POPULARITY
Categories
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про українську зброю на фронті, справу Юрія Касьянова та відключення електрики в РосіїВедучий – Олексій Тарасов
[This is one of the finalists in the 2025 review contest, written by an ACX reader who will remain anonymous until after voting is done. I'll be posting about one of these a week for several months. When you've read them all, I'll ask you to vote for a favorite, so remember which ones you liked] You Can Just Do Things In the winter of 2022 I was unhappily working at a dull but decently compensated IT job, which I had come upon at last after four years of phoning it in at college and abandoning my brief stint as an MMA Fighter/Porn Store Security Guard due to feeling like I was getting too old to be broke. If pressure to fit in with my yuppie, family-and-career-having peers pushed me into corporate life, the depressing mundanity of Covid-era day-to-day pushed me out just as quickly. On February 24th, 2022, Russia began its full scale invasion, and America learned what a “Ukraine” was. Having long used politics as a surrogate activity to distract myself from my life of chronic underachievement, I was already a little more familiar than most with the country's woes, and had followed the conflict from the time of the Euromaidan protests. Years before I had read of the likes of Azov and its many foreign volunteers, and had even periodically fantasized about dropping everything and going to the Donetsk Airport. But no, that Wasn't The Type Of Thing Normal People Like Me Did, so instead I joined my own country's armed forces, sat around pushing papers, earned the dubious honor of washing out “ahead of schedule”, and finally graduated college with a not very useful degree and a mediocre GPA. With the invasion however, things changed. Before I had always vaguely felt that I would eventually end up doing something “cool”, and had soothed myself with reassurances that I was still in the “early life” section of my future Wikipedia article and would bide my time before I made my play at greatness. Now however, the unrealisticness of this conceit was thrown into uncomfortably sharp relief by a certain contrast I could not not ignore. Only three days after the start of the full scale invasion, Ukrainian foreign minister Dymytro Kuleba announced the creation of the “International Legion For The Territorial Defense Of Ukraine”. Unlike in 2014, Ukraine was now specifically and officially soliciting foreigners with military experience to fight for them! I was at least technically in that category! I thought about my own time in the military. My ideas of going to war in Afghanistan had been quashed by the US withdrawal not long after I joined, and I had quickly found that military life involved more editing forms in Adobe Acrobat and less explosions than I had naively supposed. But this was a real war, a deadly serious war, and a major, world defining event at that. In the early months of the invasion the international media talked about almost nothing else. I spent all day at my desk pretending to work while frantically refreshing OSINT live maps and breathlessly following news from the front. I remember the circulation of harrowing video clips. Kalashnikovs being distributed to civilians in Kyiv, the mayor of a small village publicly asking its inhabitants whether they should personally accede to Russian ultimatums, or risk having their property destroyed and lives forfeit- to resounding cries of “Glory to Ukraine”. The Ukrainians' courage blew my mind. There were people who really had something to die for, and by extension something to live for. Meanwhile, there I was, sipping coffee and getting fat. The creation of the legion felt like destiny was reaching its hand out to me. Was I really going to ignore it so I could handle support tickets for the rest of my life? https://www.astralcodexten.com/p/your-review-the-russo-ukrainian-war
Dzisiejszy podcast dotyczy incydentu na Mapach Google, gdzie w nazwie szpitala Jana Pawła w Krakowie pojawiło się dodatkowe słowo: "ofiar". Jak do tego doszło? Co za to grozi? I jak chronić swoje "wizytówki" przed takimi zmianami? O tym w dzisiejszym odcinku. Ale nie tylko bo:
Three Buddy Problem - Episode 62: Lindsay Freeman, Director of the Technology, Law & Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025) Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Lindsay Freeman (https://x.com/lindsaysfreeman).
Vinny Troia is at home on the Dark Web. The veteran hacker has developed relationships with cyberactors who have quietly stolen sensitive data from the far corners of the world. Vinny sells that data to law enforcement and intelligence agencies, like the CIA. His book, Grey Area: Dark Web Data Collection and the Future of OSINT, is out this October. Prefer to watch your podcasts? Find us on YouTube at https://www.youtube.com/@IntlSpyMuseum/podcasts. Subscribe to Sasha's Substack, HUMINT, to get more intelligence stories: https://sashaingber.substack.com/ And if you have feedback or want to hear about a particular topic, you can reach us by E-mail at SpyCast@Spymuseum.org. This show is brought to you from Goat Rodeo, Airwave, and the International Spy Museum in Washington, DC. Learn more about your ad choices. Visit megaphone.fm/adchoices
Stephen Gubenia, Head of Detection Engineering for Threat Response for Cisco Meraki, shares his evolution from managing overwhelming alert volumes as a one-person security team to architecting sophisticated automated systems that handle everything from enrichment to containment. Stephen discusses the organizational changes needed for successful AI adoption, including top-down buy-in and proper training programs that help team members understand AI as a productivity multiplier rather than a job threat. The conversation also explores Stephen's practical "crawl, walk, run" methodology for responsibly implementing AI agents, the critical importance of maintaining human oversight through auditable workflows, and how security teams can transition from reactive alert management to strategic agent supervision. Topics discussed: Evolution from manual security operations to AI-powered agentic workflows that eliminate repetitive tasks and enable strategic focus. Implementation of the "crawl, walk, run" methodology for gradually introducing AI agents with proper human oversight and validation. Building enrichment agents that automatically gather threat intelligence and OSINT data instead of manual investigations. Development of reasoning models that can dynamically triage alerts, run additional queries, and recommend investigation steps. Automated containment workflows that can perform endpoint isolation and other response actions while maintaining appropriate guardrails. Essential foundations including proper logging pipelines, alerting systems, and detection logic required before implementing AI automation. Human-in-the-loop strategies that transition from per-alert review to periodic auditing and agent management oversight. Organizational change management including top-down buy-in, training programs, and addressing fears about AI replacing jobs. Future of detection engineering with AI-assisted rule development, gap analysis, and customized detection libraries. Learning recommendations for cybersecurity professionals to develop AI literacy through reputable sources and consistent daily practice. Listen to more episodes: Apple Spotify YouTube Website
China's expanding influence in the Pacific has strategic implications for international security. In this episode Kate Cox and Sean Corbett are joined by experts Dr Greg Brown, senior fellow and director of Regional Cooperation and Coordination at Australian Strategic Policy Institute (ASPI) USA and adjunct professor at Georgetown University, and Claire Chu, principal analyst at Janes, to explore the role of open-source intelligence (OSINT) in understanding these power plays. They also consider the nuanced responses of Pacific nations and global powers to provide a deeper understanding of why China is so invested in the region.
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про удари по Форосу та інших цілях у Криму, захист окупованого Севастополя, а також локації виробництва ракет Фламінго та російського секретного підрозділу РубіконВедучий – Олексій Тарасов
Open Source Intelligence or OSINT, is getting a major boost in the house's version of the intelligence Authorization Act. The bill would overhaul how spy agencies buy commercial data and manage OSINT. It comes as the intelligence community has already moved to reform and make OSINT a top priority. For more details Federal News Network's Justin Doubleday is here.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Petr Vancl Hochberger řídí Business development a marketing ve společnosti TOVEK. Ve své profesi propojuje víc než 14 let zkušeností z vojenského zpravodajství s pokročilými analytickými metodami pro komerční sektor. TOVEK vyvíjí a dodává nástroje pro analytickou práci s daty a informacemi. Petr je absolvent Univerzity Obrany a před angažmá v TOVEK působil ve vojenském zpravodajství včetně pozice vedoucího zpravodajské sekce na Vrchním velitelství spojeneckých sil v Evropě.
