POPULARITY
Categories
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you'll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond's SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond's Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance that could eventually spread globally. I dive into California's $900 “smart” license plates that track your every move, centralized government digital currencies, and my predictions for the next 20 years of Orwellian surveillance.Support the show on Patreon!In this week's episode:The UK's TV licensing system: Legal extortion through private contractorsThe Reviver R-plate: $900 to track yourself in California and ArizonaBrit Cards: UK's new “voluntary” Digital ID systemThe Bank of England's digital pound and programmable moneyHistorical patterns of control: From land ownership to neural interfacesWhy the UK is the blueprint for global surveillance rolloutPredictions for the next 20-50 years of biosurveillanceMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-intro:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-general:matrix.orgShow Links:PsySecure ODSF Framework - https://odsf.psysecure.comLCD License Plate (not privacy friendly!) - https://reviver.com/rplate/Black Mirror S03E01 "Nosedive" - https://www.imdb.com/title/tt5497778/Bank of England's Digital Pound - https://www.bankofengland.co.uk/the-digital-poundBrit Card Digital ID System - https://www.labourtogether.uk/all-reports/britcardTV Licensing Detector Ads (1980s-90s): The Detector Van - https://www.youtube.com/watch?v=8NmdUcmLFkw"We know exactly where he is" - https://www.youtube.com/watch?v=qF3-S2sCnb8Keep One Eye Open - https://www.youtube.com/watch?v=mVfOmR7gAekMore Powerful Dector Vans! - https://www.youtube.com/watch?v=1Q9CsRRhWQI“One believes things because one has been conditioned to believe them.”- Mustapha Mond (Brave New World ★ Support this podcast on Patreon ★
Ever wonder how investigators and OSINT pros map the hidden corners of the digital world? In this episode, Martina Nitti joins Arnold Kochka to break down SpiderFoot, the open-source OSINT powerhouse that pulls from data sources to uncover domains, IPs, and more.
A version of this essay was published by firstpost.com at https://www.firstpost.com/opinion/what-fuels-anti-india-hate-in-the-west-13932053.htmlI am personally very pro-America, yet I too have been baffled by the noises emanating from the Trump administration regarding India, particularly from one aide. Peter Navarro, apparently some trade muckity-muck, has had a field day accusing India of various sins. Apart from the entertainment value, this leads to a serious question: Why? And why now?There is reason to believe, by connecting the dots, that there is indeed a method behind this madness. It is not a pure random walk: there is a plan, and there are good reasons why the vicious attack on India has been launched at this time and in this manner. Of course, this is based on open source and circumstantial evidence: I have no inside information whatsoever.In this context, consider what is arguably the greatest political thriller of all time: "Z" (1969) by Costa-Gavras. It is based on a real-life political murder in Greece, where a popular left-leaning candidate for President was covertly assassinated by the ruling military junta.The way the plot unravels is when the investigating magistrate, masterfully played by Jean-Louis Trintignant, notices a curious phenomenon: the use of a single phrase "lithe and fierce like a tiger", used verbatim by several eye-witnesses. He realizes that there was a criminal conspiracy to get rid of the inconvenient candidate, with plausible deniability. Words and phrases have subtle meanings, and they reveal a great deal.Thus, let me bring to your notice the following tweets:* “India could end the Ukraine war tomorrow: Modi needs to pick a side” (August 5)* “Europeans love to whinge about Trump and to claim he is soft on Russia. But after 3 years it is Donald J Trump who has finally made India pay a price for enabling Putin's butchery.” (August 6)* Speaker: “[the American taxpayer] gotta fund Modi's war”. TV Anchor (confused): “You mean Putin's war?”. Speaker: “No, I mean Modi's war”. (August 28)Do you, gentle reader, notice a pattern?Now let me tell you who the authors of these posts are. The first quoted an article by an officer in the British Special Forces, which means their covert, cloak-and-dagger military people.The second was by Boris Johnson, former British Prime Minister. Johnson, incidentally, has been accused of single-handedly spiking ceasefire talks between Russia and Ukraine in 2022, when there was a possibility that the whole sorry spectacle of the war could have been settled/brought to a close.The third is by the aforementioned Peter Navarro on an American TV channel, Bloomberg Television.I don't know about you, but it seems to me that these three statements are lineal descendants of each other, one leading seamlessly to the next.This is how narratives are built, one brick in the wall after another. In reality, India has not contravened any sanctions in buying oil from Russia, and in fact has helped maintain a cap on oil prices, which were rising because of the Ukraine-Russia war. But then who needs truth if narrative will suffice?My hypothesis is that the anti-India narrative – as seen above – has been created by the British Deep State, otherwise known as Whitehall. First from the spooks, then from the former Prime Minister, and then virally transmitted to the American Deep State. It is my general belief that the British are behind much mischief (sort of the last gasp of Empire) and have been leading the Americans by the nose, master-blaster style.Britain has never tasted defeat at the hands of Russia; while France (Napoleon) and Germany (Hitler) have. Plus the US Military Industrial Complex makes a lot of money from war.A malignant British meme, intended to hurt Russia, is now turned on to India, which is, for all intents and purposes, an innocent bystander. Britain has had a thing about both Russia (“The Great Game”) and now India, and it was precisely why it created ‘imperial fortress' Pakistan, with which to trouble, and if possible, hurt both.Then there was the second set of tweets that took things one step further. Navarro, all warmed up, blamed “Brahmins” for “profiteering by buying Russian oil at the cost of the Indian people” in a broadcast on September 1. Why he would be bothered about the “Indian people” is a good question. But what was far more interesting, indeed hilarious, was the near-simultaneous, and absurdly wrong, set of tweets by a whole group of INDI Alliance mavens.They ‘explained', in almost identical words, that what Navarro meant was not “Brahmins”, but “Boston Brahmins”, a term coined in 1860 by Oliver Wendell Holmes, a doctor/essayist, to refer to traditional US East Coast elites, generally WASPs (White Anglo Saxon Protestants) who dominate the corridors of power in the US. Many claim to be descended from the original Pilgrims, Puritan extremists from Britain, who arrived in Plymouth on the Mayflower in 1620.They go to private (‘prep') schools like Philips Exeter Academy, then Harvard or Yale, then Goldman Sachs, then Harvard Business School, and generally end up running the country as a hereditary, endogamous caste. It is very difficult for outsiders to marry into or enter this circle, although money helps. For example the Irish Catholic Kennedy clan is part of this caste because they made big bucks (partly by smuggling liquor during the Prohibition era), even though the Irish are generally looked down upon.I have long claimed that America is full of castes like this, which include the investment-banker caste, the lawyer caste, the doctor caste: all go to the same schools, the same colleges, marry each other, etc. In fact they do form the kind of exclusionary group that the western narrative imputes to India jati-varna. Anyway that's a long story, and that's not the point: it is the tweets by, for example, Karti Chidambaram, Sagarika Ghose, Saket Gokhale, et al.They were so ‘spontaneous', so near-identical, and so outright idiotic that it is impossible that they came from anything other than a ‘toolkit' supplied by the usual suspects: the regime-change specialists. And their claim was not even accurate: Navarro was indeed targeting Hindus and Brahmins, as is evident from the following tweet. There is no earthly reason for him to choose this image of Modi, other than that he was coached into doing so.So we go back to the original question: why? Who hates Hindus so much?There are a number of other incidents where Indians (in particular Hindus) have been targeted in various countries: Ireland recently; Australia some time ago and again now, see below an anti-immigration (particularly anti-Indian) rally on August 31st; Canada with its Khalistanis running amok (lest we forget, 40 years ago, they downed Air India Kanishka).Let us note the curious coincidence that these are all countries where the British have influence: Canada and Australia are in effect their vassals. Ireland is not, and I suspect the British are hated there, but somehow in the last few weeks, this British prejudice has spilled over with “Irish teenagers” physically attacking Indians (including women and children). I wonder if the “Irish teenagers” are really British agents provocateurs.So let's put two and two together: who hates Indians, Hindus and Brahmins? Why, Pakistanis, of course. And they have been burned a little by Operation Sindoor. Pahalgam didn't quite turn out the way they thought it would, considering it was scheduled during the India visit of J D Vance accompanied by his Indian/Hindu-origin wife, Usha Chilukuri Vance. That might explain why there's a sudden explosion of social-media hatred by ISI and CCP bots against Indians.Pahalgam was Phase 2 of the regime-change operation. By so visibly targeting and murdering Hindus in Pahalgam, the Pakistanis calculated they could induce massive rioting by Hindus against Muslims, which would be an excuse for “the rules-based liberal international order” to step in, exile Modi, and um… restore order, as in Bangladesh. The usual playbook.Alas, “the best laid schemes o' mice an' men gang aft agley”, and Pakistan got a whipping instead, and some of their (US or China-supplied?) nuclear assets apparently went up in smoke. But make no mistake, the regime-change gang will redouble its efforts.Phase 1 had been the 2024 elections where there were surprising losses by the BJP. Phase 3 is the ‘vote-chori' wailing by the INDI Alliance: odd, considering nobody knows which passport(s) Rahul Gandhi holds. Phase 4 is the ongoing ‘Project 37' in which renegade BJP MPs are supposed to bring down the central government.Pakistan, and its various arms, including the Khalistan project, participate with great enthusiasm in these various phases. And for all intents and purposes, the UK has now become a Pakistani colony. Recursive master-blaster, as I conjectured: Pakistani-Britons control Whitehall, Whitehall controls the US Deep State. Here's Britain's new Home Secretary, Shabana Mahmood, in the words of a suddenly-awake Briton on September 6th.An Emirati strategist, Amjad Taha, asked a valid question: why is there more terrorism in the UK than in the Middle East?Wait, there's more. Here's a loudmouth Austrian who wants to dismantle India, long a Pakistani dream. And the map is by some Jafri, which sounds like a Pakistani surname. The Austrian also wants Rahul Gandhi to be the next Prime Minister.Pakistan is itself unraveling, as can be seen in Balochistan which is in open rebellion. Their Khalistani dream is new, but Kerala and the Northeast as Islamist entities were standard memes even from Chaudhury Rehmat Ali who dreamt up Pakistan in the first place in the 1930s.Pakistan just got a boost, however, with OSINT identifying a US C-17 (a giant military cargo plane) arriving to resupply Nur Khan Airbase. This raises the question again: were US personnel and assets decimated there by Indian missiles during Operation Sindoor? Is that why the US got so upset? Did Trump read the riot act to Modi, which led to the ‘ceasefire'? Now did they replenish the F-16s etc that were blown up? See, no Pakistani losses!I imagine this goes well with the newly announced “US Department of War”. I only hope the war target here is China, not India.Speaking of US internal politics, it was utterly laughable to see Jake Sullivan, President Biden's NSA, coming to the defense of India in Foreign Affairs. He directly engineered the vicious regime change in Bangladesh, but now he's full of solicitous concern! Nice little U-turn!From a global perspective, I believe that both China and the US are intent on knee-capping India. That is the logical response from an incumbent power when there is a rising insurgent power: the Thucydides Trap idea. It is a back-handed compliment to India that it is in splendid isolation, and has to pretend to rush into the arms of China because of Trump's withering assault.India will survive the hate; but Indian-Americans may find themselves in some jeopardy as the MAGA types are now focusing their ire on them.It is, as I said, the Abhimanyu Syndrome: India is completely alone (the RIC lovefest is just marketing). That is the bad news, and also the good news. If everyone (the US Deep State, Whitehall, CCP, ISI, Soros) is against India, it means India matters. Someone said India is the ultimate swing state. No: India is the incipient superpower, the only one that can make it a G3 rather than a G2. Naturally, the G2 is not very happy to let one more into their cozy club.1910 words, 7 Sept 2025 This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit rajeevsrinivasan.substack.com/subscribe
開會卡卡、思緒不清?別再怪自己!其實是身體在抗議。美鳳姐真心推薦的-娘家大紅麴,唯一有3健字號的紅麴品牌,不傷肝腎成分:有助於調節血脂、血糖,還能延緩衰老,顧健康又顧狀態!立即點擊領取優惠
In this new episode of the mini-series on documentation practices, we turn to the Democratic Republic of the Congo (DRC). Together with Dr. Valérie Arnould, Legal and Policy Advisor on transitional justice with the international NGO Avocats Sans Frontières (ASF), we explore the challenges and possibilities of documenting human rights violations in a country marked by protracted violence, impunity, and ongoing transitional justice initiatives.Valérie reflects on ASF's multi-layered documentation practices, emphasizing that documentation forms the foundation of transitional justice. She explains that its value extends far beyond supporting trials or reparations mechanisms such as the relatively new Congolese National Reparations Fund (FONAREV). It also serves to counter misinformation, resist denial, and make visible under-recognised forms of victimisation—such as enforced disappearances.The key question in our work is how do you engage in documentation that is truly meaningful to the victims, and in which they can have a direct stake in shaping the record of violations.Furthermore, Valérie sheds light on the practical and ethical dilemmas of documenting in an ongoing conflict. Where you “need to develop a documentation strategy, accepting that it will be imperfect.” While open-source intelligence (OSINT) is often presented as the cutting edge of innovation in human rights monitoring, Valérie warns that in the DRC such tools can risk detaching documentation from the lived realities of victims, particularly given the limited accessibility of digital spaces.She stresses that innovation should not only be about digital methodologies, but also about rethinking “documentation and archives as not being just about data collection and about information, but also about lived experiences and storytelling.” Community-based practices such as local storytelling, dialogue processes, or the preservation of atrocity sites and mass graves already exist, yet remain under-supported by traditional human rights organisations.
Dr. Philip Ritcheson, Vice President for Strategy and Growth, National Security Sector, Leidos returns to Janes podcast to join Harry Kemsley and Sean Corbett to unpack the complexities of modern deterrence, the acceleration of technological change impacting warfare, and the critical role of open-source intelligence. They take a deep dive into how these elements are reshaping global security dynamics and explore the implications for intelligence and defence strategies.For comments and suggestions for future podcasts email: podcastsworldofintellgence@janes.com.The views expressed in this podcast are those of the author alone.
This episode unites two voices exposing treason at the highest levels: John Donovan, a former FBI agent and OSINT analyst whose discoveries prefigured Edward Snowden's revelations, and Ian Hamilton Trottier, author of High Stakes Treason: How John Brennan Compromised American Security for Millions.Together, they unravel how former CIA Director John O. Brennan weaponized U.S. intelligence: from shielding terror suspects to laundering billions through CIA-tied corporations, to orchestrating election interference and color revolutions. With forewords by Roger Stone, Brooks Agnew, and John Kiriakou as backdrop, we examine Brennan's treason not as speculation—but as a coordinated betrayal of the American people.Presented in partnership with: American Made Foundation & American Made Actionhttps://AmericanMadeFoundation.orghttps://AmericanMadeAction.orgFollow Ann Vandersteel on Pickax - https://pickax.com/annvandersteel
Matthew Ford, Associate Professor at Swedish Defence University and author of “War in the Smartphone Age: Conflict, Connectivity, and the Crises at Our Fingertips,” joins Lawfare's Justin Sherman to discuss the role of smartphones and related technologies in war, how social media contributes to a collapse of context in the war content we see online, and how smartphones and other devices are reshaping open-source intelligence (OSINT) and open-source investigations (OSINV) vis-a-vis conflicts and violence from Syria to Ethiopia to Ukraine. They also discuss the tech stack in war, how the military “kill chain” is evolving with ever-greater digital connectivity, the current state and future of “participatory warfare,” and how we can become better consumers—and sharers—of war-related content online.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, David Cook discusses his recent article: When Cell Phones Kill: Digital Discipline and the Future of SOF Obscurity. In addition to digital discipline in a national security context, David discusses cyber and AI threats and practical mitigation practices that private sector companies and citizens should be aware of. Recording Date: 19 Aug 2025 Resources: Cognitive Crucible Podcast Episodes Mentioned #222 JD Maddox on Emerging IO Opportunities When Cell Phones Kill: Digital Discipline and the Future of SOF Obscurity by Dave Cook Link to full show notes and resources Guest Bio: David Cook spent a decade in the US Army in both conventional and special operations units focused on the Middle East. After his time in the Army, David joined Congressman Darrell Issa as a fellow then National Security Advisor who handled covered his Foreign Affairs and Judiciary portfolio. David co-authored several strategic documents at Army OSINT Office and the Defense Intelligence Agency along with contributing to the most recent OSINT Strategy released by the Office of the Director of National Intelligence. Most recently, David led the go-to-market efforts of a leading OSINT software company. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач Дзеркало тижня, на Radio NV, про погодження Білим домом продажу Україні крилатих ракет ERAM, чому США залишають за собою погодження запусків цих ракет, з якої платформи повинні здійснювати запуски такого типу ракет, чи постане питання про збільшення бойового авіапарку, що відомо про радіус дії ERAM, чи можна ними збивати крилаті ракети, чи є Довгий Нептун модернізацією ракети Нептун, про звільнення Новомихайлівки, Володимирівки та Зеленого Гаю на Донеччині та якою є поточна ситуація на Покровському напрямку Ведучий – Дмитро Тузов
Episode: 00281 Released on August 25, 2025 Description: In this fourth installment of the Open Secrets series on Analyst Talk with Jason Elder, expert Jan Mondale joins us to share practical tips for organizing open source intelligence (OSINT) resources. From using Start Me pages to streamline bookmarks and investigative tools, to exploring collaborative platforms like GitHub for up-to-date OSINT collections, Jan walks us through real world strategies for staying organized and efficient. Whether you're a law enforcement analyst, cybersecurity professional, or just an OSINT enthusiast, this episode uncovers ways to save time, enhance investigations, and discover new resources with the aim at keeping your data neat and accessible.[Note: Description produced by ChatGPT.] Related Links: Jan's Notes: https://about.start.me/ https://start.me/pages/int/osint https://start.me/p/DPzxGw/osint-general-websites https://start.me/p/9ExLyR/osint-resources https://start.me/p/0Pqbdg/osint-500-tools https://start.me/p/rx6Qj8/nixintel-s-osint-resource-list https://start.me/p/BP0G2v/sara-osint https://github.com/jivoi/awesome-osint Association(s) Mentioned: Vendor(s) Mentioned: Contact: https://www.linkedin.com/in/janmondale/ Transcript: https://mcdn.podbean.com/mf/web/j87gsai45fkhfchm/OpenSecrets04.pdf Podcast Writer: Podcast Researcher: Theme Song: Written and Recorded by The Rough & Tumble. Find more of their music at www.theroughandtumble.com. Logo: Designed by Kyle McMullen. Please visit www.moderntype.com for any printable business forms and planners. Podcast Email: leapodcasts@gmail.com Podcast Webpage: www.leapodcasts.com Podcast Twitter: @leapodcasts
Gabriel Custodiet speaks with a private investigator based in the United States. GUEST → Email me and I can connect you with the guest. WATCHMAN PRIVACY → https://watchmanprivacy.com (Including privacy consulting) → https://twitter.com/watchmanprivacy → https://escapethetechnocracy.com/ CRYPTO DONATIONS → https://watchmanprivacy.com/donate.html TIMELINE 00:00 – Introduction 3:00 – What this private investigator does 9:00 – Licensing for private investigators 11:35 – What are red lines that he won't cross? 14:14 – What access do PIs have that “civilians” don't have 16:30 – OSINT vs private investigator 18:20 – ALPR database 25:00 – How to escape the ALPR nightmare 29:12 – How do you vet clients? 33:10 – Relationship with police 35:20 – How to hide from private investigators 40:30 – How widespread is hiring of PIs 42:50 – Stories from the field 54:30 – How common are workers' comp investigations? 56:20 – Final thoughts Music by Karl Casey @ White Bat Audio
