Podcasts about osint

  • 584PODCASTS
  • 1,800EPISODES
  • 42mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Mar 13, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about osint

Show all podcasts related to osint

Latest podcast episodes about osint

Fed Time Stories
From Secrets to Open-Source: Jane van Tienen on Intelligence, Leadership, and Global Security

Fed Time Stories

Play Episode Listen Later Mar 13, 2026 42:37


In this episode of Fed Time Stories, Dave Brandt and John Gill sit down with Jane van Tienen, Chief Intelligence Officer at OSINT Combine, to explore her journey from the Australian national security community to the forefront of open-source intelligence in the private sector. Drawing on 24 years of experience, Jane reflects on her career journey, the growing importance of OSINT, and how intelligence derived from publicly and commercially available information is reshaping modern security.The discussion explores how AI can strengthen OSINT workflows while still requiring strong human tradecraft, ethics, and governance to be effective. Jane also shares her perspective on the Bondi Beach attack, the challenges security agencies face when threats emerge without clear warning signs, and why the absence of intelligence does not mean the absence of risk.Beyond security and intelligence, the episode also touches on mentorship, community engagement, and the importance of investing in young people to build confidence, agency, and critical thinking. Along the way, Jane offers thoughtful reflections on the cultural differences between Australia and the United States and what those differences reveal about leadership, security, and public safety.Fed Time Stories is brought to you by Kaseware, an investigative case management solution. Learn more at www.kaseware.com/fedtimestoriespodcast

Layer 8 Podcast
Episode 137: Rosa Rowles - Social Engineer

Layer 8 Podcast

Play Episode Listen Later Mar 9, 2026 34:04


Rosa Rowles has spent more than six years as a social engineer, mainly performing vishing calls. She reports that she has made more than 20,000 calls in her career. In this episode, she talks about using OSINT to build a pretext and how she chooses favorite pretexts to fit into a target's own bias. She also explains amygdala hijacking and how the right pretext can put someone's mind into a state where they might not make the best choices. Rosa will be presenting at BSides Tampa on May 16 at 2 pm!

BELLUMARTIS PODCAST
IRÁN: 7 DÍAS DE GUERRA TOTAL. Análisis estratégico y táctico en fuentes OSINT con Martin Tuitero

BELLUMARTIS PODCAST

Play Episode Listen Later Mar 7, 2026 117:30


** VIDEO EN NUESTRO CANAL DE YOUTUBE **** https://youtube.com/live/RBvFXRUDkqY +++++ Hazte con nuestras camisetas en https://www.bhmshop.app +++++ ¿Qué está pasando realmente en el corazón de Irán? Tras una semana de conflicto abierto, la niebla de guerra es más espesa que nunca, pero los datos no mienten. Hoy en Bellumartis, nos acompaña Martin Tuitero para realizar una autopsia táctica de los primeros 7 días de combate. Olvidamos la propaganda y los comunicados oficiales para centrarnos en lo que dicen los píxeles: imágenes de satélite, geolocalización de impactos y metadatos de combate. En este análisis desglosamos: La Ceguera de la IRGC: ¿Cómo han sido neutralizados los sistemas S-300 y Bavar-373? Analizamos la campaña de degradación de sensores. Masa vs. Intercepción: El balance real de la "Guerra de Salvas". ¿Cuántos misiles han impactado y cuántos han sido interceptados por la coalición? Logística Fracturada: El ataque a los "puntos de estrangulamiento" en los Montes Zagros y el colapso del suministro de combustible. El Mapa de la Destrucción: Martin nos muestra los daños confirmados en bases aéreas, nodos de mando y refinerías estratégicas. La guerra moderna es transparente para quien sabe mirar. Acompáñanos en este recorrido técnico por el campo de batalla más vigilado del mundo. SUSCRÍBETE @BELLUMARTISACTUALIDADMILITAR y @BELLUMARTISHISTORIAMILITAR para no perderte ningún programa y únete a nuestra comunidad de apasionados por la historia militar y los conflictos del mundo. Apóyanos para seguir creando contenido riguroso e independiente: Patreon: https://www.patreon.com/bellumartis PayPal: https://www.paypal.me/bellumartis Bizum: 656 778 825 Síguenos también en redes: Instagram: https://www.instagram.com/bellumartis Twitter / X: https://twitter.com/Bellumartis #Iran2026 #Israel #orientemedio #OSINT #MartinTuitero #BellumArtis #GuerraTotal #TacticaMilitar #Geopolitica #UltimaHora #Hablamos

In the Interest of National Security
OSINT Tradecraft: Credibility and Collection in Online Spaces with Nico Dekens

In the Interest of National Security

Play Episode Listen Later Mar 6, 2026 24:23


Our guest for this episode is Nico Dekens, a veteran practitioner of Open Source Intelligence (OSINT), cyber intelligence, and online investigations with 20+ years in Dutch law enforcement as an all-source intelligence analyst.  Now the owner of Dutch OSINT Guy Intelligence Services and Director of Intelligence & Collection Innovation at ShadowDragon, Dekens is widely known in the OSINT community as @Dutch_OsintGuy and as a co-founder of OSINTCurio.us.  He has trained thousands of government personnel, helped stand up OSINT units, and is recognized for blending operational experience with hands-on instruction as a SANS Instructor and Lead Author. In this interview, we focus on how OSINT is being operationalized, how analysts should think about trust and ethics in anonymous digital environments, and how emerging threats like AI-enabled manipulation are changing verification standards.  Listen as Mr. Dekens digs into collection innovation and what's actually changing at the tools-and-methods level and where Dekens thinks OSINT is headed strategically for government and security stakeholders.  

Room 101 by 利世民
以美擊殺哈梅內伊的內幕交易

Room 101 by 利世民

Play Episode Listen Later Mar 5, 2026 19:41


哈梅內伊(Ali Khamenei)遇刺前24小時,預測市場上六個神秘戶口以120萬美元精準押注,外界嘩然,紛紛指摘是內幕交易。然而,比內幕交易更值得深思的問題是:市場的核戰機會率在行動前悄然攀升至19%,Polymarket卻在輿論壓力下悄然將這個賭注下架——拿走訊號,並不等於消除風險。市場除了分配資源,更核心的功能是揭露資訊;哪怕背後有人靠內幕消息或OSINT獲利,那個價格訊號本身,已是普通人在政府和傳媒過濾之外,所能獲得的最誠實的早期預警。禁止人們知道核武引爆的機會率,究竟是保護公眾,還是剝奪他們自救的機會?問:哈梅內伊遇刺前,預測市場上究竟發生了什麼? 答:在美國和以色列聯合行動擊殺伊朗最高領袖哈梅內伊(Ali Khamenei)前約24小時,Polymarket上有六個戶口合共落注120萬美元,賭哈梅內伊在2月28日前下臺。事後區塊鏈分析公司Bubblemaps發現,這些戶口大多在行動前24小時內才開立,引發外界廣泛質疑是否涉及內幕交易。問:市場除了分配資源之外,還有什麼更根本的功能? 答:市場的另一個核心功能是「資訊揭露」(information revelation)——透過價格訊號,將散落在不同人手中的知識匯聚起來,反映出最接近現實的狀態。傳媒和評論員的工作主要是解讀資訊,但第一手資訊往往受制於消息來源的議程,存在被操控的風險。預測市場的價格走勢,反而可能是一個較少被刻意操縱的訊號來源。問:這六個戶口的下注,一定是內幕交易嗎? 答:不一定。除了直接內幕消息之外,還有另一個解釋:透過開源情報(OSINT)和各種公開數據的分析,有人或許早已推算出軍事行動的可能時間窗口。俄羅斯入侵烏克蘭之前約兩週,供應鏈和物流數據已反映出俄軍的異常部署。此外,Binary Option的時間值特性令臨近到期日的賭注回報率大幅提升,純粹從套利角度也可解釋為何有人選擇在24小時前大注。問:哪怕真的存在內幕交易,這對普通人有什麼好處? 答:內幕交易者透過落注,將原本只屬少數人的資訊「洩漏」到市場價格之中,令其他參與者和觀察者也能從價格走勢中讀取到相關訊號。這種機制可以理解為:社會在不知情的情況下,向那些願意揭露隱藏資訊的人支付了一筆「懸紅」。即使過程不公平,資訊揭露的結果對公眾而言仍然利多於弊。問:Polymarket下架核戰賭注,對公眾有什麼實際影響? 答:在下架之前,該賭注所反映的核武引爆機會率已升至約19%至22%,而在此之前長期接近零。下架令這個市場訊號消失,但核戰的實際風險並不會因此降低。普通人若能獲得這個資訊,至少可以就個人安全、財產配置和出行計劃作出更理性的安排。壓制訊號與消除風險,是截然不同的兩件事。問:市場究竟是在反映現實,還是在改造現實? 答:批評者認為,允許人們在核戰或暗殺上賭博,會產生道德風險,甚至誘使有影響力的人為利益而推波助瀾。但另一種看法認為,政治和軍事事件的發生,根本上由更深層的結構性因素決定,並非預測市場所能左右。拿走賭注,不等於阻止事件發生;反而是讓公眾在沒有任何早期預警的情況下,面對已成定局的現實。問:對於普通人來說,預測市場的最終價值是什麼? 答:在一個政府和傳媒都可能有意無意地過濾資訊的時代,預測市場提供了一個相對獨立、由真實金錢驅動的資訊聚合機制。它不是完美的,也不是完全公平的,但它讓個人有機會在主觀願望之外,獲得一個較為客觀的風險評估基準,從而為自己和身邊的人作出更有根據的決定。 This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit leesimon.substack.com/subscribe

Silberbauer & Blomseth
113: OSINT – folkets efterretningstjeneste

Silberbauer & Blomseth

Play Episode Listen Later Mar 5, 2026 60:36


Folkets efterretningstjeneste kunne lyde som en af den slags vildledende begreber, der blev tildelt alt andet end folkevenlige organisationer på den østlige side af jerntæppet under Den Kolde Krig. Ruslands fuldskalainvasion af Ukraine har imidlertid for alvor bragt efterretningsarbejde udført af civile og og delt via sociale medier frem i lyset. Det er en global, distribueret, spontant og løst organiseret folkets efterretningstjeneste. Open-source i begrebet OSINT, altså open-source intelligence, betød i udgangspunktet åbne kilder. Der er imidlertid opstået en anden vinkel på det, nemlig open-source som i open-source software. Det handler ikke kun om at indsamle kildemateriale, men også om i fællesskab at bygge værktøjerne til at behandle flodbølgen af data. Det er de ikke-statslige aktiviteter omkring The Epstein Files et godt eksempel på.**** Nu også på YouTube — hvis du bedst kan lide din podcast med uden video. https://youtube.com/@silberblom **** Hvem betaler for Silberbauer & Blomseth? Det gør vi selv. Vores indhold er på ingen måde egnet til sponsorer eller reklamer for proteinpulver, VPN-forbindelse eller e-bøger. Så hosting, udstyr og alt det der er på egen regning. Det eneste vi beder om til gengæld (hvis du altså kan lide det, vi laver) er at du smider stjerner, og måske oven i købet en lille anbefaling, efter os på Apple Podcast. Det betyder alverden. Vi higer jo allesammen efter anerkendelse i en eller anden form. Husk at følge os på Bluesky (@silberblom) Linktree

SECURE AF
OSINT Essentials – Unlocking Not So Hidden Insights for Your SOC

SECURE AF

Play Episode Listen Later Mar 4, 2026 6:05


Got a question or comment? Message us here!Open-source intelligence (OSINT) isn't just for threat actors ... it's a powerful advantage for SOC teams too. In this episode, we break down how publicly available data can help you uncover exposed assets, detect vulnerabilities early, and shrink your attack surface before attackers do.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

Random but Memorable
Everything you need to know about OSINT with Kolina Koltai from Bellingcat

Random but Memorable

Play Episode Listen Later Mar 3, 2026 72:44


Ever fancied becoming a digital detective?

MISTERIOS DE ORION
"Alerta Roja: Filtraciones en Seguridad Nacional Española – Marzo 2026"

MISTERIOS DE ORION

Play Episode Listen Later Mar 2, 2026 15:33


¡Bienvenidos al canal de Sergio Ruiz! Hoy desgranamos la ola de brechas cibernéticas en España: credenciales expuestas en CNP y Guardia Civil, datos personales del Presidente Sánchez, CNI, ministros de Defensa/Interior y más. Todo basado en OSINT público (tweets @DarkWebInformer, SecurityWeek, El País). Cumple EU AI Act: transparencia total, sin manipulación. Mi take sin sesgos: escalada seria, debilidades en proveedores externos. ¡Cambia contraseñas y activa 2FA YA! Si te preocupa la soberanía digital, dale like, suscríbete al canal de Sergio Ruiz y comparte con quien necesite saberlo. ¡Hasta el próximo!

Exploit Brokers - Hacking News
6 Zero-Days Exploited NOW, Lazarus Poisons npm, AI-Generated Malware & More | HN62

Exploit Brokers - Hacking News

Play Episode Listen Later Feb 26, 2026 24:18


Microsoft just dropped patches for SIX actively exploited zero-day vulnerabilities — and that's just the beginning. In this week's Hacking News, we break down the February 2026 Patch Tuesday emergency, North Korea's Lazarus Group poisoning npm and PyPI through fake job recruiters, nation-state hackers weaponizing Google's Gemini AI (including malware that writes its own payloads), a massive Dutch telecom breach affecting 6.2 million people, and a U.S. government contractor breach that ballooned from 4 million to potentially tens of millions affected. This is Exploit Brokers by Forgebound Research — cybersecurity news, threat intelligence, and insights. Whether you're a security analyst, developer, or just someone who wants to stay informed, this episode has something for you.

Cyber Security Headlines
Department of Know: Chrome zero-day, exploits, Copilot summarizes confidential emails, Identity abuse problems

Cyber Security Headlines

Play Episode Listen Later Feb 24, 2026 31:49


Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Montez Fitzpatrick, CISO, Navvis, and Peter Gregory, author. Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. AI is changing phishing, because persuasion now scales like code. And it's not just email anymore; attackers hit SMS, voice calls, and multi-step scams that jump channels. Adaptive runs AI-powered phishing simulations across email, SMS, and voice, including OSINT-based spearphishing and BEC-style scenarios, so employees practice what attacks look like. Learn more at adaptivesecurity.com. All links and the video of this episode can be found on CISO Series.com

Layer 8 Podcast
Episode 135: Mrs. OSINT

Layer 8 Podcast

Play Episode Listen Later Feb 23, 2026 36:40


It's pretty easy to guess what she does simply by her name. Mrs. OSINT has an incredible web site dedicated to sharing her learning journey and helping others do the same. She has a "Start Here" page for people looking to get into OSINT and she also has frequent OSINT challenges for those looking to test their own skills. Even better, her site is bilingual! She has blog posts in both Spanish and English.

Radio NV
Про фіаско було відомо одразу. Для таких дій треба було вдвічі більше сил | Віталій Кононученко - Війна в Україні

Radio NV

Play Episode Listen Later Feb 19, 2026 20:30


Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач "Дзеркало тижня", на Radio NV про те, чому контрнаступ у 2023 році не вдався та чому, зважаючи на відсутність достатніх сил і ресурсів, Україна пішла на такий крок. Ведучий – Дмитро Тузов

David Bombal
#537: Best OSINT Tools 2026: What Pros Use Daily

David Bombal

Play Episode Listen Later Feb 18, 2026 52:47


Are you ready to see the 7 digital investigation tools that completely changed how I look at the internet? In this video, I'm REVEALING a powerful stack of OSINT (Open Source Intelligence) and research tools that most people have zero clue exist. These are absolute game-changers. Subscribe for more cutting-edge tech and security tools: The internet is vast, but finding the right information, or knowing what information about you is out there, requires the right toolkit. I was genuinely shocked by the advanced capabilities of some of these applications. Whether you are a cybersecurity researcher, a journalist, a private investigator, or just someone who wants to master digital reconnaissance and protect their privacy, this list of 7 secret tools will upgrade your skillset immediately. We are breaking down tools for deep email searching, uncovering hidden data in PDFs, mapping global networks, and analyzing trends that standard search engines completely miss. // MJ Banias' SOCIALS // LinkedIn: / mjbanias Cloak and Dagger Podcast (Spotify): https://open.spotify.com/show/6mT8zDM... The Debrief: https://thedebrief.org/podcasts/ Instagram: / mjbanias X: https://x.com/mjbanias Website: https://www.bullshithunting.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Introduction 01:17 - Who is MJ Banias? 03:55 - MJ Banias' Favourite OSINT Tools 04:28 - Bullsh*t Hunting 06:10 - Tool 1 - WhatsMyName Web 09:47 - Tool 2 - DorkGPT and Dork Search Pro 14:30 - Tool 3 - OD Crawler 16:59 - Tool 4 - Kagi Browser 21:55 - Tool 5 - Ubikron 26:35 - Tool 6 - newspapers.com and Judy Records 34:56 - Tool 7 - OSINT Industries 40:15 - Maltego 42:54 - Darkside and Breach Data 49:03 - Privacy Laws in America and beyond 50:57 - Plugs From MJ Banias 51:35 - MJ Banias Socials 52:25 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #osint #osinttools #privacy

Security Squawk
From FanDuel Fraud to Google AI Abuse The Real Risk in 2026

Security Squawk

Play Episode Listen Later Feb 17, 2026 36:04


Google has confirmed that state-backed threat actors are operationally using Gemini across the intrusion lifecycle — not experimentally, but strategically. In this episode of Security Squawk, we break down how AI is being integrated into reconnaissance, phishing refinement, vulnerability research, and even dynamic malware generation. According to Google's Threat Intelligence Group, multiple clusters — including DPRK-linked actors — are using Gemini to synthesize OSINT, map organizational structures, refine recruiter impersonation campaigns, and research exploit paths. In one case, malware known as HONESTCUE leveraged Gemini's API to dynamically generate C# code for stage-two payload behavior, compile it in memory using legitimate .NET tooling, and execute filelessly. This isn't a zero-day story. It's a friction story. At the same time, two individuals in Connecticut were charged for allegedly using thousands of stolen identities to exploit FanDuel's onboarding and promotional systems. No exotic exploit. No advanced intrusion chain. Just automated workflow abuse at scale. The pattern is clear: AI is compressing attacker timelines, and identity-driven fraud is industrializing predictable processes. We examine: How AI-enhanced phishing eliminates traditional grammar-based red flags Why trusted SaaS domains (Gemini share links, Discord CDNs, Cloudflare fronting, Supabase backends) are weakening reputation-based defenses What model distillation attempts (100,000+ structured prompts) signal about API abuse and intellectual property risk How fileless malware compiled with legitimate developer tooling challenges signature-based detection Why onboarding workflows and recruiting processes are now primary attack surfaces For CEOs, this is about erosion of trust anchors and shifting insurability expectations. For IT Directors and SOC leaders, this means reevaluating fileless execution visibility, API anomaly detection, and the reliability of reputation filtering models. For MSPs and risk managers, breaches will increasingly originate from workflow exploitation rather than perimeter misconfiguration. AI didn't invent new attack types. It removed friction from existing ones. And when friction disappears, scale compounds. If your recruiting, onboarding, verification, or AI product interfaces can be scripted — they can be weaponized. This episode is about operational clarity in a rapidly compressing threat landscape. Keywords: Google Gemini, HONESTCUE malware, AI phishing, state-backed threat actors, DPRK cyber operations, model distillation attacks, API abuse detection, fileless malware, .NET in-memory compilation, identity fraud, FanDuel fraud case, workflow exploitation, SaaS infrastructure abuse, Cloudflare phishing, Discord CDN payloads, Supabase backend abuse. Support the show https://buymeacoffee.com/securitysquawk

Radio NV
Командування штурмами РФ зламане. Рашистів відкотило на 2 роки назад | Віталій Кононученко - Війна в Україні

Radio NV

Play Episode Listen Later Feb 10, 2026 24:42


Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач Дзеркало тижня, на Radio NV про те, як відключення Starlink вплинуло на перебіг бойових дій одразу на кількох напрямках, чому війна в Україні є вікном можливостей для європейців, а також що відбувається сьогодні на Харківщині та Запоріжжі, а також навколо Покровська. Ведуча – Юлія Петрова

Citadel Dispatch
CD190: GLEASON - OPEN SOURCE AI BOTS

Citadel Dispatch

Play Episode Listen Later Feb 9, 2026 92:22 Transcription Available


Alex Gleason was one of the main architects behind Donald Trump's Truth Social. Now he focuses on the intersection of nostr, ai, and bitcoin. We explore open source ai agents, such as OpenClaw, and the wider implications of the tech on society.Alex on Nostr: https://primal.net/p/nprofile1qqsqgc0uhmxycvm5gwvn944c7yfxnnxm0nyh8tt62zhrvtd3xkj8fhggpt7fyClawstr: https://clawstr.com/Soapbox Tools: https://soapbox.pub/toolsMy bot's nostr account: https://primal.net/p/nprofile1qqsfzaahg24yf7kujwrzje8rwa7xmt359tf9zyyjeczc9dhll30k8pgmlfee2 EPISODE: 190BLOCK: 935786PRICE: 1422 sats per dollar(00:02:30) Value-for-value, no sponsors, and show philosophy(00:02:39) Alex Gleason returns to talk AI(00:03:56) From vibe coding to open-source agents with memory(00:05:24) Messaging-first UX: Signal, Nostr, WhatsApp as AI interfaces(00:06:10) Why chatbots beat traditional AI apps for mainstream users(00:07:07) Open protocols pain vs closed platforms; Bitcoin and Nostr(00:08:52) Automating social games: price tracker and agent posting on Nostr(00:10:01) AI mediators for collective action, constitutions, and nonprofits(00:11:46) Scaling governance: trust, bias, and Discord vs freedom tech(00:13:14) Bot barriers on centralized messengers and need for open chat(00:14:04) Clawstr: decentralized AI-to-AI discussions on Nostr(00:15:21) Hype vs reality in AI agents; emergent behaviors and money(00:16:26) Agentic payments: bots with Cashu wallets and earnings(00:18:40) Agents solving UX pain: relay management, keys, and UTXOs(00:20:00) Cold storage approvals with chat agents: a new wallet paradigm(00:20:22) Specialized agents, skills, and distribution challenges(00:22:34) Cost tradeoffs: pay another agent vs build skills yourself(00:24:55) Token burn lessons(00:27:44) Beyond OpenClaw: bloated stacks, Icarus, and cost-optimized agents(00:28:52) Hybrid model routing: local small models with cloud for heavy lifts(00:29:47) Agents paying humans directly: disintermediating platforms(00:30:47) Voice, screens, and form factors: AirPods, text, and brain chips(00:33:01) Apple, privacy branding, and the Siri gap(00:34:35) Enterprise AI choices: Google, Microsoft, trust, and lock-in(00:36:01) Model personalities: Gemini concerns and OpenAI "openwashing"(00:37:23) Obvious agent UX wins: flights, rides, and social media shifts(00:38:50) Local-first social: group chats, neighbors, and healthier networks(00:40:16) Antiprimal.net: standardizing stats from Primal's caching server(00:43:34) Open specs, documentation via AI, and trust tradeoffs(00:45:18) Indexes vs client-side scans: performance and verification(00:46:20) APIs, rate limits, and a market for paid Nostr data(00:47:57) Agents and DVMs: paying sats for services on demand(00:48:49) Degenerate bots: LN Markets, costs, and Polymarket curiosity(00:50:42) Truth feeds for agents: Nostr, webs of trust, and OSINT sources(00:53:51) Post-truth reality: verification, signatures, and subjectivity(00:56:04) Polymarket mechanics: on-chain prediction markets and signals(01:00:10) Trading perception vs truth; sports markets as timelines(01:01:45) The Clawstr token saga: hype, claims, and misinformation(01:07:11) Why meme coins are scams: no equity, utility myths, slow rugs(01:08:55) Pulling the rug back: swapping out, fallout, and donations(01:10:49) Aftermath: donating to OpenSats and lessons learned(01:12:14) Prediction markets vs meme coins: societal value distinction(01:15:25) Iterating beyond OpenClaw and MoltBook; experiments on Nostr(01:18:00) Do bots need Clawstr? Segregating AI content and labels(01:21:02) Reverse CAPTCHA: proving bot-ness and the honor system(01:23:38) Souls, prompts, and token costs; agents with personalities(01:27:01) Wrap-up: acceleration, optimism, and next check-in(01:28:21) Open-source models, China's incentives, and local hardware(01:30:06) The dream stack: home server agent, Nostr chat, hybrid modelsmore info on the show: https://citadeldispatch.comlearn more about me: https://odell.xyz

Layer 8 Podcast
Episode 133: Dennis Keefe

Layer 8 Podcast

Play Episode Listen Later Feb 9, 2026 37:44


Want to get into the OSINT field and are unsure where to start? Then this is the episode for you. Dennis Keefe started out in law enforcement, became a web developer and then changed into the OSINT field through his own determination and hard work. Through this episode, Dennis will talk about his path to OSINT and how others can follow in his footsteps. Dennis' web site where he posts all of his learning and advice can be found at https://denniskeefe.me This episode is sponsored by Compass Cyber Guard.

444
Borízű hang #256: Bulvár Kund Epstein szigetén, Rodriguez apuka az orosházi üveggyárban, popperek és csövesek az iskolában [rövid verzió]

444

Play Episode Listen Later Feb 8, 2026 51:25


Az előfizetők (de csak a Belső kör és Közösség csomagok tulajdonosai!) már szombat hajnalban hozzájutnak legfrissebb epizódunk teljes verziójához. A hétfőn publikált, ingyen meghallgatható verzió tíz perccel rövidebb. Itt írtunk arról, hogy tudod meghallgatni a teljes adást. Lázár János tudatosan hülye? Rogán bezzeg föltalálja magát. Hiába szórta a pénzt Orbán, sehol sem vagyunk: Epstein-sziget magyarok nélkül. Musk, a legnagyobb lúzer. Waze és a kátyúk. A legfeleslegesebb magyar rockzenekar. 00:52 Lázár János és a tudatosság. Lázár közpénzből, hotelben. Rogán Antal feltalálta a feltalálást.06:54 Lázár nem vágná le a tolvajok kezét. Én nem fogok Batidáról podcastolni Bódis Krisztával!09:44 Brian Epstein szigete. A hipergazdagok hálózata. Az elitellenesség mindig az elit projektje. Trumpék arab kriptobiznisze. Miért fotózkodtak ezek ennyit alsógatyában? 14:40 A Blackrock-dal eredete. Hallgató Barbadosról. Delcy Rodriguez és az orosházi üveggyár. Kínai a Forma 1-ben. Hol tartanánk, ha nem lenne 444?21:02 Winkler Róber: Igenis van kraftsör-armageddon. Ratebeer és Untappd. A Leikeim megszűnése. A jó és olcsó német sör.27:03 A Waze és a budapesti kátyúk.30:39 Aktuális mobilos csalások. Epstein macskakamerája.36:32 A legfeleslegesebb magyar rockzenekar. Hooligans és Kiscsillag. A Ponies sorozat. OSINT gitárral. Skorpió: Előre nézz!43:11 Fenyő Miklósnál nem volt erőltetett a prozódia. Hungária: pro és kontra. A német vendéglátózás szerepe a magyar popzenében.47:49 Popperek és csövesek áltisiben. Szandi: Kicsi lány. Pintácsi apuka ideges.See omnystudio.com/listener for privacy information.

IQ - Wissenschaft und Forschung
OSINT - Mit offenen Daten neues Wissen schaffen

IQ - Wissenschaft und Forschung

Play Episode Listen Later Feb 7, 2026 25:23


Sie decken Verbrechen auf und bringen die Wissenschaft zu neuen Erkenntnissen: Nutzer offener Daten sorgen immer wieder für spektakuläre Schlagzeilen. Wie Open Source Intelligence - OSINT - ein wichtiges Werkzeug für Journalisten, Forschende und Aktivisten geworden ist, klärt dieser Podcast von Lukas Grasberger.

Grey Dynamics
From SIGINT to OSINT: Gabriel Fanelli on Languages, Intelligence, and Being Useful

Grey Dynamics

Play Episode Listen Later Feb 6, 2026 69:10


Gabriel Fanelli is back on the Grey Dynamics Podcast, and this time as our new Director of Training.Look, I've been wanting to have this conversation since we first met. Gabe's trajectory is different from most people in the intelligence world. Bronze Star recipient, 14 years in the Army, former SOCOM instructor, fluent in Arabic, and now leading our training programs at Grey Dynamics. But what makes this conversation special isn't just his resume.We went deep on this one. We talked about what it really means to be a crypto linguist, not the Hollywood version. But the actual work of listening to intercepted communications while sitting in a forward operating base in Syria. We talked about why he hated being stuck in a SCIF and how he found his way to tactical SIGINT work where he could actually connect with people on the ground.But we also talked about languages in a way I haven't explored on this podcast before. Gabe's father was an archaeologist, and he grew up surrounded by Middle Eastern artifacts and culture. His love for Arabic didn't come from military necessity. It came from genuine fascination. And that makes all the difference when you're trying to connect with people. Whether you're an intelligence collector or just someone trying to understand the world better.We touched on OSINT and where it sits in the intelligence ecosystem. Gabe's take is refreshing. OSINT isn't better than SIGINT or HUMINT, and those disciplines aren't better than OSINT. They're all sinew connecting different parts of the same body. The gatekeeping and chest-pounding about which INT is superior misses the point entirely.And then we got philosophical. We talked about AI's role in intelligence work, about writing and how to convey complex ideas without sucking the humanity out of them, about the goal in life not being happiness but usefulness. Gabe wrote a book called The Resilient Dad after losing a friend to suicide, and his perspective on fatherhood, masculinity, and what it means to show up for people hit differently than most self-help nonsense you see online.This is probably the most introspective conversation I've had on this podcast. Usually I'm just listening and learning from guests, but because Gabe and I are already friends, this felt more like two people thinking out loud together. If you're interested in intelligence tradecraft, if you care about language and cross-cultural communication. Or if you're just trying to figure out how to be a better human being in a world that's increasingly automated and disconnected—this one's for you.And for those asking: yes, Gabe will be launching our Operational OSINT Fundamentals course soon, along with an open-source SIGINT course for people who want to get their feet wet in that world. More details are coming.Listen now and see why I'm so excited to have Gabe on the team. Hosted on Acast. See acast.com/privacy for more information.

Closed Network Privacy Podcast
Episode 51 - Snoop On Them As They Snoop On us

Closed Network Privacy Podcast

Play Episode Listen Later Jan 31, 2026 89:34


Show Notes - https://forum.closednetwork.io/t/episode-51-snoop-on-them-as-they-snoop-on-us/174Website / Donations / Support - https://closednetwork.io/support/BTC Lightning Donations - closednetwork@getalby.com / simon@primal.netThank You Patreons! - https://www.patreon.com/closednetworkMichael Bates - Privacy Bad AssDavid - Privacy Bad AssInferno Potato - Privacy Bad AssTK - Privacy Bad AssDavid - Privacy Bad AssVO - Privacy Bad AssRichard G. - Privacy Bad AssMrMilkMustache - Privacy SupporterHutch - Privacy AdvocateTOP LIGHTNING BOOSTERS !!!! THANK YOU !!!@bon@sn@x@fireflygowartime@unkown@anonymousBBB - Buy Me. A Coffee - $30.00Thank You To Our Moderators:Unintelligentseven - Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354dMaddestMax - Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavtJoin Our CommunityClosed Network Forum - https://forum.closednetwork.ioJoin Our Matrix Channels!Main - https://matrix.to/#/#closedntwrk:matrix.orgOff Topic - https://matrix.to/#/#closednetworkofftopic:matrix.orgSimpleX Group Chat - https://smp9.simplex.im/g#SRBJK7JhuMWa1jgxfmnOfHz7Bl5KjnKUFL5zy-Jn-j0Join Our Mastodon server!https://closednetwork.socialFollow Simon On The SocialsMastodon - https://closednetwork.social/@simonNOSTR - Public Address - npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 - primal.net/simonTwitter / X - @ClosedNtwrkInstagram - https://www.instagram.com/closednetworkpodcast/YouTube - https://www.youtube.com/@closednetworkEmail - simon@closednetwork.io

SpyMasters
From CIA to Spy Novelist: The Israel–Iran Shadow War Behind The Persian | David McCloskey

SpyMasters

Play Episode Listen Later Jan 29, 2026 43:46


Former CIA analyst and bestselling spy novelist David McCloskey returns to Spymasters to talk to Antonia Senior about his new thriller The Persian — a razor-sharp spy story set inside the Israel–Iran shadow war. We discuss how real-world covert operations (from sabotage to targeted assassinations) have shaped modern espionage, and how spy fiction can capture the human cost of clandestine conflict: fear, tradecraft, loyalty, identity, and moral compromise. McCloskey breaks down how he researches intelligence operations using open-source reporting and conversations with former practitioners — and why he chose to write a spy novel with no Americans at the center of the story. We also explore the culture and risk tolerance differences between intelligence services, the evolution of surveillance and remote warfare, and the perennial question: should writers “stay in their lane,” or is imagining other lives the whole point of fiction? What the Israel–Iran covert conflict looks like — and why it's perfect terrain for a spy novel The premise of The Persian: a Persian Jewish dentist recruited as a Mossad asset Researching espionage through open-source intelligence (OSINT), reporting, and real tradecraft insight Mossad vs CIA: risk tolerance, bureaucracy, operational style, and culture Remote and tech-enabled killing — drones, distance, and the changing nature of modern war Writing morally complex characters (and why the book isn't a “morality play”) Representation in fiction: writing characters outside your own experience A teaser for McCloskey's next novel: CIA and MI6 under strain — and spying on each other again David McCloskey is a former CIA analyst and the author of multiple acclaimed spy novels including Damascus Station, Moscow X, and The Seventh Floor. His work is known for its operational authenticity and insider-level realism — without losing sight of the human story. The Persian is out now (publication-day episode). Available wherever you buy books, or here: https://amzn.eu/d/5DzqbwC If you enjoy deep-dive conversations on espionage, intelligence history, covert action, tradecraft, and spy fiction, hit Follow on Spotify, or wherever you get your podcasts and leave a rating — it helps more listeners find the show. Learn more about your ad choices. Visit podcastchoices.com/adchoices

From The Green Notebook
Making the Call: Military Intelligence, Judgment, and Command with Lieutenant General Tony Hale

From The Green Notebook

Play Episode Listen Later Jan 23, 2026 83:05


Send us a textLieutenant General Tony Hale, the Army G-2, joins Joe for a conversation on military intelligence, judgment, and decision-making in modern war. Drawing on nearly four decades of service, Hale reflects on the evolution of the intelligence profession—from red pens and acetate maps to AI-enabled platforms—and why human judgment still matters most.Hale shares his path into military intelligence, challenges common misconceptions about the field, and explains why intelligence is foundational to maneuver, lethality, and command. From battalion S2 shops to JSOC, Afghanistan, and the Army's highest intelligence roles, he offers a clear view of how intelligence professionals shape outcomes across every echelon.They discuss the responsibility of “putting your rank on the table,” developing junior analysts, and creating environments where ideas matter more than hierarchy. The conversation also explores self-development, operating amid disinformation, balancing OSINT with historical context, and how AI can enhance—but never replace— disciplined thinking.In this episode, LTG Hale and Joe explore:Why “lethality starts with intelligence”The role of intelligence in enabling decision dominanceMaking analytical calls under uncertaintyDeveloping confident, capable intelligence professionalsThe limits of AI and the enduring value of human judgmentPreparing for future conflict while mastering the fundamentalsWhether you're an intelligence professional, commander, or leader navigating uncertainty, this conversation is a reminder that seeing clearly—and thinking well—remains the decisive advantage.A Special Thanks to Our Sponsors!Veteran-founded Adyton. Step into the next generation of equipment management with Log-E by Adyton. Whether you are doing monthly inventories or preparing for deployment, Log-E is your pocket property book, giving real-time visibility into equipment status and mission readiness. Learn more about how Log-E can revolutionize your property tracking process here!Meet ROGER Bank—a modern, digital bank built for military members, by military members. With early payday, no fees, high-yield accounts, and real support, it's banking that gets you. Funds are FDIC insured through Citizens Bank of Edmond, so you can bank with confidence and peace of mind. Logistics Systems Incorporated (LSI) is a Service-Disabled Veteran-Owned Small Business supporting DoD and federal civilian agencies with enterprise IT operations, global logistics support, cybersecurity, data, and mission support services. Founded by a veteran Army leader, LSI is known for operating inside complex, high-consequence environments where leadership, discipline, and execution matter. Their teams support large user communities and mission-critical systems across defense and civilian agencies.

Raw Talks With Vamshi Kurapati - Telugu Business Podcast
EP -116 | ⚠️‼️JAGRATHA సోదరా…!!! | ‘CYBER FORENSIC EXPERT' ON RAW TALKS | Ft. Krishna Sastry | Telugu Podcast

Raw Talks With Vamshi Kurapati - Telugu Business Podcast

Play Episode Listen Later Jan 23, 2026 149:20


In this episode, to share the much-needed knowledge of the hour, we have Krishna Sastry Pendyala, one of India's senior-most cyber security and digital forensics experts, with over 25 years of experience working with the Ministry of Home Affairs and leading national institutions. We entered the real world of cyber crime investigations, digital fraud, and cyber warfare as it unfolded on the ground, not in theory.The conversation traces the evolution of cyber crime across generations. From early certificate frauds using scanners and computers, to e-governance scams, banking frauds, phishing, QR code scams, ransomware, and today's AI-driven cyber attacks, Krishna Sastry explains how cyber crime moved from individuals to organised networks, state actors, and crime-as-a-service models. He explains why his famous line, “Distance is dead and identity is a doubt,” perfectly describes the modern digital world.We break down how social engineering, malware, RAT Trojans, keyloggers, zero-click exploits, Pegasus-style surveillance, steganography, homoglyph attacks, vishing, smishing, fake QR codes, and personalised fraud mails actually work. The episode explains how one click, one message, or one panic moment is enough to trigger massive damage.The discussion includes real landmark cases such as the Cosmos Bank cyber heist, ATM skimming, shimmer attacks, jackpoting, man-in-the-middle attacks, and how fraud risk management, user behaviour analytics, and RBI safeguards protect Indian banks today. Krishna Sastry also shares rare cases where crimes were solved using electronic evidence from unexpected devices like smart water meters, gaming consoles, and embedded systems.A major part of the episode focuses on digital forensics. How deleted messages are recovered, why police never switch on seized systems, how metadata can expose the truth, what cross-examination in courts looks like, and why electronic evidence is time-sensitive, repeatable, and reproducible. He also explains his role as an expert witness, handling cases that resurface even decades later.We dive into the dark web ecosystem including TOR networks, marketplaces, ransomware gangs, virtual currencies, mule accounts, mixers, tumblers, and cyber slavery rings. The episode also addresses elder frauds, sextortion, digital arrests, cyber insurance, ethical hacking, OSINT, social media risks, and why both individuals and organisations must rethink cyber safety.The conversation also offers insights on the future of cyber forensics, AI and cyber security, and practical advice for everyday digital life.If you want to understand how cyber crimes actually happen, how investigations really work, and how to stay safer in a connected world, this episode is for you.

The Leading in a Crisis Podcast
EP69 Dealing with rage farming and manufactured outrage, with Phil Borremans

The Leading in a Crisis Podcast

Play Episode Listen Later Jan 21, 2026 26:12 Transcription Available


Send us a textOutrage online isn't always organic—and when it's engineered, it can hit hard. We sit down with crisis and risk consultant Phil Borremans to expose the mechanics of rage farming: coordinated attacks that use psychology, algorithms, and incentives to inflame audiences, distort brand updates, and turn a minor moment into a market-moving storm. From bots and fake accounts to “coordinated amplification,” Phil maps how bad actors build momentum, trigger engagement spikes, and push fringe narratives into mainstream feeds.We reference high-profile cases like Bud Light and Cracker Barrel to illustrate how synthetic engagement can drive real reputational and financial fallout.Most importantly, we outline a practical defense. Phil details how to retool monitoring from brand mentions to topic-centric early warning, detect anomalies and narrative evolution, and leverage predictive analytics and OSINT to identify viral liftoff before it peaks. We explain why engaging attackers usually backfires and how to focus instead on direct communication with stakeholders who matter—employees, customers, partners, and regulators. Reach Phil and his excellent newsletter, Wag the Dog, at wagthedog.io.If this was useful, follow the show, share it with a colleague in comms or risk, and leave a quick review telling us what you want to hear next.We'd love to hear from you. Email the show at Tom@leadinginacrisis.com.

BTC Sessions
Social Engineering: They Can't Hack Your Bitcoin BUT They Can Hack You!

BTC Sessions

Play Episode Listen Later Jan 13, 2026 65:43


Mentor Sessions Ep. 047: Human Hacking Bitcoin Wallets, Deadly Social Engineering Scams & Nuclear Breaches | Christopher HadnagyWhat if one phone call could drain your Bitcoin wallet like MGM's $190M ransomware nightmare, or social engineering tricks from Jamaican bank heists expose why Bitcoin's human element is your biggest security flaw? In this episode of BTC Sessions, world-renowned human hacking expert Christopher Hadnagy reveals how AI-fueled scams like sextortion are exploding, and targeting Bitcoin holders with FOMO, romance frauds, and voice phishing that bypasses security. He breaks down wild stories of tailgating, breaking into nuclear facilities and owning bank servers with just a clipboard, proving no system is safe from psychological manipulation. Chris warns of dark web guides and shares pro defenses like code words, MFA, and OSINT to hack-proof your sats. From QR phishing to AI accent-erasing vishing, he exposes how hackers spoof LinkedIn for $250K Bitcoin thefts. As founder of Innocent Lives Foundation, Chris flips his skills to hunt predators worldwide, rescuing kids from exploitation rings. If you're self-custodying BTC, this is your must-watch guide to human hacking threats, social engineering secrets, and Bitcoin security mastery—don't let hackers own you!About Christopher HadnagyWebsite: https://www.social-engineer.com/Podcast: https://www.social-engineer.org/podcast/X: @humanhackerInnocent Lives Foundation: https://www.innocentlivesfoundation.org/Chapters:00:00:00 Teaser & Intro00:01:35 Guest Intro & Social Engineering Definition00:02:58 Jamaican Bank Heist00:09:21 Heist Reflections00:10:19 Tactics: OSINT, Pretexts & Influence00:14:51 Bitcoin's Human Flaw00:16:31 Common Pretexts & LinkedIn Scams00:20:57 Scam Losses & Global Impact00:22:55 Motivations: FOMO, Romance & Sextortion00:28:42 AI's Role in Scams00:32:35 Vectors: Phishing, Vishing & MGM00:35:17 Generational Shifts: Smishing/QR00:38:53 Defenses: Verification, Code Words & MFA00:42:19 Breaches & Security Failures00:45:51 Sovereign Computing & Nostr00:47:22 Nuclear Facility Stories00:53:57 Innocent Lives Foundation Origins00:58:06 ILF Mission, Impact & Resources01:02:46 Podcast, Class & ClosingPrevious Episode:Mentor Sessions Ep. 046: Bitcoin 2026 Bull Run, TradFi Myths & Fed Liquidity Secrets | Joe Consorti: https://youtu.be/7p16VXpyEpU⚡ POWERED by Abundant Mines: Fully managed Bitcoin mining. Learn more at https://qrco.de/bgYKPB

Silicon Curtain
Stopping Putin's Terror Ships - The Apocalypse Fleet Delivering Global Disorder

Silicon Curtain

Play Episode Listen Later Jan 12, 2026 16:51


2026-01-10 | UPDATES #095 | Russia grey fleet transporting illicit oil to keep its war machine ticking over, is becoming the Apocalypse Fleet – a transportation route for covert intelligence operations, military equipment and gear for dictatorial regimes, and potentially illegal nuclear materials, as well as platforms for launching hybrid operations against Russia's adversaries. It must be stopped. Europe's front line is not only in the trenches of Donbas and air defence batteries around Kyiv and Odesa, Dnipro and Kharkiv. It is also sea lanes, chokepoints, and the floating junkyards we politely call Russia's “commercial shipping” lifeline, the grey fleet tankers crawling the globe. “The Apocalypse Fleet” or Russia's ‘shadow' fleet is not just a sanctions-evasion machine for illicit oil. The newest reporting and enforcement actions point to something bigger and uglier: a maritime ecosystem that can move contraband, enable hybrid operations, and — at minimum — create plausible cover for weapons shipments and sensitive technology transfers across an emerging global authoritarian network. Surely the rules of free maritime passage do not apply if Russia is at war with us, and using its fleet as floating bases to launch operations? ----------SOURCES: InformNapalm (Jan 2026): investigation alleging contraband links tied to “Vostok-Akhmat / 291st regiment” and shadow-fleet logistics Reuters (Jan 8–9, 2026): reporting on US/UK-supported seizure of the Marinera and subsequent developments The Guardian (Jan 8, 2026): tankers under US sanctions transiting the English Channel; UK framing of shadow-fleet disruption The Guardian / Lloyd's List analysis (Jan 8, 2026): shadow-fleet vessels reflagging to Russia Reuters (Jan 2, 2026): Finland cable-breach investigation update Reuters analysis (Jan 2026): Baltic maritime incidents and the hybrid-security framing EU Council (Dec 18, 2025): sanctions on additional shadow-fleet vessels; explicit reference to military-equipment transport and undersea infrastructure threats Reuters (Nov 18, 2024): EU sanctions on Iranian shipping; allegations of transporting UAV/missile-related tech and Caspian transfers Reuters (Feb 21, 2024): claims of Iranian missile shipments to Russia, including by ship via the Caspian Reuters (Jun 2023): US declassified assertion of Iranian UAVs shipped across the Caspian to Russia Reuters graphics (Apr 2025): OSINT tracking of repeated North Korea-to-Russia munitions shipments by sea Reuters (Apr 2024): satellite imagery and moorage claims re vessel tied to DPRK–Russia arms transfers ----------Silicon Curtain is a part of the Christmas Tree Trucks 2025 campaign - an ambitious fundraiser led by a group of our wonderful team of information warriors raising 110,000 EUR for the Ukrainian army. https://car4ukraine.com/campaigns/christmas-tree-trucks-2025-silicon-curtainThe Goal of the Campaign for the Silicon Curtain community:- 1 armoured battle-ready pickupWe are sourcing all vehicles around 2010-2017 or newer, mainly Toyota Hilux or Mitsubishi L200, with low mileage and fully serviced. These are some of the greatest and the most reliable pickups possible to be on the frontline in Ukraine. Who will receive the vehicles?https://car4ukraine.com/campaigns/christmas-tree-trucks-2025-silicon-curtain----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------

Les dessous de l'infox
Dark Osint: quand la recherche en sources ouvertes se retourne contre la démocratie

Les dessous de l'infox

Play Episode Listen Later Jan 9, 2026 29:30


C'est une méthode d'enquête de plus en plus en vogue. L'Osint, ou recherches en sources ouvertes, bouleverse notre rapport à l'information. Utilisée par des chercheurs, des journalistes et des citoyens, cette technique d'investigation permet de mettre en lumière des faits d'intérêt public. Remède et poison, l'Osint peut aussi être détournée à des fins de contrôle et de manipulation. Dans son dernier ouvrage, Allan Deneuville, décrypte ce phénomène du « Dark Osint ». Héritée des services de renseignement, l'Osint (acronyme anglophone pour Open Source Intelligence), permet de produire des enquêtes autonomes, sourcées et susceptibles de révéler des informations d'intérêt public. Grâce à cette méthode d'enquête en sources ouvertes, il est possible de documenter des faits d'actualités, comme c'est le cas de la guerre en Ukraine, ou plus récemment de l'attaque américaine au Venezuela. Dans un contexte où les infox se multiplient, l'Osint sert également à contrecarrer des opérations de désinformation. Mais si l'Osint permet de décrypter, elle peut au contraire être dévoyée et utilisée à des fins antidémocratiques. On en parle avec Allan Deneuville, maître de conférences en sciences de l'information et de la communication, chercheur associé au centre Géode de géopolitique de la datasphère, partenaire de l'émission. Il vient de publier « Osint : enquêtes et démocratie », aux éditions de l'INA. Au Venezuela, la désinformation ne désemplit pas Près d'une semaine après la capture de Nicolas Maduro et de son épouse, Cilia Flores, les autorités vénézuéliennes ont libéré plusieurs prisonniers politiques. Une mesure saluée par Donald Trump qui affirme avoir annulé une deuxième attaque. Un contexte tendu, propice à la désinformation. Ces derniers jours, de nombreuses infox soutiennent, à tort, que les habitants de Caracas auraient massivement célébré la chute du régime et la gloire du président Trump. Décryptage avec Cassiopée Etchevers, journaliste en formation à Sciences Po Paris. À lire aussiVenezuela: quand la désinformation vise à légitimer l'opération américaine   Groenland : les infox ciblent l'armée danoise Début janvier, le président américain Donald Trump a de nouveau tenu des propos hostiles envers les autorités danoises qui, selon lui, ne sont pas capables de défendre le Groenland face aux appétits chinois et russes en Arctique. Dans le même temps, sur les réseaux sociaux, des propos outranciers et des images détournées circulent dans le but de décrédibiliser l'armée danoise chargée d'assurer la sécurité de ce territoire. C'est le sujet de la chronique des Dessous de l'infox, présentée cette semaine par Olivier Fourt.   À lire aussiGroenland: la désinformation accompagne les propos de Donald Trump

The 404 Media Podcast
The Shifting World of OSINT (with Craig Silverman)

The 404 Media Podcast

Play Episode Listen Later Dec 29, 2025 46:29


Joseph speaks to Craig Silverman, one of the co-founders of Indicator. Indicator is a new, independent media company that Craig runs with Alexios Mantzarlis. For years Craig has covered the world of ad fraud and disinformation using all sorts of open source intelligence (OSINT) techniques. Definitely check out Indicator at Indicator.media. The site publishes its own investigations but also tips and tricks you can use yourself. Indicator's site: https://indicator.media Learn more about your ad choices. Visit megaphone.fm/adchoices

The Modern Insurgent
SIGNALS SOUTH: TRACKING POWER IN LATAM

The Modern Insurgent

Play Episode Listen Later Dec 29, 2025 61:24


Joined by Stefano Ritondale from All Source News to discuss OSINT in the Mexican Drug War, from the information gathered, to the methods used, and even how propaganda is used by the cartels.

CTG's Threat Intelligence Podcast
Influence Operations in the Horn of Africa

CTG's Threat Intelligence Podcast

Play Episode Listen Later Dec 21, 2025 32:32


How do disinformation campaigns shape security in the Horn of Africa? In this episode, Arnold Koka and intelligence analyst William Adams break down the region's unfolding security landscape and how foreign influence operations are intensifying existing threats. We dive into the roles of Russia, Turkey, and regional actors, the narratives shaping the information space, and what it all means for stability, security, and OSINT practitioners.

The Cyber Threat Perspective
Episode 162: Before the Breach How Attackers Profile Your Organization

The Cyber Threat Perspective

Play Episode Listen Later Dec 19, 2025 36:22


In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what data is truly "sensitive" from an external attacker's perspective. Learn how organizations can realistically assess their external attack surface beyond automated scanning and discover creative OSINT techniques defenders can use to mimic attacker reconnaissance.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

Easy Prey
You Are Traceable with OSINT

Easy Prey

Play Episode Listen Later Dec 17, 2025 56:01


Publicly available data can paint a much clearer picture of our lives than most of us realize, and this episode takes a deeper look at how those tiny digital breadcrumbs like photos, records, searches, even the background of a Zoom call can be pieced together to reveal far more than we ever intended. To help break this down, I'm joined by Cynthia Hetherington, Founder and CEO of The Hetherington Group, a longtime leader in open-source intelligence. She also founded Osmosis, the global association and conference for OSINT professionals, and she oversees OSINT Academy, where her team trains investigators, analysts, and practitioners from all experience levels. Cynthia shares how she started her career as a librarian who loved solving information puzzles and eventually became one of the earliest people applying internet research to real investigative work. She talks about the first wave of cybercrime in the 1990s, how she supported law enforcement before the web was even mainstream, and why publicly accessible data today is more powerful and more revealing than ever. We get into how OSINT actually works in practice, from identifying a location based on a sweatshirt logo to examining background objects in video calls. She also explains why the U.S. has fewer privacy protections than many assume, and how property records, social media posts, and online datasets combine to expose surprising amounts of personal information. We also explore the growing role of AI in intelligence work. Cynthia breaks down how tools like ChatGPT can accelerate analysis but also produce hallucinations that investigators must rigorously verify, especially when the stakes are legal or security-related. She walks through common vulnerabilities people overlook, the low-hanging fruit you can remove online, and why your online exposure often comes from the people living in your home. Cynthia closes by offering practical advice to protect your digital footprint and resources for anyone curious about learning OSINT themselves. This is a fascinating look at how much of your life is already visible, and what you can do to safeguard the parts you'd rather keep private. Show Notes: [01:17] Cynthia Hetherington, Founder & CEO of The Hetherington Group is here to discuss OSINT or Open-Source Intelligence. [02:40] Early cyber investigators began turning to her for help long before online research tools became mainstream. [03:39] Founding The Hetherington Group marks her transition from librarian to private investigator. [04:22] Digital vulnerability takes center stage as online data becomes widely accessible and increasingly revealing. [05:22] We get a clear breakdown of what OSINT actually is and what counts as "publicly available information." [06:40] A simple trash bin in a photo becomes a lesson in how quickly locations can be narrowed down. [08:03] Cynthia shares the sweatshirt example to show how a tiny image detail can identify a school and possibly a city. [09:32] Background clues seen during COVID video calls demonstrate how unintentional information leaks became routine. [11:12] A news segment with visible passwords highlights how everyday desk clutter can expose sensitive data. [12:14] She describes old threat-assessment techniques that relied on family photos and subtle personal cues. [13:32] Cynthia analyzes the balance and lighting of a Zoom backdrop, pointing out what investigators look for. [15:12] Virtual and real backgrounds each reveal different signals about a person's environment. [16:02] Reflections on screens become unexpected sources of intelligence as she notices objects outside the camera frame. [16:37] Concerns grow around how easily someone can be profiled using only public information. [17:13] Google emerges as the fastest tool for building a quick, surface-level profile of almost anyone. [18:32] Social media takes priority in search results and becomes a major driver of self-exposed data. [19:40] Cynthia compares AI tools to the early internet, describing how transformative they feel for investigators. [20:58] A poisoning case from the early '90s demonstrates how online expert communities solved problems before search engines existed. [22:40] She recalls using early listservs to reach forensic experts long before modern digital research tools were available. [23:44] Smarter prompts become essential as AI changes how OSINT professionals gather reliable information. [24:55] Cynthia introduces her C.R.A.W.L. method and explains how it mirrors the traditional intelligence lifecycle. [26:12] Hallucinations from AI responses reinforce the need for human review and verification. [27:48] We learn why repeatable processes are crucial for building trustworthy intelligence outputs. [29:05] Elegant-sounding AI answers illustrate the danger of unverified assumptions. [30:40] An outdated email-header technique becomes a reminder of how quickly OSINT methods evolve. [32:12] Managed attribution—hiding your digital identity—is explained along with when it's appropriate to use. [33:58] Cynthia unpacks the reality that the U.S. has no constitutional right to privacy. [35:36] The 1996 case that sparked her digital-vulnerability work becomes a turning point in her career. [37:32] Practical opt-out steps give everyday people a way to remove basic personal data from public sites. [38:31] She discusses how indirect prompting of AI tools can still narrow down someone's likely neighborhood or lifestyle. [39:58] Property and asset records emerge as unavoidable exposure points tied to government databases. [40:52] A high-risk client's situation shows how family members often create digital vulnerabilities without realizing it. [42:44] Threats that surface too late demonstrate why proactive intelligence work is essential. [44:01] Concerns about government surveillance are contrasted with the broader access private investigators actually have. [45:12] Train tracks become an example of how physical infrastructure now doubles as a modern data network. [46:03] She explains how audio signatures and forensic clues could theoretically identify a train's path. [47:58] Asset tracking becomes a global operation as valuable cargo moves between ships, trucks, and rail systems. [49:48] Satellite imagery makes monitoring even remote or underwater locations almost effortless. [51:12] Everyday applications of geospatial analysis include environmental changes and shifts within local communities. [52:19] Surveillance is compared to gravity; it's constant, invisible, and always exerting pressure. [52:44] Cynthia shares practical strategies for controlling your environment and keeping conversations private. [54:01] Resources like OSINT Academy, Information Exposed, and the Osmosis Association offer pathways for learning and strengthening personal privacy. [55:32] The episode closes with encouragement to stay aware of what you share and how easily digital clues can be connected. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Hetherington Group OSMOSIS OSINT Academy Cynthia Hetherington - LinkedIn OSINT: The Authoritative Guide to Due Diligence Business Background Investigations: Tools and Techniques for Solution Driven Due Diligence

The World of Intelligence
From data to decisions: The future of OSINT

The World of Intelligence

Play Episode Listen Later Dec 9, 2025 27:58


Recorded live at DSEI 2025, this episode features host Kate Cox and a panel of Janes experts, Sean Corbett, Leendert Van Bochoven, and Phil Smith. They discuss the evolution of open-source intelligence (OSINT) and its vital role in global security. The panel examines the challenges posed by an overwhelming volume of data in the digital age and explores how artificial intelligence, machine learning, and automation are transforming the collection, processing, and verification of open-source information and why the human analyst is more important than ever.Watch the video of the recording on our YouTube channel: https://www.youtube.com/watch?v=-8qE-hKSG5g

CX Goalkeeper - Customer Experience, Business Transformation & Leadership
#270: Why Human Voices Are the Secret to Digital Transformation with Alex Wunschel

CX Goalkeeper - Customer Experience, Business Transformation & Leadership

Play Episode Listen Later Dec 8, 2025 28:03


Learn why human voices drive digital transformation. Alex Wunschel explains how voice builds trust, shapes culture, and makes leaders relatable. Get concrete tips to speak authentically, train voice skills, and embed audio into internal communication. Hear real examples and pitfalls to avoid in corporate podcasting. About Alexander Wunschel Alexander Wunschel is a founder, podcast pioneer, and producer with over 17 years of experience in the audio industry. He is the owner and executive of Klangstelle, a podcast company that offers the finest audio pieces from strategy and conception to production and marketing. He has produced and managed over 1.000 episodes in over 35 podcasts with about 8 million downloads and streams for clients such as Telekom, Fujitsu, Playboy, Starbucks, Datev, GAD, Microsoft, and many more. He is also a strategy consultant for digital media, a keynote speaker. He is passionate about the impact of sound, immersive and augmented audio, voice user interface, privacy, security, OSINT, MarTech, AdTech, meditation, and cooking. Resources  Klangstelle: https://www.linkedin.com/in/alexanderwunschel/ Please, hit the follow button and leave your feedback: Apple Podcast: https://www.cxgoalkeeper.com/apple Spotify: https://www.cxgoalkeeper.com/spotify Follow Gregorio Uglioni on Linkedin: https://www.linkedin.com/in/gregorio-uglioni/ Gregorio Uglioni is a seasoned transformation leader with over 15 years of experience shaping business and digital change, consistently delivering service excellence and measurable impact. As an Associate Partner at Forward, he is recognized for his strategic vision, operational expertise, and ability to drive sustainable growth. A respected keynote speaker and host of the well-known global podcast Business Transformation Pitch with the CX Goalkeeper, Gregorio energizes and inspires organizations worldwide with his customer-centric approach to innovation.

Dark Rhino Security Podcast
S18 E02 (VIDEO) Hackers are using ChatGPT

Dark Rhino Security Podcast

Play Episode Listen Later Dec 4, 2025 44:48


#SecurityConfidential #DarkRhiinoSecurityHusam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He's the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA, ASFSFM, and 3D Forensics, known for his hands-on expertise in uncovering digital evidence and analyzing complex cyber incidents.----------------------------------------------------------------------To learn more about Husam visit https://husamshbib.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

Dark Rhino Security Podcast
S18 E02 Hackers are using ChatGPT

Dark Rhino Security Podcast

Play Episode Listen Later Dec 4, 2025 44:48


#SecurityConfidential #DarkRhiinoSecurityHusam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He's the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA, ASFSFM, and 3D Forensics, known for his hands-on expertise in uncovering digital evidence and analyzing complex cyber incidents.00:00 Intro02:20 What's new in Cybersecurity?04:05 Companies in the news04:56 How does your data get leaked?17:10 Do you have to list all your processes?22:37 Technology is changing29:00 The Life span of a CISO31:50 The CISO, the CEO, and the CIO34:40 Penetration testing36:40 The Digital Forensics procedure44:00 More about Husam----------------------------------------------------------------------To learn more about Husam visit https://husamshbib.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ​----------------------------------------------------------------------

MISTERIOS DE ORION
EL FIN DE LA EVIDENCIA - OSINT y la Muerte de la Verdad Digital

MISTERIOS DE ORION

Play Episode Listen Later Dec 2, 2025 12:47


En este episodio abordamos uno de los mayores desafíos de nuestra era: la desaparición progresiva de la verdad verificable. Los deepfakes en tiempo real, las identidades sintéticas hiperrealistas y la erosión de las cadenas de verificación están transformando la manera en que investigamos, confiamos y tomamos decisiones. Analizamos en profundidad: • Cómo las videollamadas corporativas ya pueden ser manipuladas en directo. • Por qué el OSINT clásico está entrando en colapso. • Qué puede y qué no puede detectar la forensia biométrica. • Cómo la “negación plausible” se ha convertido en un escudo de impunidad. • Por qué la validación híbrida (digital + física) será la única confianza real en 2025 y más allá. Un episodio imprescindible para investigadores, periodistas, fuerzas de seguridad, analistas de ciberinteligencia y cualquier ciudadano que quiera entender cómo se manipula la percepción en la era de la inteligencia artificial. SRIA - Investigación, Ciberseguridad y Verdad Digital.

Atelier des médias
Pourquoi l'OSINT est l'affaire de tout le monde : entretien avec Allan Deneuville

Atelier des médias

Play Episode Listen Later Nov 29, 2025 43:46


Allan Deneuville, maître de conférence à l'université Bordeaux-Montaigne et chercheur au centre GEODE (Géopolitique de la datasphère), vient de publier OSINT : enquêtes et démocratie (INA éditions). Dans ce livre, il explore cette méthodologie d'investigation qui a explosé depuis une quinzaine d'années dans l'écosystème informationnel mais qui a aussi un côté sombre, la dark OSINT. L'acronyme OSINT, pour Open Source Intelligence (ROSO pour Renseignement d'origine sources ouvertes, en français), désigne la collecte et l'analyse d'informations accessibles à tous. C'est l'art de collecter et analyser des infos que tout le monde peut, en théorie, consulter. L'exemple des « Strava Leaks », en 2018, a montré la puissance du phénomène : en faisant leur footing, des soldats américains déployés en Afghanistan avaient sans le savoir cartographié méticuleusement des installations ultra sensibles. La pratique de l'OSINT n'est donc « pas qu'un truc de journaliste ni d'espion, c'est un peu l'affaire de tout le monde », résume Steven Jambot.  Le poison et le remède : la double nature de l'OSINT L'OSINT est devenue un enjeu démocratique majeur, une méthodologie protéiforme, à la fois salutaire et dangereuse. Pour en décrire la nature ambivalente, Allan Deneuville utilise la notion philosophique de pharmakon, un terme grec qui signifie qu'une substance est à la fois « remède et poison ». S'il est utilisé à une certaine dose, l'OSINT peut être bénéfique, mais si elle est utilisée « avec une mauvaise dose, elle peut être un poison ». Ce phénomène prend une ampleur inédite en raison de l'omniprésence des données dans notre environnement, un contexte marqué par la « documentalité » et l'« hyperdocumentation », qu'explique Allan Deneuville. En effet, grâce à la numérisation du monde et à l'hyperlien, « tout document, grâce à l'hyperdocumentation, est apporté de main ». Cette hyperaccessibilité a rendu l'OSINT incontournable. Elle repose sur le « bricolage » numérique, l'art de détourner, bricoler numériquement pour avoir accès à des informations en les croisant avec d'autres informations, en utilisant des données disponibles publiquement comme Flight Radar 24 ou MarineTraffic. Allan Deneuville propose une définition large pour englober ses multiples usages : « L'OSINT est une méthode potentiellement itérative et collaborative qui consiste en la collecte, l'analyse et l'exploitation systématique de documents et de données provenant de sources accessibles au public légalement, gratuitement ou non, dans le but de répondre à un besoin d'information. » La face sombre : Dark OSINT et fragilité démocratique Malgré son rôle crucial dans la lutte contre la désinformation (fact-checking) et pour l'émancipation citoyenne, l'OSINT possède une part sombre, désignée par l'auteur comme la « dark OSINT ». Celle-ci recouvre les usages antidémocratiques qui se manifestent, à l'échelle individuelle, par le stalking et le doxxing. Le doxxing, qui consiste à collecter et diffuser des informations privées dans le but de nuire, de harceler ou de menacer, ainsi que le « vigilantisme numérique », menacent l'État de droit.  À l'échelle étatique et géopolitique, l'OSINT révèle l'« asymétrie structurelle fondamentale » entre les démocraties et les régimes autoritaires. Les sociétés ouvertes sont paradoxalement plus vulnérables, car, comme le rappelle Deneuville : « Un des risques, c'est le fait que nos ennemis géopolitiques ont accès à nos informations et puisse s'en servir contre nous. » Les régimes autoritaires exploitent cette transparence pour mener des opérations d'influence et de surveillance de masse. De plus, l'OSINT est confrontée au risque d'instrumentalisation de ses propres codes visuels. Les enquêtes vidéo utilisent une « grammaire visuelle de la véridiction », qui peut être imitée par la propagande pour diffuser des contre-récits, notamment lors du massacre de Boutcha (Ukraine) ou de l'explosion de l'hôpital Al-Ahli (Gaza). Face à des vérités divergentes, la méthodologie doit s'accompagner d'un « regard réflexif ». L'OSINT : une compétence de base pour la résilience Pour Allan Deneuville, il est essentiel que l'OSINT soit couplée à l'enquête de terrain et à l'expertise. L'OSINT « ne se suffit pas en tant que telle ». La collaboration est nécessaire, il faut « travailler avec le terrain, [...] avoir accès à des spécialistes », pour mieux comprendre et analyser les données. En conclusion, l'apprentissage de l'OSINT devient un enjeu de citoyenneté et d'éducation. « Pour moi, il faut vraiment penser l'OSINT aujourd'hui comme une compétence numérique de base à enseigner au plus grand nombre », explique Allan Deneuville. Cet apprentissage est la clé de la « résilience de nos sociétés face à la désinformation et face aux manœuvres et aux ingérences étrangères ». Le Festival de l'OSINT, co-organisé par l'association OpenFacto, contribue à cette démocratisation, étant ouvert au plus grand nombre. Sa 3e édition se tient les 5 et 6 décembre 2025 à Paris.

State Secrets
Information Warfare The New Frontline

State Secrets

Play Episode Listen Later Nov 24, 2025 44:12


Former NSA senior executive Mike Driscoll joins Cipher Brief's Brad Christian to dissect how America - and its allies - win or lose in the cognitive domain. From post-9/11 SIGINT dominance and its pitfalls to today's OSINT revolution powered by AI, Driscoll details why democracies keep ceding the narrative, what Oct. 7 revealed about messaging at speed, and how to rebalance "the exquisite" with the open. They break down gray zone tactics, attribution lags, tunnel warfare, and the policy/risk mindset shifts needed to shrink decision timelines from months to seconds. Driscoll argues that education, public-private integration, and mission-driven AI are now decisive. If you care about how the next conflict is fought - and who shapes the truth - this conversation is essential.

Closed Network Privacy Podcast
Episode 49 - Interview With Zach w/ Developing Coze JS - Encryption, & Cryptography Chat

Closed Network Privacy Podcast

Play Episode Listen Later Nov 22, 2025 154:03


Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168Website / Donations / Support - https://closednetwork.io/support/BTC Lightning Donations - closednetwork@getalby.com / simon@primal.netThank You Patreons! - https://www.patreon.com/closednetworkMichael Bates - Privacy Bad AssDavid - Privacy Bad AssDaniel J Martin - Privacy Bad AssTK - Privacy Bad AssDavid - Privacy Bad AssMrMilkMustache - Privacy SupporterHutch - Privacy AdvocateTOP LIGHTNING BOOSTERS !!!! THANK YOU !!!@bon@somealphabeticcharacters@basedpotato@Turquoise Panda@wartime@Grounded-GridThank You To Our Moderators:Unintelligentseven - Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354dMaddestMax - Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavtJoin Our CommunityClosed Network Forum - https://forum.closednetwork.ioJoin Our Matrix Channels!Main - https://matrix.to/#/#closedntwrk:matrix.orgOff Topic - https://matrix.to/#/#closednetworkofftopic:matrix.orgSimpleX Group Chat - https://smp9.simplex.im/g#SRBJK7JhuMWa1jgxfmnOfHz7Bl5KjnKUFL5zy-Jn-j0Join Our Mastodon server!https://closednetwork.socialFollow Simon On The SocialsMastodon - https://closednetwork.social/@simonNOSTR - Public Address - npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 - primal.net/simonTwitter / X - @ClosedNtwrkInstagram - https://www.instagram.com/closednetworkpodcast/YouTube - https://www.youtube.com/@closednetworkEmail - simon@closednetwork.ioFollow Zach - https://github.com/ZamicolCoze JS - https://github.com/Cyphrme/CozeJS

earth: a love story
Episode 80: Contact Protocols with Anthony Miller

earth: a love story

Play Episode Listen Later Nov 17, 2025 102:17


Today I welcome Anthony Miller onto the podcast. Anthony shares his journey through a series of ontologically shocking events ranging from cultural to political to religious to exploring the very fabric of reality. This resulted in him developing a contact protocol that, to put it lightly, was a success. Anthony Miller is the co-host of "Fire In The Cosmos" (formerly "Obliterate The Construct"), a video podcast with Sinéad Whelehan examining the wide-ranging connections between consciousness, various anomalous phenomena, mystical experiences, and human potential. He is also the state lead for the Virginia chapter of Citizens for Disclosure, a volunteer activist group under the New Paradigm Institute pushing for UFO disclosure in Congress and destigmatizing the topic throughout society.Anthony is an experiencer of various anomalous phenomena who has learned the importance of taking a broad, non-dualistic, and integral approach in the exploration of consciousness and our greater reality, seeking to communicate this in both his public and private outreach efforts. With a career in open source intelligence (OSINT), he leverages his expertise in media and disinformation analysis to raise awareness on the narratives and constructs that have co-created and continue to permeate our perceived realities, and how we can regain agency and re-enchant our world. Anthony holds a master's degree in Public Policy & National Security from George Mason University and a B.A. in International Studies from Virginia Tech. Recently, he has started a position as Fundraiser for the nonprofit Consciousness Hub -- a community for those exploring the nature of reality, inner growth, and expanded awareness, featuring live events, meditations, imagination journeys, and practical tools that support real change.Fire In The Cosmos LinksYouTube (Video)Spotify (Audio)Patreon (Support & Community)InstagramX/TwitterFacebookListen to my recent appearance on⁠⁠ Gods, Ghosts and UFOs.⁠⁠Become a patron at the EarthLovers $10 tier by visiting ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠patreon.com/robinlassiter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and get access to two Community Gatherings per month. ⁠⁠Earth: A Love Story is now an ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠AUDIOBOOK!⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠My book ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Earth: A Love Story⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠exists as a physical object in the world. Deep forever gratitude to those of you who have purchased the book and left reviews on Amazon. Thank you, thank you, thank you.Our beautiful musical soundscapes are provided by Morgan Jenks. You can support ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠his new album on ⁠⁠bandcamp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, or find out more at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠morganjenks.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Find me on instagram⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@robin_lassiter_honeyheart⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@earth_a_love_story⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠To join my mailing list or book a 1:1 session with me, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠robinlassiter.com⁠⁠⁠

Les matins
Le magazine "Sources" éclaire avec l'OSINT la traque des fugitifs Nord-coréens

Les matins

Play Episode Listen Later Nov 12, 2025 3:03


durée : 00:03:03 - Un monde connecté - par : François Saltiel - Nouvelle enquête pour le magazine d'investigation en OSINT d'arte, la rédaction s'intéresse au sort des réfugiés Nord-coréens qui tente de rejoindre la Chine au péril de leur vie.

