Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
OSINT Podcasts

1
OSINT with ShadowDragon & Digital Tools For Modern Investigations
Daniel Clemens from ShadowDragon, LLC
This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.
…
continue reading
Experience the Cold War like never before with Cold War Conversations — an award-winning podcast recommended by The New York Times. Each week, host Ian Sanders brings you raw, firsthand accounts from the people who lived through one of history’s most tense and transformative eras — soldiers, spies, civilians, and more. These aren’t stories from textbooks. They’re unfiltered voices from the frontlines of history — emotional, gripping, and deeply human. This is Cold War history, told from the ...
…
continue reading
Here at Cyber Sector 7 our main goal is to Inform you and give you Security Tips, Digital Privacy Tips, OSINT Methods, and to teach you about hacker methods, culture, and news. We want to inform you of how important security and privacy is. This is for everyone, even if you know nothing about computers, we want you to stay informed.
…
continue reading
Welcome to OSINT Cocktail - a podcast about tools for investigators. Kirby Plessas and Cynthia Navarro interview investigators of all types on the tools of their trades. The purpose is to illustrate the variety of setups for investigators of all types. What do you really need to do a thorough investigation? Pick up some tips here!
…
continue reading
Military news and defence podcast hosted by @DefenceGeek, @Osinttechnical, @AnAustinThing2 and @geoallison in collaboration with the UK Defence Journal. www.theosintbunker.org
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
Join us as we dive deep into the world of OSINT (Open Source Intelligence), exploring the tools, techniques, and strategies that help uncover hidden truths in publicly available data. Each episode features expert guests and real-world tradecraft, case studies, and practical tips for professionals and enthusiasts alike. Whether you're a seasoned investigator or just curious about digital sleuthing, Insights & OSINT by Greypike is your gateway to mastering the art of open-source discovery. Lea ...
…
continue reading
The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions. We try to keep people curious about exploring web applications for bits of information or trying out new techniques to access important OSINT data. We are an OSINT-learning catalyst. Support this podcast: https://po ...
…
continue reading
Welcome to the Layer 8 Podcast season 5! This season we’ll have conversations with social engineers and OSINT investigators who will tell their stories. We hope you enjoy them.
…
continue reading

