Cognitive Warfare

Determine and use audience vulnerabilities

How to determine the very VULNERABILITIES of the target audience that the PSYOP analyst needs so much to form impact scenarios?Maslow's theory is just one way to identify target audience vulnerabilities suitable for PSYOP.Vulnerabilities are the needs that arise in the target audience, which they will seek to satisfy or benefit from them as soon as they are satisfied.Vulnerabilities are a manifestation of an unmet or perceived need of the target audience. The key word…

Read More

Training Subscription – All Online Courses for One Year 500 students

Training Subscription - All Online Courses for One Year 500 students Limited Opportunity: Only 20 Subscriptions Available at $99,990.00 ($4.71/class/student) Introducing the One Year Five Hundred subscription from Treadstone 71 – a unique and comprehensive training package designed to unleash the potential of your existing staff and guide new employees from junior to senior levels. The full Treadstone 71 online course catalogue at your fingertips. Over forty courses and counting. Our curriculum spans traditional cyber…

Read More

Roskomnadzor has limited access to the Groza website in the Russian Federation.

Roskomnadzor has limited access to the Groza website in the Russian Federation. We'll be back in a couple of days. Hello everyone, this is the editorial office of Groza. Last night a reader wrote to us: “Make it so that your site can be read without a VPN 🤔.” This is how we learned that the Groza website no longer opens in Russia - this does not mean anything, it is still safe to read…

Read More

AI-infused cyber intelligence

AI-infused cyber intelligence collection, analysis, and analytic writing integrate artificial intelligence technologies into traditional cyber intelligence practices. AI-Infused Cyber Intelligence Collection:In traditional cyber intelligence, analysts manually gather data from various sources like social media, deep web, and databases. With AI infusion, machine learning algorithms automatically collect data, filter out noise, and prioritize high-value information. For example, AI can analyze sentiment on social media platforms to detect emerging threats or trends. By leveraging natural language processing…

Read More

AI Infused Counterintelligence

AI Infused Counterintelligence Our Counterintelligence Training includes AI Infused modules: Integrating AI into Cyber Intelligence Training: A Game-Changer Enhanced Curriculum Adaptation: AI uses vast educational data to personalize training modules according to a learner's needs. Whether focusing on cyber warfare, disinformation tactics, or open-source intelligence, AI adjusts the course content dynamically, enabling more effective learning. Real-Time Simulations and Scenarios: Imagine training scenarios that evolve in real time based on world events. AI algorithms could simulate…

Read More

Putin Family Member Causes Major Fire in Moscow

An expensive accident in the center of Moscow - a Ferrari Portofino flew onto the sidewalk and crashed into a tree on Sadovo-Kudrinskaya Street.The driver and passengers of the elite car escaped with bruises and armed escort. The crash involved father vehicles not seen in the video that triggered multiple small fires. The cost of such a Ferrari model can reach 50 million rubles.The crashed caused a fire that now covers 1000 square meters. According…

Read More

Russian View of Ukrainian Disinformation #Psyops

IN THEIR WORDS METHODS OF INFORMATIONALPSYCHOLOGICAL INFLUENCE, INFORMATIONALPSYCHOLOGICAL OPERATIONS USED BY UKRAINIAN UNITS AGAINST THE PARTICIPANTS OF THE NWO, THEIRRELATIVES AND OTHER CITIZENS METHODS OF INFORMATIONAL PSYCHOLOGICAL INFLUENCE,used by Ukrainian units of information and psychological operations against members of the SVO, their relatives and other citizens CONTENT: Introduction… 3 Methods of informational and psychological influence… 6 Staged videos (fakes) and how to recognize them… 38 Basic principles for detecting fake material… 40 Conclusion… 41 INTRODUCTION“Any…

Read More

Cyber Cognitive Warfighter Training

DALLAS Oct 30-Nov 3 Monday-Thursday 7:45-5 PM, Friday 7:45-12 PM. Dallas Cyber Cognitive Warfighter Training: Transform Your Cyber Capabilities with AI-Infused Insights Discover the edge you've been looking for with Treadstone 71's immersive Cyber Cognitive Warfighter Training. Featuring hands-on experience with innovative AI tools, including ChatGPT, we tailor this dynamic course to elevate your expertise in cyber intelligence, counterintelligence, and cognitive warfare. What You Will Gain: In-depth Browser Security: Master operational security with multi-browser configurations, testing for…

Read More

Application of
the Risk Management Framework to
Russian disinformation campaigns

The actions of Musk on Twitter and Zuckerberg on Meta contributed to the effectiveness of the Kremlin’s propaganda.This conclusion was made by the experts of the European Commission. According to their study, the influence of Russian accounts increased significantly in 2022 across Europe, and especially in the first half of 2023. During the first year of Russia’s illegal war in Ukraine, social media companies enabled the Kremlin to run a large-scale disinformation campaign targeting the…

Read More

Digest of Russian Hate Speech

#CCD_informs: The Center for Countering Disinformation in cooperation with the National Council of Ukraine on Television and Radio Broadcasting, having investigated the russian and international information space, recorded a new series of cases of enemy hate speech directed against Ukraine and its allies

Read More