Islamic State

Drone Wars! Threats, Vulnerabilities and Hostile Use

References Adamy, D. (2001) EW 101 A First Course in Electronic Warfare, Boston: Artech House. Adamy, D. (2004) EW 102 A Second Course in Electronic Warfare, Boston: Artech House. Adamy,…

Wilderness of Shlemiels 

Thurs 9:15 AM Moscone South 307. Treadstone 71 talk on adversary infiltration target centric DandD @RSAConference ‬https://www.rsaconference.com/events/us17/agenda/sessions/6113-wilderness-of-shlemiels Register ahead of time for a seat Be there! www.treadstone71.com

Full Suite of Cyber-Threat Intelligence and Counterintelligence Courses Ready for Global Delivery

HALF MOON BAY, CA (PRWEB) JANUARY 25, 2017 Treadstone 71 today announced a full suite of Cyber and Threat Intelligence and CounterIntelligence training courses. The courses drive the expansion of…

We Are in a State of Cyber Cold War?

Wisdom begins with the definition of terms – Socrates Many believe that we are not in some sort of state of cyber warfare. Many believe that it is only influence…

The 12 Days of Cyber Christmas

...or What I want for Cyber Security and Intelligence Christmas 2016 All CIOs must have served as a CISO for at least 4 years before being allowed to be a…

Implementing Effective Criminal Justice Responses for Countering Crimes related to Terrorism and Violent Extremism

...preventing the misuse of the internet and social media for terrorist purposes, strengthening support for victims of terrorism and the use of victims stories and other counter narratives to terrorist…