Treadstone 71 Cyber Intelligence Subscription Program

The Cyber Intelligence 12-Month Online Subscription Program is designed to guide organizations in their cyber and threat intelligence program builds through online lectures, demonstrations, and templates covering a wide range of topics. After years of teaching intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers the subscription-based, automated program guiding clients through the strategic planning process, goals and objectives creation, maturity assessment, SOP development, threat intelligence platform selection, collection planning, intelligence analysis, analytic writing, and dissemination non-inclusively.

The program includes instructional videos tied to content with periodic direct access to Treadstone 71 for client deliverable reviews. The reviews follow a standard cycle including comments, suggestions, recommendations, and examples of previously finished products. Treadstone71 also offers regular ‘professor’ office hours for Q&A.

The program follows proven methods established over the years while creating intelligence programs. Clients move at a regular pace that corresponds with their internal schedules that Treadstone 71 helps to establish with the client. Clients may choose the entire subscription package or choose modules ala-cart. The subscription also includes the standard Cyber Intelligence Tradecraft Certification training and adds a new module assisting clients with the creation of table-top exercises.

An overview of some of the subscription content follows:

  • Strategic Plan development, acceptance, and dissemination
  • Mission
  • Vision
  • Guiding Principles
  • Roles and Responsibilities
  • Goals and Objectives
  • Roadmap
  • Cyber Intelligence Capability Maturity Model Assessment
  • Standard operating procedures
  •               RACI(S)
  •               Process flow diagrams
  •               Associated metrics
  •               Peer Reviews
  • Intelligence Functions
  • Communications, Responsibilities, Methods
  • Practices and Activities
  • Organizational interfaces
  • SOC and IR
  • Other intelligence groups
  • CISO/CSO and CIO
  • C-Suite
  • Department leadership
  • External groups
  •                            Vendors
  • Cyber Intelligence Lifecycle definition
  • Stakeholder Analysis
  • Collection Planning
  • Production
  • Structured analytic techniques
  • Analysis
  • Analytic Writing
  • Reporting and Briefing
  • Dissemination
  • Intelligence Information Sharing
  •               Enterprise objectives
  •               Communities of Interest
  •               Your internal ISAC
  • Threat Intelligence Platforms
  •               RFP and Selection process
  •               Maturation
  •               Vendor data feeds
  • Training and Knowledge Transfer
  •               Cyber Intelligence Tradecraft Certification
  •                            In-person
  •                            8-week online
  • Treadstone 71 Onsite Assessment and Assistance

Clients subscribing to the program create program content undergoing Treadstone 71 review prior to leadership delivery. The intent is to share our vast expertise in cyber intelligence to assist organizations in the timely building of their programs. Clients may choose to extend their program beyond a year or accelerate their program based upon their acceptance of agreed upon assumptions and requirements. Clients have the ability to speed up or slow down their programs throughout the subscription.

Mixmatch

We see this model as an effective and efficient way to extend our knowledge, share our standards-based program information while setting up an industry model rooted in intelligence community tradecraft. That tradecraft follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training, intelligence community directives (ICDs), content from the Sherman Kent School for Intelligence Analysis and Mercyhurst University as well as boots on the ground experience.

What do you have at the end of the program?

As clients carefully follow the training, timelines, and execute to the deliverables internally, clients will have built a complete cyber threat intelligence program. The program definition, strategy, policies, procedures, process flow diagrams, roles, responsibilities, templates, models, methods, tactics, techniques, reports, dissemination models, briefings, table-top exercises, as well as certified Cyber Intelligence Tradecraft professionals are all core components of the what clients achieve.

Our pricing model will be a fixed price for the core modules with add-on modules priced separately. Treadstone 71 onsite work options will be clear and defined with the ability of clients to purchase onsite and online ‘office hours’ over and above hours provided in the core modules. Clients will have the choice of selecting from several options.

For more information about this new program, contact Treadstone 71 at 888.714.0071 or info@treadstone71.com. We will respond to all inquiries as long as they are from corporate and business accounts.

Copyright 2018 Treadstone 71 LLC

Gerasimov Doctrine in Full Swing against the US

The Gerasimov Doctrine is in use in the United States and will come to another crescendo in the near future as our 2018 elections come to bear. Learn how to identify some of the methods when they occur.  #education #cyber #training #intelligence #intel #analysis#collection #elections #analysts #doctrine #intelligencecollection#intelligenceanalysis #gerasimov #putin #russia #olgino

How to help identify propaganda coming from any source. Gerasimov Doctrine in action in the United States.

