Cyber Intelligence

In Person and Online Intelligence Training

Cyber Intelligence, Counterintelligence, and Cognitive Warfare Training Courses online and in-person Washington, DC, Miami Florida, New York City, Chicago, Seattle, Los Angeles, Phoenix, Dallas, OrlandoOur In-Person courses cover intelligence, counterintelligence, influence operations, how to build a cyber intelligence program, geopolitical and strategic intelligence, open-source intelligence, clandestine cyber human intelligence, persona development and use, and operational security in online environments. Our courses include the adversary OSINT techniques, methodical procedures for OPSEC, and the use of ChatGPT…

Read More

Cyber war – large-scale destruction without the use of military force

Cyber war has the potential of large-scale destruction without the use of military force and can be used without an official declaration of war. As a strong current, the "soft" paradox is a good guide to dealing with hybrid threats and hybrid warfare and its responses and countermeasures, as well as resilience and vulnerability. https://cybershafarat.com/2023/02/18/cognitive-warfighter/ To achieve success, one cannot focus only on difficult defense or security issues and only look for war. This can…

Read More

Miami – Cyber Cognitive Warfighter Training

Cyber Cognitive Warfighter Training This course includes the use of ChatGPT and other AI solutionsMay 15-19 Monday through Thursday 7:45-5 PM, Friday 7:45-12 PM.Weston, Florida (Miami-Fort Lauderdale) Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational security, multiple browser configurations and containers for the alignment to and tracking of personas. Students learn how to test browsers for leakage. Students must maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during…

Read More

Cyber Cognitive Warfighter Training with Open AI / ChatGPT functions

Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - New York City Jun 12-16 OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting…

Read More

Trust is a vital asset

Trust is a vital asset for any society that can be damaged or even destroyed by the use of various cognitive weaponsFew countries are as committed to spreading false information among their society as Russia.Michiko Kakutani, cultural critic and author of The Death of Truth, tells how Russia uses propaganda to distract and destroy. Destroying its own people (and citizens of foreign countries) through a mass media of lies, tricking people into stopping, not resisting,…

Read More

Cognitive War All Encompassing

Over the past few years, new terms have emerged to describe the constant state of conflicts around the world, in the form of concepts such as hybrid warfare, cyber warfare, gray zone conflict, misinformation, deceptive information, deep forgery, infiltration operations, and cognitive warfare. But they are only a few of the new terms that have entered the military or political lexicon in an attempt to define today's relatively vague concepts of confrontation between states that…

Read More

OPSEC for OSINT The Cyber Cognitive Warfighter Training Course

Intelligence Tradecraft Operator – OPSEC for OSINT, The Cyber Cognitive Warfighter US dates and locations WashingtonMay 1-5 MiamiMay 15-19 New York City June 12-16 ChicagoJuly 17-21 SeattleAugust 7-11 Los AngelesSeptember 11-15 Dallas October 30-November 3 Orlando December 4-8 Cognitive Warfare Training The weaponization of information influences your thoughts and how you perceive content. Learn to recognize it and prevent it. Unlike conventional wars where the invading army can be seen in different streets and passages, preparation for a…

Read More

Creating a cyberspace branch of the International Criminal Court

Expanding the jurisdiction of the International Criminal Court and creating a cyberspace branchFirst, the jurisdiction of the International Criminal Court (ICC) could be expanded. For example, the idea of delegating cases related to cyberspace to the ICC was raised at the United Nations Congress on Crime Prevention and Criminal Justice, organized by the UN Office on Drugs and Crime in Bangkok in 2005: “…it is recommended that the crimes of cyberspace, terrorism and cybercrime should…

Read More

Klaus Martin Schwab
Psychology of the Seven Radicals

This material was prepared by Russian students of the course "HUMINT: Methodology" Seven Radicals "for communications" https://www.treadstone71.com/index.php/training/cogwarfarecourse Klaus Martin Schwab  (German: [klaʊs ˈmaʁtiːn ʃvaːp]; born 30 March 1938) is a German engineer,  economist and founder of the World Economic Forum (WEF). He has acted as the WEF's chairman since founding the organisation in 1971. Psychological picture Features of the psyche / character traits .. Sociocultural sphere Manifestation of character in activity Communication sphere Motivational sphere Structure of interests.. Negotiation…

Read More