show episodes
 
TOP SECRET Personal Attention, SpyCast Listeners Known to be the podcast real spies listen to -(STOP)- eavesdrop on conversations with high level sources from around the world -(STOP)- spychiefs molehunters defectors covert operators analysts cyberwarriors and researchers debriefed by SPY Historian Hammond -(STOP) stories secrets tradecraft and technology discussed -(STOP)- HUMINT SIGINT OSINT IMINT GEOINT and more -(STOP)- rumored to be professional education internal communication and publ ...
  continue reading
 
Artwork

1
Layer 8 Podcast

Layer 8 Conference

Unsubscribe
Unsubscribe
Monthly
 
Welcome to the Layer 8 Podcast season 3! This season we’ll have conversations with social engineers and OSINT investigators who will tell their stories. We hope you enjoy them.
  continue reading
 
Award-winning real stories of the Cold War told by those who were there. Every week we interview an eyewitness of the Cold War. Across soldiers, spies, civilians, and others, we aim to cover the whole range of Cold War experiences. Hosts Ian Sanders, James Chilcott, and Peter Ryan bring your ears into the heart of the Cold War. Reading a history book is one thing, but hearing a human voice, with every breath, hesitation and intonation brings a whole new dimension to understanding what it was ...
  continue reading
 
Artwork
 
Welcome to OSINT Cocktail - a podcast about tools for investigators. Kirby Plessas and Cynthia Navarro interview investigators of all types on the tools of their trades. The purpose is to illustrate the variety of setups for investigators of all types. What do you really need to do a thorough investigation? Pick up some tips here!
  continue reading
 
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
  continue reading
 
The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions. We try to keep people curious about exploring web applications for bits of information or trying out new techniques to access important OSINT data. We are an OSINT-learning catalyst. Support this podcast: https://po ...
  continue reading
 
Artwork
 
Every Tuesday, NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
  continue reading
 
Here at Cyber Sector 7 our main goal is to Inform you and give you Security Tips, Digital Privacy Tips, OSINT Methods, and to teach you about hacker methods, culture, and news. We want to inform you of how important security and privacy is. This is for everyone, even if you know nothing about computers, we want you to stay informed.
  continue reading
 
Cloak & Dagger is a podcast about OSINT, technology, global conflict, and the practitioners and investigators who work in these fields. Join host and journalist MJ Banias as he explores the stories that shape the worlds of intelligence, security, and technology. Cloak & Dagger is powered by Sapper Labs Group. For more information, https://sapperlabs.com/blogs/podcast
  continue reading
 
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
  continue reading
 
Unlock a world of valuable insights and thought-provoking discussions related to the Intelligence Community (CIA, NSA, NGA, FBI, Military Intelligence). Join Nick, a successful entrepreneur and business leader, on his journey to discover a world of INTELLIGENCE in all facets of our lives. As an Army Veteran with expertise in geospatial Intelligence Operations, and multiple successful businesses and investments across a variety of industries, including technology, defense, real estate, crypto ...
  continue reading
 
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
  continue reading
 
Artwork

51
The Cognitive Crucible

Information Professionals Association

Unsubscribe
Unsubscribe
Monthly+
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
  continue reading
 
The podcast that explores everything related to disinformation and online networks. To help us make sense of the global town square that is social media, in every episode, our host speaks to a fresh voice to uncover the good, bad, and fake online. This podcast believes that we are at a pivotal moment in the fight against disinformation. Many people apply the word disinformation to everything from fake news, bot networks, malicious actors, influence operations, manipulation, inauthentic accou ...
  continue reading
 
Artwork

1
Fraud Talk

Association of Certified Fraud Examiners (ACFE)

Unsubscribe
Unsubscribe
Monthly
 
Fraud Talk is the monthly podcast of the Association of Certified Fraud Examiners (ACFE). In these sessions, we break down case studies, talk with the anti-fraud industry’s leading experts, and give you more tools to spot, fight and prevent fraud.
  continue reading
 
Artwork
 
Join our host, Matthew Spaier, PI weekly as he dives into the perspectives of what it takes to be a successful Private Investigator. Hear Matthew’s take on how to build your business and learn techniques to help you be the very best investigator you can be. Join us as we look to elevate the profession thru effective and concise experience based knowledge and discussion. Matthew’s 24 years of investigative experience in New York City has given him a unique perspective on how to succeed from c ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
  continue reading
 
The Convergence is an Army Mad Scientist podcast with a distinct focus on divergent viewpoints, a challenging of assumptions, and insights from thought leaders and subject matter experts. The purpose of "The Convergence" is to explore technological, economic, and societal trends that disrupt the operational environment and to get a diversity of opinions on the character of warfare.
  continue reading
 
Artwork
 
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
  continue reading
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
  continue reading
 
WYWM #BeFierce Podcast - Our Audio Archive for the Future Military veterans discussing hot topics such as recruitment, talent, skills, transition, and the market. Are you a current/ex-serving military member or immediate family member? Sign up today for free courses to IT Careers including Cyber Security, Robotic Process Automation, Data Analytics. Simply visit our website and sign up! https://www.withyouwithme.com
  continue reading
 
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
  continue reading
 
Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help you
  continue reading
 
Artwork

1
CyberSpeaksLIVE

CyberSpeaksLIVE

Unsubscribe
Unsubscribe
Monthly
 
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
  continue reading
 
Artwork
 
Security Headlines is a podcast about the latest security vulnerabilities with in the cyber security field. So if your interested about the latest security holes no mather if you are a tech savy penetration tester, a devops person, a programmer or just generally interested in the latest technology security news. Security headlines is here for you Security headlines is perfect to listen on when you want a quick update, on the way to work or when you are taking a walk out side The podcast is p ...
  continue reading
 
Loading …
show series
 
Podcast Summary: ShadowDragon - Malware Alert on Social Media In this episode of the ShadowDragon podcast, Nico "Dutch OSINT Guy" Dekens delves into a recent surge in malicious online activity linked to trending topics on social media platforms such as X (formerly Twitter), Meta (Facebook), and Instagram. The discussion centers around a disturbing …
  continue reading
 
We're dedicating a whole episode to Sam's new narrative piece on how a ragtag group of friends hunted down a wanted sex trafficking ringleader. First we give you all the context for why this person, Michael Pratt, eventually ended up on the FBI's Most Wanted list. Then Sam breaks down the hunt for Pratt, told through the eyes of the people who were…
  continue reading
 
Jacob Lloyd, head of investigations at Animal Welfare Investigations Project, has been putting OSINT skills to use to stop organized animal crime — dogfights, puppy mills, badger baiting and more. Jacob discusses how these crimes are often neglected by law enforcement due to lack of training and are thus dealt with reactively. He explains how to le…
  continue reading
 
Discover the fascinating world of OSINT (Open Source Intelligence) with expert insights from Melisa Stivaletti on this episode of The Audit! Hosted by Eric Brown and Nick Mellem from IT Audit Labs, we sit down with Melisa Stivaletti, Chair at Epic and OSINT Director at GuideHouse. Melisa shares her remarkable journey from working at the Department …
  continue reading
 
This week I respond to a few listener questions, primarily around the use of social media as a privacy enthusiast. Love it or hate it, you can guess which camp I'm in, social media like LinkedIn has almost become a requirement for job searches, employers, and connecting with other professionals. I also touch on OPSEC for OSINT, a new talk track I a…
  continue reading
 
Web browsing can be a fundamental part of an OSINT investigation. Isolating your browser in such a way that doesn't "cross-pollinate" with the host operating system can be a critical part of keeping yourself safe and maintaining the integrity of your investigation. In this episode we get to hear from Kasm! Kasm is a container streaming solution tha…
  continue reading
 
Summary Jefferson Morley and Mark Zaid join Andrew in a debate over the assassination of President John F. Kennedy. Mark and Jeff are longtime friends and colleagues with very different viewpoints of what truly happened on November 22nd, 1963. What You’ll Learn Intelligence The lasting questions surrounding the Kennedy assassination Lee Harvey Oswa…
  continue reading
 
In part one of this podcast Harry Kemsley and Sean Corbett are joined by Janes analysts Dylan Lee Lehrke and James Rands to discuss the lessons learned from the ongoing conflict in Ukraine. The panel discusses the changing tactics deployed by Russia and Ukraine during the campaign and what this conflict has told us about the conduct of modern warfa…
  continue reading
 
Alethe Denis is the first ever three-time guest to the Layer 8 Podcast. When Alethe comes on, we can swap stories for hours. And we did! This is part 1 of a two-part episode, as Alethe had so many great stories to share. For this episode, she talks her way into buildings, tells us how she prepares her OSINT and when she knows it's time to go into t…
  continue reading
 
Episode 225: We are back with a new show this week. We are starting our yearly features of the Osmosis Conference. This year the event is in Las vegas and they are celebrating 10 years. In this segment we interview Jessica Smith, David Wells and Steve Adams. Learn more at www.osmosisinstitute.orgUse code 24OSCON10 to save 10% at check out. Links: M…
  continue reading
 