Where does the speaker or group get their funding? What is their background?

Who are their main supporters?

Does the content have a strong emotional aspect?

Do they provide or describe ominous, stirring, or patriotic images or music?

Do they associate a group, person, event, or idea with something hated or feared?

Do they use slogans of any type that have been heard before and repeated?

Do they use virtue words (e.g. peace, happiness, security, wise leadership, freedom, liberty)?

Is their reasoning poor?

·      Illogical or non-intuitive relationships between concepts

·      Sweeping conclusions from mere anecdotal evidence

·      Issues framed to favor one point of view while deflecting and pivoting

·      Irrelevant or questionable data

·      Vague, undefined terms and concepts

Do you see evidence of false or missing information (telling only half of the story)?

Is there oversimplification?

·      Simple answers to complex social and political questions

·      Blame assigned to an individual or group (scapegoating) without evidence

·      Misleading stereotypes or labels

·      Blanket statements

Is the aim of the article to persuade?

·      Cites or associates prominent figures to a position, idea, argument, or action

·      Repeats ideas until they are accepted as truth

·      Presents ideas as the view of the majority (so get on the bandwagon – wake up)

·      Implies that opposition (to the author’s premise) would be unpatriotic, undemocratic, or inhumane

Does it align information that is not objective and is used primarily to influence an audience and further an agenda? Are facts presented selectively to encourage a particular synthesis or perception or using loaded language to produce an emotional rather than a rational response to the information that is presented. Are the contents associated with material prepared by adversarial governments while ignoring the issues associated with those they support?

Influence operations are focused on affecting the feelings and behaviors of leaders, groups, or entire populations. Influence operations employ capabilities to affect behaviors, protect programs that support their intent, and project false information interspersed with some accurate data to achieve desired effects across the cognitive domain. Influence operations are the coordinated, integrated, and synchronized application of national diplomatic, informational, military, economic, and other capabilities in peacetime, crisis, conflict, and post-conflict to foster attitudes, behaviors, or decisions by US citizens driven by foreign entities bent on creating chaos.

Biases are systematic errors in judgment that human beings consistently make, and our adversaries continue to use against the US populace. Here are 10 that help explain why we will never stop falling for their propaganda and methods to ensure chaos in our society:

1.     Bias blind spot — the tendency not to compensate for one’s own cognitive biases. (This is why nobody thinks they’re biased)

2.     Third-person effect- Belief that mass communicated media messages have a greater effect on others than on themselves. (This is why propaganda is so effective. It does not affect me!)

3.     Authority bias — The tendency to attribute greater accuracy to the opinion of an authority figure (unrelated to its content) and be more influenced by that opinion. (This is why some of Trump’s supporters believe everything he says no matter what)

4.     Declinism – The belief that a society or institution is tending towards decline. Particularly, it is the predisposition to view the past favorably and future negatively. (This is why ‘Make America Great Again’ was such an effective message)

5.     Confirmation bias — the tendency to search for or interpret information in a way that confirms one’s preconceptions. (This is why people click on fake news they want to be true)

6.     Bandwagon effect — The tendency to believe things because many other people believe the same. (This is why people believe fake news shared by their friends)

7.     Availability cascade — A self-reinforcing process in which a collective belief gains more and more plausibility through its increasing repetition in public discourse. (This is why fake news become true the more it is shared)

8.     Continued influence effect — The tendency to believe previously learned misinformation even after it has been corrected. (This is why Hillary’s ‘formal accusation’ had such a big effect even after Comey dropped charges)

9.     Hostile media effect — the tendency to perceive news coverage as biased against your position on an issue. (This is why millions of voters don’t trust the mainstream media)

10. Backfire effect — The urge to do the opposite of what someone wants you to do out of a need to resist a perceived attempt to constrain your freedom of choice. (This is why the media ganging up on Trump completely backfired)

What to learn more?

www.planetreg.com/T71IntelTraining

www.cyberinteltrainingcenter.com

www.treadstone71.com

Blog at WordPress.com.

Up ↑

%d bloggers like this: