Spy Craft is a podcast that tells gripping life-and-death spy stories and the amazing devices and operations that made them possible. Now let’s get started

How did a deceased, homeless Welshman become the most effective secret agent of World War II? This episode uncovers the brilliant espionage tradecraft behind Operation Mincemeat, a masterclass in counter-intelligence orchestrated by British naval intelligence officers Ewen Montagu and Charles Cholmondeley. Discover how MI5 meticulously forged "pocket litter," created a fake fiancée, and built a flawless legend for a corpse to completely blindside Nazi intelligence.

In May 2026, Eileen Wang, the mayor of Arcadia, California, resigned her position and agreed to plead guilty to federal charges of acting as an illegal agent of the People's Republic of China. Prosecutors allege that, prior to her election, Wang and her associates operated a community news website under direct instructions from Chinese officials, publishing propaganda and reporting engagement metrics to advance Beijing's interests. This case offers a sobering examination of foreign influence operations targeting American local government and diaspora communities, raising critical questions about transparency, accountability, and the integrity of democratic institutions.

Some intelligence operatives don't just live under false identities — they raise entire families inside them. In this episode, we explore the psychological consequences of children growing up in espionage households, sometimes without realizing that their parents, names, histories, and even childhood memories were carefully manufactured covers. Through the lenses of developmental psychology, attachment theory, trauma research, and intelligence tradecraft, we examine what happens when identity itself becomes operational camouflage.

Behind the vaulted doors of the CIA, three women were tasked with an impossible mission: finding a ghost among their own colleagues. As they peeled back layers of Cold War deception, their evidence pointed toward a "Rock Star" of the intelligence community—a man who was supposed to be catching the spies, not serving them. This is a story of paranoia, betrayal, and the thin line between a legendary patriot and a devastating double agent.

For an intelligence officer, a Zero Day is the ultimate skeleton key for gathering signals intelligence without leaving a footprint. We dive into the secret marketplace the tech world where these vulnerabilities are bought and sold by state actors to facilitate long-term surveillance. Discover the tradecraft behind maintaining access to "hard targets" before the defense even realizes the door is unlocked.

Analyze the enduring mechanics of classic espionage techniques—dead drops, brush passes, and related tradecraft—still employed by intelligence services despite pervasive digital surveillance. This episode breaks down operational principles, psychological advantages, and real-world applications, revealing how anonymity, misdirection, and human psychology enable secure communication when electronic methods carry unacceptable risk. Essential listening for intelligence professionals, students of security studies, psychologists of deception, business leaders concerned with operational security, and anyone navigating trust and privacy in an era of constant monitoring.

we examine “The Macau Ghost” — a high-stakes espionage case involving asset recruitment, operational compromise, and counterintelligence tactics in Macau's shadowy financial and intelligence landscape. This forensic intelligence analysis details the tradecraft, psychological operations, and security failures that led to the asset's exposure and the network's collapse. Essential listening for understanding modern espionage dynamics, handler-asset relationships, and the real-world challenges of running covert operations in high-risk environments.

We go behind the firewall to expose a sophisticated North Korean espionage unit infiltrating Western companies through remote IT roles. Discover how elite state-sponsored hackers bypass security protocols to funnel millions back to a rogue regime's weapons program. This episode uncovers the digital "Trojan Horse" currently threatening the global tech infrastructure.

How did a single CIA officer with a suitcase full of cash topple a democratically elected prime minister? This episode deconstructs the tradecraft used by Kermit Roosevelt Jr. to orchestrate the downfall of Mohammad Mosaddegh. We analyze the recruitment of local "influencers," the use of paid protesters, and the creation of "black" propaganda to flip the Iranian public. Discover how the CIA and MI6 turned a failing mission into a blueprint for regime change that would be studied by intelligence agencies for the next 70 years.

A high-level intelligence and national security podcast analyzing the full lifecycle of spy networks, including recruitment, covert operations, counterintelligence, double agents, and systemic collapse. This episode explores CIA and FBI case studies, HUMINT tradecraft, information warfare, and modern digital espionage, revealing how intelligence systems are built, compromised, and rebuilt. Ideal for listeners interested in espionage strategy, global security, covert operations, psychological manipulation, and advanced intelligence analysis.

In August 2010, the naked body of 31-year-old Gareth Williams, a gifted mathematician and cryptographic expert on secondment from GCHQ to MI6, was discovered padlocked inside a red North Face sports bag in the bathtub of his secure London flat. Despite extensive forensic investigation, an inquest ruled the death unnatural and likely criminally mediated, while subsequent police reviews concluded it was probably an accident, leaving core questions about third-party involvement and the precise circumstances unanswered. This case exemplifies enduring intelligence mysteries, sparking public interest in espionage tradecraft, forensic limitations, and the tension between official narratives and unresolved evidence in high-stakes national security contexts.

In this episode, we examine Project Iceworm, the U.S. Army's secret Cold War plan from the 1950s and 1960s to construct a massive network of mobile nuclear missile launch sites beneath the Greenland ice sheet. Disguised as the scientific research station Camp Century, the project raised serious counterintelligence concerns with Denmark and long-term environmental risks due to buried nuclear wast

In this episode, we examine the Rumrich Nazi Spy Case of 1938, the FBI's first major international espionage investigation. Naturalized U.S. citizen Guenther Rumrich, a former Army deserter recruited by German intelligence, was arrested after impersonating the Secretary of State to obtain blank passports for Nazi agents. The case exposed a broader spy ring, led to four convictions, and established key precedents for U.S. counterintelligence on the eve of World War II.

Retired CIA officer James Lawler discusses his pivotal role in dismantling the A.Q. Khan network, the global nuclear black market that once threatened international security. He provides a masterclass in human intelligence, detailing how his team successfully recruited assets to stop the proliferation of weapons of mass destruction. Lawler also introduces his novel, Living Lies, explaining how his real-world experience battling nuclear threats inspired his transition into espionage fiction.

Don't forget to check out our new podcast logical lead off