In this Risky Business News sponsor interview, Catalin Cimpanu talks with Brian A. Coleman, Senior Director at Pfizer for Insider Risk, Information Security, Digital Forensics Expert. Brian goes over all the Island features that have made the browser a favorite tool to secure older corporate apps, either by blocking insecure features or adding logg…
  continue reading
 
The Spycatcher affair remains one of the most intriguing moments in the history of British intelligence and a pivotal point in the public's relationship with the murky world of espionage and security. It lifted the lid on alleged Soviet infiltration of British services and revealed a culture of law-breaking, bugging and burgling. But how much do we…
  continue reading
 
Harry Kemsley and Sean Corbett are joined in this episode by Janes analysts Puja Banerjee, Sarbhanu Nath and Shivani Gayakwad to discuss the key events relating to the ongoing political instability in Bangladesh. Following weeks of protests and violence, the country is currently being run by an interim government following the resignation of Sheikh…
  continue reading
 
This special episode of The Mindful Business Security Show is the second in a multi-part series about how to start a business. In this episode, Accidental CISO is accompanied by Joe Brinkley, TheBlindHacker. Joe is a business owner, content creator, and cybersecurity consultant. With an entrepreneurial journey spanning more than a decade, his busin…
  continue reading
 
In this podcast Tom Uren and Patrick Gray discuss a US government policy initiative to cover cyber insurance gaps while also improving security across the economy. Lofty goals, but Tom wonders if it is a difficult way to address security gaps. They also talk about what appears to be a hack and leak operation targeting the Trump campaign and a recen…
  continue reading
 
Summary Jefferson Morley and Mark Zaid join Andrew in a debate over the assassination of President John F. Kennedy. Mark and Jeff are longtime friends and colleagues with very different viewpoints of what truly happened on November 22nd, 1963. What You’ll Learn Intelligence The lasting questions surrounding the Kennedy assassination Lee Harvey Oswa…
  continue reading
 
Ever wondered how scams really work? In this episode, we are joined by scam expert Shameela Gonzalez as we dive into the shady world of scammers. From pulling on heart strings to encouraging the purchase of questionable Taylor Swift tickets, nothing is off limits for these criminals. Let this episode be your guide on how to spot a scam and stay one…
  continue reading
 
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Maksym Tereshchenko of Mantis Ana…
  continue reading
 
Podcast Summary In this episode of the ShadowDragon podcast, Nico Dekens discusses the current geopolitical tensions and disturbances monitored through online platforms. The focus is on the recent actions of Israel against Hamas leaders, which have caused significant unrest and propaganda, particularly from Iran. The podcast highlights the use of A…
  continue reading
 
Jack Downey was the longest-held prisoner of war in American history. He was a CIA officer captured in China during the Korean War and imprisoned for twenty-one years. I speak with Barry Werth the author of Prisoner of Lies - Jack Downey's Cold War. He details Downey’s story when the CIA recruited him as a new Yale graduate in the post-World War II…
  continue reading
 
[Editor’s Note: Army Mad Scientist is pleased to publish its 500th post! Since its inception on 09 November 2017, the Mad Scientist Laboratory has continuously sought to explore the Operational Environment (OE) and the changing character of warfare on behalf of the U.S. Army. Given this enduring mission, it’s fitting that this milestone post featur…
  continue reading
 
In this podcast Tom Uren and Patrick Gray discuss the US’s National Counterintelligence strategy and that it highlights the risk that foreign intelligence entities will use personal information to target and blackmail individuals. They also talk about the recent international prisoner swap. Although two cybercriminals were exchanged in the swap, th…
  continue reading
 
This is a big one. Sam got hold of a massive leak of internal Nvidia emails, Slack messages, and documents which show how the tech giant is scraping YouTube and Netflix for its own purposes. In the second half of the show, Jason peels back the curtain on who is behind the wave of AI spam on Facebook and how they're doing it; finally an answer after…
  continue reading
 
Summary Henry Hemming (X, Website) joins Andrew (X; LinkedIn) to discuss the case of Frank Hegarty, a British spy operating within the IRA. Henry is a bestselling espionage author. What You’ll Learn Intelligence Espionage and the role of MI5 within the Troubles The story of Frank Hegarty, a British spy working in Derry Freddie Scappaticci, or Stake…
  continue reading
 
Loading …

Quick Reference Guide