1
The NDS Show - An Intelligence Community Podcast covering Geospatial Intelligence, Open Source Intelligence OSINT, Human Intelligence HUMINT, Military & National Security
The NDS Show
Unlock a world of valuable insights and thought-provoking discussions related to the Special Forces, Military, and Intelligence Community (CIA, NSA, NGA, FBI, Military Intelligence). Things we discuss: GEOINT, OSINT, HUMINT, SIGINT, SOF, Special Forces, Military, Veterans Issues, Army, Navy, Marines, Air Force, Entrepreneurship, Geopolitics, News, Politics, Technology, Artificial Intelligence, Augmented Reality, Cloud Computing, Data Analytics, Government Contracting, Defense Contracting, Bu ...
…
continue reading
Spybrary is a podcast for fans of spy books, spy tv and spy movies since 2017. We bring you author interviews and reader discussions on our favorite spy books and novels.
…
continue reading
Cloak & Dagger is a podcast about OSINT, technology, global conflict, and the practitioners and investigators who work in these fields. Join host and journalist MJ Banias as he explores the stories that shape the worlds of intelligence, security, and technology. Cloak & Dagger is powered by Sapper Labs Group. For more information, https://sapperlabs.com/blogs/podcast
…
continue reading
Trace Labs is a Canadian based non profit specializing in the crowd sourcing of open source intelligence collection. In this series, we explore the topics, techniques and tools that relate to OSINT collection.
…
continue reading
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
…
continue reading
🔊 The Defuse Podcast: Personal Threat Management for High-Risk Lives When the threats are real, the stakes are high — so what actually works?" Hosted by Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management — this podcast lifts the lid on the proven methods used to keep prominent individuals, executives, and private clients safer. Each episode features straight-talking conversations with trusted experts on: Stalking, fixated ...
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Moody’s Talks: KYC Decoded is your window into the world of financial crime fighters and the industries that arm them against the illegal actors that threaten people, companies and society. Listen and learn from subject matter experts, authors and practitioners to find out how you can better address and mitigate the risks to your business and community.
…
continue reading
The podcast that explores everything related to disinformation and online networks. To help us make sense of the global town square that is social media, in every episode, our host speaks to a fresh voice to uncover the good, bad, and fake online. This podcast believes that we are at a pivotal moment in the fight against disinformation. Many people apply the word disinformation to everything from fake news, bot networks, malicious actors, influence operations, manipulation, inauthentic accou ...
…
continue reading
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
…
continue reading
”Bright Brainz” is an engaging podcast that brings together fascinating individuals to delve into captivating subjects, catering to the curiosity of inquisitive minds. Join us as we explore a wide array of intriguing topics, featuring insightful conversations with experts, enthusiasts, and innovators from various fields. Whether you’re a lifelong learner or simply curious about the world around you, ”Bright Brainz” is your ticket to a journey of discovery, where the intellectually curious ga ...
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
WYWM #BeFierce Podcast - Our Audio Archive for the Future Military veterans discussing hot topics such as recruitment, talent, skills, transition, and the market. Are you a current/ex-serving military member or immediate family member? Sign up today for free courses to IT Careers including Cyber Security, Robotic Process Automation, Data Analytics. Simply visit our website and sign up! https://www.withyouwithme.com
…
continue reading
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
Owl Talks is a new adventure where we try to highlight user's unique areas of interest and expertise to help everyone gain a more well rounded understanding of events, cultures, and experiences.
…
continue reading
Security Headlines is a podcast about the latest security vulnerabilities with in the cyber security field. So if your interested about the latest security holes no mather if you are a tech savy penetration tester, a devops person, a programmer or just generally interested in the latest technology security news. Security headlines is here for you Security headlines is perfect to listen on when you want a quick update, on the way to work or when you are taking a walk out side The podcast is p ...
…
continue reading
There are OSINT tools that mirror or provide workarounds for hidden social media posts. Join us as we talk with an investigator who really knows his way around the internet, dark web, social platforms and more.By Authentic8
…
continue reading

1
AI for automated OSINT reconnaissance - part two
20:11
20:11
Play later
Play later
Lists
Like
Liked
20:11In part two of this podcast, Jim Clover OBE, Varadius Ltd, continues to uncover the evolving landscape of artificial intelligence (AI) in the intelligence community with Harry Kemsley and Sean Corbett. They discuss the fine line between the innovative applications of AI and the critical importance of human oversight in intelligence analysis. Explor…
…
continue reading

1
Mastering Social Media OSINT: SMI Aware's Secrets to Cyber Sleuthing
1:01:19
1:01:19
Play later
Play later
Lists
Like
Liked
1:01:19Picture this: you’re scrolling through social media, trying to piece together clues for a case, but the sheer volume of posts, profiles, and comments is overwhelming. Sound familiar? That’s why you need to tune into this episode of The Cyber Sleuth Show with Kevin DeLong and Josh Janow, CEO of SMI Aware. Josh pulls back the curtain on how his team …
…
continue reading

1
Hiring, Dating, Partnering: Stop Trusting the Wrong People!
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34We’ve all made mistakes—hiring the wrong person, starting a business with the wrong partner, or dating someone who seemed perfect… at first. In this episode of Ask Socialprofiler, Dave and Tony share personal stories of relationships—both business and personal—that crashed due to hidden incompatibilities. More importantly, they reveal how you can a…
…
continue reading

1
“America’s Gatekeeper”: A Conversation with DCSA’s Director David Cattler
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00Born out of a major Chinese cyberattack that stole personal information from millions of federal government employees, the Defense Counterintelligence and Security Agency calls itself ‘America’s Gatekeeper.’ Now five years into its existence, it’s responsible for overseeing most of the security clearances for government personnel and contractors. D…
…
continue reading