Nukes of Hazard
Are We Living in a House of Dynamite?

Nukes of Hazard

Play Episode Listen Later Oct 24, 2025 43:05


Has “A House of Dynamite” popped up on your Netflix? Our staff got the chance to see it early in theaters and decided to break down what this film gets right (and wrong) about the nuclear weapons complex and what we hope people will take away from it. Host and Communications Associate Farah Sonde is joined by Senior Policy Director John Erath, Research Analyst Connor Murray and Communications Director Anna Schumann in this special Nukes of Hazard roundtable. Music from www.bensound.com Show Notes - More analysis from us on “A House of Dynamite”: https://armscontrolcenter.org/a-house-of-dynamite/ Check out our podcast episode on OSINT (open-source intelligence) collection: https://soundcloud.com/cacnp/how-open-source-intelligence-can-unlock-nuclear-secrets Check out our podcast episode on the nuclear football and our nuclear launch system: https://soundcloud.com/cacnp/footballs-biscuits-and-americas-nuclear-monarchy

The Logistics of Logistics Podcast
Who Stole Guy Fieri and Sammy Hagar's Tequila with Jessica Mcfate

The Logistics of Logistics Podcast

Play Episode Listen Later Oct 23, 2025 49:23


In “Who Stole Guy Fieri and Sammy Hagar's Tequila”, Joe Lynch and Jessica McFate, Sr. Director of Intelligence Solutions at Babel Street, discuss how national security intelligence methods are now vital for solving commercial theft and securing global supply chains. About Jessica McFate Jessica Lewis McFate is Sr. Director of Intelligence Solutions at Babel Street and a career intelligence professional, specializing in OSINT for national security. At the Institute for the Study of War, her research won acclaim for forecasting the rise of ISIS. She has authored over 50 publications, briefed top U.S. government agencies, appeared in print and broadcast media, and testified before Congress. A West Point graduate, she served as a U.S. Army officer with 34 months in country deployment in Iraq and Afghanistan supporting signals intelligence, human intelligence, and counter-corruption roles. About Babel Street Babel Street delivers mission-grade risk intelligence for organizations across government, defense, and the private sector to expose hidden identities, secure vendor networks, and identify threats. Our AI-native platform empowers the most trusted organizations in the world with the strategic advantage needed to stay ahead of risk and protect their missions. Headquartered in the U.S., Babel Street has an established presence in Australia, Canada, Israel, Japan, and the U.K. For more information, visit babelstreet.com.  Webinar: Securing Tomorrow: The Critical Role of Intelligent Vendor Vetting in Government Supply Chains For more information on how intelligent vendor vetting can protect your supply chain and help ensure compliance with new U.S. government contractor requirements, register for the upcoming webinar, “Securing Tomorrow: The Critical Role of Intelligent Vendor Vetting in Government Supply Chains,” to be presented by Babel Street and Carahsoft on Wednesday, October 29, 2025, at 3:00 p.m. Eastern. Key Takeaways: Who Stole Guy Fieri and Sammy Hagar's Tequila In “Who Stole Guy Fieri and Sammy Hagar's Tequila”, Joe Lynch and Jessica McFate, Sr. Director of Intelligence Solutions at Babel Street, discuss how national security intelligence methods are now vital for solving commercial theft and securing global supply chains. OSINT: The New Tool in Commercial Investigations: Learn how Open-Source Intelligence (OSINT)—the same methodology used to forecast global threats like the rise of ISIS—is now being repurposed to trace and recover high-value commercial assets, such as stolen celebrity tequila, by monitoring online chatter and digital footprints. From Counter-Corruption to Corporate Supply Chains: Understand how the principles of counter-corruption and signals intelligence (SIGINT) that Jessica applied during her military deployments in Iraq and Afghanistan are directly relevant to identifying and neutralizing vulnerabilities in modern-day vendor networks and supply chains. The Tequila Heist as a Case Study for Organized Crime: Discover how the theft of a high-profile brand like Guy Fieri and Sammy Hagar's tequila is rarely an isolated incident, but often a sign of sophisticated organized criminal enterprises using the dark market, which requires a "mission-grade" approach to identify the true threat actors. The Power of AI in Exposing Hidden Identities: Explore how Babel Street's AI-native platform is used to rapidly sift through global, multilingual data to "expose hidden identities" involved in commercial theft, showing that the sheer volume of data makes human-only analysis impossible. Forecasting and Pre-Empting Brand Risk: A key lesson is the shift from reacting to theft to predicting it. Learn how intelligence professionals can apply forecasting models to identify and secure distribution choke points or compromised vendor relationships before a high-value product goes missing. The Strategic Cost of Reputational Damage: Beyond the physical loss of inventory, the episode highlights the immense brand and reputational risk for celebrity-backed products. The use of advanced risk intelligence is necessary to protect a brand's integrity and consumer trust following a public security failure. Bridging National Security and Private Sector Intelligence: The conversation will demonstrate the growing imperative for private companies to adopt the rigor and discipline of national security intelligence methods to secure their operations against global threats, transforming how they approach risk mitigation. Learn More About Who Stole Guy Fieri and Sammy Hagar's Tequila Jessica McFate LinkedIn Babel Street LinkedIn Babel Street Guy Fieri reveals new details into the criminals who stole $1M of his tequila Thieves Steal 24,000 Bottles of Guy Fieri's Tequila in Elaborate Cross-Country Heist The Logistics of Logistics Podcast If you enjoy the podcast, please leave a positive review, subscribe, and share it with your friends and colleagues. The Logistics of Logistics Podcast: Google, Apple, Castbox, Spotify, Stitcher, PlayerFM, Tunein, Podbean, Owltail, Libsyn, Overcast Check out The Logistics of Logistics on Youtube

Slate Star Codex Podcast
Your Review: The Russo-Ukrainian War

Slate Star Codex Podcast

Play Episode Listen Later Oct 5, 2025 37:20


[This is one of the finalists in the 2025 review contest, written by an ACX reader who will remain anonymous until after voting is done. I'll be posting about one of these a week for several months. When you've read them all, I'll ask you to vote for a favorite, so remember which ones you liked] You Can Just Do Things In the winter of 2022 I was unhappily working at a dull but decently compensated IT job, which I had come upon at last after four years of phoning it in at college and abandoning my brief stint as an MMA Fighter/Porn Store Security Guard due to feeling like I was getting too old to be broke. If pressure to fit in with my yuppie, family-and-career-having peers pushed me into corporate life, the depressing mundanity of Covid-era day-to-day pushed me out just as quickly. On February 24th, 2022, Russia began its full scale invasion, and America learned what a “Ukraine” was. Having long used politics as a surrogate activity to distract myself from my life of chronic underachievement, I was already a little more familiar than most with the country's woes, and had followed the conflict from the time of the Euromaidan protests. Years before I had read of the likes of Azov and its many foreign volunteers, and had even periodically fantasized about dropping everything and going to the Donetsk Airport. But no, that Wasn't The Type Of Thing Normal People Like Me Did, so instead I joined my own country's armed forces, sat around pushing papers, earned the dubious honor of washing out “ahead of schedule”, and finally graduated college with a not very useful degree and a mediocre GPA. With the invasion however, things changed. Before I had always vaguely felt that I would eventually end up doing something “cool”, and had soothed myself with reassurances that I was still in the “early life” section of my future Wikipedia article and would bide my time before I made my play at greatness. Now however, the unrealisticness of this conceit was thrown into uncomfortably sharp relief by a certain contrast I could not not ignore. Only three days after the start of the full scale invasion, Ukrainian foreign minister Dymytro Kuleba announced the creation of the “International Legion For The Territorial Defense Of Ukraine”. Unlike in 2014, Ukraine was now specifically and officially soliciting foreigners with military experience to fight for them! I was at least technically in that category! I thought about my own time in the military. My ideas of going to war in Afghanistan had been quashed by the US withdrawal not long after I joined, and I had quickly found that military life involved more editing forms in Adobe Acrobat and less explosions than I had naively supposed. But this was a real war, a deadly serious war, and a major, world defining event at that. In the early months of the invasion the international media talked about almost nothing else. I spent all day at my desk pretending to work while frantically refreshing OSINT live maps and breathlessly following news from the front. I remember the circulation of harrowing video clips. Kalashnikovs being distributed to civilians in Kyiv, the mayor of a small village publicly asking its inhabitants whether they should personally accede to Russian ultimatums, or risk having their property destroyed and lives forfeit- to resounding cries of “Glory to Ukraine”. The Ukrainians' courage blew my mind. There were people who really had something to die for, and by extension something to live for. Meanwhile, there I was, sipping coffee and getting fat. The creation of the legion felt like destiny was reaching its hand out to me. Was I really going to ignore it so I could handle support tickets for the rest of my life? https://www.astralcodexten.com/p/your-review-the-russo-ukrainian-war  

SpyCast
The Dark Web Broker

SpyCast

Play Episode Listen Later Sep 23, 2025 35:42


Vinny Troia is at home on the Dark Web. The veteran hacker has developed relationships with cyberactors who have quietly stolen sensitive data from the far corners of the world. Vinny sells that data to law enforcement and intelligence agencies, like the CIA. His book, Grey Area: Dark Web Data Collection and the Future of OSINT, is out this October. Prefer to watch your podcasts? Find us on YouTube at https://www.youtube.com/@IntlSpyMuseum/podcasts.  Subscribe to Sasha's Substack, HUMINT, to get more intelligence stories: https://sashaingber.substack.com/  And if you have feedback or want to hear about a particular topic, you can reach us by E-mail at SpyCast@Spymuseum.org.  This show is brought to you from Goat Rodeo, Airwave, and the International Spy Museum in Washington, DC. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Lawfare Podcast
Lawfare Daily: ‘War in the Smartphone Age,' with Matthew Ford

The Lawfare Podcast

Play Episode Listen Later Aug 27, 2025 59:06


Matthew Ford, Associate Professor at Swedish Defence University and author of “War in the Smartphone Age: Conflict, Connectivity, and the Crises at Our Fingertips,” joins Lawfare's Justin Sherman to discuss the role of smartphones and related technologies in war, how social media contributes to a collapse of context in the war content we see online, and how smartphones and other devices are reshaping open-source intelligence (OSINT) and open-source investigations (OSINV) vis-a-vis conflicts and violence from Syria to Ethiopia to Ukraine. They also discuss the tech stack in war, how the military “kill chain” is evolving with ever-greater digital connectivity, the current state and future of “participatory warfare,” and how we can become better consumers—and sharers—of war-related content online.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.