Sock Puppet

Treadstone 71 Online Courses

Online Courses  (www.cyberinteltrainingcenter.com) Advanced Cyber Intelligence Tradecraft Advanced Strategic Intelligence Analysis Adversary Targeting Analytic Writing (Reporting and Briefs) Aspects of Disinformation Basic Cyber Intelligence Tradecraft Big Five in Cyber Intelligence Certified Cyber Counterintelligence Analyst Cialdini's Principles in Influence Operations Cognitive Warfare Definitions Part 1 Collection Management Color Revolutions - Cognitive Warfare Conspiracy Theories Critical Thinking and Cognitive Bias for Cyber Intelligence Cyber Cointelpro Dirty Tricks in CounterIntelligence and Deception Intelligence Requirements Intermediate Cyber Intelligence Tradecraft…

Read More

In Person and Online Intelligence Training

Cyber Intelligence, Counterintelligence, and Cognitive Warfare Training Courses online and in-person Washington, DC, Miami Florida, New York City, Chicago, Seattle, Los Angeles, Phoenix, Dallas, OrlandoOur In-Person courses cover intelligence, counterintelligence, influence operations, how to build a cyber intelligence program, geopolitical and strategic intelligence, open-source intelligence, clandestine cyber human intelligence, persona development and use, and operational security in online environments. Our courses include the adversary OSINT techniques, methodical procedures for OPSEC, and the use of ChatGPT…

Read More

Miami – Cyber Cognitive Warfighter Training

Cyber Cognitive Warfighter Training This course includes the use of ChatGPT and other AI solutionsMay 15-19 Monday through Thursday 7:45-5 PM, Friday 7:45-12 PM.Weston, Florida (Miami-Fort Lauderdale) Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational security, multiple browser configurations and containers for the alignment to and tracking of personas. Students learn how to test browsers for leakage. Students must maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during…

Read More

Cyber Cognitive Warfighter Training with Open AI / ChatGPT functions

Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - New York City Jun 12-16 OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting…

Read More

MARCH MADNESS SALE Prices in effect through March 31 

Our In-Person courses cover intelligence, counterintelligence, influence operations, how to build a cyber intelligence program, geopolitical and strategic intelligence, open-source intelligence, clandestine cyber human intelligence, persona development and use, and operational security in online environments. Our courses include: Cyber Intelligence Tradecraft Certified Cyber Intelligence AnalystCertified Cyber Counterintelligence AnalystAdvanced Analytic Writing Advanced Structured Analytic Techniques Advanced Critical Thinking and Cognitive Bias Building a Cyber Intelligence Program OPSEC, OSINT, and Darknet Collection Cognitive Warfare Series of Training Hybrid…

Read More

Half time of the March Madness Sale is here

The Next Half of the March Madness Sale is Here! Enroll in any of the upcoming 5-day in-person courses and receive a free cyber intelligence program assessment prior to course start (timing conditions apply). The assessment includes pre-course adversary data collection.

Read More

OPSEC a Critical Requirement for Open-Source and Dark Net Collection

HALF MOON BAY, Calif., March 7, 2023 (SEND2PRESS NEWSWIRE) — Treadstone 71, LLC, the source for cyber intelligence, counterintelligence, hybrid, and cognitive warfare, announces new courses and services. “Targeted adversary data collection creates significant risk when seeking relevant information not available from threat intelligence feeds. Our operational security (OPSEC) training courses reduce risk to negligible levels that risk and legal departments find acceptable,” asserted Jeff Bardin, Chief Intelligence Officer at Treadstone 71. “We assess and…

Read More

Trust Erosion in Cognitive Warfare

Trust is a critical asset that can be damaged or completely destroyed through a variety of applied cognitive weapons such as social media. People or institutions that seek to destroy this trust first identify major gaps in the target society and then intensify them in a way that causes distrust towards the honesty and motivation of others in society. https://cybershafarat.com/2022/12/07/cognitive-warfare/ Research studies in the field of cognitive hybrid warfare show that intelligence operations will necessarily…

Read More

Intelligence Tradecraft Operator – Cyber Cognitive Warfighter training

WASHINGTON DULLES - 3/20-24 CYBER COGNITIVE WARFIGHTER COURSE OPSEC methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type, cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, conspiracy theories, cyber color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, Cognitive war…

Read More

INTELLIGENCE TRADECRAFT OPERATOR – CYBER COGNITIVE WARFIGHTER TRAINING

Atlanta ATL South - 2/20-24/2023 and Washington Dulles - 3/20-24/2023 CYBER COGNITIVE WARFIGHTER COURSEOPSEC methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type, cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, conspiracy theories, cyber color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and…

Read More