1
029 - Minimize not Militarize and Avoiding Surveillance with GrapheneOS
54:26
54:26
Play later
Play later
Lists
Like
Liked
54:26In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robo…
…
continue reading

1
The Cold War Origins of the War in Ukraine (410)
57:51
57:51
Play later
Play later
Lists
Like
Liked
57:51The legacy of the Cold War in Europe continues to impact present day events, most notably in Ukraine. In this episode I speak with author Stephan Kieninger about his new book Securing Peace in Europe - Strobe Talbott, NATO, and Russia After the Cold War. Talbott was a key figure in US President Clinton’s administration playing a pivotal role in sha…
…
continue reading
What if all your data and systems could work together seamlessly, breaking down silos and unlocking endless possibilities? That’s the promise of data interoperability—connecting platforms and datasets to fuel smarter collaboration, sharper insights, and transformative innovation. In this episode, we welcome Ian Godfrey, Industry Practice Lead at Mo…
…
continue reading

1
Russia's Fake Identity Assembly Line in Brazil
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44When a Russian spy was arrested in Brazil in 2022, authorities were shocked to discover that he seemed to have a real birth certificate and authentic citizenship documents. The incident sparked a multi-year investigation that uncovered a network of Russian operatives living and working in Brazil – Their false identities supported by genuine documen…
…
continue reading

1
How to Know If You Can Trust Someone in Your Home?
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25We let people into our homes every day—nannies, dog walkers, housekeepers—but how well do we really know them? In this episode of Ask Socialprofiler, we explore how AI-powered social media screening helps homeowners, parents, and caregivers assess trust before giving anyone access to what matters most. Traditional background checks may miss key ins…
…
continue reading
Send us a text In this compelling two-part episode, Philip Grindell welcomes back security expert James Hamilton to explore the "attack cycle" - a proven model used by criminals, terrorists, and assassins to target victims. Following the high-profile New York CEO assassination, Hamilton breaks down the eight critical phases: target selection, surve…
…
continue reading

1
The End of East Germany: A Communist Family’s Journey Through Change (409)
1:06:41
1:06:41
Play later
Play later
Lists
Like
Liked
1:06:41This is the story of a Communist family in East Germany whose world was turned upside down by the implosion of the GDR. The story is told by Katja Hesse, whose father was a Vice Admiral in the Volksmarine, the East German Navy. We start the episode with Katja crossing into West Berlin on the night of 9th November 1989 and journey through the emotio…
…
continue reading

1
He Stole the KGB’s Secrets For Years! With Gordon Corera
56:34
56:34
Play later
Play later
Lists
Like
Liked
56:34Gordon Corera makes his Spybrary debut in this riveting episode of the Spybrary podcast. Host Shane Whaley welcomes the former BBC security correspondent, espionage historian and host of The Rest is Classified podcast, Gordon Corera to discuss his latest book, The Spy in the Archive. The Cold War might be over, but its shadows stretch far into the …
…
continue reading
AJ and Robert explore the shadowy side of AI — how some users are becoming addicted, confiding in it like a personal therapist and then gaining confidence to take risky actions in their lives and at work. They discuss what this could mean for insider threats and the broader impact on security.By Authentic8
…
continue reading
In this episode of KYC Decoded, we’re excited to highlight the newly formed partnership between Moody’s and GBG, a collaboration aimed at further streamlining business onboarding through continued development of smarter identity verification in Moody’s Maxsight™ platform. Joining us is Gus Tomlinson, Managing Director of Identity Fraud at GBG, to d…
…
continue reading

1
How to Know If Someone Is a Threat Before Letting Them In?
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Over 70% of people misrepresent themselves online. But what happens when that misrepresentation becomes a real threat—to your family, your business, or your peace of mind? In this episode of Ask Socialprofiler, we explore how AI-powered social media background checks can help you spot red flags, assess compatibility, and decide who really belongs i…
…
continue reading

