Clandestine Cyber HUMINT / OSINT

On Demand
February 20 - 24, 2017
7:45 AM


, YT

Open Map in new window

Already Registered?

Enter your Last Name and Confirmation ID to review your record.

Last Name or Email

Clandestine Cyber HUMINT / OSINT
Registration Information - Treadstone 71 Clandestine Cyber HUMINT / OSINT
Dates and Times TBD  

Course syllabus and content proprietary to Treadstone 71
Cyber Intelligence Tradecraft Certification
Cyber CounterIntelligence Tradecraft Certification
Cyber Intelligence Analyst Certification
These dates and locations are in the works with more to come. London or near Amsterdam 2017 – 1/30-2/3 in the works as well.  

2017 Training Dates
  • 1/30-2/3 Amsterdam - Class Completed
  • 2/20-2/24-Chantilly
  • 3/13-3/17-Indianapolis area
  • 4-10-4/14-Palo Alto
  • 5/1-5/5-Denver
  • 6/5-6/10-Chantilly
  • 7/17-7/21-Palo Alto
  • 8/7-8/11-Chantilly
  • 10/2-10/6-Palo Alto 
(or on demand including in-house or by location)

FS-ISAC Sponsored Courses:

Cyber Intelligence Tradecraft Training
3-7 April | Reston, VA
More | Register
Cyber Intelligence Tradecraft Training
8-12 May | London
More | Register
Cyber Intelligence Tradecraft Training
19-23 June | Reston, VA
More | Register
Cyber Intelligence Tradecraft Training
21-25 August | Reston, VA
More | Register


Clandestine Cyber HUMINT / OSINT

The Clandestine Cyber HUMINT / OSINT course is designed to provide the student with tactics, techniques, and methods for remaining anonymous while performing targeted adversary data collection.
This course educates students on how to install and use, Tor, Tails, Maltego, Oryon, and I2P non-inclusively. Students will learn how to install and use these tools from flash drives meant to assist in anonymous methods. (NOTICE: Tails does not work on all laptops and has difficult with gaming laptops, new laptops, and sometimes Apple devices.) We will take you through how Tor, Tails, and I2P work along with tips and methods to maintain operational security.
Students, using their own laptops are provided flash drives with the necessary tools. Students will execute the installation and use, and use the tools in live case studies targeting actual adversaries. (NOTE: All activities performed stay within the letter of the law). Students will use the tools embedded within the browsers, operating systems, and apps getting hands-on experience.
The second phase of the training covers social media intelligence focusing on target acquisition and exploitation. Using Treadstone 71 provided burn phones (US only) and the anonymity toolsets, students use case studies to effectively gather information on adversaries. Students will create multiple accounts on various web platforms, social media applications, and other applications used for anonymous and encrypted communications.
The third phase of the training covers persona development and management. Students will be required to create a series of identities, character development and dimensions (motivation, methodology, evaluation, and purpose), storyline, plot synopsis, story drive and limit, story weaving, applicability, scope, tools to be used, methods of interaction with other identities, engaging secondary characters, refining targeting, while developing a campaign to gain street credentials.
The final phase of the course provides an overview on Darknet access, tools, sites for exploration, wikis, and any current known sites.  

This is an on-demand course and not regularly scheduled. Due to the nature of this course, students must provide valid identification via corporate accounts to determine eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo and the like).

Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).1
$6590.00 required before course start.

This course combines lecture, research, and hands-on team assignments. Students need to bring a laptop (PC or MAC) that does not have corporate controls (tablets will not suffice). PC works best.

Course material is not for resale or commercial use outside the end user license agreement. Course material may not be used for competitive purposes.

You must attend the full class in order to receive all course material and the certification. Certification is granted after completion of course instruction and hands-on application of the concepts in 3 to 4 team exercises. If a student leaves the class prior to course completion, neither the certification is granted nor is the course material covered after the student leaves made available.  Lectures and associated material is posted each day after each lecture. This method supports the student in a just-in-time manner. This method ensures full understanding of the material without discovering course plot lines until the proper time. The course is architected to support a particular process flow and learning method.
Registration     Date TBD 20

Student     $6,590.00

Event Details

DATE TBD. 7:45AM - 5PM Monday through Thursday. 7:45AM - 3PM Friday.

Laptops without corporate controls required.  Personal laptops allowed.  Administrative access required.  Pre-requisites - Strong understanding of the Internet and web browsers. MAC or PC is fine but PCs preferred. Tablets will not work.

All students need to take the below Myers-Briggs personality test prior to the class.  This may be performed here:

Target audience:  CISOs, SOC Managers, Cyber / Information Security VPs, Directors, Analysts, Intelligence analysts, law enforcement, Intelligence Community, and those wishing to learn proper methods of analysis.

No refunds allowed after DATE TBD. Refunds are minus processing fees. Please read the course end user license agreement:

Course EULA


online event registration system provided by: PlanetReg
2017 Hemko Systems Corp. All rights reserved. Unauthorized use prohibited.