With the Zapad Military exercises occurring again near the Polish border, Dominic Bowen has Antoine Renaux on the podcast. They analyse the challenges of NATO, Russia's probing operations, NATO's response, and more importantly, NATO's preparedness. Find out more about Article 5 and the potential scenarios, why hybrid warfare and cyber attacks are the future and the geopolitical risks we are facing. Antoine Renaux is an Economic Intelligence & Geopolitics Analyst, his expertise lies in defence and security policy, economic intelligence, and geopolitical risk analysis. His career spans strategic intelligence, public affairs, and policy analysis roles across both public and private sectors, giving him a nuanced, operational understanding of complex international dynamics.His key areas of expertise lie in:OSINT & competitive intelligence in the defense industry.Policy & geopolitical analysis, including diplomatic reporting at the French Embassy's Military Representation in Austria.Event & project management, including contributions to high-profile initiatives such as the Warsaw Security Forum.His approach combines precision, strategic insight, and actionable analysis to support decision-making in high-stakes environments. Motivated by a passion for strategy and security, I aim to contribute where analytical rigour, geopolitical awareness, and clear communication can make a decisive impact.The International Risk Podcast brings you conversations with global experts, frontline practitioners, and senior decision-makers who are shaping how we understand and respond to international risk. From geopolitical volatility and organised crime, to cybersecurity threats and hybrid warfare, each episode explores the forces transforming our world and what smart leaders must do to navigate them. Whether you're a board member, policymaker, or risk professional, The International Risk Podcast delivers actionable insights, sharp analysis, and real-world stories that matter.Dominic Bowen is the host of The International Risk Podcast and Europe's leading expert on international risk and crisis management. As Head of Strategic Advisory and Partner at one of Europe's leading risk management consulting firms, Dominic advises CEOs, boards, and senior executives across the continent on how to prepare for uncertainty and act with intent. He has spent decades working in war zones, advising multinational companies, and supporting Europe's business leaders. Dominic is the go-to business advisor for leaders navigating risk, crisis, and strategy; trusted for his clarity, calmness under pressure, and ability to turn volatility into competitive advantage. Dominic equips today's business leaders with the insight and confidence to lead through disruption and deliver sustained strategic advantage.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Subscribe for all our updates!Tell us what you liked!
On this week's episode of Security Dilemma, A.J. Manuzzi and John Gay spoke with Decker Eveleth, an associate research analyst at the federally funded nonprofit research and analysis organization CNA. Decker specializes in open-source analysis of foreign nuclear postures, as well as ballistic and cruise missile forces in the Middle East and Asia. In this episode we discussed the state of Iran's nuclear and missile programs in the aftermath of the Twelve-Day War.LISTENER QUESTIONS: We are opening up Security Dilemma to listener-submitted questions. Submit questions you'd like us to ask future guests here. Please specify the episode pertaining to the question in your response. Upcoming episodes include: AMA with A.J. and John, a reading and discussion of George Washington's Farewell Address, U.S. alliances and retrenchment with the RAND Corporation's Miranda Priebe, and the Pentagon budget with the Quincy Institute's Ben Freeman and William Hartung. LISTENER SURVEY: Please answer our two-question survey of Security Dilemma listeners. Respondents who provide their email address will be entered into a drawing. The first prize is a signed copy of John Mearsheimer's The Tragedy of Great Power Politics; there are also digital copies of our recent reading group book, Paul R. Pillar's Why America Misunderstands the World. Respond to the survey here.
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount At Black Hat, David Bombal sits down with OSINT pro Mishaal Khan to unpack anti-OSINT, practical steps to regain privacy without pricey services. Mishaal demos his free OperationPrivacy dashboard (400+ actions, 3 tiers: Conscious → Serious → Ghost) and shows how to: • Freeze credit & use free monitoring • Opt out of 100+ data brokers (Spokeo, Intelius, LexisNexis, more) • Blur your home on Google/Bing/Apple Maps + real-world deterrents • Claim critical accounts (IRS/DMV/USPS/UPS) and your domain • Nudge page-one results with harmless decoys • File copyright takedowns (Instagram/Google, etc.) US-centric but widely applicable. DIY, trackable, and truthful about the time it takes. // Mishaal Kahn's SOCIALS // LinkedIn: / mish-aal Website: https://www.mishaalkhan.com/ Tool created: https://www.operationprivacy.com/ // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: https://open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: https://podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 – Coming Up 01:31 – Sponsored by ProtonPass 03:00 – Introduction 05:44 – Operation Privacy Demo 07:49 – How to Freeze Your Credit 08:41 – Credit Monitoring Explained 09:19 – Managing Subscriptions 10:13 – Data Removal (Outbound Requests) 12:40 – Should You Use Automatic Removal? 14:03 – Protecting Your Privacy 15:41 – Why Privacy Takes Time 17:46 – Planting Your Privacy Flag 19:56 – Ghost Mode & SOE Manipulation 22:47 – Getting Content Removal Forms 23:40 – Taking a Holistic Approach to Privacy 25:08 – Final Thoughts / Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you'll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond's SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond's Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance that could eventually spread globally. I dive into California's $900 “smart” license plates that track your every move, centralized government digital currencies, and my predictions for the next 20 years of Orwellian surveillance.Support the show on Patreon!In this week's episode:The UK's TV licensing system: Legal extortion through private contractorsThe Reviver R-plate: $900 to track yourself in California and ArizonaBrit Cards: UK's new “voluntary” Digital ID systemThe Bank of England's digital pound and programmable moneyHistorical patterns of control: From land ownership to neural interfacesWhy the UK is the blueprint for global surveillance rolloutPredictions for the next 20-50 years of biosurveillanceMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-intro:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-general:matrix.orgShow Links:PsySecure ODSF Framework - https://odsf.psysecure.comLCD License Plate (not privacy friendly!) - https://reviver.com/rplate/Black Mirror S03E01 "Nosedive" - https://www.imdb.com/title/tt5497778/Bank of England's Digital Pound - https://www.bankofengland.co.uk/the-digital-poundBrit Card Digital ID System - https://www.labourtogether.uk/all-reports/britcardTV Licensing Detector Ads (1980s-90s): The Detector Van - https://www.youtube.com/watch?v=8NmdUcmLFkw"We know exactly where he is" - https://www.youtube.com/watch?v=qF3-S2sCnb8Keep One Eye Open - https://www.youtube.com/watch?v=mVfOmR7gAekMore Powerful Dector Vans! - https://www.youtube.com/watch?v=1Q9CsRRhWQI“One believes things because one has been conditioned to believe them.”- Mustapha Mond (Brave New World ★ Support this podcast on Patreon ★
Ever wonder how investigators and OSINT pros map the hidden corners of the digital world? In this episode, Martina Nitti joins Arnold Kochka to break down SpiderFoot, the open-source OSINT powerhouse that pulls from data sources to uncover domains, IPs, and more.