1
Breaking the Silence: Coming Out in the CIA
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42Emerging alongside Joseph McCarthy’s Red Scare in the 1950s was the Lavender Scare: Widespread panic and paranoia over the inclusion of gay personnel in the federal government. Their perceived dangers led to the terminations and forced resignations of thousands. Fast forward to 1988 – Tracey Ballard, who worked at the CIA, headed in to take a polyg…
…
continue reading

1
AI for automated OSINT reconnaissance - part one
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39While Artificial Intelligence AI is not a new phenomenon, its use in the gathering of intelligence and the amount of AI tools available are growing at pace. In part one of this podcast Harry Kemsley and Sean Corbett are joined by Jim Clover OBE, Varadius Ltd, to take a deeper look into the practical uses and implications of AI for the defence intel…
…
continue reading
The story of how one man—a librarian for the KGB—became a traitor to the intelligence agency, stealing the most prized Soviet-era archives and smuggling them to the West. Historian and journalist Gordon Corera whose new book “The Spy in the Archive” tells the remarkable story of how Vasili Mitrokhin—an introverted archivist who loved nothing more t…
…
continue reading

1
028 - Silence & Stealth - Mailbox, Email & Anti-KYC Phone Strategies
45:28
45:28
Play later
Play later
Lists
Like
Liked
45:28In this episode, I discuss three key strategies for maintaining privacy and security across your physical mailbox, email, and phone. I discuss the growing Matrix community, explore alternative mailing solutions using co-working spaces, detail a four-tier email strategy, and examine the concerning spread of Flock ALPR cameras. I also share insights …
…
continue reading

1
A Conversation with House Permanent Select Committee on Intelligence Chairman
34:56
34:56
Play later
Play later
Lists
Like
Liked
34:56What should the US Intelligence Community prioritize domestically and overseas, and how should the work be done? We sat down with Congressman Rick Crawford, Chairman of the House Permanent Select Committee on Intelligence, to learn his perspective on these questions. The conversation emphasized the growing threat of China’s influence in the West, t…
…
continue reading

1
Know Anyone’s True Interests in 60 Seconds — Even Their Biases!
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Bias is everywhere—on the surface and deep under it. But what if you could spot it… before it affects your life? In this episode of ask socialprofiler, we explore how our AI-powered platform uncovers people’s real interests, values, and even subtle biases—just from public social media data. No guesswork. No invasions. Just digital facts. 🔍 Whether …
…
continue reading

1
027 - Stop Playing the Game, Join The New Matrix Privacy Community
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16In this episode, I discuss breaking free from the Apple ecosystem, the dangers of social media oversharing, and introduce our new Matrix community. I also cover the upcoming capture the flag challenge, share thoughts on the OSINT Defense & Security Framework progress, and rant about security theater at airports and online services that block VPNs. …
…
continue reading

1
Memories of an East German Naval Officer's Family (407)
1:15:32
1:15:32
Play later
Play later
Lists
Like
Liked
1:15:32Katja Hesse, daughter of Vice Admiral Gustav Hesse of the East German Navy, shares her deeply personal story of growing up behind the Iron Curtain. In this fascinating conversation, Katja provides rare insights into life in the GDR as the child of a high-ranking officer— from an idyllic childhood in privileged housing to working at the Grand Hotel …
…
continue reading

1
Techno Security East 2025 Wrap Up with Jennifer Salvadori
1:05:17
1:05:17
Play later
Play later
Lists
Like
Liked
1:05:17Join Kevin DeLong on The Cyber Sleuth Show for an exclusive wrap-up of the Techno Security & Digital Forensics Conference East 2025 with Jennifer Salvadori, Event Director. Fresh off the June 3-5 event in Wilmington, NC, Jennifer shares why the conference is relocating back to Myrtle Beach, what the vibrant coastal city brings to the table. They wi…
…
continue reading

