Full Suite of Cyber-Threat Intelligence and Counterintelligence Courses Ready for Global Delivery

Treadstone 71 today announced a full suite of Cyber and Threat Intelligence and CounterIntelligence training courses. The courses drive the expansion of Treadstone 71’s accelerated, academically validated, intelligence training to global markets. Treadstone 71 delivers courses in California, Virginia, Canada, the United Kingdom, and the Netherlands and is set to expand to the Middle East and Asia later this year. (www.planetreg.com/T71IntelTraining)

Treadstone 71 offers a compelling business model that delivers rapid cyber and threat intelligence strategic planning, program build, and targeted training in sectors such as financial services, government, healthcare, energy, and other critical infrastructure verticals. Treadstone 71’s format, curriculum, and instruction model are helping meet critical global demand for cyber and threat intelligence and analysis expertise. Treadstone 71 training provide graduates with an attractive pathway to compensation increases, career progression, and much-needed attention to intelligence. The organization has been teaching cyber intelligence at the Master’s level and commercially for seven years. New courses include a focus on campaign management, the use of Tor, Tails, I2P, and Maltego as well as covering persona development and management. Students create a series of identities, character development, and dimensions, storyline, plot synopsis, story drive and limit, story weaving, applicability, scope, tools to be used, methods of interaction with other identities, engaging secondary characters, refining targeting while developing a campaign to gain street credentials.

“Our courses provide academic instruction combined with real-world, hands-on collection, analysis, analytic writing, dissemination, and briefings that many liken to an apprenticeship,” said Jeff Bardin, Chief Intelligence Officer for Treadstone 71. “Our curriculum follows the teachings of Sherman Kent and Richards Heuer giving students the tools necessary to perform targeted collection, structured analysis while authoring reports modeled after intelligence community standards. We teach methods of cyber infiltration, information and influence operations, counterintelligence strategies, mission based counterintelligence, denial and deception, and counter-denial and deception.”

Treadstone 71 courses are validated and proven by intelligence professionals creating job-ready threat intelligence professionals for global organizations suffering a talent shortage. “Intelligence analysis as an inherently intellectual activity that requires knowledge, judgment, and a degree of intuition,” continued Bardin. “Treadstone 71’s intelligence, counterintelligence, and clandestine cyber HUMINT training and services help organizations transform information into intelligence pertinent to their organization.”

Analysis includes integrating, evaluating, and analyzing all available data — which is often fragmented and even contradictory — and preparing intelligence products. Despite all the attention focused on the operational (collection) side of intelligence, analysis is the core of the process to inform corporate stakeholders. Analysis as more than just describing what is happening and why; identifying a range of opportunities… Intelligence Analysis is the key to making sense of the data and finding opportunities to take action. Analysis expands beyond the technical focus of today providing organizations with core capabilities for business, competitive, cyber, and threat intelligence.

Treadstone 71’s Cyber Intelligence Tradecraft Certification is the gold standard in the industry today derived from both academia and from Treadstone 71’s experience in building cyber intelligence programs at Fortune 500 organizations worldwide.

Treadstone 71

888.714.0071 – osint@treadstone71.comhttp://www.planetreg.com/T71IntelTraining

The 12 Days of Cyber Christmas

…or What I want for Cyber Security and Intelligence Christmas 2016

  1. All CIOs must have served as a CISO for at least 4 years before being allowed to be a CIO.
  2. All CIOs must have a CISSP, CISM, and at least 2 technical information security certifications and have been thoroughly trained and qualified to be a CIO. No more cronyism.
  3. CISOs will never report to the CIO – conflict of interest and a recipe for … what we have now.
  4. If you are the administrator for a device, you secure that device (servers, routers, appliances, etc.). You are responsible and accountable – Secure what you own. Secure what you manage.
  5. CIOs and their leadership will be held liable for deploying vulnerable systems.
  6. All new products (IoT and beyond) must be certified secure before public release. No more figure it out as we go and bolt it on after we have consumers hooked.
  7. All root access / administrative rights for production, critical, supporting, etc., systems and devices are removed and granted only for approved changes and incidents.
  8. All written code and script must be written properly. There is no such thing as secure code, only code the works correctly and does not create vulnerabilities.

