We are pleased to announce the release of the latest bridgehead.exe automatic installation tool (v1.1.0) for the Kestrel TSCM Professional Software. This latest release provides a new reference release (version) identifier to prevent any confusion as to whether the most current bridgehead.exe file is being utilized on the target system. It is strongly recommended that all operators follow the process to access the new auto update tool for the Kestrel TSCM Professional Software by uninstalling any existing installer and removing all old drop files from the installation directory. Next, download and run the latest bridgehead.exe auto installer. This will invoke a full automatic download of the latest full installer, or required new files to keep the installation representative of the latest official release code by adding newly released feature-sets. The process is simple; each time the software is run and a network connection is available, the auto update tool will contact the Kestrel update server, check the current version installed, and download any new full installer or feature updates required. This process is extremely fast and does not require any additional steps by the technical operator. For air gap systems, the automatic update tool can be inhibited by simply adding the parameter < inhibitupgrade > to the desktop shortcut command line. This is a powerful new capability milestone for the Kestrel TSCM Professional Software. This new process will ensure that the latest innovative features are available and ensure that newly identified threat technology are addressed in near real-time. We have also released the February 2022 Kestrel TSCM | SIGINT Newsletter for online viewing or download as a PDF file. This month the newsletter includes the following content; Kestrel Optical Detection Sensor Technology, Automatic Software Update Tool, and the Canadian Technical Security Conference (CTSC). This edition of the newsletter marks the 80th release since July 2015. Our newsletters do not simply redistribute and repackage old news stories, but address complex subject matter relevant to emerging threat actor technology and have a serious educational component. We address and tackle real-world deployment applications and bring to light best practices and identify obsolete concepts. For the latest updates on the Espionage Research Institute International (ERII), please visit the website.