1
Inside the Int. Spy Museum: Shane & Joe’s Espionage Adventure
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37In this special episode of Spybrary, Shane is joined by fellow spy fan Joe Modzelewski for an in-depth International Spy Museum review. Recorded after their recent visit to the museum in Washington D.C., this episode is packed with honest reflections, surprising discoveries, and plenty of spy geekery. From Virginia Hall’s heroic story to rare artif…
…
continue reading
Anna discusses her career trajectory from corporate security and financial crimes to becoming the CEO of Pine Risk Management. She shares her experiences in conducting complex risk assessments, fraud detection, and crisis communications, particularly highlighting her role at Meta where she led Silicon Valley's largest physical red team.…
…
continue reading

1
Ghost Stories: The Hunt for Russian Spies in the US
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In the early 2000s, the FBI uncovered a team of Russian operatives who had been living double lives in the United States. They were posing as professors, journalists, financial planners, real estate and travel agents, all while sending information back to Moscow. Now, 15 years after they were arrested, Alan Kohler, the former Assistant Director of …
…
continue reading

1
From Cold Leads to Real Connections! Selling with Social Insights
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29What if you could understand what your customer really cares about—before saying a single word? In this episode, we explore how socialprofiler is changing the game for sales professionals by using AI to unlock public social media interests. Whether you’re pitching real estate, raising capital, or hiring your next key employee, this tool helps you c…
…
continue reading
Janes analysts James Trigg and Aparna Iyer join Sean Corbett and Kate Cox to discuss the strategic depths of Yemen’s role in global security. They unpack the complex military, political, and regional dynamics shaping this pivotal Middle Eastern country and how Yemen’s conflict influences international shipping lanes, serves as a battleground for pr…
…
continue reading

1
Gorbachev - The Man Who Ended An Empire (406)
1:10:28
1:10:28
Play later
Play later
Lists
Like
Liked
1:10:28In the annals of history, few leaders have faced the monumental challenges that Mikhail Gorbachev encountered when he rose to power in the Soviet Union in 1985. His ascent came at a time when the nation was grappling with stagnation, disillusionment, and an economy on the brink of collapse. Gorbachev, the youngest General Secretary in Soviet histor…
…
continue reading

1
Live from Techno Security with Martino Jerian of Amped Software
16:23
16:23
Play later
Play later
Lists
Like
Liked
16:23Join Kevin as he speaks with Martino Jerian of Amped Software live from the Techno Security conference in Wilmington, NC.By Cyber Social Hub
…
continue reading

1
Background Check or Invasion of Privacy? Where Do You Draw the Line?
7:01
7:01
Play later
Play later
Lists
Like
Liked
7:01In this episode of ask socialprofiler, we explore the fine line between awareness and intrusion when it comes to online screening. From job interviews to dating to parenting—how much should we rely on someone’s digital footprint? Is it responsible behavior or crossing a boundary? You’ll hear real stories and opinions on how people feel about being …
…
continue reading

1
Live from Techno Security with Martin Westman of MSAB
37:50
37:50
Play later
Play later
Lists
Like
Liked
37:50Join Kevin live from Techno Security Conference in Wilmington, NC as he speaks to Martn Westman of MSAB. Here is Martins bio from the conference... lol Martin Westman has worked in the mobile device technology field since 1994. He has held many roles within MSAB over the last 20 years, bouncing back and forth between tech and development, and hes c…
…
continue reading

1
Live from Techno Security with Chad Gish of Magnet Forensics
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Join Kevin as he talks with Chad Gish of Magent Forensics https://www.magnetforensics.comBy Cyber Social Hub
…
continue reading
Three years after our 2022 podcast series on Perpetual KYC (pKYC), we’re rebooting the topic to explore how the practice has evolved and where the industry stands today. The pKYC landscape has shifted, with advancements in technology, regulatory expectations, and data integration driving its adoption as a dynamic, real-time approach to customer due…
…
continue reading