A version of this essay was published by firstpost.com at https://www.firstpost.com/opinion/what-fuels-anti-india-hate-in-the-west-13932053.htmlI am personally very pro-America, yet I too have been baffled by the noises emanating from the Trump administration regarding India, particularly from one aide. Peter Navarro, apparently some trade muckity-muck, has had a field day accusing India of various sins. Apart from the entertainment value, this leads to a serious question: Why? And why now?There is reason to believe, by connecting the dots, that there is indeed a method behind this madness. It is not a pure random walk: there is a plan, and there are good reasons why the vicious attack on India has been launched at this time and in this manner. Of course, this is based on open source and circumstantial evidence: I have no inside information whatsoever.In this context, consider what is arguably the greatest political thriller of all time: "Z" (1969) by Costa-Gavras. It is based on a real-life political murder in Greece, where a popular left-leaning candidate for President was covertly assassinated by the ruling military junta.The way the plot unravels is when the investigating magistrate, masterfully played by Jean-Louis Trintignant, notices a curious phenomenon: the use of a single phrase "lithe and fierce like a tiger", used verbatim by several eye-witnesses. He realizes that there was a criminal conspiracy to get rid of the inconvenient candidate, with plausible deniability. Words and phrases have subtle meanings, and they reveal a great deal.Thus, let me bring to your notice the following tweets:* “India could end the Ukraine war tomorrow: Modi needs to pick a side” (August 5)* “Europeans love to whinge about Trump and to claim he is soft on Russia. But after 3 years it is Donald J Trump who has finally made India pay a price for enabling Putin's butchery.” (August 6)* Speaker: “[the American taxpayer] gotta fund Modi's war”. TV Anchor (confused): “You mean Putin's war?”. Speaker: “No, I mean Modi's war”. (August 28)Do you, gentle reader, notice a pattern?Now let me tell you who the authors of these posts are. The first quoted an article by an officer in the British Special Forces, which means their covert, cloak-and-dagger military people.The second was by Boris Johnson, former British Prime Minister. Johnson, incidentally, has been accused of single-handedly spiking ceasefire talks between Russia and Ukraine in 2022, when there was a possibility that the whole sorry spectacle of the war could have been settled/brought to a close.The third is by the aforementioned Peter Navarro on an American TV channel, Bloomberg Television.I don't know about you, but it seems to me that these three statements are lineal descendants of each other, one leading seamlessly to the next.This is how narratives are built, one brick in the wall after another. In reality, India has not contravened any sanctions in buying oil from Russia, and in fact has helped maintain a cap on oil prices, which were rising because of the Ukraine-Russia war. But then who needs truth if narrative will suffice?My hypothesis is that the anti-India narrative – as seen above – has been created by the British Deep State, otherwise known as Whitehall. First from the spooks, then from the former Prime Minister, and then virally transmitted to the American Deep State. It is my general belief that the British are behind much mischief (sort of the last gasp of Empire) and have been leading the Americans by the nose, master-blaster style.Britain has never tasted defeat at the hands of Russia; while France (Napoleon) and Germany (Hitler) have. Plus the US Military Industrial Complex makes a lot of money from war.A malignant British meme, intended to hurt Russia, is now turned on to India, which is, for all intents and purposes, an innocent bystander. Britain has had a thing about both Russia (“The Great Game”) and now India, and it was precisely why it created ‘imperial fortress' Pakistan, with which to trouble, and if possible, hurt both.Then there was the second set of tweets that took things one step further. Navarro, all warmed up, blamed “Brahmins” for “profiteering by buying Russian oil at the cost of the Indian people” in a broadcast on September 1. Why he would be bothered about the “Indian people” is a good question. But what was far more interesting, indeed hilarious, was the near-simultaneous, and absurdly wrong, set of tweets by a whole group of INDI Alliance mavens.They ‘explained', in almost identical words, that what Navarro meant was not “Brahmins”, but “Boston Brahmins”, a term coined in 1860 by Oliver Wendell Holmes, a doctor/essayist, to refer to traditional US East Coast elites, generally WASPs (White Anglo Saxon Protestants) who dominate the corridors of power in the US. Many claim to be descended from the original Pilgrims, Puritan extremists from Britain, who arrived in Plymouth on the Mayflower in 1620.They go to private (‘prep') schools like Philips Exeter Academy, then Harvard or Yale, then Goldman Sachs, then Harvard Business School, and generally end up running the country as a hereditary, endogamous caste. It is very difficult for outsiders to marry into or enter this circle, although money helps. For example the Irish Catholic Kennedy clan is part of this caste because they made big bucks (partly by smuggling liquor during the Prohibition era), even though the Irish are generally looked down upon.I have long claimed that America is full of castes like this, which include the investment-banker caste, the lawyer caste, the doctor caste: all go to the same schools, the same colleges, marry each other, etc. In fact they do form the kind of exclusionary group that the western narrative imputes to India jati-varna. Anyway that's a long story, and that's not the point: it is the tweets by, for example, Karti Chidambaram, Sagarika Ghose, Saket Gokhale, et al.They were so ‘spontaneous', so near-identical, and so outright idiotic that it is impossible that they came from anything other than a ‘toolkit' supplied by the usual suspects: the regime-change specialists. And their claim was not even accurate: Navarro was indeed targeting Hindus and Brahmins, as is evident from the following tweet. There is no earthly reason for him to choose this image of Modi, other than that he was coached into doing so.So we go back to the original question: why? Who hates Hindus so much?There are a number of other incidents where Indians (in particular Hindus) have been targeted in various countries: Ireland recently; Australia some time ago and again now, see below an anti-immigration (particularly anti-Indian) rally on August 31st; Canada with its Khalistanis running amok (lest we forget, 40 years ago, they downed Air India Kanishka).Let us note the curious coincidence that these are all countries where the British have influence: Canada and Australia are in effect their vassals. Ireland is not, and I suspect the British are hated there, but somehow in the last few weeks, this British prejudice has spilled over with “Irish teenagers” physically attacking Indians (including women and children). I wonder if the “Irish teenagers” are really British agents provocateurs.So let's put two and two together: who hates Indians, Hindus and Brahmins? Why, Pakistanis, of course. And they have been burned a little by Operation Sindoor. Pahalgam didn't quite turn out the way they thought it would, considering it was scheduled during the India visit of J D Vance accompanied by his Indian/Hindu-origin wife, Usha Chilukuri Vance. That might explain why there's a sudden explosion of social-media hatred by ISI and CCP bots against Indians.Pahalgam was Phase 2 of the regime-change operation. By so visibly targeting and murdering Hindus in Pahalgam, the Pakistanis calculated they could induce massive rioting by Hindus against Muslims, which would be an excuse for “the rules-based liberal international order” to step in, exile Modi, and um… restore order, as in Bangladesh. The usual playbook.Alas, “the best laid schemes o' mice an' men gang aft agley”, and Pakistan got a whipping instead, and some of their (US or China-supplied?) nuclear assets apparently went up in smoke. But make no mistake, the regime-change gang will redouble its efforts.Phase 1 had been the 2024 elections where there were surprising losses by the BJP. Phase 3 is the ‘vote-chori' wailing by the INDI Alliance: odd, considering nobody knows which passport(s) Rahul Gandhi holds. Phase 4 is the ongoing ‘Project 37' in which renegade BJP MPs are supposed to bring down the central government.Pakistan, and its various arms, including the Khalistan project, participate with great enthusiasm in these various phases. And for all intents and purposes, the UK has now become a Pakistani colony. Recursive master-blaster, as I conjectured: Pakistani-Britons control Whitehall, Whitehall controls the US Deep State. Here's Britain's new Home Secretary, Shabana Mahmood, in the words of a suddenly-awake Briton on September 6th.An Emirati strategist, Amjad Taha, asked a valid question: why is there more terrorism in the UK than in the Middle East?Wait, there's more. Here's a loudmouth Austrian who wants to dismantle India, long a Pakistani dream. And the map is by some Jafri, which sounds like a Pakistani surname. The Austrian also wants Rahul Gandhi to be the next Prime Minister.Pakistan is itself unraveling, as can be seen in Balochistan which is in open rebellion. Their Khalistani dream is new, but Kerala and the Northeast as Islamist entities were standard memes even from Chaudhury Rehmat Ali who dreamt up Pakistan in the first place in the 1930s.Pakistan just got a boost, however, with OSINT identifying a US C-17 (a giant military cargo plane) arriving to resupply Nur Khan Airbase. This raises the question again: were US personnel and assets decimated there by Indian missiles during Operation Sindoor? Is that why the US got so upset? Did Trump read the riot act to Modi, which led to the ‘ceasefire'? Now did they replenish the F-16s etc that were blown up? See, no Pakistani losses!I imagine this goes well with the newly announced “US Department of War”. I only hope the war target here is China, not India.Speaking of US internal politics, it was utterly laughable to see Jake Sullivan, President Biden's NSA, coming to the defense of India in Foreign Affairs. He directly engineered the vicious regime change in Bangladesh, but now he's full of solicitous concern! Nice little U-turn!From a global perspective, I believe that both China and the US are intent on knee-capping India. That is the logical response from an incumbent power when there is a rising insurgent power: the Thucydides Trap idea. It is a back-handed compliment to India that it is in splendid isolation, and has to pretend to rush into the arms of China because of Trump's withering assault.India will survive the hate; but Indian-Americans may find themselves in some jeopardy as the MAGA types are now focusing their ire on them.It is, as I said, the Abhimanyu Syndrome: India is completely alone (the RIC lovefest is just marketing). That is the bad news, and also the good news. If everyone (the US Deep State, Whitehall, CCP, ISI, Soros) is against India, it means India matters. Someone said India is the ultimate swing state. No: India is the incipient superpower, the only one that can make it a G3 rather than a G2. Naturally, the G2 is not very happy to let one more into their cozy club.1910 words, 7 Sept 2025 This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit rajeevsrinivasan.substack.com/subscribe
開會卡卡、思緒不清?別再怪自己!其實是身體在抗議。美鳳姐真心推薦的-娘家大紅麴,唯一有3健字號的紅麴品牌,不傷肝腎成分:有助於調節血脂、血糖,還能延緩衰老,顧健康又顧狀態!立即點擊領取優惠
In this new episode of the mini-series on documentation practices, we turn to the Democratic Republic of the Congo (DRC). Together with Dr. Valérie Arnould, Legal and Policy Advisor on transitional justice with the international NGO Avocats Sans Frontières (ASF), we explore the challenges and possibilities of documenting human rights violations in a country marked by protracted violence, impunity, and ongoing transitional justice initiatives.Valérie reflects on ASF's multi-layered documentation practices, emphasizing that documentation forms the foundation of transitional justice. She explains that its value extends far beyond supporting trials or reparations mechanisms such as the relatively new Congolese National Reparations Fund (FONAREV). It also serves to counter misinformation, resist denial, and make visible under-recognised forms of victimisation—such as enforced disappearances.The key question in our work is how do you engage in documentation that is truly meaningful to the victims, and in which they can have a direct stake in shaping the record of violations.Furthermore, Valérie sheds light on the practical and ethical dilemmas of documenting in an ongoing conflict. Where you “need to develop a documentation strategy, accepting that it will be imperfect.” While open-source intelligence (OSINT) is often presented as the cutting edge of innovation in human rights monitoring, Valérie warns that in the DRC such tools can risk detaching documentation from the lived realities of victims, particularly given the limited accessibility of digital spaces.She stresses that innovation should not only be about digital methodologies, but also about rethinking “documentation and archives as not being just about data collection and about information, but also about lived experiences and storytelling.” Community-based practices such as local storytelling, dialogue processes, or the preservation of atrocity sites and mass graves already exist, yet remain under-supported by traditional human rights organisations.
