The 12 Days of Cyber Christmas

…or What I want for Cyber Security and Intelligence Christmas 2016

  1. All CIOs must have served as a CISO for at least 4 years before being allowed to be a CIO.
  2. All CIOs must have a CISSP, CISM, and at least 2 technical information security certifications and have been thoroughly trained and qualified to be a CIO. No more cronyism.
  3. CISOs will never report to the CIO – conflict of interest and a recipe for … what we have now.
  4. If you are the administrator for a device, you secure that device (servers, routers, appliances, etc.). You are responsible and accountable – Secure what you own. Secure what you manage.
  5. CIOs and their leadership will be held liable for deploying vulnerable systems.
  6. All new products (IoT and beyond) must be certified secure before public release. No more figure it out as we go and bolt it on after we have consumers hooked.
  7. All root access / administrative rights for production, critical, supporting, etc., systems and devices are removed and granted only for approved changes and incidents.
  8. All written code and script must be written properly. There is no such thing as secure code, only code the works correctly and does not create vulnerabilities.

Treadstone 71 2017 Intelligence Training Courses – Sign up now or inquire about how to have us come onto your site to training.

    9. All operating systems will be shipped closed and installed closed with a risk rating system for each port, protocol, and/or service. Each modification reduces the security posture of the operating system providing a risk score while automatically offering advice on how to remediate that score with other controls. 

    10. New regulations to enforce security and privacy, demanding disclosure of breaches,    fining companies and individuals for negligence are put in place, at once.

    11. Vendors posting adversary IoCs, TTPs, and other methods that would normally be seen as ‘telling the enemy what we know, i.e., sedition’ will be fined for such activity.

  12. You will tell yourselves over and over again that contracting with Treadstone 71 to build your cyber intelligence strategy and program is the absolute right thing to do (repeat after me …).

Merry Cyber Christmas from Treadstone 71


Featured post

Implementing Effective Criminal Justice Responses for Countering Crimes related to Terrorism and Violent Extremism

11/18/2015 – Vienna

Treadstone 71 recently participated in a United Nations working group meeting titled: Expert Group Meeting on “Implementing Effective Criminal Justice Responses for Countering Crimes related to Terrorism and Violent Extremism.” The very timely meeting covered a gamut of topics both physical and cyber related. The core of the discussions included preventive aspects of countering terrorism (criminalization, investigation and prosecution of crimes related to terrorism, e.g.- recruitment, incitement and training.); the use of the internet for terrorist purposes; support for victims of terrorism; and de-radicalization. The discussions focused upon current issues in light of the recent attacks in France, Iraq, and Lebanon. We also discussed several other topics of importance such as:

National perspectives – challenges and lessons learned in developing and implementing strategies and measures for countering crimes related to terrorism and violent extremism, and for the de-radicalization, rehabilitation and reintegration of radicalized individuals

“The integration of human rights and the rule of law to counter terrorism, with a focus on criminal investigations and specialized investigative techniques”

The interplay between the intelligence and law enforcement sectors in countering terrorism and violent extremism over the internet and social media platforms – are their interests compatible?

The role which the internet, social media and related technology plays in (i) the promotion of violent narratives, extremism and terrorism, and (ii) as part of effective responses to counter these threats.

The Use of Positive Narratives as a tool for Countering and Delegitimizing Violent Extremist Messaging

The role of civil society, including victims associations and their partnerships with governments in effectively countering violent extremism, and in strengthening efforts aimed at the de-radicalization, rehabilitation and re-integration of affected individuals.

What are the key components of effective national frameworks for countering violent extremism, including related crimes (e.g. incitement, recruitment and training) – are these common to all countries, and what are the challenges and possible approaches to implementing these at a national level?

UNODC’s Project on “Managing Violent Extreme Offenders and Preventing Radicalization to Violence in Prisons”.

The role of technology as a tool in supporting effective measures to counter the promotion of violent extremism and radicalization and to support criminal investigations and interventions.

Is it possible to monitor and evaluate the impact and effectiveness of measures aimed at countering violent extremism, and for the de-radicalization, rehabilitation and reintegration of radicalized individuals?