1
The Secret Navy and Their Hunt for a Nazi Sub
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06How do you catch an enemy’s submarine … and then make it vanish? That’s what the U.S. Navy’s elusive Tenth Fleet planned, as it tracked down Germany’s U-505 submarine. The mission came right before the Allies ran ashore on the beaches of Normandy in World War II. Historian Alexander Rose draws on long classified documents and intercepted transmissi…
…
continue reading

1
When Crisis Hits: The Real Cost of Getting Reputation Wrong
58:11
58:11
Play later
Play later
Lists
Like
Liked
58:11Send us a text When Crisis Hits: The Real Cost of Getting Reputation Wrong This week's Defuse Podcast featured Heather Blundell (CEO, Grayling UK) and James Clothier (Head of Crisis) discussing how reputation management has become essential protection. Key insights: Most crisis failures stem from human behaviour under pressure, not poor messaging. …
…
continue reading
In this brief episode between travels, I announce the “Ghost in the Source” capture the flag challenge, a cryptographic hunt on my website starting June 21st, 2025. At the end of June I will pick 3 lucky winners which will receive a 6-month TryHackMe subscription voucher. I also provide an update on our new Matrix community. In this week’s episode:…
…
continue reading

1
Policing the Berlin Wall with the Royal Military Police (405)
1:24:06
1:24:06
Play later
Play later
Lists
Like
Liked
1:24:06Simon Wood served in the British Army’s Royal Military Police in Berlin during the1980s. He describes the unique challenges he faced patrolling the Berlin Wall and policing British troops in the divided city. Discover the political tensions, the camaraderie with fellow soldiers, and the surreal moments such as being present at the post-mortem of Hi…
…
continue reading

1
The Poet's Game - A Spy in Moscow with Author Paul Vidich
49:42
49:42
Play later
Play later
Lists
Like
Liked
49:42On this episode of Spybrary, I welcome back one of today's finest spy fiction authors, Paul Vidich. We're diving into his gripping new novel, The Poet's Game, a contemporary espionage thriller rooted in the tense geopolitics of modern-day Russia and the United States. Paul joins me to unpack the creative process, real-life inspirations, and the dee…
…
continue reading

1
How culture can inform OSINT investigations
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16An OSINT Arabic instructor and geopolitical risk expert joins the show to discuss what can get lost in translation when performing OSINT investigations. Plus learn how cultural knowledge can unlock key insights. About Paolo Walcher Paolo Walcher is a leading OSINT trainer and security consultant, recognized for his expertise in Arabic-language inve…
…
continue reading

1
S04 E05: Melisa Stivaletti, the Queen of OSINT, on Elevating OSINT with AI, Private-Public Synergy, and More
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02Guest introduction & background Melisa describes how the 2010–11 Arab Spring revealed the power of social-media data while she was a Department of the Army civilian in Afghanistan. Since then she has worked across academia, federal agencies, and the private sector to professionalize open-source intelligence, currently serving as OSINT Director at G…
…
continue reading

1
How Are Shifting Priorities Impacting National Security in America?
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18Most Americans would agree that the United States should be protected, but from whom … and how? Dr. Donell Harvin, the former Chief of Homeland Security and Intelligence for the District of Columbia, says the U.S. is taking its eye off the ball - focusing its large domestic intelligence apparatus in a direction that is politically expedient, but no…
…
continue reading
Five years after their first episode of the World of Intelligence podcast, Kate Cox, director of Janes RD&A Strategic Programmes, turns the table on Harry Kemsley and Sean Corbett to uncover the origins of the podcast and how it has evolved alongside the prominence of OSINT for intelligence analysis, and to offer a glimpse into the future of intell…
…
continue reading

1
025 - AI Privacy Concerns with ChatGPT and Claude
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36In this episode, I explore the privacy implications of using AI apps like ChatGPT and Claude on mobile devices. I discuss why ChatGPT’s requirement for Google Play Store login and audio recording storage led me to Claude on my GrapheneOS device. I also cover my daily app setup, Windows telemetry blocking with SimpleWall, macOS privacy with Little S…
…
continue reading