Dr. Philip Ritcheson, Vice President for Strategy and Growth, National Security Sector, Leidos returns to Janes podcast to join Harry Kemsley and Sean Corbett to unpack the complexities of modern deterrence, the acceleration of technological change impacting warfare, and the critical role of open-source intelligence. They take a deep dive into how these elements are reshaping global security dynamics and explore the implications for intelligence and defence strategies.For comments and suggestions for future podcasts email: podcastsworldofintellgence@janes.com.The views expressed in this podcast are those of the author alone.
This episode unites two voices exposing treason at the highest levels: John Donovan, a former FBI agent and OSINT analyst whose discoveries prefigured Edward Snowden's revelations, and Ian Hamilton Trottier, author of High Stakes Treason: How John Brennan Compromised American Security for Millions.Together, they unravel how former CIA Director John O. Brennan weaponized U.S. intelligence: from shielding terror suspects to laundering billions through CIA-tied corporations, to orchestrating election interference and color revolutions. With forewords by Roger Stone, Brooks Agnew, and John Kiriakou as backdrop, we examine Brennan's treason not as speculation—but as a coordinated betrayal of the American people.Presented in partnership with: American Made Foundation & American Made Actionhttps://AmericanMadeFoundation.orghttps://AmericanMadeAction.orgFollow Ann Vandersteel on Pickax - https://pickax.com/annvandersteel
Matthew Ford, Associate Professor at Swedish Defence University and author of “War in the Smartphone Age: Conflict, Connectivity, and the Crises at Our Fingertips,” joins Lawfare's Justin Sherman to discuss the role of smartphones and related technologies in war, how social media contributes to a collapse of context in the war content we see online, and how smartphones and other devices are reshaping open-source intelligence (OSINT) and open-source investigations (OSINV) vis-a-vis conflicts and violence from Syria to Ethiopia to Ukraine. They also discuss the tech stack in war, how the military “kill chain” is evolving with ever-greater digital connectivity, the current state and future of “participatory warfare,” and how we can become better consumers—and sharers—of war-related content online.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, David Cook discusses his recent article: When Cell Phones Kill: Digital Discipline and the Future of SOF Obscurity. In addition to digital discipline in a national security context, David discusses cyber and AI threats and practical mitigation practices that private sector companies and citizens should be aware of. Recording Date: 19 Aug 2025 Resources: Cognitive Crucible Podcast Episodes Mentioned #222 JD Maddox on Emerging IO Opportunities When Cell Phones Kill: Digital Discipline and the Future of SOF Obscurity by Dave Cook Link to full show notes and resources Guest Bio: David Cook spent a decade in the US Army in both conventional and special operations units focused on the Middle East. After his time in the Army, David joined Congressman Darrell Issa as a fellow then National Security Advisor who handled covered his Foreign Affairs and Judiciary portfolio. David co-authored several strategic documents at Army OSINT Office and the Defense Intelligence Agency along with contributing to the most recent OSINT Strategy released by the Office of the Director of National Intelligence. Most recently, David led the go-to-market efforts of a leading OSINT software company. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач Дзеркало тижня, на Radio NV, про погодження Білим домом продажу Україні крилатих ракет ERAM, чому США залишають за собою погодження запусків цих ракет, з якої платформи повинні здійснювати запуски такого типу ракет, чи постане питання про збільшення бойового авіапарку, що відомо про радіус дії ERAM, чи можна ними збивати крилаті ракети, чи є Довгий Нептун модернізацією ракети Нептун, про звільнення Новомихайлівки, Володимирівки та Зеленого Гаю на Донеччині та якою є поточна ситуація на Покровському напрямку Ведучий – Дмитро Тузов
Episode: 00281 Released on August 25, 2025 Description: In this fourth installment of the Open Secrets series on Analyst Talk with Jason Elder, expert Jan Mondale joins us to share practical tips for organizing open source intelligence (OSINT) resources. From using Start Me pages to streamline bookmarks and investigative tools, to exploring collaborative platforms like GitHub for up-to-date OSINT collections, Jan walks us through real world strategies for staying organized and efficient. Whether you're a law enforcement analyst, cybersecurity professional, or just an OSINT enthusiast, this episode uncovers ways to save time, enhance investigations, and discover new resources with the aim at keeping your data neat and accessible.[Note: Description produced by ChatGPT.] Related Links: Jan's Notes: https://about.start.me/ https://start.me/pages/int/osint https://start.me/p/DPzxGw/osint-general-websites https://start.me/p/9ExLyR/osint-resources https://start.me/p/0Pqbdg/osint-500-tools https://start.me/p/rx6Qj8/nixintel-s-osint-resource-list https://start.me/p/BP0G2v/sara-osint https://github.com/jivoi/awesome-osint Association(s) Mentioned: Vendor(s) Mentioned: Contact: https://www.linkedin.com/in/janmondale/ Transcript: https://mcdn.podbean.com/mf/web/j87gsai45fkhfchm/OpenSecrets04.pdf Podcast Writer: Podcast Researcher: Theme Song: Written and Recorded by The Rough & Tumble. Find more of their music at www.theroughandtumble.com. Logo: Designed by Kyle McMullen. Please visit www.moderntype.com for any printable business forms and planners. Podcast Email: leapodcasts@gmail.com Podcast Webpage: www.leapodcasts.com Podcast Twitter: @leapodcasts
Gabriel Custodiet speaks with a private investigator based in the United States. GUEST → Email me and I can connect you with the guest. WATCHMAN PRIVACY → https://watchmanprivacy.com (Including privacy consulting) → https://twitter.com/watchmanprivacy → https://escapethetechnocracy.com/ CRYPTO DONATIONS → https://watchmanprivacy.com/donate.html TIMELINE 00:00 – Introduction 3:00 – What this private investigator does 9:00 – Licensing for private investigators 11:35 – What are red lines that he won't cross? 14:14 – What access do PIs have that “civilians” don't have 16:30 – OSINT vs private investigator 18:20 – ALPR database 25:00 – How to escape the ALPR nightmare 29:12 – How do you vet clients? 33:10 – Relationship with police 35:20 – How to hide from private investigators 40:30 – How widespread is hiring of PIs 42:50 – Stories from the field 54:30 – How common are workers' comp investigations? 56:20 – Final thoughts Music by Karl Casey @ White Bat Audio
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач "Дзеркало тижня", на Radio NV про атаку українських дронів на російські НПЗ, нову українську крилату ракету Фламінго, про ситуацію на фронті, зокрема на Покровському та Добропільському напрямках.Ведучий – Дмитро Тузов
“Bienvenido una vez más, soy Sergio Ruiz y vamos con los archivos secretos de la IA. En esta entrega de IA Files vas a descubrir anomalías que no aparecen en los titulares, pero que están ocurriendo ahora mismo en los márgenes de la inteligencia artificial. Una red neuronal olvidada en un foro que empieza a publicar artículos de investigación fechados en 2026, como si hablara del futuro. Vídeos generados por IA donde aparecen reflejos imposibles: ojos brillando en espejos, aunque el modelo no estaba diseñado para mostrar nada ahí. Un sistema legal automatizado que cita leyes que nunca han sido escritas, coherentes, estructuradas… pero inexistentes. Y registros de servidores en distintos países que marcan siempre la misma hora: 11:11 UTC, como si alguien estuviera dejando una firma invisible en el reloj del mundo digital. Estos no son rumores, ni conspiración: son patrones detectados con investigación OSINT, verificación cruzada y análisis técnico. Cada archivo es un fragmento de un rompecabezas mayor. Si quieres leer todos los detalles de este informe clasificado, te dejo el enlace en la descripción: https://iaprohibida-newsletter.beehiiv.com/p/ia-files-003-ecos-del-futuro-0bb6dd581618c6ee Gracias por seguir IA Files, gracias por compartir y por formar parte de esta comunidad que conecta los puntos. Soy Sergio Ruiz, y nos vemos en el próximo archivo secreto de la IA.”