Treadstone 71 2017 Intelligence Training Courses – Sign up now or inquire about how to have us come onto your site to training.

    9. All operating systems will be shipped closed and installed closed with a risk rating system for each port, protocol, and/or service. Each modification reduces the security posture of the operating system providing a risk score while automatically offering advice on how to remediate that score with other controls. 

    10. New regulations to enforce security and privacy, demanding disclosure of breaches,    fining companies and individuals for negligence are put in place, at once.

    11. Vendors posting adversary IoCs, TTPs, and other methods that would normally be seen as ‘telling the enemy what we know, i.e., sedition’ will be fined for such activity.

  12. You will tell yourselves over and over again that contracting with Treadstone 71 to build your cyber intelligence strategy and program is the absolute right thing to do (repeat after me …).

Merry Cyber Christmas from Treadstone 71

img_0668

Implementing Effective Criminal Justice Responses for Countering Crimes related to Terrorism and Violent Extremism

11/18/2015 – Vienna

Treadstone 71 recently participated in a United Nations working group meeting titled: Expert Group Meeting on “Implementing Effective Criminal Justice Responses for Countering Crimes related to Terrorism and Violent Extremism.” The very timely meeting covered a gamut of topics both physical and cyber related. The core of the discussions included preventive aspects of countering terrorism (criminalization, investigation and prosecution of crimes related to terrorism, e.g.- recruitment, incitement and training.); the use of the internet for terrorist purposes; support for victims of terrorism; and de-radicalization. The discussions focused upon current issues in light of the recent attacks in France, Iraq, and Lebanon. We also discussed several other topics of importance such as:

National perspectives – challenges and lessons learned in developing and implementing strategies and measures for countering crimes related to terrorism and violent extremism, and for the de-radicalization, rehabilitation and reintegration of radicalized individuals

“The integration of human rights and the rule of law to counter terrorism, with a focus on criminal investigations and specialized investigative techniques”

The interplay between the intelligence and law enforcement sectors in countering terrorism and violent extremism over the internet and social media platforms – are their interests compatible?

The role which the internet, social media and related technology plays in (i) the promotion of violent narratives, extremism and terrorism, and (ii) as part of effective responses to counter these threats.

The Use of Positive Narratives as a tool for Countering and Delegitimizing Violent Extremist Messaging

The role of civil society, including victims associations and their partnerships with governments in effectively countering violent extremism, and in strengthening efforts aimed at the de-radicalization, rehabilitation and re-integration of affected individuals.

What are the key components of effective national frameworks for countering violent extremism, including related crimes (e.g. incitement, recruitment and training) – are these common to all countries, and what are the challenges and possible approaches to implementing these at a national level?

UNODC’s Project on “Managing Violent Extreme Offenders and Preventing Radicalization to Violence in Prisons”.

The role of technology as a tool in supporting effective measures to counter the promotion of violent extremism and radicalization and to support criminal investigations and interventions.

Is it possible to monitor and evaluate the impact and effectiveness of measures aimed at countering violent extremism, and for the de-radicalization, rehabilitation and reintegration of radicalized individuals?

Some of the themes coming out of this meeting include the effective criminalization, investigation and prosecution of crimes related to terrorism (including preparatory offences); preventing the misuse of the internet and social media for terrorist purposes, strengthening support for victims of terrorism and the use of victims stories and other counter narratives to terrorist propaganda; the effective de-radicalization, rehabilitation and reintegration of persons vulnerable to terrorist propaganda and narratives that might lead to violent extremism or acts of terrorism; and opportunities and approaches for effective technical assistance and support to Member States to develop, establish and implement such measures at a national level and to monitor and evaluate their impact and effectiveness.

Member states, organizations and groups involved in the 3-day meeting are listed below. The meeting led to significant team building and establishing relationships with key counter terrorism experts across the globe.

