Creators Tell What It Takes To Create A Stuxnet, Flame And Duqu

Creators Tell What It Takes To Create A Stuxnet, Flame And Duqu


As more sophisticated cyber espionage tools are discovered the media is still hiding the big picture about what really behind these programs.

The arrogance shown in the military cyber complex recruiting video below and the deep of the recruiters to military industrial complex reveals those who are responsible for training some if not all of the operatives involved in the creation of the Stuxnet, Flame, and DuQu, and their variants.
Stuxnet, Flame, Duqu and Mahdi are but payloads of overall programs designed through the work of cyber intelligence complex.

For those not familiar with the Stuxnet/Flame/DuQu family of cyber espionage tools, this infograph will catch you up to speed Cross-posted from Veracode


The news, anti-virus firms, managed security companies and consultancies all focus on the malware and the code.

They are missing the big picture.

Treadstone 71 and Secure Ninja Open Source Intelligence, Cyber Intelligence and Cyber Counter Intelligence Courses give you the big picture and more.

Watch: What does it take to create the intelligence required for a Stuxnet, Flame or Duqu?

Don’t be fooled by the use of the computer animated characters in this video.

If you have watched the video then you know the video is a propaganda tool recruit people into the DoD’s cyber espionage effort.

It goes into how what a wonderful achievement these cyber espionage tools are and then examines the intelligence effort to create such a great systems but is full of CIA spook talk about using these espionage tools to gather data and create actionable intelligence necessary to protect America from its adversaries.

It then turns into a propaganda recruitment pitch to take classes so you can be trained to join the effort or learn how to defend yourself against it if American’s adversaries use such tactics to target you or your business.

Just check out the Secure Ninja site, the people that made this video.
They are located in Alexandria, Virginia which is just across the river from the Pentagon and are one of the few places that provide actual DOD cyber intelligence and cyber intelligence course.

Further more their instructors also possess TOP SECRET security clearances from the government and proudly boast of their work for several branches of the military and numerous Department of Defense contractor’s.

Specifically the video promotes this course and if you join this will be your trainer:


Jeffrey Bardin

Jeff has held Top Secret clearances since 1982 while working for the US Government (USAF – National Security Agency) breaking codes and ciphers and performing Arabic language translations. He has worked in leadership positions or consulted at both corporate and government organizations such as EMC, Investors Bank & Trust, Hanover Insurance Group, NASA, Centers for Medicare & Medicaid, USDA, General Electric, Lockheed Martin, Marriott International, the United States Air Force and the United States Army National Guard.

Mr. Bardin was awarded the 2007 RSA Conference award for Excellence in the Field of Security Practices. The internationally recognized RSA Conference Award for Excellence in the Field of Security Practices recognizes outstanding achievement in the practice of security within an organization. The judging committee seeks to recognize a security practitioner for their outstanding security program or initiative that made significant contributions to improving the security posture and business processes at their organization. Previous winners include security executives from Nationwide and Bank of New York. The Bardin-led security team from Hanover Insurance also won the 2007 SC Magazine Award – Best Security Team competing against such organizations as Barclays Global and the Department of State.

The companies list of customers include DoD, DoD contractors, several branches of the military, several governments around the world, telecommunications companies and more:

Satisfied customers include:

  • US Department of Defense
  • United States Air Force
  • United States Army
  • The Pentagon (OSD)
  • US Department of Naval Intelligence
  • US Dept of Treasury
  • SAIC
  • SRA
  • CACI
  • America Online
  • MCI /WorldCom
  • General Dynamics
  • Lockheed Martin
  • Northrop Grumman
  • Raytheon Corporation
  • Computer Science Corporation (CSC)
  • Telos / Xacta
  • Electronic On-Ramp (EOR)
  • International Relief & Development
  • Kingdom of Saudi Arabia
  • Embassy of Indonesia
  • Verizon
  • The Centech Group
  • Gupton & Associates
  • Harris Corporation
  • Definiens Corporation
  • Versatone
  • Worldwide Information Network Systems (WINS)
  • Quantico
  • McGuire AFB
  • Bit Defender
  • Synergetics
  • Booz Allen Hamilton

Here’s the Course Objectives:


Upon completion of the course, each student will be able to:

  • Identify the differences and intersections between open source data, open source information and open source intelligence
  • Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course
  • Understand the use of online anonymity
  • Understand collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence
  • know the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations for prevention
  • the basics of Analysis of Competing Hypotheses (ACH) tool and usage
  • the ability to use open source intelligence tools to target, collect, produce and analyze data points into actionable intelligence.
  • how to quickly examine the data for new targeting and potential immediate recommendations and/or opportunities
  • how to gather information based upon provided targets
  • how to use several OSINT tools for data collection
    how to collect, product and analyze data that provid
  • es my organization with a valid view of its Cyber-OPSEC posture
  • know what type of information my adversaries know about my organization and how students can use this to enhance organizational security postures and improve prevention through situational awareness
Categories: WAR & TERRORISM

About Author

Write a Comment