331-999-0071

Two Hundred for Two Years - MASSIVE DISCOUNT TRAINING SUBSCRIPTION - Only 20 subscriptions will be sold

Two Hundred for Two Years (Basically Unlimited)

A subscription to the Treadstone 71 Cyber Intelligence Tradecraft Training Courses at cyberinteltrainingcenter.com gives you access to basic through advanced courses, enough to build a well-skilled cyber intelligence program. The courses are self-paced, video-based, with professor’s office hours, assessed assignments and periodic quizzes.

Two hundred students per year (basically unlimited) for two years for all portal published courses! 20 Subscriptions to be sold. Normal cost for one student and all Treadstone 71 courses is approximately $30K.

Access courses on any internet-enabled device via PC, MAC, iOS, or Android tablets. All you need is a set of headphones and a browser, and you are on your way. You may stop and start lectures as you wish from anywhere at any time.

The Two Year Two Hundred subscription maximizes the potential of your existing staff, guides new employees from junior level through senior. These classes include traditional cyber intelligence and counterintelligence tradecraft along with innovative Strategic Intelligence and Cognitive Warfare trainings. We create the glue that ties the physical intelligence world with the virtual.

What you get: Instant and unlimited access to the Treadstone 71 course catalog (existing and anything created during the two-year period. See the image above for the current course list

Each course includes:

Multiple video lessons (number of lessons varies by course). Supplemental videos and materials, templates, and real-world assignments. Artifacts, documents, readings, and related documents. A Treadstone 71 Reference Guide Some courses require books delivered by Amazon Kindle to each student. Learning assessments (quizzes) used to evaluate knowledge (we assess course content skill by way of practical exercises as opposed to memorized question and answer tests). Certificates of completion with every completed course, Certifications for Courses named as such with CPE credits

Use Treadstone 71 as your primary portal for cyber intelligence, counterintelligence, and cognitive warfare trainings.

Purchase a subscription with 1 seat to Cyberintellipedia for $149k (before December 31, 2022. Another $50k savings. Seats to CyberIntellipedia normal sell for $99K.

Who should take the Treadstone 71 trainings?

$99K plus books is a huge savings to organizations that need training for multiple employees in various collection, analysis, and intelligence tradecraft roles. Positions with titles such as: VP Cybersecurity, CISO, Chief Risk, Information Security Managers, SOC Analysts, Cyber Threat Intelligence Analysts, Operations Analysts, SOC Manager, Chief Security Officer, Head of Cyber Defense, Chief Security Executive, Information Security Analyst, Cyber Security Analyst, Insider Threat Analyst, Cyber Intelligence Analyst, Director Cyber Threat Intelligence, Threat Intelligence Cyber Operations, Cyber Forensics, All Source Intelligence Analyst, Cyber Defense Analyst, Cyber Exploitation Analyst, Cyber Threat/Warning Analyst, Target Network Analyst, Technical Surveillance Countermeasures Analyst, Strategic Intelligence Analyst, Strategic Intelligence Planner, Crime Intelligence Analyst, Open Source Intelligence, Strategy Analyst Intelligence and Foresight, Missions Systems Analyst, Cognitive Warfare Operations, Product Support Hybrid, and Risk Analyst non-inclusively.

Pricing: $99,000 for two years and up to two hundred students may taken any or all Treadstone 71 Intelligence Tradecraft courses. This includes existing, under development, and courses not yet developed. If you signup before the end of 2022, you receive 10% off any payment schedule option.

Payment schedule options: $99,000 up front $50,000 bi-annually $26,000 quarterly $5,000 monthly

Required books are extra. Your subscription activates the day of initial purchase. Each course comes with its own z-fold reference guide.

We also have available a choice for organizational management within our portal for student course status reporting, adding, and removing students, tracking quiz grades, and progress reporting.

Treadstone 71 offers customization for courses including adding internal artifacts, policies, procedures, videos, and rules of engagement as examples of tailoring courses to your needs. This takes a bit longer to setup and requires a small setup fee.

Upon enrollment, each student receives login instructions and the best way to use the portal.



Two Hundred for Two Years - MASSIVE DISCOUNT TRAINING SUBSCRIPTION - Only 20 subscriptions will be sold

Two Hundred for Two Years (Basically Unlimited)

A subscription to the Treadstone 71 Cyber Intelligence Tradecraft Training Courses at cyberinteltrainingcenter.com gives you access to basic through advanced courses, enough to build a well-skilled cyber intelligence program. The courses are self-paced, video-based, with professor’s office hours, assessed assignments and periodic quizzes.

Two hundred students per year (basically unlimited) for two years for all portal published courses! 20 Subscriptions to be sold. Normal cost for one student and all Treadstone 71 courses is approximately $30K.

Access courses on any internet-enabled device via PC, MAC, iOS, or Android tablets. All you need is a set of headphones and a browser, and you are on your way. You may stop and start lectures as you wish from anywhere at any time.

The Two Year Two Hundred subscription maximizes the potential of your existing staff, guides new employees from junior level through senior. These classes include traditional cyber intelligence and counterintelligence tradecraft along with innovative Strategic Intelligence and Cognitive Warfare trainings. We create the glue that ties the physical intelligence world with the virtual.

What you get: Instant and unlimited access to the Treadstone 71 course catalog (existing and anything created during the two-year period. See the image above for the current course list

Each course includes:

Multiple video lessons (number of lessons varies by course). Supplemental videos and materials, templates, and real-world assignments. Artifacts, documents, readings, and related documents. A Treadstone 71 Reference Guide. Some courses require books delivered by Amazon Kindle to each student. Learning assessments (quizzes) used to evaluate knowledge (we assess course content skill by way of practical exercises as opposed to memorized question and answer tests). Certificates of completion with every completed course, Certifications for Courses named as such with CPE credits

Use Treadstone 71 as your primary portal for cyber intelligence, counterintelligence, and cognitive warfare trainings.

Purchase a subscription with 1 seat to Cyberintellipedia for $149k (before December 31, 2022. Another $50k savings. Seats to CyberIntellipedia normal sell for $99K.

Who should take the Treadstone 71 trainings?

$99K plus books is a huge savings to organizations that need training for multiple employees in various collection, analysis, and intelligence tradecraft roles. Positions with titles such as: VP Cybersecurity, CISO, Chief Risk, Information Security Managers, SOC Analysts, Cyber Threat Intelligence Analysts, Operations Analysts, SOC Manager, Chief Security Officer, Head of Cyber Defense, Chief Security Executive, Information Security Analyst, Cyber Security Analyst, Insider Threat Analyst, Cyber Intelligence Analyst, Director Cyber Threat Intelligence, Threat Intelligence Cyber Operations, Cyber Forensics, All Source Intelligence Analyst, Cyber Defense Analyst, Cyber Exploitation Analyst, Cyber Threat/Warning Analyst, Target Network Analyst, Technical Surveillance Countermeasures Analyst, Strategic Intelligence Analyst, Strategic Intelligence Planner, Crime Intelligence Analyst, Open Source Intelligence, Strategy Analyst Intelligence and Foresight, Missions Systems Analyst, Cognitive Warfare Operations, Product Support Hybrid, and Risk Analyst non-inclusively.

Pricing: $99,000 for two years and up to two hundred students may taken any or all Treadstone 71 Intelligence Tradecraft courses. This includes existing, under development, and courses not yet developed. If you signup before the end of 2022, you receive 10% off any payment schedule option.

Payment schedule options: $99,000 up front $50,000 bi-annually $26,000 quarterly $5,000 monthly

Required books are extra. Your subscription activates the day of initial purchase. Each course comes with its own z-fold reference guide.

We also have available a choice for organizational management within our portal for student course status reporting, adding, and removing students, tracking quiz grades, and progress reporting.

Treadstone 71 offers customization for courses including adding internal artifacts, policies, procedures, videos, and rules of engagement as examples of tailoring courses to your needs. This takes a bit longer to setup and requires a small setup fee.

Upon enrollment, each student receives login instructions and the best way to use the portal.

Cognitive Warfare

Cognitive Warfare Training

The weaponization of information influences your thoughts and how you perceive content. Don't be manipulated. Cyber Warfare targets your beliefs, values, and culture.

Targeted Adversary Research

Targeted Adversary Research and Analysis -KNOW YOUR ADVERSARY

Who are they? What are their skills, capabilities, and motivations? What do they know about you!

Training Subscription

Training Subscription - All Treadstone 71 Online Courses for Two Years

Two Hundred Students Per Year for Two Years - All Treadstone 71 online courses for a fraction of the cost. Selling only 20!

Detect Influence Operations

Detect, Analyze, Expose, Counter Influence Operations

.