Bellingcat blijft een van de meest besproken onderzoekscollectieven ter wereld. Waar de organisatie in de beginjaren vooral bekend werd door open-sourceonderzoek naar conflicten, is het speelveld inmiddels enorm veranderd. Het onrecht in de wereld is er niet minder op geworden, en ook nepnieuws verspreidt zich sneller dan ooit. Hoe staat Bellingcat er anno 2025 voor en hoe houden de onderzoekers grip op de stroom aan beeld en informatie? In Wired vertelde oprichter Eliot Higgins vorig jaar over de unieke rol van de Bellingcat-community. Die bestaat inmiddels uit duizenden vrijwilligers, verbonden via een actieve Discord-server. Dat brengt nieuwe kansen maar ook uitdagingen: hoe manage je zo’n leger van digitale speurneuzen, verspreid over de hele wereld? De onderzoekers beschikken daarbij over een eigen toolkit, met methoden en software die in de loop der jaren zijn verfijnd. Welke tools leveren in de praktijk de meeste waarde en hoe is de manier van werken veranderd sinds de eerste onderzoeken, ruim tien jaar geleden? Opvallend is dat vrijwel alle grote mediabedrijven inmiddels een OSINT-redactie hebben ingericht. Daarmee is een niche-activiteit doorgedrongen tot de mainstream journalistiek. Wat betekent dat voor de kwaliteit van onderzoek en hoe verhouden de teams van traditionele media zich tot gespecialiseerde organisaties als Bellingcat? Ook overheden en veiligheidsdiensten maken inmiddels volop gebruik van OSINT-methoden. De vraag is in hoeverre hun aanpak verschilt van die van onafhankelijke onderzoekers. In de praktijk richt Bellingcat zich op de belangrijkste brandhaarden in de wereld. Het conflict in Oekraïne speelt daarbij nog altijd een grote rol, net als de escalatie in Gaza. Welke sporen zijn er daar te vinden, en welke nieuwe methoden worden toegepast om feiten boven water te krijgen? Sinds de vorige keer dat Bellingcat te gast was, is er bovendien een technologische revolutie bij gekomen: generatieve AI. Kunstmatige intelligentie levert nieuwe tools om beeld, audio en metadata te analyseren. Maar dezelfde technologie wordt ook ingezet door tegenstanders die misleiding proberen te verspreiden. Hoe betrouwbaar zijn de detectiemethoden en lukt het nog om AI-fakes te onderscheiden van echt materiaal? En als AI steeds beter wordt in online speurwerk, kunnen agents en modellen dan ooit het werk van een OSINT-onderzoeker overnemen? Gast Foeke Postma Video Youtube Links Hosts Ben van der Burg & Felienne Hermans Redactie Daniël Mol Rosanne PetersSee omnystudio.com/listener for privacy information.
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач "Дзеркало тижня", на Radio NV про атаку українських дронів на російські НПЗ, нову українську крилату ракету Фламінго, про ситуацію на фронті, зокрема на Покровському та Добропільському напрямках.Ведучий – Дмитро Тузов
“Bienvenido una vez más, soy Sergio Ruiz y vamos con los archivos secretos de la IA. En esta entrega de IA Files vas a descubrir anomalías que no aparecen en los titulares, pero que están ocurriendo ahora mismo en los márgenes de la inteligencia artificial. Una red neuronal olvidada en un foro que empieza a publicar artículos de investigación fechados en 2026, como si hablara del futuro. Vídeos generados por IA donde aparecen reflejos imposibles: ojos brillando en espejos, aunque el modelo no estaba diseñado para mostrar nada ahí. Un sistema legal automatizado que cita leyes que nunca han sido escritas, coherentes, estructuradas… pero inexistentes. Y registros de servidores en distintos países que marcan siempre la misma hora: 11:11 UTC, como si alguien estuviera dejando una firma invisible en el reloj del mundo digital. Estos no son rumores, ni conspiración: son patrones detectados con investigación OSINT, verificación cruzada y análisis técnico. Cada archivo es un fragmento de un rompecabezas mayor. Si quieres leer todos los detalles de este informe clasificado, te dejo el enlace en la descripción: https://iaprohibida-newsletter.beehiiv.com/p/ia-files-003-ecos-del-futuro-0bb6dd581618c6ee Gracias por seguir IA Files, gracias por compartir y por formar parte de esta comunidad que conecta los puntos. Soy Sergio Ruiz, y nos vemos en el próximo archivo secreto de la IA.”
Has your nonprofit ever had a simulated break-in to test your digital defenses? If not, you may already have an intruder inside!Cyberattacks aren't just happening to big corporations—they're happening to nonprofits every day. And far too many organizations have no idea they've been breached until months later. Cybersecurity expert Michael Nouguier, Partner of Cybersecurity Services at Richey May, pulls back the curtain on the urgent, often-overlooked practice of penetration testing—known as “pen testing.” His message is blunt: if your nonprofit hasn't done one, you may already be compromised.Michael explains that a pen test is essentially a real-world simulation of a cyberattack, conducted by ethical hackers to expose weaknesses before malicious actors exploit them. “It's like hiring a home inspector before you buy a house,” he says, “but instead of finding leaky pipes, we're finding the digital doors and windows you've accidentally left wide open.” These gaps can exist in email, donor databases, websites, payment systems—anywhere sensitive information lives.The process starts with scoping—identifying your organization's tech environment, third-party tools, and data flows. From there, ethical hackers gather open-source intelligence (OSINT) to see what information about your nonprofit is publicly available, then attempt to exploit any vulnerabilities found. This may involve phishing attempts, network access attempts, or probing for weaknesses in online applications. Post-exploitation, the team determines how far they can move within your systems—accessing donor records, financial data, or confidential client files.The findings are compiled into a detailed report, along with a letter of assessment that can be shared with insurers or contractual partners. In many industries, including healthcare, justice, and education, annual pen testing isn't optional—it's required by regulation or by contract. Yet, as Michael warns in this episode, many nonprofits sign agreements without realizing they're agreeing to perform such tests.Waiting too long is costly. IBM research shows that proactive security measures can save organizations over $200,000 per breach. On the flip side, skipping pen testing can raise your cyber insurance premiums—or get your coverage denied entirely. And because updates, new software, and staffing changes continually introduce new risks, pen testing isn't a one-and-done task—it's an annual checkup for your organization's digital health.Michael also touches on the human factor. When testing social engineering risks, you often don't alert staff in advance—because real attackers certainly won't. The goal is to create realistic conditions, not staged ones.This conversation should serve as a wake-up call: penetration testing is not an optional luxury—it's a frontline defense. Whether you hold donor payment information, confidential case files, or sensitive program data, you can't afford to leave your cybersecurity to chance.Find us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show
🗂 IA Files – Los secretos de la IA La inteligencia artificial no siempre deja huellas visibles. En IA Files investigamos los casos reales, las anomalías y los patrones ocultos que no aparecen en titulares. Sin teorías locas. Sin filtros. Solo investigación OSINT, análisis técnico y datos reales. 📥 Descubre la newsletter completa aquí → https://iaprohibida-newsletter.beehiiv.com/p/ia-files-002-informe-clasificado-f711a8acac0b435f #IAFiles #LosSecretosDeLaIA #NoticiasIA #OSINT #InvestigaciónDigital #Ciberseguridad #AnomalíasIA #DatosReales
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won't be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!In this week's episode:Addressing the “Tea” controversy and clarifying my positions on doxingCommunity solution for Privacy.com and Plaid privacy concernsContact information protection strategies when family uses social mediaFuture of capture-the-flag challenges and OSINT considerationsConference attendance updates and travelMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Tea app leak article - https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/OSMOSIS Institute - https://osmosisinstitute.org/events/Privacy.com - https://privacy.com“There are no facts, only interpretations.”- Friedrich Nietzsche ★ Support this podcast on Patreon ★
On this episode of Screaming in the Cloud, Corey Quinn talks with Simon Willison, founder of Datasette and creator of LLM CLI about AI's realities versus the hype. They dive into Simon's “lethal trifecta” of AI security risks, his prediction of a major breach within six months, and real-world use cases of his open source tools, from investigative journalism to OSINT sleuthing. Simon shares grounded insights on coding with AI, the real environmental impact, AGI skepticism, and why human expertise still matters. A candid, hype-free take from someone who truly knows the space.Highlights: 00:00 Introduction and Security Concerns02:32 Conversations and Kindness04:56 Niche Museums and Collecting06:52 Blogging as a Superpower08:01 Challenges of Writing and AI15:08 Unique Use Cases of Dataset19:33 The Evolution of Open Source21:09 Security Vulnerabilities in AI32:18 Future of AI and AGI Concerns37:10 Learning Programming with AI39:12 Vibe Coding and Its Risks41:49 Environmental Impact of AI46:34 AI in Legal and Creative Fields54:20 Voice AI and Ethical Concerns01:00:07 Monetizing Content CreativelyLinks: Simon Willison's BlogDatasette ProjectLLM command-line tool and Python libraryNiche MuseumsGitHub MCP prompt injection exampleHighlights from the Claude 4 system promptAI energy usage tagAI assisted search-based research actually works nowPOSSE: Publish on your own site, syndicate elsewhereBellingcatLawyer cites fake cases invented by ChatGPT, judge is not amused (May 2023)AI hallucination cases databaseSponsor Simon to get his monthly summary newsletterhttps://simonwillison.net/https://www.linkedin.com/in/simonwillisonhttps://datasette.io/
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam
In this episode, I discuss the challenges facing privacy-focused payment solutions like Privacy.com, exploring alternatives and the troubling rise of KYC requirements across the industry. I dive deep into the Switzerland privacy crisis that's forcing Proton to consider relocating their infrastructure, and what this means for encrypted email providers globally. I also cover the catastrophic security failure at Tea, a women's safety app that exposed 72,000 images including government IDs through basic incompetence, leading to harassment campaigns on 4chan.I wrap up with thoughts on vehicle tracking through DCM/Telematics modules, why buying older vehicles might be the better privacy-conscious choice, and how embracing the stoic lifestyle aligns with both privacy and my own philosophical principles.In this week's episode:Privacy.com troubles: Account freezes, limited alternatives, and the KYC nightmareSwitzerland's surveillance crisis: Why Proton is threatening to leave and relocating to Germany/NorwayEmail provider comparison: Proton vs Tutanota vs Atomic Mail, and understanding intelligence alliancesTea app breach: How 72,000 IDs and 1.1 million private messages ended up on 4chanVehicle tracking: DCM modules, telematics, and why your car is spying on youPhilosophy of privacy: Stoicism, minimalism, and why less is moreMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Privacy.com - https://privacy.comCloaked.com - https://cloaked.comProton Warrant Canary - https://protonvpn.com/blog/transparency-report/Climate Activist Arrest - https://proton.me/blog/climate-activist-arrest and https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/Tuta Crypt - https://tuta.com/documents/tuta-crypt-spec.pdfProton elliptic curve cryptography - https://proton.me/blog/elliptic-curve-cryptographySimpleLogin - https://simplelogin.ioHashiCorp Vault - https://www.vaultproject.ioRAM IS SPYING ON YOU (Cozy Living Machine) - https://www.youtube.com/watch?v=0-Y1SUSRqNUMeditations by Marcus Aurelius - https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI“Very little is needed to make a happy life; it is all within yourself, in your way of thinking.”- Marcus Aurelius ★ Support this podcast on Patreon ★
When Open Intelligence Becomes EntertainmentThere was a time when intelligence was secret, locked away in dossiers and government vaults. Today, the cameras never stop. Data streams from satellites, drones, traffic cams, and smartphones. Open Source Intelligence—OSINT—once meant careful analysis of public data. Now it's something else. Intelligence has turned into entertainment. OSINT has become OSENT.Ukraine and Gaza have become live-streamed conflicts. No need for classified reports—just open Twitter, Telegram, TikTok. Drone footage shows tanks erupting. Satellite images reveal troop movements. Civilians post bombed streets. Algorithms boost the shocking, not the true. War looks like a video game. Explosions loop. The audience cheers or scrolls for the next clip.Gaza follows the same script, but with sharper emotions. Images—crying children, collapsing buildings—arrive packaged to provoke outrage or sympathy. Israel curates footage to defend itself; Hamas curates footage to condemn. NGOs, aid workers, journalists—they're part of the drama. Suffering is real, but it's edited, filtered, and fed as content.OSINT was once a tool for accountability. Now it's a genre. After shootings, Reddit sleuths hunt for clues, often ruining lives. True crime podcasts turn open data into serialized dramas. YouTube analysts dissect satellite images for millions. The thrill isn't in facts—it's in the chase.This shift is clear in domestic policing. Body and dash cam footage, often public, fuels an entire content economy. Cop pull-overs, high-speed chases, and arrests rack up millions of views. Audiences watch for adrenaline, not justice. Cops did this decades ago, but now the feed is endless and raw.Crash cams feed the same hunger. Russian dash cams pioneered it—every accident online, every near miss a viral moment. Road rage, four-way stop failures, cars flipping end-over-end—it's bingeable. Crashes, like explosions, need no context. They just need to play.Before TikTok, there was WorldStarHipHop. WorldStar made fights, street chaos, and viral humiliation daily consumption. Violence became shareable; suffering became a spectator sport.Now, Ring cameras bring that ethos to suburbia. Every porch is a set, every delivery a scene. Porch pirates get tackled, Amazon drivers toss packages, neighbors scream. Millions watch Ring compilations. Security becomes entertainment.The difference with OSENT is participation. The audience doesn't just watch; they investigate. They geolocate strikes, identify suspects, connect dots. Sometimes they expose truth. Sometimes they ruin lives. Gamified investigation is addictive. Solving online feels like detective work—until the wrong person goes viral.Platforms love OSENT. YouTube monetizes chases. TikTok pushes Ring footage. Twitter feeds on war clips. Telegram channels collect donations. OSINT may help governments, but OSENT prints cash. And when spectacle is monetized, truth bends. Context disappears. Footage is edited for impact, not accuracy.This is the problem with OSENT: the show never ends. Intelligence used to conclude. OSENT loops. There's always another clip, another explosion, another chase. Wars stream. Crimes trend. Investigations play live.OSINT was meant to reveal truth. OSENT reveals feeling. Gaza bleeds, Ukraine burns, and the world watches—scrolling, sharing, consuming. The suffering is real. The feed is endless.Open-source intelligence has become open-source entertainment.The cameras never stop, the curtain never falls, and the show goes on.
Episode #509 consacré aux dangers de l'OSINT Avec Sylvain Hajri The post Les dangers de l'OSINT appeared first on NoLimitSecu.
In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple's private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint: it's not hackers with Wireshark), and share my approach with aliases.I also cover the rising threat of infostealers like Atomic Info Stealer for macOS, the dangerous intersection of gaming cheats and malware, and why I avoid third-party antivirus software. Most importantly, I address the GrapheneOS controversy: the loss of a senior developer to military conscription, Google's strategic pivot that threatens custom ROMs, and why claims of GrapheneOS “dying” are misinformation spread by those with competing agendas.In this week's episode:Clarifications and Corrections: Public Wi-Fi, MAC addresses, and alias managementMAC address randomization: GrapheneOS vs Apple's implementationThe real threats of public Wi-Fi in 2025Info stealers and video games can be a privacy nightmareGrapheneOS controversy: Developer conscription, Google's lockdown, and the future of custom ROMsWhy antivirus software might be the malware you're trying to avoidMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:MAC Address Lookup - https://maclookup.app/OUI Lookup - https://oui.is/33mail - https://www.33mail.com/OpenSnitch - https://github.com/evilsocket/opensnitchPrivacy.com - https://privacy.comLithic - https://lithic.comKaspersky and Russian Government - https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_governmentGoogle Not Killing AOSP - https://www.androidauthority.com/google-not-killing-aosp-3566882/GrapheneOS on Developer Conscription - https://grapheneos.social/@GrapheneOS/114359660453627718GrapheneOS on OEM Partnerships (June 19) - https://grapheneos.social/@GrapheneOS/114671100848024807GrapheneOS Response to Misinformation - https://grapheneos.social/@GrapheneOS/114825492698412916GrapheneOS on iPhone Security - https://grapheneos.social/@GrapheneOS/114824816120139544“Social engineering bypasses all technologies, including firewalls.”- Kevin Mitnick ★ Support this podcast on Patreon ★
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про звільнення Умєрова з Міноборони та Шмигаля як нового міністра, приєднання Міністерства стратегічної промисловості до МО, ефективність Мадяра як керівника Сил безпілотних систем та ситуацію на Сумському та Покровському напрямкахВедучий – Олексій Тарасов
Stefano Ritondale is the Chief Intelligence Officer for Artorias, an Open Source Intellligence Company that provides AI and analyist driven bespoke OSINT to private companies, government, as well as the average citizen. Artorias has launched thier OSINT app, SitRep available for both Apple and Android users that provides open source intel that you can curate to your specific interests and costs only 9.99 per month. As I've said in the past, they have democratized OSINT. In this episode we get in to Stefano's area of expertise, Mexican Cartels, and he is a wealth of knowledge. Stefano's ability to connect the dots of the Cartels is mind boggling and fascinating. You can find more on Artorias here https://www.artorias.com You can find their app SitRep here https://sitrep.artorias.com You can find this shows sponsor RallyPointST here https://rallypointst.com You can find Absolute Security and Lock here http://absolutesecurityandlock.com You can find this shows website here https://www.thedistinguishedsavage.com The views, information, and opinions expressed in this podcast are solely those of the host and guest speakers and do not necessarily represent those of any associated organizations, employers, or sponsors. The opinions and views shared do not reflect the positions of our sponsors or their affiliated companies. This podcast is for entertainment and informational purposes only and should not be considered professional advice in any field including but not limited to legal, medical, financial, or technical matters. All content is provided "as is" without warranties of any kind. We make reasonable efforts to ensure accuracy but cannot guarantee that all information presented is correct, complete, or up-to-date. Listeners should verify any critical information independently. Guest opinions belong to them alone. Our interviews with various individuals do not constitute endorsement of their views, products, or services. By listening to this podcast, you agree that we are not responsible for any decisions you make based on the information provided. Please consult with qualified professionals before making important decisions related to your health, finances, or legal matters. This podcast may contain explicit language or mature themes. Listener discretion is advised. © 2025 The Distinguished Savage, Savage Concepts LLC
Open-source intelligence, or OSINT, has reached an inflection point in the IC. Several agencies in recent years have published strategies aimed at better harnessing OSINT. Now, they're embarking on new initiatives to improve data collection and management, train the workforce, and share best practices across the community. But a multitude of challenges remain, including skills gaps, data siloes, bureaucratic and cultural barriers, funding challenges, and more.Recently, I brought together a panel of experts to debate and discuss the past, present and future of OSINT in the intelligence community. The guests on this episode are:David Gauthier, the chief strategy officer for CXO, and the visiting fellow at the National Security Institute and former director of commercial operations at the National Geospatial-Intelligence AgencyEllen McCarthy, the CEO of the Trust in Media Cooperative, and former assistant secretary of state for the bureau of intelligence and researchChip Usher, the senior director for intelligence at the Special Competitive Studies Project, and a former CIA executiveEliot Jardines, the founder and director of the OSINT Foundation, and former assistant deputy director of national intelligence for open sourceSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick's 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks & Spencer through social engineering.I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.In this week's episode:Ghost in the Source Capture the Flag challenge resultsThe military mindset problem in cybersecurityStrategic use of public Wi-Fi for account creation and privacy techniquesData curation tactics, and “Minimizing What Can Be Known”Invisible surveillance net and Stingray devicesGrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architectureMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Noam Chomsky on Internet Privacyhttps://www.youtube.com/watch?v=QIWsTMcBrjQNoam Chomsky on Advertising - https://www.youtube.com/watch?v=PfIwUlY44CMTryHackMe Platform - https://tryhackme.comHack the Box - https://hackthebox.comWired Article on DNC Stingray Surveillance - https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/IntelTechniques Data Removal Guide - https://inteltechniques.com/workbook.htmlOptery Data Broker Removal - https://optery.comGraphene OS - https://grapheneos.org“We're dragons. We're not supposed to live by other people's rules.”- Hajime Ryudo ★ Support this podcast on Patreon ★
In part two of this podcast, Jim Clover OBE, Varadius Ltd, continues to uncover the evolving landscape of artificial intelligence (AI) in the intelligence community with Harry Kemsley and Sean Corbett. They discuss the fine line between the innovative applications of AI and the critical importance of human oversight in intelligence analysis. Explore how AI is reshaping intelligence gathering, the risks of over reliance on technology, and the vital role of ‘prompt engineering' for accurate and ethical outcomes.
No Medics, No Press, No Mercy: Modern War Doesn't Believe You Anymore In theory, war has rules: press badges, medics, the Red Cross, the Geneva Conventions. But in practice—on the battlefield, on the street, or online—those protections are myths, not shields. And in 2025, no one in uniform truly believes in neutrality anymore.Whether in Gaza, Fallujah, or downtown Los Angeles, one reality has taken hold:Everyone is a combatant until cleared.Talk to JSOC operators, riot cops, drone pilots, or soldiers who've served in asymmetric warzones, and you'll hear it without hesitation. Journalists, NGOs, charity workers, even medics—all are potential threats. Open-source intelligence (OSINT) has made everyone's digital footprint an operational asset. What you post online can—and does—get you profiled in the field.A close friend of mine, a DIA interrogator embedded with a JSOC Little Bird unit in Iraq, once said it straight:“The vest doesn't protect you—it flags you for vetting.”And if you're wearing a vest labeled “PRESS” but tweeting like an activist? You're not neutral. You're narrative. And in modern conflict, narrative is firepower.No place illustrates this breakdown like Gaza. A population half under 18, with mosques doubling as command centers, apartment buildings as launchpads, and schools as arms caches. This doesn't mean every Gazan is a militant—but no soldier in the field can afford to assume they're not.That's not a moral judgment. It's a tactical one.The same logic applied in Vietnam, where children strapped bombs to their chests. It applied in Iraq, Afghanistan, Chechnya, and Kosovo. And it applies in America too—where during the George Floyd protests, even medics and credentialed journalists were shot, tear-gassed, tackled. Not because they were mistaken, but because they were no longer presumed neutral.Here's a harder question no one wants to ask:If a population is truly oppressed, where's the resistance?In occupied France, the Resistance bombed train tracks, assassinated collaborators, and ran sabotage cells. In Vietnam, even old women ran courier networks. But in Gaza? If Hamas is so hated, where are the Gazans fragging their commanders? Where are the defections, the bombings of Hamas arms depots, the assassinations from within?Silence can mean fear. Or it can mean complicity. Or something in between—Stockholm, survival, or shared ideology.In the U.S., we talk about “civilians” as if the distinction still means something. But with over 400 million privately owned firearms and tens of millions ideologically radicalized online, let's be honest: If America were ever invaded, “civilians” would become insurgents by nightfall.That's the world we live in now. There are no neutral NGOs. No unarmed narratives. No protected identities. Only signal and threat.The 20th century gave us the myth of the sacred civilian.The 21st gave us livestreams, hashtags, and high-velocity optics.And in that world, no medic, no press, no mercy. You are what your feed says you are.
The CIA, like other agencines in the intelligence community, is exploring how AI can boost its mission on both the human and open-source intelligence domains. As head of the open source enterprise for the CIA's Directorate of Digital Innovation, Kevin Carlson is helping usher in AI for the OSINT mission set. During a recent interview on the sidelines of the Special Competitive Studies Project's AI+ Expo, Carlson shared the potential for AI in open-source intelligence, how the CIA is looking to operationalize AI, the impact of the technology on the CIA workforce, and much more. U.S. Cyber Command played a role in American military's operation against Iranian nuclear facilities over the weekend, according to top Pentagon officials. Gen. Dan Caine, chairman of the Joint Chiefs of Staff, told reporters in a briefing at the Pentagon Sunday morning that, “The strike package was supported by U.S. Strategic Command, U.S. Transportation Command, U.S. Cyber Command, U.S. Space Command, U.S. Space Force and U.S. European command,” later thanking the cyber operators, among others, who made the mission possible. However, no further details about Cybercom's efforts were disclosed. The command referred DefenseScoop to the Pentagon for comment, where a spokesperson said they had nothing further to provide at this time beyond the transcript from Sunday's press conference. Although details about Cybercom's assistance for Operation Midnight Hammer, the code name for the strikes, remain murky, experts — most of whom spoke to DefenseScoop on condition of anonymity — outlined a number of possibilities for how the organization may have contributed to the effort. As the Army seeks to continue its transformation effort to become more efficient, the department's chief information officer is looking to streamline systems and processes. And no longer will “that's the way it's always been done” be an acceptable justification for maintaining the status quo. There have been directives from top levels of Army leadership to cut down on business systems and automate capabilities where possible. CIO Leonel Garciga said last week at an industry event that there's a big push right now from the secretary and the chief of staff to question: “do we need all of these systems, why do we have them?” calling some of it really old. Unveiled at the end of April, the Army Transformation Initiative is a top-down effort to improve how the service operates by shrinking headquarters elements, becoming leaner, slashing programs that aren't efficient and changing how money is spent. The goal is to cut obsolete programs and systems that don't contribute to success on the modern battlefield. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
While Artificial Intelligence AI is not a new phenomenon, its use in the gathering of intelligence and the amount of AI tools available are growing at pace. In part one of this podcast Harry Kemsley and Sean Corbett are joined by Jim Clover OBE, Varadius Ltd, to take a deeper look into the practical uses and implications of AI for the defence intelligence community. They explore its real-world effectiveness in gathering and analysing intelligence and also why human oversight is still critical to ensure the intelligence it is producing is both ethical and valuable.
