Cyber Warfare

The Treadstone 71 Cyber Intelligence Program

Threat Intelligence Program Development Improve and provide feeds for automation and remediation Security operations Enhance and improve remediation actions Centralize threat intelligence – Intelligence as a Service – Analysis as a Service Drive improvements to risk management Effective Efficient Improve workflow through well-defined roles and responsibilities People, process and technology enhancements Drive the quality improvements of your intelligence Credibility and relevance

Read More

Pathology of Western Games (feminism – video)

PATHOLOGY of WESTERN GAMES as defined by Iranian hackers and their analysis of Western video games - (emulation?) Issues Save the world Femininity Or proof of concept? Nature and culture The relative values Defect creation Cultural induction Evil sin Violence and addiction Political territory Contempt of religions Money axial Aquaculture myth Fantasy Aquaculture Evil sin Destructive nature of sin is sin Style game is considered guilty Simplified sin and encourage it Test out of power Violence and addiction Innate violence! Charm of violence Addiction to…

Read More

Implementing Effective Criminal Justice Responses for Countering Crimes related to Terrorism and Violent Extremism

...preventing the misuse of the internet and social media for terrorist purposes, strengthening support for victims of terrorism and the use of victims stories and other counter narratives to terrorist propaganda; the effective de-radicalization...

Read More

Cyber Intelligence Course

The latest comment: Cyber Intelligence course comments: …  Looking back at the week and the challenge you had per getting us through a necessary set of material, you had your work cut out for you. There’s just so much ground to cover in such little time. The necessary, minimal set is extensive - not surprisingly given the interdisciplinary nature of this area.  The critical theory aspect alone can have a slice taken and become a…

Read More

Treadstone 71 Series of Intelligence Courses – FAQ

Who benefits from the Treadstone 71 series of intelligence courses? Information technology and information security organizations are struggling to produce actual intelligence. Most of what is delivered as intelligence is in fact either data or at best, information. Additionally, these same organizations receive data and information from analyst-type organizations who provide general products. General from the standpoint that they create a single generic threat report and then distribute it many times to most of their…

Read More

Active Defense – Strike, CounterStrike, Mercenary or Vigilante?

The opponent lands combination after combination to the head, ribs, and kidneys. This barrage continues until the defender boxer is knocked out, dragged off the mat to hopefully fight another day. The fighter cannot continue. (Bardin, 2011) This picture is much like our cyber defenses today. Culturally trained to block every punch, cyber defenses attempt to detect where the next punch will hit. Standing toe-to-toe with an adversary that is much more devious, much more…

Read More

They Paid the Ultimate Sacrifice – Green Revolution 2009 – Iran

As we proceed through the negotiations with Iran we must not forget who we are dealing with and the recent history of the Green Revolution of 2009. Many sacrificed all they could. Oppression and censorship were but a few of the actions taken by the IRGC and Basij under the direction of the government. Many died and disappeared. https://cybershafarat.com/wp-content/uploads/2014/05/brief-on-iranian-oppression.pdf Below is a list of those we have lost in Excel format. Iranian dead and detained…

Read More