Intelligence Analysis

Treadstone 71 Online Courses

Online Courses  (www.cyberinteltrainingcenter.com) Advanced Cyber Intelligence Tradecraft Advanced Strategic Intelligence Analysis Adversary Targeting Analytic Writing (Reporting and Briefs) Aspects of Disinformation Basic Cyber Intelligence Tradecraft Big Five in Cyber Intelligence Certified Cyber Counterintelligence Analyst Cialdini's Principles in Influence Operations Cognitive Warfare Definitions Part 1 Collection Management Color Revolutions - Cognitive Warfare Conspiracy Theories Critical Thinking and Cognitive Bias for Cyber Intelligence Cyber Cointelpro Dirty Tricks in CounterIntelligence and Deception Intelligence Requirements Intermediate Cyber Intelligence Tradecraft…

Read More

In Person and Online Intelligence Training

Cyber Intelligence, Counterintelligence, and Cognitive Warfare Training Courses online and in-person Washington, DC, Miami Florida, New York City, Chicago, Seattle, Los Angeles, Phoenix, Dallas, OrlandoOur In-Person courses cover intelligence, counterintelligence, influence operations, how to build a cyber intelligence program, geopolitical and strategic intelligence, open-source intelligence, clandestine cyber human intelligence, persona development and use, and operational security in online environments. Our courses include the adversary OSINT techniques, methodical procedures for OPSEC, and the use of ChatGPT…

Read More

RU Analysis of In-Q-Tel

In-Q-Tel Inc. Norman Augustin proposed to CIA director George Tenet that they create an organization that would repeat the business model of Silicon Valley and would work mainly in the same place. Through venture investments, it was supposed to attract the most promising and influential companies to cooperate, give them money and freedom of action, and, in return, receive advanced tools for searching and analyzing information. In-Q-Tel's initial budget is $30 million per year. For…

Read More

Cyber war – large-scale destruction without the use of military force

Cyber war has the potential of large-scale destruction without the use of military force and can be used without an official declaration of war. As a strong current, the "soft" paradox is a good guide to dealing with hybrid threats and hybrid warfare and its responses and countermeasures, as well as resilience and vulnerability. https://cybershafarat.com/2023/02/18/cognitive-warfighter/ To achieve success, one cannot focus only on difficult defense or security issues and only look for war. This can…

Read More

RU Analysis: Kamala Harris – Seven Radicals

Kamala Devi Harris Psychological picture as RU Intelligence analysis defined. US Vice President. Born October 20, 1964 in Oakland, California. Father Donald Harris is a Jamaican economist who immigrated to the United States. Mother Shyamala Gopalan is an Indian cancer researcher. Conclusions Kamala Harris is a strong, strong-willed, charismatic, and purposeful person. Seeks to dominate negotiations. In negotiations, she is determined only to win and will defend her point of view despite all the opponent's…

Read More

Miami – Cyber Cognitive Warfighter Training

Cyber Cognitive Warfighter Training This course includes the use of ChatGPT and other AI solutionsMay 15-19 Monday through Thursday 7:45-5 PM, Friday 7:45-12 PM.Weston, Florida (Miami-Fort Lauderdale) Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational security, multiple browser configurations and containers for the alignment to and tracking of personas. Students learn how to test browsers for leakage. Students must maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during…

Read More

Cyber Cognitive Warfighter Training with Open AI / ChatGPT functions

Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - New York City Jun 12-16 OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting…

Read More

How Russia Sees It – Information Diversions Ukraine

INFORMATION DIVERSIONS IN THE CONFLICT IN UKRAINE To identify and classify the forms and methods of information warfare in the modern conflict in Ukraine (in the context of the war in Ukraine). Procedures and methods. The study was carried out using the methods of analysis, synthesis, generalization and interpretation of the results. Results. The forms and methods of conducting information warfare in Ukraine under the conditions of the war (strategic information operations, special propaganda, fakes…

Read More

Trust is a vital asset

Trust is a vital asset for any society that can be damaged or even destroyed by the use of various cognitive weaponsFew countries are as committed to spreading false information among their society as Russia.Michiko Kakutani, cultural critic and author of The Death of Truth, tells how Russia uses propaganda to distract and destroy. Destroying its own people (and citizens of foreign countries) through a mass media of lies, tricking people into stopping, not resisting,…

Read More