satellite

Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco

Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided

Read More

Zapad Exercises – 2nd/3rd Order Effects

  The recent Russian Zapad wargaming exercises included a plethora of electronic capabilities demonstration and potentially more. Russia is known to recently been involved in illegal immigration efforts in Sweden, Finland, and Norway along with hostile intent along its northern borders (Estonia, Latvia, Lithuania) including cell/communication tower tampering. Could the recent Zapad exercises be more than just wargaming? Some What If thoughts on these non-linear actions: - Testing capabilities, distance, strength, impacts - Testing responses like…

Read More

Drone Wars! Threats, Vulnerabilities and Hostile Use

References Adamy, D. (2001) EW 101 A First Course in Electronic Warfare, Boston: Artech House. Adamy, D. (2004) EW 102 A Second Course in Electronic Warfare, Boston: Artech House. Adamy, D. (2009) EW 103 Tactical Battlefield Communications Electronic Warfare, Boston: Artech House. Adamy, D. (2015) EW 104 EW against a New Generation of Threats, Boston: Artech House. Anonymous, (2017) GPS/SBAS Signal Generator, GSS4100, Spirent Communications Data Sheet. Satellite AIS, Exact Earth, Ltd. Anonymous, (9/8/2017) Innovation:…

Read More

Intelligence for the C-Suite and Stakeholders

This is a one-day course designed to educate corporate leadership and stakeholders in cyber and threat intelligence.  There is a general awareness of the need to establish intelligence functions. Many organizations do not have a fundamental understanding of what intelligence is, where the function should reside, how it is different from business and competitive intelligence while understanding the overlaps and natural points of integration. This one day course targets corporate leadership delivering a clear and coherent…

Read More

Wilderness of Shlemiels 

Thurs 9:15 AM Moscone South 307. Treadstone 71 talk on adversary infiltration target centric DandD @RSAConference ‬https://www.rsaconference.com/events/us17/agenda/sessions/6113-wilderness-of-shlemiels Register ahead of time for a seat Be there! www.treadstone71.com

Read More

Full Suite of Cyber-Threat Intelligence and Counterintelligence Courses Ready for Global Delivery

HALF MOON BAY, CA (PRWEB) JANUARY 25, 2017 Treadstone 71 today announced a full suite of Cyber and Threat Intelligence and CounterIntelligence training courses. The courses drive the expansion of Treadstone 71’s accelerated, academically validated, intelligence training to global markets. Treadstone 71 delivers courses in California, Virginia, Canada, the United Kingdom, and the Netherlands and is set to expand to the Middle East and Asia later this year. (www.planetreg.com/T71IntelTraining) Treadstone 71 offers a compelling business…

Read More

Cyber Security Predictions – Not Even Reality TV – Just Daytime Entertainment

The plethora of 2017 cyber security predictions do nothing but distract practitioners from executing actual controls and methods of defense and prevention. Each year we get slammed with predictions that are never followed, are common sense, and serve to market and sell products and services. The so-called information and cyber security experts, many times self-proclaimed, spew predictions on all potential areas. This is not much more than fake news and methods to direct readers to…

Read More

The 12 Days of Cyber Christmas

...or What I want for Cyber Security and Intelligence Christmas 2016 All CIOs must have served as a CISO for at least 4 years before being allowed to be a CIO. All CIOs must have a CISSP, CISM, and at least 2 technical information security certifications and have been thoroughly trained and qualified to be a CIO. No more cronyism. CISOs will never report to the CIO – conflict of interest and a recipe for…

Read More

We regard the use of these weapons (nuclear) to be illegal and haram. AEOI CTF – Iranian Nuke Capture the Flag

"...Nuclear energy for all, nuclear weapon for none."

Read More

Drone Attack! Swarm with Hazardous Waste Payload

Prepare drone swarm operators before handling radioactive payloads Begin taking iodine pills Saturate thyroid to block uptake of radioactive iodine Drink red wine before and after exposure Protects chromosomes from radiation damage Drink green tea before and after exposure Inhibits intestinal absorption of Strontium-90 Apply essential oils to exposed skin on the day the radioactive payloads are placed in the attack drones

Read More