Clandestine

Dru’a al-Waaqiah lil-Bedoon – Syrian Sanctions Busting with Russian Help

Past report on Syrian Government collusion with Russia to bypass sanctions against Syria. This instance involves acquiring materials and machines to manufacture their own body armor in Latakia by way of the UAE where a Syrian soldier working with a female FSB agent centralize the acquisitions. Visas, passports, military IDs, fake names, bills of lading and more for your reading and review. The Treadstone 71 Report (pdf) - Treadstone 71 - drua-alwaaqiah-lilboodoon Treadstone 71 acquired supporting…

Read More

It has not changed – Russian Maskirovka – Denial and Deception

I keep a vigil in a wilderness of mirrors Where nothing here is ever what it seems Yuri Nosenko "Instead of being relieved to hear that the Soviets had not been involved in the assassination, James Jesus Angleton, the C.I.A.’s legendarily suspicious counterintelligence chief, and others in the spy trade thought Mr. Nosenko’s apparent defection was a trick." www.planetreg.com/T71IntelTraining including Cyber Counterintelligence Tradecraft  "After all, the agency had suffered a series of setbacks, including the…

Read More

Intelligence for the C-Suite and Stakeholders

This is a one-day course designed to educate corporate leadership and stakeholders in cyber and threat intelligence.  There is a general awareness of the need to establish intelligence functions. Many organizations do not have a fundamental understanding of what intelligence is, where the function should reside, how it is different from business and competitive intelligence while understanding the overlaps and natural points of integration. This one day course targets corporate leadership delivering a clear and coherent…

Read More

Training Report – Treadstone 71 Cyber Intelligence Tradecraft Professional Certification

I would highly recommend this course to anyone looking to further their knowledge in the cyber area. It will also allow you to become a better intelligence analyst, as a whole.

Read More

Wilderness of Shlemiels 

Thurs 9:15 AM Moscone South 307. Treadstone 71 talk on adversary infiltration target centric DandD @RSAConference ‬https://www.rsaconference.com/events/us17/agenda/sessions/6113-wilderness-of-shlemiels Register ahead of time for a seat Be there! www.treadstone71.com

Read More

We Are in a State of Cyber Cold War?

Wisdom begins with the definition of terms – Socrates Many believe that we are not in some sort of state of cyber warfare. Many believe that it is only influence operations. These are the same people who are selling you security technologies and services to protect your environment. They believe calling our current state cyber war is hype. They fact that they believe this is demonstrated in their technologies that have double and triple downed…

Read More

Cyber Security Predictions – Not Even Reality TV – Just Daytime Entertainment

The plethora of 2017 cyber security predictions do nothing but distract practitioners from executing actual controls and methods of defense and prevention. Each year we get slammed with predictions that are never followed, are common sense, and serve to market and sell products and services. The so-called information and cyber security experts, many times self-proclaimed, spew predictions on all potential areas. This is not much more than fake news and methods to direct readers to…

Read More

Iranian hack of a Saudi (Arabistan) Site

Using the Management Experts job application site to upload shell files exposing the site [wpvideo o3dcfDbF] https://wiki.debian.org/Iceweasel Treadstone 71 2017 Intelligence Training Courses - Sign up now or inquire about how to have us come onto your site to training. http://iedb.ir/acc/tag-Hidden.html https://github.com/BDLeet/public-shell/blob/master/ALFA%20TEaM%20Shell.php https://github.com/solevisible/ALFA-SHELL-V2.5 View the presentation given by Treadstone 71 with Nordic Innovation Labs - March 2017 Treadstone 71 with Nordic Innovation Labs March 2017 - PDF solevisible - r00t.info

Read More

The 12 Days of Cyber Christmas

...or What I want for Cyber Security and Intelligence Christmas 2016 All CIOs must have served as a CISO for at least 4 years before being allowed to be a CIO. All CIOs must have a CISSP, CISM, and at least 2 technical information security certifications and have been thoroughly trained and qualified to be a CIO. No more cronyism. CISOs will never report to the CIO – conflict of interest and a recipe for…

Read More