Category: Cyber Warfare
Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures
This article is partially written in analytic writing format starting with the conclusions first. The Conclusion section does not include normal analytic paragraphs and alternative analysis following standard intelligence tradecraft analytic writing. Instead, the Recommendations and Opportunities section represents supervisory actions. The article uses the Admiralty System or NATO System as a method for evaluating…
We regard the use of these weapons (nuclear) to be illegal and haram. AEOI CTF – Iranian Nuke Capture the Flag
INSA Opens Nominations for 2017 Achievement Awards
Members of the intelligence and national security communities are encouraged to nominate their peers and partners from government, private industry, and academia for the 2017 Achievement Awards, the Intelligence and National Security Alliance (INSA) has announced. The Achievement Awards recognize up-and-coming leaders and mentors serving or supporting the U.S. national security mission.
Join us at the 2016 ISSA International Conference!
Treadstone 71 Cyber Intelligence and Counterintelligence – Course Overviews and Dates
Treadstone 71 Cyber Intelligence, Counterintelligence, and Target-Centric OSINT Course Overviews
“With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real world scenarios establishing a solid understanding on utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional.”
Drone Attack! Swarm with Hazardous Waste Payload
Prepare drone swarm operators before handling radioactive payloads
Begin taking iodine pills
Saturate thyroid to block uptake of radioactive iodine
Drink red wine before and after exposure
Protects chromosomes from radiation damage
Drink green tea before and after exposure
Inhibits intestinal absorption of Strontium-90
Apply essential oils to exposed skin on the day the radioactive payloads are placed in the attack drones
Cyber Threat Intelligence – All-Source Intelligence – Successful Program Build
Proven services, years of experience, in-depth knowledge – Treadstone 71 Cyber Intelligence Training and Services
The most dangerous thing in the world is a Second Lieutenant with a map and a compass.
We need to stop believing that companies with a pedigree in anti-virus understands intelligence tradecraft and offensive methods. We need to understand that stopping the adversary starts with not tipping them off.


You must be logged in to post a comment.