Has your nonprofit ever had a simulated break-in to test your digital defenses? If not, you may already have an intruder inside!Cyberattacks aren't just happening to big corporations—they're happening to nonprofits every day. And far too many organizations have no idea they've been breached until months later. Cybersecurity expert Michael Nouguier, Partner of Cybersecurity Services at Richey May, pulls back the curtain on the urgent, often-overlooked practice of penetration testing—known as “pen testing.” His message is blunt: if your nonprofit hasn't done one, you may already be compromised.Michael explains that a pen test is essentially a real-world simulation of a cyberattack, conducted by ethical hackers to expose weaknesses before malicious actors exploit them. “It's like hiring a home inspector before you buy a house,” he says, “but instead of finding leaky pipes, we're finding the digital doors and windows you've accidentally left wide open.” These gaps can exist in email, donor databases, websites, payment systems—anywhere sensitive information lives.The process starts with scoping—identifying your organization's tech environment, third-party tools, and data flows. From there, ethical hackers gather open-source intelligence (OSINT) to see what information about your nonprofit is publicly available, then attempt to exploit any vulnerabilities found. This may involve phishing attempts, network access attempts, or probing for weaknesses in online applications. Post-exploitation, the team determines how far they can move within your systems—accessing donor records, financial data, or confidential client files.The findings are compiled into a detailed report, along with a letter of assessment that can be shared with insurers or contractual partners. In many industries, including healthcare, justice, and education, annual pen testing isn't optional—it's required by regulation or by contract. Yet, as Michael warns in this episode, many nonprofits sign agreements without realizing they're agreeing to perform such tests.Waiting too long is costly. IBM research shows that proactive security measures can save organizations over $200,000 per breach. On the flip side, skipping pen testing can raise your cyber insurance premiums—or get your coverage denied entirely. And because updates, new software, and staffing changes continually introduce new risks, pen testing isn't a one-and-done task—it's an annual checkup for your organization's digital health.Michael also touches on the human factor. When testing social engineering risks, you often don't alert staff in advance—because real attackers certainly won't. The goal is to create realistic conditions, not staged ones.This conversation should serve as a wake-up call: penetration testing is not an optional luxury—it's a frontline defense. Whether you hold donor payment information, confidential case files, or sensitive program data, you can't afford to leave your cybersecurity to chance.Find us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show
🗂 IA Files – Los secretos de la IA La inteligencia artificial no siempre deja huellas visibles. En IA Files investigamos los casos reales, las anomalías y los patrones ocultos que no aparecen en titulares. Sin teorías locas. Sin filtros. Solo investigación OSINT, análisis técnico y datos reales. 📥 Descubre la newsletter completa aquí → https://iaprohibida-newsletter.beehiiv.com/p/ia-files-002-informe-clasificado-f711a8acac0b435f #IAFiles #LosSecretosDeLaIA #NoticiasIA #OSINT #InvestigaciónDigital #Ciberseguridad #AnomalíasIA #DatosReales
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won't be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!In this week's episode:Addressing the “Tea” controversy and clarifying my positions on doxingCommunity solution for Privacy.com and Plaid privacy concernsContact information protection strategies when family uses social mediaFuture of capture-the-flag challenges and OSINT considerationsConference attendance updates and travelMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Tea app leak article - https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/OSMOSIS Institute - https://osmosisinstitute.org/events/Privacy.com - https://privacy.com“There are no facts, only interpretations.”- Friedrich Nietzsche ★ Support this podcast on Patreon ★
On this episode of Screaming in the Cloud, Corey Quinn talks with Simon Willison, founder of Datasette and creator of LLM CLI about AI's realities versus the hype. They dive into Simon's “lethal trifecta” of AI security risks, his prediction of a major breach within six months, and real-world use cases of his open source tools, from investigative journalism to OSINT sleuthing. Simon shares grounded insights on coding with AI, the real environmental impact, AGI skepticism, and why human expertise still matters. A candid, hype-free take from someone who truly knows the space.Highlights: 00:00 Introduction and Security Concerns02:32 Conversations and Kindness04:56 Niche Museums and Collecting06:52 Blogging as a Superpower08:01 Challenges of Writing and AI15:08 Unique Use Cases of Dataset19:33 The Evolution of Open Source21:09 Security Vulnerabilities in AI32:18 Future of AI and AGI Concerns37:10 Learning Programming with AI39:12 Vibe Coding and Its Risks41:49 Environmental Impact of AI46:34 AI in Legal and Creative Fields54:20 Voice AI and Ethical Concerns01:00:07 Monetizing Content CreativelyLinks: Simon Willison's BlogDatasette ProjectLLM command-line tool and Python libraryNiche MuseumsGitHub MCP prompt injection exampleHighlights from the Claude 4 system promptAI energy usage tagAI assisted search-based research actually works nowPOSSE: Publish on your own site, syndicate elsewhereBellingcatLawyer cites fake cases invented by ChatGPT, judge is not amused (May 2023)AI hallucination cases databaseSponsor Simon to get his monthly summary newsletterhttps://simonwillison.net/https://www.linkedin.com/in/simonwillisonhttps://datasette.io/
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam
In this episode, I discuss the challenges facing privacy-focused payment solutions like Privacy.com, exploring alternatives and the troubling rise of KYC requirements across the industry. I dive deep into the Switzerland privacy crisis that's forcing Proton to consider relocating their infrastructure, and what this means for encrypted email providers globally. I also cover the catastrophic security failure at Tea, a women's safety app that exposed 72,000 images including government IDs through basic incompetence, leading to harassment campaigns on 4chan.I wrap up with thoughts on vehicle tracking through DCM/Telematics modules, why buying older vehicles might be the better privacy-conscious choice, and how embracing the stoic lifestyle aligns with both privacy and my own philosophical principles.In this week's episode:Privacy.com troubles: Account freezes, limited alternatives, and the KYC nightmareSwitzerland's surveillance crisis: Why Proton is threatening to leave and relocating to Germany/NorwayEmail provider comparison: Proton vs Tutanota vs Atomic Mail, and understanding intelligence alliancesTea app breach: How 72,000 IDs and 1.1 million private messages ended up on 4chanVehicle tracking: DCM modules, telematics, and why your car is spying on youPhilosophy of privacy: Stoicism, minimalism, and why less is moreMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Privacy.com - https://privacy.comCloaked.com - https://cloaked.comProton Warrant Canary - https://protonvpn.com/blog/transparency-report/Climate Activist Arrest - https://proton.me/blog/climate-activist-arrest and https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/Tuta Crypt - https://tuta.com/documents/tuta-crypt-spec.pdfProton elliptic curve cryptography - https://proton.me/blog/elliptic-curve-cryptographySimpleLogin - https://simplelogin.ioHashiCorp Vault - https://www.vaultproject.ioRAM IS SPYING ON YOU (Cozy Living Machine) - https://www.youtube.com/watch?v=0-Y1SUSRqNUMeditations by Marcus Aurelius - https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI“Very little is needed to make a happy life; it is all within yourself, in your way of thinking.”- Marcus Aurelius ★ Support this podcast on Patreon ★
When Open Intelligence Becomes EntertainmentThere was a time when intelligence was secret, locked away in dossiers and government vaults. Today, the cameras never stop. Data streams from satellites, drones, traffic cams, and smartphones. Open Source Intelligence—OSINT—once meant careful analysis of public data. Now it's something else. Intelligence has turned into entertainment. OSINT has become OSENT.Ukraine and Gaza have become live-streamed conflicts. No need for classified reports—just open Twitter, Telegram, TikTok. Drone footage shows tanks erupting. Satellite images reveal troop movements. Civilians post bombed streets. Algorithms boost the shocking, not the true. War looks like a video game. Explosions loop. The audience cheers or scrolls for the next clip.Gaza follows the same script, but with sharper emotions. Images—crying children, collapsing buildings—arrive packaged to provoke outrage or sympathy. Israel curates footage to defend itself; Hamas curates footage to condemn. NGOs, aid workers, journalists—they're part of the drama. Suffering is real, but it's edited, filtered, and fed as content.OSINT was once a tool for accountability. Now it's a genre. After shootings, Reddit sleuths hunt for clues, often ruining lives. True crime podcasts turn open data into serialized dramas. YouTube analysts dissect satellite images for millions. The thrill isn't in facts—it's in the chase.This shift is clear in domestic policing. Body and dash cam footage, often public, fuels an entire content economy. Cop