Some of the themes coming out of this meeting include the effective criminalization, investigation and prosecution of crimes related to terrorism (including preparatory offences); preventing the misuse of the internet and social media for terrorist purposes, strengthening support for victims of terrorism and the use of victims stories and other counter narratives to terrorist propaganda; the effective de-radicalization, rehabilitation and reintegration of persons vulnerable to terrorist propaganda and narratives that might lead to violent extremism or acts of terrorism; and opportunities and approaches for effective technical assistance and support to Member States to develop, establish and implement such measures at a national level and to monitor and evaluate their impact and effectiveness.

Member states, organizations and groups involved in the 3-day meeting are listed below. The meeting led to significant team building and establishing relationships with key counter terrorism experts across the globe.

  • Belgium Police Superintendent/Head Central Counter Terrorism Department Federal Judicial Police
  • Bosnia and Herzegovina – CT Department, Ministry of Security Adviser, Counter-Terrorism Ministry of Security
  • Canada Criminal Law Policy Section Department of Justice
  • France Magistrate, Director of Criminal Affairs & Pardons Ministry of Justice – Could not attend
  • Permanent Mission of the Federal Republic of Germany to the UN (Vienna), Mission of the Federal Republic of Germany to the UN (Vienna)
  • India Deputy Inspector General, National Investigation Agency
  • Indonesia National Counterterrorism Agency (BNPT) – Deputy of International Cooperation National Counterterrorism Agency (BNPT)
  • Director, International Safety and Security Cooperation Division Japanese Ministry of Foreign Affairs
  • Astana City Prosecutor’s Assistant General Prosecutor’s Office of the Republic of Kazakhstan
  • Morocco Magistrate, Ministry of Justice
  • Kenya Coordinator, Prevention of Radicalization & Violent Extremism, National Counter Terrorism Centre and Permanent Mission of Kenya to the UN (Vienna)
  • Lebanon Director General of the Ministry of Justice
  • Pakistan, Ministry of Defense
  • First Secretary, Permanent Mission of Qatar to the UN (Vienna), Permanent Mission of Qatar to the UN (Vienna)Second Secretary
  • Macedonia, International Cooperation Section Ministry of Internal Affairs
  • Maldives, Chief Superintendent of Police Deputy Head of Intelligence Directorate
  • Russia, Expert, Federal Financial Monitoring Service (Rosfinmonitoring)
  • Tunisia, Judge and Advisor to the Ministry of Foreign Affairs, Secretary of Foreign Affairs, Member, Cabinet of the Minister of Foreign Affairs
  • Turkey, President of Religious Affairs, Dept. of Interreligious & Intercultural Relations
  • UK Head, Counter Terrorism Internet Referral Unit Counter Terrorism Command, Met Police and Detective Inspector for the Met Police
  • Uganda, State Attorney Directorate of Public Prosecutions
  • Senior Rule of Law Advisor & Dept. of Justice Liaison, Bureau of Counterterrorism, US Dept. of State
  • OTIM Expert, Common African Defense and Security Policy
  • Head of Council of Europe, Office in Vienna
  • Europole, Head of Program, IGAD Security Sector Program Inter-Governmental Authority on Development and the Europol Internet Referral Unit
  • Managing Director, Institute for Security Studies Africa
  • Chief Operating Officer, Global Community Engagement & Resilience Fund
  • Transnational Threats Department Action Against Terrorism Unit
  • Cove Research Program Curtin University, Perth
  • Criminologist/Anthropologist/Legal Advocate, Islamabad, Pakistan
  • France – Spokesman, International Federation of Victims of Terrorism (Could not attend)
  • Programme Coordinator, Institute for Strategic Dialogue
  • Vice President, Bangladesh Enterprise Institute
  • Terrorism Research Initiative, (TRI) Vienna
  • Women Without Borders Save Vienna/Austria
  • Media Consultant
  • Associations of European/Spanish Victims of Terrorism
  • Journalist, Media Specialist, Indian Institute of Advanced Study
  • Director, Peacetech Data Networks The Peace Tech Lab, Washington, DC
  • Chief Intelligence Officer Treadstone 71
  • Head, digital transformation Hootsuite
  • FMS Advanced Systems Group United States
  • Industry Lead PS&NS Public Sector Group Microsoft Western Europe

Treadstone 71’s expertise in cyber jihad, cyber intelligence, open source intelligence, cyber counter intelligence activities, both in services and training were highlighted in open discussions and panel events.

In the spirit of information sharing, Treadstone 71 shared its extensive library of audio, video, magazines, manuals, training guides, and overall information with Europol.


Blog at

Up ↑

%d bloggers like this: