Clandestine Cyber HUMINT-OSINT-OPSEC (Tails, Tor, Blackphone, VPNs, Encryption tools, Financial OPSEC, Persona Creation and Management)


On Demand
May 1 2017 - May 1, 2018
7:45 AM


Where
TBD

, YT


Open Map in new window

Already Registered?

Enter your Last Name and Confirmation ID to review your record.


Last Name or Email
ID




Clandestine Cyber HUMINT-OSINT-OPSEC (Tails, Tor, Blackphone, VPNs, Encryption tools, Financial OPSEC, Persona Creation and Management)
 
Course syllabus and content proprietary to Treadstone 71
*********************************************************************
Cyber Intelligence Tradecraft Certification
Cyber CounterIntelligence Tradecraft Certification
Cyber Intelligence Analyst Certification
These dates and locations are in the works with more to come. London or near Amsterdam 2017 – 1/30-2/3 in the works as well.  


2017 Training Dates
  • 1/30-2/3 Amsterdam - Class Completed
  • 2/20-2/24-Chantilly
  • 3/13-3/17-Indianapolis area
    • https://stimulusengineering.regfox.com/cyber-series-course-1-cyber-intelligence-tradecraft-certification
    • https://stimulusengineering.regfox.com/cyber-series-course-2-cyber-counterintelligence-tradecraft-certification
    • https://stimulusengineering.regfox.com/cyber-series-course-3-clandestine-cyber-humint-osint
    • https://stimulusengineering.regfox.com/cyber-series-course-4-cyber-intelligence-analyst-certification
  • 4-10-4/14-Palo Alto
  • 5/1-5/5-Denver
  • 6/5-6/10-Chantilly
  • 7/17-7/21-Palo Alto
  • 8/7-8/11-Chantilly
  • 10/2-10/6-Palo Alto 
(or on demand including in-house or by location)

FS-ISAC Sponsored Courses:

Cyber Intelligence Tradecraft Training
3-7 April | Reston, VA
More | Register
Cyber Intelligence Tradecraft Training
8-12 May | London
More | Register
Cyber Intelligence Tradecraft Training
19-23 June | Reston, VA
More | Register
Cyber Intelligence Tradecraft Training
21-25 August | Reston, VA
More | Register

*********************************************************************

Clandestine Cyber HUMINT / OSINT / OPSEC

This training is designed to provide the student with tactics, techniques, and methods for remaining anonymous while performing targeted adversary data collection.
 
The course educates students on how to install and use, Tor, Tails, Maltego, Oryon, and I2P non-inclusively. Students will learn how to install and use these tools from flash drives meant to assist in anonymous methods. (NOTICE: Tails does not work on all laptops and has difficult with gaming laptops, new laptops, and sometimes Apple devices.) We will take you through how Tor, Tails, and I2P work along with tips and methods to maintain operational security.
 
Students, using their own laptops are provided flash drives with the necessary tools. Students will execute the installation and use, and use the tools in live case studies targeting actual adversaries. (NOTE: All activities performed stay within the letter of the law). Students will use the tools embedded within the browsers, operating systems, and apps getting hands-on experience.
 
Students will learn OSINT tools, methods to setup their laptops for anonymity and safe online usage, open source intelligence collection methods, methods of counterintelligence, practical applications of these capabilities to provide defensive, preventive, and predictive intelligence capabilities.
 
The training covers social media intelligence focusing on target acquisition and exploitation. Using Treadstone 71 provided burn phones (US only) and the anonymity toolsets, students use case studies to effectively gather information on adversaries. Students will create multiple accounts on various web platforms, social media applications, and other applications used for anonymous and encrypted communications.
 
The training also covers persona development and management. Students will be required to create a series of identities, character development and dimensions (motivation, methodology, evaluation, and purpose), storyline, plot synopsis, story drive and limit, story weaving, applicability, scope, tools to be used, methods of interaction with other identities, engaging secondary characters, refining targeting, while developing a campaign to gain street credentials.
 
In addition, we will cover secure Blackphone use and configuration using the Silent Phone from Silent Circle. We will cover peer to peer calling, text, video, and conference calls as well as secure messaging and file transfers, and full burn functionality. We cover the Security Center, Privacy Meter, phone settings, spaces management, encryption options, individual app permissions, remote wipe capabilities, unknown sources, user defined privacy levels, and spaces. Spaces coverage includes setting up secure containers (up to 3) where various work efforts are maintained separately.
 
