We See What Others Cannot - WWW.TREADSTONE71.COM
  1.   The recent Russian Zapad wargaming exercises included a plethora of electronic capabilities demonstration and potentially more. Russia is known to recently been involved in illegal immigration efforts in Sweden, Finland, and Norway along with hostile intent along its northern borders (Estonia, Latvia, Lithuania) including cell/communication tower tampering. Could the recent Zapad exercises be more than […]
  2. References Adamy, D. (2001) EW 101 A First Course in Electronic Warfare, Boston: Artech House. Adamy, D. (2004) EW 102 A Second Course in Electronic Warfare, Boston: Artech House. Adamy, D. (2009) EW 103 Tactical Battlefield Communications Electronic Warfare, Boston: Artech House. Adamy, D. (2015) EW 104 EW against a New Generation of Threats, Boston: […]
  3. Hybrid warfare – conventional, irregular, terrorist, criminal Non-linear warfare includes those plus cyber, information, economic, diplomatic, political, cultural, religious, and social means Treadstone 71 on I24News Subvert the enemies social and political structure – political and social agitation, remove confidence in a system, sow seeds of discontent, pit brother against brother = create confusion and […]
  4. Chief of the General Staff of the Armed Forces of the Russian Federation / First Deputy Minister of Defence of the Russian Federation, General of the Army. Валерий Васильевич Герасимов Born      8 September 1955 (age 62) Kazan, Tatar Autonomous Soviet Socialist Republic Married – one son Russian hackers reportedly stole NSA data via Kaspersky Lab […]
  5. Syrian violations of sanctions with Russian FSB assistance to manufacture ballistic vests – Not discovered by any organization other than Treadstone 71 – No sensors, no aggregation of thousands of taps – Just hard-nosed open source collection and analysis Russian malware tied to BlackEnergy / Dragonfly embedded in PLC software at Delta Electronics Taiwan […]
  6. Post 9 – Abu Bahgat “Hatem Deeb” – Syrian Electronic Army Leadership – : The Facebook page of Hatem Deeb – August …
  7. Parts 3 and 4 of Post 5 - Syrian Electronic Army - SEA
  8. SEA emails - listings from Syrian Electronic Army Foot Soldiers Post 5
  9. Past report on Syrian Government collusion with Russia to bypass sanctions against Syria. This instance involves acquiring materials and machines to manufacture their own body armor in Latakia by way of the UAE where a Syrian soldier working with a female FSB agent centralize the acquisitions. Visas, passports, military IDs, fake names, bills of lading […]
  10. U.S. warns public about attacks on energy, industrial firms (Reuters) - The U.S government issued a rare public warning that sophisticated hackers are targeting energy and industrial firms, the latest sign that cyber attacks present an increasing threat to the power industry and other public infrastructure. The Department of Homeland Security and Federal Bureau of Investigation warned in a report distributed by email late on Friday that the nuclear, energy, aviation, water and critical manufacturing industries have been targeted along with government entities in attacks dating back to at least May.

Search Our Site

Treadstone 71 - We See What Others Cannot

The Cyber Intelligence Training delivered and created by Jeff Bardin adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio, 

Fortune 100 Company


Upcoming Classes

Current Courses (dates, locations, topics subject to change):
Cyber Intelligence Reston - October 2017 (October 16-20)

2018 Course Dates - Locations TBD 

January 15-19 Cyber Intelligence- Dallas/Plano, TX
January 22-26 Cyber Intelligence- Utrecht, Netherlands
February 5-9 Cyber Intelligence- Tyson Corner Virginia
March 19-23 Cyber Intelligence- Columbia, Maryland
April 2-6 Cyber Intelligence- London, UK
April 30 – May 3 Cyber Intelligence - Los Angeles California
May 14-18 Cyber Intelligence- San Jose, CA
June 18-22 Cyber Intelligence- Annapolis Junction, Maryland
Aug 13-17 Cyber Intelligence- Reston, VA
Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland

Students and organizations taught (non-inclusively):

AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

  Treadstone 71 Cyber Intelligence Services

  Treadstone 71 Expands Groundbreaking Services


Cyber Jihad - 2008-2011 Compilation Part 1


Cyber Jihad - 2008-2011 Compilation Part II


Iran Cyber Proxies and Capabilities 

Gaming as a Method of Jihadist Training








Treadstone 71 Cyber Intel Services / Training