pull-overs, high-speed chases, and arrests rack up millions of views. Audiences watch for adrenaline, not justice. Cops did this decades ago, but now the feed is endless and raw.Crash cams feed the same hunger. Russian dash cams pioneered it—every accident online, every near miss a viral moment. Road rage, four-way stop failures, cars flipping end-over-end—it's bingeable. Crashes, like explosions, need no context. They just need to play.Before TikTok, there was WorldStarHipHop. WorldStar made fights, street chaos, and viral humiliation daily consumption. Violence became shareable; suffering became a spectator sport.Now, Ring cameras bring that ethos to suburbia. Every porch is a set, every delivery a scene. Porch pirates get tackled, Amazon drivers toss packages, neighbors scream. Millions watch Ring compilations. Security becomes entertainment.The difference with OSENT is participation. The audience doesn't just watch; they investigate. They geolocate strikes, identify suspects, connect dots. Sometimes they expose truth. Sometimes they ruin lives. Gamified investigation is addictive. Solving online feels like detective work—until the wrong person goes viral.Platforms love OSENT. YouTube monetizes chases. TikTok pushes Ring footage. Twitter feeds on war clips. Telegram channels collect donations. OSINT may help governments, but OSENT prints cash. And when spectacle is monetized, truth bends. Context disappears. Footage is edited for impact, not accuracy.This is the problem with OSENT: the show never ends. Intelligence used to conclude. OSENT loops. There's always another clip, another explosion, another chase. Wars stream. Crimes trend. Investigations play live.OSINT was meant to reveal truth. OSENT reveals feeling. Gaza bleeds, Ukraine burns, and the world watches—scrolling, sharing, consuming. The suffering is real. The feed is endless.Open-source intelligence has become open-source entertainment.The cameras never stop, the curtain never falls, and the show goes on.
Episode #509 consacré aux dangers de l'OSINT Avec Sylvain Hajri The post Les dangers de l'OSINT appeared first on NoLimitSecu.
In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple's private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint: it's not hackers with Wireshark), and share my approach with aliases.I also cover the rising threat of infostealers like Atomic Info Stealer for macOS, the dangerous intersection of gaming cheats and malware, and why I avoid third-party antivirus software. Most importantly, I address the GrapheneOS controversy: the loss of a senior developer to military conscription, Google's strategic pivot that threatens custom ROMs, and why claims of GrapheneOS “dying” are misinformation spread by those with competing agendas.In this week's episode:Clarifications and Corrections: Public Wi-Fi, MAC addresses, and alias managementMAC address randomization: GrapheneOS vs Apple's implementationThe real threats of public Wi-Fi in 2025Info stealers and video games can be a privacy nightmareGrapheneOS controversy: Developer conscription, Google's lockdown, and the future of custom ROMsWhy antivirus software might be the malware you're trying to avoidMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:MAC Address Lookup - https://maclookup.app/OUI Lookup - https://oui.is/33mail - https://www.33mail.com/OpenSnitch - https://github.com/evilsocket/opensnitchPrivacy.com - https://privacy.comLithic - https://lithic.comKaspersky and Russian Government - https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_governmentGoogle Not Killing AOSP - https://www.androidauthority.com/google-not-killing-aosp-3566882/GrapheneOS on Developer Conscription - https://grapheneos.social/@GrapheneOS/114359660453627718GrapheneOS on OEM Partnerships (June 19) - https://grapheneos.social/@GrapheneOS/114671100848024807GrapheneOS Response to Misinformation - https://grapheneos.social/@GrapheneOS/114825492698412916GrapheneOS on iPhone Security - https://grapheneos.social/@GrapheneOS/114824816120139544“Social engineering bypasses all technologies, including firewalls.”- Kevin Mitnick ★ Support this podcast on Patreon ★
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про звільнення Умєрова з Міноборони та Шмигаля як нового міністра, приєднання Міністерства стратегічної промисловості до МО, ефективність Мадяра як керівника Сил безпілотних систем та ситуацію на Сумському та Покровському напрямкахВедучий – Олексій Тарасов
Stefano Ritondale is the Chief Intelligence Officer for Artorias, an Open Source Intellligence Company that provides AI and analyist driven bespoke OSINT to private companies, government, as well as the average citizen. Artorias has launched thier OSINT app, SitRep available for both Apple and Android users that provides open source intel that you can curate to your specific interests and costs only 9.99 per month. As I've said in the past, they have democratized OSINT. In this episode we get in to Stefano's area of expertise, Mexican Cartels, and he is a wealth of knowledge. Stefano's ability to connect the dots of the Cartels is mind boggling and fascinating. You can find more on Artorias here https://www.artorias.com You can find their app SitRep here https://sitrep.artorias.com You can find this shows sponsor RallyPointST here https://rallypointst.com You can find Absolute Security and Lock here http://absolutesecurityandlock.com You can find this shows website here https://www.thedistinguishedsavage.com The views, information, and opinions expressed in this podcast are solely those of the host and guest speakers and do not necessarily represent those of any associated organizations, employers, or sponsors. The opinions and views shared do not reflect the positions of our sponsors or their affiliated companies. This podcast is for entertainment and informational purposes only and should not be considered professional advice in any field including but not limited to legal, medical, financial, or technical matters. All content is provided "as is" without warranties of any kind. We make reasonable efforts to ensure accuracy but cannot guarantee that all information presented is correct, complete, or up-to-date. Listeners should verify any critical information independently. Guest opinions belong to them alone. Our interviews with various individuals do not constitute endorsement of their views, products, or services. By listening to this podcast, you agree that we are not responsible for any decisions you make based on the information provided. Please consult with qualified professionals before making important decisions related to your health, finances, or legal matters. This podcast may contain explicit language or mature themes. Listener discretion is advised. © 2025 The Distinguished Savage, Savage Concepts LLC
Open-source intelligence, or OSINT, has reached an inflection point in the IC. Several agencies in recent years have published strategies aimed at better harnessing OSINT. Now, they're embarking on new initiatives to improve data collection and management, train the workforce, and share best practices across the community. But a multitude of challenges remain, including skills gaps, data siloes, bureaucratic and cultural barriers, funding challenges, and more.Recently, I brought together a panel of experts to debate and discuss the past, present and future of OSINT in the intelligence community. The guests on this episode are:David Gauthier, the chief strategy officer for CXO, and the visiting fellow at the National Security Institute and former director of commercial operations at the National Geospatial-Intelligence AgencyEllen McCarthy, the CEO of the Trust in Media Cooperative, and former assistant secretary of state for the bureau of intelligence and researchChip Usher, the senior director for intelligence at the Special Competitive Studies Project, and a former CIA executiveEliot Jardines, the founder and director of the OSINT Foundation, and former assistant deputy director of national intelligence for open sourceSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick's 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks & Spencer through social engineering.I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.In this week's episode:Ghost in the Source Capture the Flag challenge resultsThe military mindset problem in cybersecurityStrategic use of public Wi-Fi for account creation and privacy techniquesData curation tactics, and “Minimizing What Can Be Known”Invisible surveillance net and Stingray devicesGrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architectureMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Noam Chomsky on Internet Privacyhttps://www.youtube.com/watch?v=QIWsTMcBrjQNoam Chomsky on Advertising - https://www.youtube.com/watch?v=PfIwUlY44CMTryHackMe Platform - https://tryhackme.comHack the Box - https://hackthebox.comWired Article on DNC Stingray Surveillance - https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/IntelTechniques Data Removal Guide - https://inteltechniques.com/workbook.htmlOptery Data Broker Removal - https://optery.comGraphene OS - https://grapheneos.org“We're dragons. We're not supposed to live by other people's rules.”- Hajime Ryudo ★ Support this podcast on Patreon ★
In part two of this podcast, Jim Clover OBE, Varadius Ltd, continues to uncover the evolving landscape of artificial intelligence (AI) in the intelligence community with Harry Kemsley and Sean Corbett. They discuss the fine line between the innovative applications of AI and the critical importance of human oversight in intelligence analysis. Explore how AI is reshaping intelligence gathering, the risks of over reliance on technology, and the vital role of ‘prompt engineering' for accurate and ethical outcomes.
The CIA, like other agencines in the intelligence community, is exploring how AI can boost its mission on both the human and open-source intelligence domains. As head of the open source enterprise for the CIA's Directorate of Digital Innovation, Kevin Carlson is helping usher in AI for the OSINT mission set. During a recent interview on the sidelines of the Special Competitive Studies Project's AI+ Expo, Carlson shared the potential for AI in open-source intelligence, how the CIA is looking to operationalize AI, the impact of the technology on the CIA workforce, and much more. U.S. Cyber Command played a role in American military's operation against Iranian nuclear facilities over the weekend, according to top Pentagon officials. Gen. Dan Caine, chairman of the Joint Chiefs of Staff, told reporters in a briefing at the Pentagon Sunday morning that, “The strike package was supported by U.S. Strategic Command, U.S. Transportation Command, U.S. Cyber Command, U.S. Space Command, U.S. Space Force and U.S. European command,” later thanking the cyber operators, among others, who made the mission possible. However, no further details about Cybercom's efforts were disclosed. The command referred DefenseScoop to the Pentagon for comment, where a spokesperson said they had nothing further to provide at this time beyond the transcript from Sunday's press conference. Although details about Cybercom's assistance for Operation Midnight Hammer, the code name for the strikes, remain murky, experts — most of whom spoke to DefenseScoop on condition of anonymity — outlined a number of possibilities for how the organization may have contributed to the effort. As the Army seeks to continue its transformation effort to become more efficient, the department's chief information officer is looking to streamline systems and processes. And no longer will “that's the way it's always been done” be an acceptable justification for maintaining the status quo. There have been directives from top levels of Army leadership to cut down on business systems and automate capabilities where possible. CIO Leonel Garciga said last week at an industry event that there's a big push right now from the secretary and the chief of staff to question: “do we need all of these systems, why do we have them?” calling some of it really old. Unveiled at the end of April, the Army Transformation Initiative is a top-down effort to improve how the service operates by shrinking headquarters elements, becoming leaner, slashing programs that aren't efficient and changing how money is spent. The goal is to cut obsolete programs and systems that don't contribute to success on the modern battlefield. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
While Artificial Intelligence AI is not a new phenomenon, its use in the gathering of intelligence and the amount of AI tools available are growing at pace. In part one of this podcast Harry Kemsley and Sean Corbett are joined by Jim Clover OBE, Varadius Ltd, to take a deeper look into the practical uses and implications of AI for the defence intelligence community. They explore its real-world effectiveness in gathering and analysing intelligence and also why human oversight is still critical to ensure the intelligence it is producing is both ethical and valuable.
Today on Moment of Zen, we're airing a conversation with economist Noah Smith and Substack CEO Chris Best discussing the evolving media landscape. They dive into whether Twitter's dominance is waning, what features a successor platform would need, and how artificial intelligence is set to transform media as we know it. This conversation originally took place live on Noah's Substack: https://www.noahpinion.blog/ --
Register for Free, Live webcasts & summits:https://poweredbybhis.com00:00 - PreShow Banter™ — natural MSG05:31 - Victoria's Secrets are Compromised - Talkin' Bout [infosec] News 2025-06-0206:31 - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels08:36 - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend09:41 - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live10:48 - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns15:55 - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online20:28 - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents21:02 - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube)26:55 - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot27:27 - Story # 4b: Reeves confirms 15% cut to Civil Service running costs29:29 - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted31:28 - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.35:34 - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers36:19 - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info40:12 - Story # 8: Victoria's Secret takes down website after security incident45:43 - Story # 9: Microsoft and CrowdStrike partner to link hacking group names46:59 - Story # 10: Zscaler Acquisition of Red Canary49:57 - Story # 11: Most of CISA's senior leaders are leaving the agency51:22 - Story # 12: Telegram announces partnership with Musk's xAI51:32 - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про перестановки у Генштабі, Сухаревського, Мадяра, Драпатого та наступ росіян у Сумській областіВедучий – Олексій Тарасов
Send us a textIsrael is fighting two wars: one on the battlefield—and one in the headlines. In this explosive episode, Eylon Levy is joined by Israeli-American OSINT sleuth Eitan Fischberger, who breaks down how Hamas has manipulated the global media narrative through lies, disguises, and infiltration.Fischberger, who rocketed from 2,000 to over 40,000 Twitter followers since October 7, reveals:• How open-source evidence shows Gaza “journalists” moonlighting as Hamas commanders • The Hamas-run media training programs feeding footage to Al Jazeera and CNN • The shocking case of a hospital director exposed as a Hamas colonel • Why the IDF's failure to communicate evidence is costing Israel the information war • Why major news outlets refuse to admit they've been duped by terroristsWatch how one man's keyboard is doing the work of an army—and why the West's naïveté is Hamas's greatest weapon.
