Psychological Technique of the Seven Radicals

Treadstone 71 Online Courses

Online Courses  (www.cyberinteltrainingcenter.com) Advanced Cyber Intelligence Tradecraft Advanced Strategic Intelligence Analysis Adversary Targeting Analytic Writing (Reporting and Briefs) Aspects of Disinformation Basic Cyber Intelligence Tradecraft Big Five in Cyber Intelligence Certified Cyber Counterintelligence Analyst Cialdini's Principles in Influence Operations Cognitive Warfare Definitions Part 1 Collection Management Color Revolutions - Cognitive Warfare Conspiracy Theories Critical Thinking and Cognitive Bias for Cyber Intelligence Cyber Cointelpro Dirty Tricks in CounterIntelligence and Deception Intelligence Requirements Intermediate Cyber Intelligence Tradecraft…

Read More

Today’s Disinfo

Disinformation «The US used Zelenskyy as a tool to wage an endless proxy conflict with russia», said SCMP columnist Yonden Lhatu. In his opinion, Washington is making a mistake by rejecting any peace initiatives Fake «The USA «took control» of Moldova and destroyed its sovereignty», said v.volodin. He also added that the USA does not look at the people in the same way as it does not look at Ukrainians, considering them expendable material Fake…

Read More

In Person and Online Intelligence Training

Cyber Intelligence, Counterintelligence, and Cognitive Warfare Training Courses online and in-person Washington, DC, Miami Florida, New York City, Chicago, Seattle, Los Angeles, Phoenix, Dallas, OrlandoOur In-Person courses cover intelligence, counterintelligence, influence operations, how to build a cyber intelligence program, geopolitical and strategic intelligence, open-source intelligence, clandestine cyber human intelligence, persona development and use, and operational security in online environments. Our courses include the adversary OSINT techniques, methodical procedures for OPSEC, and the use of ChatGPT…

Read More

Russia Completely Confused on a CounterOffensive

When, where, how, and how many vexing Russian leadership They really have no idea and, therefore, have resorted to WWI style defense infrastructure. Their thinking is skewed, while fear and corruption continue to permeate their senior ranks. Failure means a long trip off a hotel balcony as Putler hides in his bunker making decisions under extreme duress, influenced by false information ( the emperor has no clothes) , using his paranoid personality enhanced with anti-cancer…

Pages: 1 2

Read More

Cognitive Warfighter Training

Studies show that the brain feeds on stories and subsequently facilitates the absorption of false information Coping with hybrid threats is considered a continuous process in which the development of "resilience" at societal, national and transnational levels plays a key role.🔍 https://cybershafarat.com/2023/04/22/miami-cyber-cognitive-warfighter-training/

Read More

Cyber war – large-scale destruction without the use of military force

Cyber war has the potential of large-scale destruction without the use of military force and can be used without an official declaration of war. As a strong current, the "soft" paradox is a good guide to dealing with hybrid threats and hybrid warfare and its responses and countermeasures, as well as resilience and vulnerability. https://cybershafarat.com/2023/02/18/cognitive-warfighter/ To achieve success, one cannot focus only on difficult defense or security issues and only look for war. This can…

Read More

RU Analysis: Kamala Harris – Seven Radicals

Kamala Devi Harris Psychological picture as RU Intelligence analysis defined. US Vice President. Born October 20, 1964 in Oakland, California. Father Donald Harris is a Jamaican economist who immigrated to the United States. Mother Shyamala Gopalan is an Indian cancer researcher. Conclusions Kamala Harris is a strong, strong-willed, charismatic, and purposeful person. Seeks to dominate negotiations. In negotiations, she is determined only to win and will defend her point of view despite all the opponent's…

Read More

Limitations of the Cognitive Domain?

https://cybershafarat.com/2023/04/11/65021/ The cognitive domain should not be limited to influencing information operations, social engineering and the conceptual approach of "controlling hearts and minds," but should include all domains in which there is a possibility of ideological attacks. https://cybershafarat.com/2023/04/22/miami-cyber-cognitive-warfighter-training/ The corruption of the mind is not just the public but cyber functions since these groups are now on the front lines. One problem is the lack of realization by organizations that this is a fact. We…

Read More

Miami – Cyber Cognitive Warfighter Training

Cyber Cognitive Warfighter Training This course includes the use of ChatGPT and other AI solutionsMay 15-19 Monday through Thursday 7:45-5 PM, Friday 7:45-12 PM.Weston, Florida (Miami-Fort Lauderdale) Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational security, multiple browser configurations and containers for the alignment to and tracking of personas. Students learn how to test browsers for leakage. Students must maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during…

Read More