  • Belgium Police Superintendent/Head Central Counter Terrorism Department Federal Judicial Police
  • Bosnia and Herzegovina – CT Department, Ministry of Security Adviser, Counter-Terrorism Ministry of Security
  • Canada Criminal Law Policy Section Department of Justice
  • France Magistrate, Director of Criminal Affairs & Pardons Ministry of Justice – Could not attend
  • Permanent Mission of the Federal Republic of Germany to the UN (Vienna), Mission of the Federal Republic of Germany to the UN (Vienna)
  • India Deputy Inspector General, National Investigation Agency
  • Indonesia National Counterterrorism Agency (BNPT) – Deputy of International Cooperation National Counterterrorism Agency (BNPT)
  • Director, International Safety and Security Cooperation Division Japanese Ministry of Foreign Affairs
  • Astana City Prosecutor’s Assistant General Prosecutor’s Office of the Republic of Kazakhstan
  • Morocco Magistrate, Ministry of Justice
  • Kenya Coordinator, Prevention of Radicalization & Violent Extremism, National Counter Terrorism Centre and Permanent Mission of Kenya to the UN (Vienna)
  • Lebanon Director General of the Ministry of Justice
  • Pakistan, Ministry of Defense
  • First Secretary, Permanent Mission of Qatar to the UN (Vienna), Permanent Mission of Qatar to the UN (Vienna)Second Secretary
  • Macedonia, International Cooperation Section Ministry of Internal Affairs
  • Maldives, Chief Superintendent of Police Deputy Head of Intelligence Directorate
  • Russia, Expert, Federal Financial Monitoring Service (Rosfinmonitoring)
  • Tunisia, Judge and Advisor to the Ministry of Foreign Affairs, Secretary of Foreign Affairs, Member, Cabinet of the Minister of Foreign Affairs
  • Turkey, President of Religious Affairs, Dept. of Interreligious & Intercultural Relations
  • UK Head, Counter Terrorism Internet Referral Unit Counter Terrorism Command, Met Police and Detective Inspector for the Met Police
  • Uganda, State Attorney Directorate of Public Prosecutions
  • Senior Rule of Law Advisor & Dept. of Justice Liaison, Bureau of Counterterrorism, US Dept. of State
  • OTIM Expert, Common African Defense and Security Policy
  • Head of Council of Europe, Office in Vienna
  • Europole, Head of Program, IGAD Security Sector Program Inter-Governmental Authority on Development and the Europol Internet Referral Unit
  • Managing Director, Institute for Security Studies Africa
  • Chief Operating Officer, Global Community Engagement & Resilience Fund
  • Transnational Threats Department Action Against Terrorism Unit
  • Cove Research Program Curtin University, Perth
  • Criminologist/Anthropologist/Legal Advocate, Islamabad, Pakistan
  • France – Spokesman, International Federation of Victims of Terrorism (Could not attend)
  • Programme Coordinator, Institute for Strategic Dialogue
  • Vice President, Bangladesh Enterprise Institute
  • Terrorism Research Initiative, (TRI) Vienna
  • Women Without Borders Save Vienna/Austria
  • Media Consultant
  • Associations of European/Spanish Victims of Terrorism
  • Journalist, Media Specialist, Indian Institute of Advanced Study
  • Director, Peacetech Data Networks The Peace Tech Lab, Washington, DC
  • Chief Intelligence Officer Treadstone 71
  • Head, digital transformation Hootsuite
  • FMS Advanced Systems Group United States
  • Industry Lead PS&NS Public Sector Group Microsoft Western Europe

Treadstone 71’s expertise in cyber jihad, cyber intelligence, open source intelligence, cyber counter intelligence activities, both in services and training were highlighted in open discussions and panel events.

In the spirit of information sharing, Treadstone 71 shared its extensive library of audio, video, magazines, manuals, training guides, and overall information with Europol.

JSB

Blog at WordPress.com.

Up ↑

%d bloggers like this: