Baseball Cards - Adversary Targeting

baseballcardsTargeting focuses on achieving stakeholder objectives. It is the function of targeting to achieve efficiently those objectives within the parameters set at the operational level, directed limitations, the rules of engagement, or rules for the use of force in the cyber world, and other guidance given by stakeholders.baseballcards2

Targeting seeks to create specific desired effects through adversary infiltration and data extraction. Target analysis encompasses all possible means to create desired effects, drawing from all available capabilities. The art of targeting seeks to create desired effects with the least risk and expenditure of time and resources. Targeting is a fundamental task of cyber operations that encompasses many disciplines and requires participation from skilled intelligence operators with many different capabilities that far exceed technical skills.

Read more ...

Treadstone 71 Cyber Security Services

Cultural barriers and technical obstacles limit the effectiveness of the efforts of many security organizations.  In response, Treadstone 71 created Trusted Advisory Services.  We very quickly provide customers an unadulterated view of their security and risk posture.  The service provides timely intelligence on how to effectively mature operational inefficiencies while aligning security directly with business and regulatory requirements.  As a result, compliance is translated into actionable solutions and costs are reduced through the effective and efficient integration of security. T71ITILSecMgmt

Most of our competitors focus on risks that align to their offerings.  Treadstone 71 focuses on your business risk.  We know you are concerned with the theft of business critical information. We understand your worries over fraudulent buyers, sellers and the theft of authorization details. We have resolved the disputes that occur due to a lack of defined responsibility and accountability. Treadstone 71 recognizes the frustration and loss of confidence that occurs when systems do not work properly or errors and mistakes cause costly outages and information disclosure. Our Trusted Advisory Services embeds information security risk into your lifecycle ensuring cost reductions while demonstrating security as a true business enabler.

Read more ...

Virtual CISO

Treadstone 71 provides information security leadership service that is designed to assess and benchmark your organization's information security and network security posture. The Interim CISO Service is customized and scaled based on the size of your organization and industry type. Treadstone 71 provides a structured approach used to measure security and develop the strategic security direction for organizations using internationally recognized information security standards. The Treadstone 71 Interim CISO service focuses on prevention by proactively examining your security infrastructure prior to remediation efforts. In addition, Treadstone 71 measures compliance with the ISO27001/2/5, the CISSP Common Body of Knowledge, Common Criteria, and NIST Security Standards non-inclusively. Treadstone 71 utilizes standards for gap analysis and risk assessment such as the National Security Agency’s Information Assurance Methodology non-inclusively, while incorporating best practices from BITS & FFIEC (for financial services) and FISMA/NIST RMF for asset intensive requirements.

Read more ...

Social Networking Intelligence Services

Social network targeting, data collection, production, analysis and reporting is very much center stage at Treadstone 71. sn1Intelligence of any type must be applied if it is to be useful, and it needs to be actionable. In most cases, this implies that the intelligence has to be transmitted, communicated, shared and delivered with clear recommendations and opportunities to the client.

Treadstone 71 integrates counterintelligence and cyber counterintelligence as extracted and analyzed from social networking and other Web 2.0 sites. We have taken the physical tradecraft of intelligence and applied cyber methods to this mature discipline. We help organizations recognize how they are being targeted for intelligence collection purposes and, provide cyber counterintelligence support and services to defend against this threat.

Read more ...

Search Our Site

Treadstone 71 - We See What Others Cannot

The Cyber Intelligence Training delivered and created by Jeff Bardin adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio, 

Fortune 100 Company


Use HOLIDAY2018 as a Coupon Code at checkout to save big! November 20-December 8

January 8-12 Cyber Intelligence- Amsterdam, NL
February 5-9 Cyber Intelligence- Reston, VA
March 19-23 Cyber Intelligence- Columbia, Maryland
April 9-13 Cyber Intelligence- London, UK
April 30 – May 3 Cyber Intelligence - Los Angeles California
May 14-18 Cyber Intelligence- San Jose, CA
June 18-22 Cyber Intelligence- Annapolis Junction, Maryland
Aug 13-17 Cyber Intelligence- Reston, VA
Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland

Students and organizations taught (non-inclusively):

AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

  Treadstone 71 Cyber Intelligence Services

  Treadstone 71 Expands Groundbreaking Services


Cyber Jihad - 2008-2011 Compilation Part 1


Cyber Jihad - 2008-2011 Compilation Part II


Iran Cyber Proxies and Capabilities 

Gaming as a Method of Jihadist Training








Treadstone 71 Cyber Intel Services / Training