Information Operations

China’s ‘Long Game’ Influence Campaign in Latin America

China’s ‘Long Game’ Influence Campaign in Latin America BY JULIETA PELCASTRE/DIÁLOGOAUGUST 29, 2023 U.S.-based cybersecurity firm Nisos uncovered the existence of a network of pro-China accounts targeting Latin American audiences, designed to bolster the country’s image and status, Time magazine reported in mid-July. This operation is part of the continued expansion of Chinese influence in the region to consolidate its position as the main regional ally and trading partner. https://dialogo-americas.com/articles/chinas-long-game-influence-campaign-in-latin-america/

Read More

Post-Truth

A pervasive force distorting public discourse, hampering effective policymaking, and creating fertile ground for exploitation and manipulation. On November 16, 2016, Oxford Dictionaries declared "post-truth" as its word of the year, highlighting a seismic shift in public discourse. The term saw a staggering 2,000 percent increase in usage between 2015 and 2016, reflecting its emergence as a significant cultural phenomenon. Unlike traditional approaches that might weaken the core and center of truth, post-truth employs a…

Read More

Counter-event planning in psyop operations

When the opponents have committed some action, you take retaliatory steps in a reaction situation. At the "Analysis of enemy actions" stage, it is necessary to understand what precisely the enemy has done. To do this, study the identified shock content (message) and understand what idea (topic) the enemy wants to convey to the audience. Having understood this, we can assume who exactly constitutes the target audience of this information operation. There may be several…

Read More

Truth and lies: the problem of perception in the context of information wars

Truth and lies: the problem of perception in the context of information wars In a period of aggravation of the domestic and foreign political situation, the information confrontation of the conflicting parties acquires special significance, including through the impact on citizens through the dissemination of relevant information to achieve their goals. It is not easy for citizens to navigate the flow of information, including because of the dominance of the so-called mass media. fakes, spread…

Read More

Automating Cyber Intelligence Analysis

Automating cyber intelligence analysis involves using technology and data-driven approaches to gather, process, and analyze large volumes of information. While complete automation of the analysis process may not be possible due to the complex nature of cyber threats, there are several steps you can take to enhance efficiency and effectiveness. Here is a high-level overview of how you could approach automating cyber intelligence analysis: Data Collection: Develop automated mechanisms to collect data from various sources,…

Read More

Cognitive Warfare Course Online and In Person Training

Treadstone 71 Cognitive Warfare The art of using technology to alter the cognition of human targets. They are usually unaware. Those countering the results may be unaware. Combat without fighting. There are many misconceptions on this topic.         Our training starts here! What is Cognitive Warfare?The Treadstone 71 series of Cognitive Warfare courses study practices, methods, tools, technologies of information operations, examples of hybridization, including approaches of countering this type of warfare. The…

Pages: 1 2 3

Read More

Chinese Cognitive and Information Warfare Section 1 – Cyber Psyops – APT Groups

Cognitive and Information Warfare tactics, techniques, and methods from the Chinese Perspective    Enroll in Course for $499 Information operations, a key component of China's contemporary way of war, encompasses all the uses of information and disinformation, by states or nonstate actors, as a tool of state power and includes military information support operations, cyberspace operations, electronic warfare, military deception, psychological operations, public affairs, and strategic communications. Historically, China has recognized the importance of information as a…

Read More

Certified CounterIntelligence Analyst, Cyber CounterIntelligence Tradecraft Training

In-Person - 5 days This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the…

Read More

Certified Intelligence Analyst
Cyber Intelligence Tradecraft Training

Online - 8 weeks In-Person - 5 days The Certified Threat Intelligence Analyst - Cyber Intelligence Tradecraft training course follows the iterative processes of the intelligence lifecycle while covering non-inclusively. This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training incorporating intelligence community member validated content and hands-on experience in the cyber environment since 2004.I. Introduction to IntelligenceII. Critical ThinkingIII. Analytic WritingIV. Creative ThinkingV. Analytic BriefingVI. Structured Analytic Techniques.VII. Analytic IssuesVIII. Argument MappingIX. Case…

Read More

RU Disinformation and Fakes

🔶 Fake❌ The russian Telegram channel «Pervyi Kharkovskiy» writes: at night «more than 800 Ukrainian soldiers were killed by a rocket attack in Konstyantynivka» 🔶 Disinformation❌ deputy chairman of the security council of russia d.medvedev stated: «Neither Washington nor Kyiv want peace. America wants undivided power and for its sake does not spare bloody Ukrainian lard» 🔶 Fake❌ «The Kyiv regime is a neo-Nazi malignant neoplasm on the body of Eastern Europe. He ziggurats, organizes…

Read More