 2017 1/30-2/3 Amsterdam - Class Completed 2/20-2/24-Chantilly - Class Completed Indianapolis area https://stimulusengineering.regfox.com/cyber-series-course-1-cyber-intelligence-tradecraft-certification https://stimulusengineering.regfox.com/cyber-series-course-2-cyber-counterintelligence-tradecraft-certification https://stimulusengineering.regfox.com/cyber-series-course-3-clandestine-cyber-humint-osint https://stimulusengineering.regfox.com/cyber-series-course-4-cyber-intelligence-analyst-certification 6/5-6/10-Chantilly 7/17-7/21-Palo Alto 8/7-8/11-Chantilly…

Wilderness of Shlemiels 

Thurs 9:15 AM Moscone South 307. Treadstone 71 talk on adversary infiltration target centric DandD @RSAConference ‬https://www.rsaconference.com/events/us17/agenda/sessions/6113-wilderness-of-shlemiels Register ahead of time for a seat Be there! www.treadstone71.com

Full Suite of Cyber-Threat Intelligence and Counterintelligence Courses Ready for Global Delivery

HALF MOON BAY, CA (PRWEB) JANUARY 25, 2017 Treadstone 71 today announced a full suite of Cyber and Threat Intelligence and CounterIntelligence training courses. The courses drive the expansion of…

We Are in a State of Cyber Cold War?

Wisdom begins with the definition of terms – Socrates Many believe that we are not in some sort of state of cyber warfare. Many believe that it is only influence…

Cyber Security Predictions – Not Even Reality TV – Just Daytime Entertainment

The plethora of 2017 cyber security predictions do nothing but distract practitioners from executing actual controls and methods of defense and prevention. Each year we get slammed with predictions that…

The 12 Days of Cyber Christmas

...or What I want for Cyber Security and Intelligence Christmas 2016 All CIOs must have served as a CISO for at least 4 years before being allowed to be a…

Treadstone 71 – CBS News Live

[wpvideo Gx2OIjVG] http://www.cbsnews.com/live/video/is-vladimir-putin-behind-the-election-hacking-allegations/ Interview with Vlad Duthiers of CBS News - 12/15/2016 Treadstone 71 2017 Intelligence Training Courses - Sign up now or inquire about how to have us come…

Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures

This article is partially written in analytic writing format starting with the conclusions first. The Conclusion section does not include normal analytic paragraphs and alternative analysis following standard intelligence tradecraft…