Wilderness of Shlemiels

Posted on in Presentations

We need to find ways to passively and actively neutralize adversarial operations. This needs to be considered a primary option. We need to identify, disrupt, neutralize, penetrate and exploit adversaries. We need to utilize denial and deception activities. We need to manipulate and control messaging. We need to maintain information superiority against our adversaries.
Jeff Bardin


Chief Intel Officer, Treadstone 71

Hackers & Threats

cyber warfare & cyber weapons cyber espionage cyber espionage hackers & threats



Share With Your Community