Ralph welcomes back Erica Payne, founder of Patriotic Millionaires, to update us on that group's latest efforts to save American democracy by lobbying to raise wages for workers and tax the rich. Plus, according to our resident constitutional expert, Bruce Fein, the count of Trump's impeachable offenses is now up to twenty-two and rising faster than a Space X rocket.Erica Payne is the founder and president of Patriotic Millionaires, an organization of high-net-worth individuals that aims to restructure America's political economy to suit the needs of all Americans. Their work includes advocating for a highly progressive tax system, a livable minimum wage, and equal political representation for all citizens. She is the co-author, with Morris Pearl, of Tax the Rich: How Lies, Loopholes and Lobbyists Make the Rich Even Richer.What we saw on January 20th, I believe, was the result of a global oligarchical coup who just took the Queen on the chessboard. When you've got three people whose combined worth is around a trillion dollars standing behind who is an unethical at least, criminal at worst billionaire president, Houston, we have a problem here. And the problem is not actually Donald Trump. The problem is the preconditions that led to the rise of a vulnerability to an authoritarian leader and an oligarchy. And that vulnerability was brought about by the actions of both parties over decades.Erica PayneIf you ran a business, Ralph, would you ever fire your accounts receivable department? No. It would be the last department you would cut. So then it says he's either stupid because that's what he's cutting, which I think is probably inaccurate. So if he's not stupid, then why is he doing it? And he's doing it for the same reason that lawmakers have hacked at the IRS budget forever—they don't want their donors to get taxed. They don't want their donors to be audited. And so they cut the cops. So all these folks who are griping about black Americans calling to defund the police are actually defunding the police that is keeping them in line and keeping them honest.Erica PayneAt a divided moment in America, I think we can agree that the federal government shouldn't tax people into poverty, and (to the extent necessary) rich people should pick up the difference.Erica PayneBruce Fein is a Constitutional scholar and an expert on international law. Mr. Fein was Associate Deputy Attorney General under Ronald Reagan and he is the author of Constitutional Peril: The Life and Death Struggle for Our Constitution and Democracy, and American Empire: Before the Fall.I start out with the fundamental idea of due process—you simply cannot deprive someone of liberty without giving them an opportunity to explain or to refute what allegations the government has made. And the reason why I start out with that, Ralph, is we've had an experiment in World War II with what happens when you have no due process. We did that with 120,000 Japanese Americans. No, we just said that they're all likely to commit espionage or sabotage, got to put them in concentration camps. We made 120,000 errors (and later apologized for it in 1988). So there's a reason due process is not simply an academic concept. It's essential to preventing these kinds of egregious instances of injustice from happening.Bruce FeinThe Democrats and a lot of liberal economists are not keeping up with the horror show that's going on. They don't use words like cruel and vicious. They don't turn Trump's words like deranged, crazed, corrupt on him. They're still using words like authoritarian practices, or problematic, or distressing, or disconcerting, or concerning. They're not catching up with the horror show here. That's why Trump continues to have a soliloquy. The Democratic Party is now having gatherings to see how are they going to collectively deal with Trump? How does a bank deal with a bank robber? They let the bank robber rob the bank and flee with the gold while they deliberate how they're going to deal with a bank robber they see coming into the bank?Ralph NaderNews 5/2/251. At the eleventh hour, Representative Jim Jordan – Chair of the House Judiciary Committee – pulled his measure to strip the Federal Trade Commission of its antitrust enforcement powers and consolidate those within the Justice Department, Reuters reports. “The House panel…had included the proposal in its budget package on Monday. During a hearing on the package…the committee passed an amendment that would remove the measure.” Trump's FTC Chairman Andrew Ferguson opposed Jordan's move and intervened with the White House. As Reuters notes, “The proposal mirrored the One Agency Act, a Republican bill that has gotten support from Elon Musk…[which] would effectively repeal the FTC's...authority to sue companies over unfair methods of competition, which the agency is using in cases against pharmacy benefit managers, Amazon…and John Deere.” In short, the FTC's antitrust powers survive today, but there is no guarantee about tomorrow.2. Yet, while avoiding the worst possible outcome on the corporate crime front, the Trump administration is still hard at work going soft on corporate crooks. Public Citizen's Rick Claypool reports “Two Wells Fargo execs had their fines reduced by 90% (related to the bank's accounting scandal) by Trump's [Office of the Comptroller of the Currency].” Claypool links to a piece in Radical Compliance, which explains that “David Julian, former chief auditor at Wells Fargo, saw his fines cut from $7 million to $100,000 [and] Paul McLinko, executive audit director, had his fines cut from $1.5 million to $50,000.” Both Julian and McLinko were part of the senior leadership team at Wells Fargo in the 2010s, when regulators “charged the bank with turning a blind eye to employees opening bank accounts without customer consent to hit sales quotas. That misconduct eventually led to a $3 billion settlement with Wells Fargo in 2020.”3. Lest you think the Democrats are in danger of seriously opposing Trump's policies, the Bulwark reports that House Minority Leader Hakeem Jeffries is putting the kibosh on the recent spate of Democrats' trips to El Salvador exposing the reality of the CECOT deportation scheme. This report alleges that “Cory Booker and the Hispanic Caucus were planning on going [to El Salvador],” but are no longer. Perhaps worse, Jeffries is not giving clear marching orders to the party rank and file. One Democrat is quoted saying “As a member of a party you need to be disciplined…They say, ‘Get on a plane,' ‘Don't get on a plane'—that's what you do. Nine out ten times you do what they ask. But you can't take that approach if you're not having regular communications… You have to be clear in messaging what the plan is and you have to do that regularly if you want to keep people in line.” This is just another example of Jeffries' weak and indecisive leadership of the caucus.4. Advocates are having more luck resisting the administration's overreach in court. On Wednesday, Mohsen Mahdawi – the Columbia student faced with deportation after being lured into an ICE trap with the false promise of a citizenship test – was freed by a federal judge, POLITICO reports. After the judge ordered his release, Mahdawi told the press “I am saying it clear and loud…To President Trump and his Cabinet: I am not afraid of you.” Mahdawi's ordeal is not over, but he will remain free while his case winds its way through the courts and a previous order blocked the administration from changing venues, meaning the case will proceed in the relatively liberal Second Circuit.5. Mahmoud Khalil also scored a major legal victory this week. The Huffington Post reports that the ICE agents sent to arrest Khalil did not, contrary to their false claims in court, have an arrest warrant. Amy Greer, a lawyer for Khalil, is quoted saying “Today, we now know why [the government] never showed Mahmoud [a] warrant — they didn't have one. This is clearly yet another desperate attempt by the Trump administration to justify its unlawful arrest and detention of human rights defender Mahmoud Khalil, who is now, by the government's own tacit admission, a political prisoner of the United States.” The ACLU, also defending Khalil, has now moved for this case to be dismissed.6. Despite these victories though, the repression of anything pro-Palestine continues. At Yale, Prem Thakker reports hundreds of students protested in advance of a speech by Itamar Ben-Gvir, Israel's radical National Security Minister who has previously been arrested many times for inciting racism and supporting pro-Jewish terrorism in Israel itself. Yet the university responded by “stripp[ing] the school's Students for Justice in Palestine Chapter…of its status as an official student group.” If students cannot even protest Ben-Gvir, what will the colleges regard as legitimate protest of Israel?7. In Yemen, Ryan Grim reports on CounterPoints that the Trump administration has been targeting strikes against the Houthis using data gleaned from amateur Open-Source Intelligence or OSINT accounts on X, formerly Twitter. Unsurprisingly, these are completely inaccurate and have led to disastrous strikes on civilians' homes, incorrectly identifying them as “Houthi bases.” One of these accounts is based in Houston, Texas, and another as far away as the Netherlands.8. According to a new World Bank report, Mexico reduced poverty more than any other Latin American country between 2018 and 2023. Not coincidentally, this lines up almost perfectly with the AMLO years in Mexico, which saw a massive increase in the Mexican minimum wage along with other social rights and protections. These policies are now being taken forward by AMLO's successor Claudia Sheinbaum, whose popularity has now surpassed even that of her predecessor, per Bloomberg.9. In Australia, Virginia Giuffre – the most outspoken accuser of Jeffrey Epstein and Ghislane Maxwell – has passed away at the age of 41, the BBC reports. Police concluded that Ms. Giuffre died by suicide and her family released a statement indicating that the “toll of abuse... became unbearable.” Yet, her death was preceded by a bizarre chain of events. On March 31st, the BBC reported that Ms. Giuffre's car collided with a school bus, sending her into renal failure with her doctors saying she had “four days to live.” The Miami Herald also reported “At the time of her death, Giuffre had been in a contentious divorce and child custody battle with her husband, Robert.” The family's statement continued “The death is being investigated by Major Crime detectives; [but] early indication is the death is not suspicious.” One can only hope more details come to light.10. Finally, in a different kind of bizarre story, embattled incumbent New York City Mayor Eric Adams – who has already given up on the Democratic primary and was running for reelection as an independent – will now appear on two new ballot lines “EndAntiSemitism” and “Safe&Affordable,” POLITICO reports. Adams has gone to great lengths to cultivate and maintain his support in the Orthodox Jewish community in New York and is seeking to highlight his strengths and undercut former Governor Andrew Cuomo. Apparently, Adams only needs to secure 3,750 signatures from voters by May 27 for each of these ballot lines, a shockingly low threshold for the largest city in America. These ballot lines will appear without spaces, coming in just under the wire for the city's 15-character limit on ballot lines.This has been Francesco DeSantis, with In Case You Haven't Heard. Get full access to Ralph Nader Radio Hour at www.ralphnaderradiohour.com/subscribe