Triggers, operational content, tactics, and intent, respond, 


Chinese Cognitive Warfare Methods

China is also removing negative historical narratives unsuitable to its interests and rooted in old stereotypes. At the same time, China amplifies its achievements as justified, given historical imperial Chinese leadership combined with current global strength. One such industry is the entertainment business and particularly Hollywood. China does not hide its investment strategies, as evidenced by the Belts and Roads initiative. Notice the investments in movies with an influx of production companies and characters all showing China as a hero as part of the movie funding requirements.

Cognitive Warfare - A Series of New Trainings from Treadstone 71

Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis. We will cover concepts in Cognitive Warfare, Gray Zone Tactics, Disinformation, Influence Operations, Information Operations, Color Revolutions, Neuro-Linguistic Program, Private Intelligence Firms, and more. New dates and locations to be announced this quarter.

Cyber Lifecycle Operations

Cutting edge new course from Treadstone 71.

The course is a hybridized intelligence and counterintelligence course geared towards executing cyberspace operations through structured methods. Students gain practical hands-on skills in cyber militias and foreign legions, space operations, weaponizing conspiracy theories, using disinformation to control narratives, jihadist online operations and locations, and cryptocurrency scams and cash-out schemes, non-inclusively. The course concludes with a program maturity review, competency models for analysts and collectors, and a maturity tracking model for goals and objectives based on the maturity assessment.

(ISSA MEMBERS SPECIAL PRICING)

  • Anonymity and Passive Persona setup - Clandestine Cyber HUMINT
  • Glossary and Taxonomy
  • Operational Security - OPSEC
  • What Intelligence Can and Cannot Do
  • Open-Source Intelligence Techniques and Tools
  • OSINT Tools for Data Manipulation
  • Stakeholder Analysis
  • Intelligence Requirements to PIRs
    • SPECIAL TASKING
      • Strategic Intelligence Analysis
      • STEMPLES Plus - Hofstede Principles - Indicators of Change
      • Strategic Cyberspace Operations
      • Influence Operations
      • Counter-Influence Operations
      • Enhanced Situational Awareness
      • Space Operations
  • Adversary Targeting - D3A F3EAD
  • Time Sensitive Targeting
  • Collection Methods and Techniques
  • Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs
  • Collection Process Flow - Collection (OSINT) Tools and Targeting
  • SPECIAL TASKING
    • Identification and collection of adversary handles and relative data - OSINT / darknet / social media
    • Adversary Denial and Deception
    • Data assessment and analysis
    • Deception detection - Counter-deception planning and execution
    • Course of Action Decision Points
    • Offensive Cyberspace Operations Through Narrative Control
  • Hunch.ly and Use of Maltego – overview
  • Darknet Sites of Interest
    • SPECIAL TASKING
      • Social Media - Off the beaten path review of social media platforms not in the mainstream
      • Adversary use of social media for social engineering
        • Jihadist Sites and where to find them
          • Burn phones
          • Virtualbox
            • Plugins and Use
            • Open Semantic Search - Oracle Virtual Box - OVA setup – Tracelabs
            • Android emulation
          • Portable Social Media
        • Cryptocurrency Scams
          • Cash-out schemes
          • Wallet tracking
          • Social media campaigns
  • Intelligence Lifecycle Production Methods
  • Structured Analytic Techniques – Their use - Case Study - ACH
  • Extended Structured Analytic Techniques - In-depth coverage
  • Source Credibility and Relevance - The real NATO Admiralty Scoring - CRAAP Tool for Relevance
  • Source Validation - Confidence Levels
    • SPECIAL TASKING
      • Disinformation and Conspiracy Theories
      • Fake, Beyond Fake, and the Misinformation Matrix
      • Memetic Warfare
      • Patient Cyber Psyops
      • Identification, Glossary, Targeted Terminology
      • Understanding People - Cognition
      • Terms targeting YOU – The Dunning-Kruger
      • Trolls and the Dark Triad
      • The Pitch-Black Tetrad
      • Weaponizing the Message
      • Tribalism and Cultism
      • Cialdini and Social Psych
      • Vaxx Schedders
  • Types of evidence
  • Production Management
  • SPECIAL TASKING
    • Creating and using cyber militias
    • Rapid Training
    • Militia Members' Levels of Expertise
    • Point and Shoot
    • Cyber Foreign Legion RoE
    • Cyber dead drops and covert coms
    • Targeting for trolling
    • Adversary courses of action
    • Adjust your fire
    • Cognitive Warfare
    • A Cyber Foreign Legion
  • Critical and Creative Thinking
  • Cognitive Bias
  • Analysis and Analytic Writing
  • FINAL SPECIAL TASKING
    • Team Maturity Assessment
    • Skill and Competency Levels
    • Goals and Objectives – Rapid Creation
  • SPECIAL TASKINGS REVIEW
  • Class Review and Wrap-up

Validated and registered students will receive login and preparation information 1 week prior to class start.

Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors. This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome

Enrollment Means Training EULA Acceptance – Strictly Enforced

Enrollment Means Training EULA Acceptance – Strictly Enforced

Content Provider Contact Information

Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.

Please type your full name.

Invalid Input

Invalid Input

Invalid email address.

Please tell us your area of content expertise.

Invalid Input

Enhance Your Skills

Online and In-Person Training Courses

A non-inclusive class list:

  • ANALYTIC WRITING
  • BUILDING A CYBER INTELLIGENCE PROGRAM
  • CERTIFIED CYBER COUNTERINTELLIGENCE ANALYST - INFLUENCE OPERATIONS
  • CERTIFIED CYBER INTELLIGENCE ANALYST
  • COGNITIVE WARFARE
  • CRITICAL THINKING AND COGNITIVE BIAS
  • CYBER MILITIAS - RAPID ORGANIZING AND EXECUTION
  • AGAINST NATION-STATE AGGRESSION
  • DISINFORMATION, MISINFORMATION, DECEPTION, AND NARRATIVE CONTROL
  • INFORMATION OPERATIONS
  • INTELLIGENCE AND COUNTERINTELLIGENCE - CYBERSPACE LIFECYCLE AND OPERATIONS
  • ONLINE - BASIC CYBER INTELLIGENCE TRADECRAFT
  • ONLINE ADVANCED CYBER INTELLIGENCE TRADECRAFT
  • ONLINE ANALYTIC WRITING (REPORTING AND BRIEFS)
  • ONLINE CERTIFIED CYBER COUNTERINTELLIGENCE ANALYST
  • ONLINE CRITICAL THINKING AND COGNITIVE BIAS FOR CYBER
  • ONLINE INTERMEDIATE CYBER INTELLIGENCE TRADECRAFT INTELLIGENCE
  • ONLINE STRATEGIC INTELLIGENCE ANALYSIS
  • ONLINE STRATEGIC INTELLIGENCE ANALYSIS PLUS BUILDING AND ENHANCING YOUR CTI PROGRAM
  • ONLINE THREAT HUNTING WITH TAHITI AND MAGMA
  • STRATEGIC INTELLIGENCE ANALYSIS
  • STRUCTURED ANALYTIC TECHNIQUES
  • Customized training, build-to-order, and targeted adversary training.

Our Next Series of Courses

Private - discreet training

Content Provider Contact Information

Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.

Please type your full name.

Invalid Input

Invalid Input

Invalid email address.

Please tell us your area of content expertise.

Invalid Input

Influence Operations Detection, Analysis, and Countering

Root out Influence Operations

  • Identify operational content to define the narrative(s) while examining imagery and the feelings created by such.
  • Identify potential emotions, instincts, reflexes, and passions intended to exploit.
  • Review content for lies, lander, intermixing of facts, possible conspiracy theories, and contradictory versions of the content across various platforms.
ISIS Online Organization Chart with Technical Listing

Details on the Islamic State and their online organization chart based on their information taken from within their forms and social media channels.

Iranian details of hybrid operations and cognitive warfare actions by Iran

Treadstone 71, LLC, your primary source for cyber intelligence and counterintelligence training and services, released in-depth details of Iranian intelligence-backed hybrid operations and cognitive warfare actions.

“Iranian intelligence uses social media to threaten and impersonate dissident groups, blatantly violating platform rules. Known intelligence operators openly working in cyberspace use social media for command and control,” stated Jeff Bardin, Chief Intelligence Officer at Treadstone 71.

“Basij Cyber Battalions execute plans on Twitter using pre-defined hashtags manipulating social media. These actions combined with physical infiltration of Iranian protests and demonstrations and distributed denial of service attacks shows a hybrid warfare approach to Iranian regime attacks against any opposition, internal and external.”

Treadstone 71 accessed the Iranian intelligence playbook for infiltrating protests. We found Iranian intelligence operators regularly infiltrating demonstrations, perverting protester messaging with divergent disinformation. Basij Cyber Battalions follow Telegram instructions describing how to avoid suspension on Twitter, while the regime develops devious ways to subvert and quash free speech. The plans include threatening messages and warnings on sites such as Telegram, Skype, Whatsapp, and Twitter, issuing instructions to execute cyber operations, how to create and manage fake social media accounts that impersonate media personalities, journalists, opposition leaders, and politicians while spreading false information that demonizes anything and anyone contrary to Islamic Republic’s ideals.

Iranian Influence Operations Assessment Link - July 2020 Iranian Influence Operations Rollup Link

Russian Cyber Warfare - The Russian Cyber Army - KILLNET / Xaknet

Details and organizational chart of Russian Cyber Militia actors in cyberspace.

Russia Release Detailed Propaganda Instructions to Manipulate Ukrainian Nationals

Kremlin propagandists have prepared a specialized 14-page publication for supporters of "Russian peace" in Ukraine: "Handbook for Ukrainian citizens on organizing resistance to the Kyiv puppet government."


Iranian Influence Operations - A Shift in Capabilities -
Published Internally July 2021
Download the report
IRANIAN INFLUENCE CAMPAIGN
Download the Report
LEARN MORE ABOUT OUR TRAINING
Learn More

 

 

VISIT US ON TELEGRAM
Treadstone 71 on Telegram
ALL ONLINE COURSES SUBSCRIPTION
Here is the scoop


  • Training Subscription

    Training Subscription - All Online Courses for Two Years

    We are only selling twenty (20) subscriptions.

    The Two Year Two Hundred subscription maximizes the potential of your existing staff, guides new employees from junior level through senior. These classes include traditional cyber intelligence and counterintelligence tradecraft along with innovative Strategic Intelligence and Cognitive Warfare trainings. We create the glue that ties the physical intelligence world with the virtual.

    What you get: 

    Instant and unlimited access to the Treadstone 71 course catalog (existing and anything created during the two -year period.

    Each course includes:

    • Multiple video lessons (number of lessons varies by course).
    • Supplemental videos and materials, templates, and real-world assignments.
    • Artifacts, documents, readings, and related documents.
    • A Treadstone 71 Reference Guide (see Figure 1 below)
    • Some courses require books delivered by Amazon Kindle to each student.
    • Learning assessments (quizzes) used to evaluate knowledge (we assess course content skill by way of practical exercises as opposed to memorized question and answer tests).
    • Certificates of completion with every completed course, Certifications for Courses named as such with CPE credits.
  • Targeted Research to Uncover Influence Operations

    Detect, Analyze, Expose, Counter, and Contain

    The Treadstone 71 Service for Influence OperationsCounter campaign development

    Identify operational content to define the narrative(s) while examining imagery and the feelings created by such.
    Identify potential emotions, instincts, reflexes, and passions intended to exploit.
    Review content for lies, lander, intermixing of facts, possible conspiracy theories, and contradictory versions of the content across various platforms.

    • Anticipate key target or threat activities that are likely to prompt a leadership decision.
    • Aid in coordinating, validating, and managing collection requirements, plans, and activities.
    • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
    • Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
    • Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
    • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
    • Recognize and mitigate deception in reporting and analysis.
      Assess intelligence, recommend targets to support operational objectives.
    • Assess target vulnerabilities and capabilities to determine a course of action.
    • Assist in the development of priority information requirements.
    • Enable synchronization of intelligence support plans across the supply chain.
    • ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.
  • Cognitive Warfare Training

    The new course that centralizes information operations through cognitive methods. We provide hands-on learning and real-world execution using unique techniques taken from both allies and adversaries.

    We will cover concepts in Cognitive Warfare, Gray Zone Tactics, Disinformation, Influence Operations, Information Operations, Color Revolutions, Neuro-Linguistic Program, Private Intelligence Firms, and more. We include review of cognitive warfare approaches, a potential framework, historical examples, rational processes, bias in perception and cognition, decision making and time pressures, domains of conflict and combatants, factors influencing decisions, speed and overload, manipulating situational awareness, inducing behavioral change using deception, distraction, distrust, chaos, and confusion. Students learn to assess adversaries for susceptiblity to cogntive weapons and what to observe for potential impacts. Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis.


DMCA.com Protection Status

Treadstone71 Video Library Contains a Wealth of Information and Media Video Related to Cyber Intelligence

Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.

Since 2002  CONTACT US TODAY