Personal Spaces
Personal spaces are entirely customizable. You decide what to call them, which apps live in them, and even what kind of access a space itself gets – whether you can make phone calls from the space, if it has access to your location, and so on. Personal spaces let you design and control separate areas to meet your own unique needs and privacy concerns.
 
Silent Spaces
A Silent Space is similar to a Personal Space, but it does not include Google apps and does not support Google services. You can install new apps in a Silent Space using a third-party app store of your choosing (or by allowing installation from unknown sources) but remember that any apps that require Google services for full functionality may not work as expected.
 
Managed Spaces
Managed Spaces are typically generated by your employer and deployed via an emailed link, or by scanning a QR code. Settings for these Spaces are determined by the third party who creates them: for example, your employer may want to create a Managed Space on your device specifically for your work apps and data, with specific privacy and security settings; or the organizers of a conference may offer a space that includes the conference program, maps, related apps, and supporting materials. When the conference is over, you can easily delete the whole space.
 
Students will also use the Silent Circle applications available on IOS and Android, use and swapping of SIM cards, virtual encrypted chat, messaging, and
 
This course provides an overview on Darknet access, tools, sites for exploration, wikis, and any current known sites.  We also cover the use of gift cards and other online payment methods to assist in operational security and privacy, where to buy them, the restrictions and scrutiny you face and questions you may be asked. Burn phone usage and setup is covered.
 
The course covers the acquisition and use of VPNs, VPNs without logs, Proxies, browser add-ins/extensions for security and privacy, and applications/tools such as:
 
  • Cyphr, Viber, WhatsApp, Wickr, Threema, Signal, Telegram, Zyptonite
  • Virtru, Protonmail, Anonymous Email(s) – Encrypted email and other private email solutions
  • FakeGPS, GeoTag
  • Redphone, Burner, Callmask, Disposal Numbers, Sideline, Caller ID Faker, Spoofcards, Secure Call, SendHub, Truecaller, Spoof Text
  • DuckDuckGo, Startpage, ixquick, Orbot, Red Onion, Anonymous Browers, Orfox, Fire.onion, Anonymous Deep Web Browser, Tornado, Orxy, InBrowser, I2P, Ghostery, Krypton
  • WoogambleVPN, ProXPN, VyprVPN, CyberGhost, TunnelBear, Hotspot Shield, Hola, SuperVPN, Cloud VPN, OpenVPN Connect, Turbo VPN, PureVPN, Nord
  • Fake Voice Call, Voice changer with effects, Fake Call with Fake Voice, Voice Changer, Voice Changer
Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).1
$6590.00 required before course start.

This course combines lecture, research, and hands-on team assignments. Students need to bring a laptop (PC or MAC) that does not have corporate controls (tablets will not suffice). PC works best.

Course material is not for resale or commercial use outside the end user license agreement. Course material may not be used for competitive purposes.

You must attend the full class in order to receive all course material and the certification. Certification is granted after completion of course instruction and hands-on application of the concepts in 3 to 4 team exercises. If a student leaves the class prior to course completion, neither the certification is granted nor is the course material covered after the student leaves made available.  Lectures and associated material is posted each day after each lecture. This method supports the student in a just-in-time manner. This method ensures full understanding of the material without discovering course plot lines until the proper time. The course is architected to support a particular process flow and learning method.
 
Registration     Date TBD 20

Student     $6,590.00
 


Event Details

DATE TBD. Approximate times 7:45AM - 5PM Monday through Thursday. 7:45AM - Noon Friday.

Laptops without corporate controls required.  Personal laptops allowed.  Administrative access required.  Pre-requisites - Strong understanding of the Internet and web browsers.  PCs preferred. Tablets will not work.

All students need to take the below Myers-Briggs personality test prior to the class.  This may be performed here:  www.humanmetrics.com/cgi-win/jtypes2.asp

Target audience:  CISOs, SOC Managers, CounterIntelligence Operators, Cyber / Information Security VPs, Directors, Analysts, Intelligence analysts, law enforcement, Intelligence Community, and those wishing to learn proper methods of analysis.

No refunds allowed after DATE TBD. Refunds are minus processing fees. Please read the course end user license agreement:

Course EULA



 
 



online event forms provided by: PlanetReg
2017 Hemko Systems Corp. All rights reserved. Unauthorized use prohibited.