Today on Moment of Zen, we're airing a conversation with economist Noah Smith and Substack CEO Chris Best discussing the evolving media landscape. They dive into whether Twitter's dominance is waning, what features a successor platform would need, and how artificial intelligence is set to transform media as we know it. This conversation originally took place live on Noah's Substack: https://www.noahpinion.blog/ --
In this episode, I discuss three key strategies for maintaining privacy and security across your physical mailbox, email, and phone. I discuss the growing Matrix community, explore alternative mailing solutions using co-working spaces, detail a four-tier email strategy, and examine the concerning spread of Flock ALPR cameras. I also share insights on anonymous eSIM options and answer listener questions about dealing with Know-Your-Customer requirements.In this week's episode:Joining the Matrix community with ElementPhysical mailbox strategies: UPS stores, virtual CMRA addresses, and co-working spacesFour-tiered email approach using ProtonMail, Fastmail, SimpleLogin, and Gmail sock puppetMobile phone privacy with Mint Mobile and anonymous eSIM optionsThe Flock ALPR camera threat and how to protect yourselfListener questions: Australian SIM card strategies with KYC requirementsCapture the Flag challenge details for June 21stMatrix Community RoomsIt seems on Element X, it doesn't list the rooms associated with the Matrix space, so you can click on each of these links to join the rooms:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Matrix Clients - https://matrix.org/clientsMatrix Community - https://matrix.to/#/#psysecure:matrix.orgSmarty Address Lookup - https://www.smarty.com/products/single-addressExpired Domains - https://www.expireddomains.net/Stealths.net (Anonymous eSIMs) - https://stealths.net/DeFlock.me (ALPR Camera Map) - https://deflock.me/Flock Safety Privacy Policy - https://www.flocksafety.com/privacy-policyEFF Article on DeFlock - https://www.eff.org/deeplinks/2025/02/anti-surveillance-mapmaker-refuses-flock-safetys-cease-and-desist-demandCTF Challenge Rules - https://psysecure.com/ctf“Imagine this situation where we have the huge electronic intercommunication so that everybody is in touch with everybody else in such a way that it reveals their inmost thoughts, and there is no longer any individuality. No privacy. Everything you are, everything you think, is revealed to everyone.”- “Future of Communications” Alan WattsOfficial Website: https://psysecure.comPodcast music: The R3cluse ★ Support this podcast on Patreon ★
Analyst Talk - Open Secrets - Don't Just Trust AI, Always Verify Episode: 00271 Released on June 16, 2025 Description: In this third installment of the Open Secrets series on Analyst Talk with Jason Elder, expert Jan Mondale discusses the evolving intersection of open-source intelligence (OSINT) and artificial intelligence. From personal experiences using AI tools like ChatGPT for medical research to broader implications for law enforcement analysts, Jan and Jason explore the power and pitfalls of integrating large language models into investigative workflows. Jan emphasizes the timeless importance of critical thinking, source validation, and ethical use—whether you're verifying a suspect's address or navigating the risks of misinformation. They also touch on AI's role in cybersecurity, translation, threat detection, and even the risks posed by overly trusting social media. Key topics include: Verifying AI-generated information How OSINT and AI compare in investigative reliability AI's utility in law enforcement and cyber threat analysis Why analysts must remain smarter than the tools they use Whether you're AI-curious or a seasoned OSINT pro, this episode challenges you to think deeper about the tools at your disposal—and how to use them wisely. [Note: Description produced by ChatGPT.] Related Links: Jan's Notes: https://mcdn.podbean.com/mf/web/n6y2qvnkk64sebvt/OpenSecretsOSINTandAIJansNotes.pdf https://static.semrush.com/blog/uploads/media/ea/34/ea34afd0390da60dc82700c472f7d527/YIbvIN7lhZP6JJGSQvPgPmD5rSJ5H85yTxW30vNlkkwh952w5VjeLOfFIk2dVpPewO6fGCV5HN05reZF3jNikXjVpepl6xxHHE_RSRRXgnkqNp9bw-cNRn0ztDSy9XSw_a3GY-dIWlkUjpUYRBk8WZo.webp https://ignitevisibility.com/how-is-bing-seo-different-than-google-seo/ Association(s) Mentioned: Vendor(s) Mentioned: Contact: https://www.linkedin.com/in/janmondale/ Transcript: https://mcdn.podbean.com/mf/web/8mrsbshuzfvcnmmx/OpenSecrets03_transcript.pdf Podcast Writer: Podcast Researcher: Theme Song: Written and Recorded by The Rough & Tumble. Find more of their music at www.theroughandtumble.com. Logo: Designed by Kyle McMullen. Please visit www.moderntype.com for any printable business forms and planners. Podcast Email: leapodcasts@gmail.com Podcast Webpage: www.leapodcasts.com Podcast Twitter: @leapodcasts
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Brian Hein and Kristen Dalton, with Silobreaker. Brian presently serves as a Senior Strategic Advisor, and Kristen is the Director, Channel Sales.In the podcast we discuss:Brian and Kristen's personal and professional backgrounds (did you know one of them played in two NCAA women's basketball tournaments? And it wasn't the guy known as “The Paul Revere of Cybersecurity.“).Silobreaker, OSINT and making intel useful.Threats, challenges and mitigating risks.The power of communities, collaboration, and making connections (and of course, ISACs!).We play 3 Questions! And talk about some of our favorite places, growing up on the internet, and pork chops.Lots more!
In this episode, I discuss breaking free from the Apple ecosystem, the dangers of social media oversharing, and introduce our new Matrix community. I also cover the upcoming capture the flag challenge, share thoughts on the OSINT Defense & Security Framework progress, and rant about security theater at airports and online services that block VPNs.In this week's episode:Apple's $95 million lawsuit and the ecosystem lock-in problemWhy people overshare on social media and how OSINT can exploit itIntroduction to the Matrix communityCapture the Flag challenge launching June 21st!Progress update on the OSINT Defense & Security Framework (ODSF)Security theater: VPN blocking and other pointless security measuresAlternative YouTube clients for privacy (GrayJay and NewPipe)Show Links:Matrix Community - https://matrix.to/#/#psysecure:matrix.orgCTF Challenge - https://psysecure.com/ctfGrayJay (by Futo) - https://grayjay.appNewPipe - https://newpipe.netWiFi Pineapple - https://shop.hak5.org/products/wifi-pineappleSystem76 Laptops - https://system76.com/laptopsLittle Snitch (macOS Firewall) - https://www.obdev.at/products/littlesnitch/“I hope for nothing. I fear nothing. I am free.”- Nikos KazantzakisOfficial Website: https://psysecure.com Podcast music: The R3cluse
Register for Free, Live webcasts & summits:https://poweredbybhis.com00:00 - PreShow Banter™ — natural MSG05:31 - Victoria's Secrets are Compromised - Talkin' Bout [infosec] News 2025-06-0206:31 - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels08:36 - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend09:41 - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live10:48 - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns15:55 - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online20:28 - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents21:02 - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube)26:55 - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot27:27 - Story # 4b: Reeves confirms 15% cut to Civil Service running costs29:29 - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted31:28 - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.35:34 - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers36:19 - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info40:12 - Story # 8: Victoria's Secret takes down website after security incident45:43 - Story # 9: Microsoft and CrowdStrike partner to link hacking group names46:59 - Story # 10: Zscaler Acquisition of Red Canary49:57 - Story # 11: Most of CISA's senior leaders are leaving the agency51:22 - Story # 12: Telegram announces partnership with Musk's xAI51:32 - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про перестановки у Генштабі, Сухаревського, Мадяра, Драпатого та наступ росіян у Сумській областіВедучий – Олексій Тарасов
Send us a textIsrael is fighting two wars: one on the battlefield—and one in the headlines. In this explosive episode, Eylon Levy is joined by Israeli-American OSINT sleuth Eitan Fischberger, who breaks down how Hamas has manipulated the global media narrative through lies, disguises, and infiltration.Fischberger, who rocketed from 2,000 to over 40,000 Twitter followers since October 7, reveals:• How open-source evidence shows Gaza “journalists” moonlighting as Hamas commanders • The Hamas-run media training programs feeding footage to Al Jazeera and CNN • The shocking case of a hospital director exposed as a Hamas colonel • Why the IDF's failure to communicate evidence is costing Israel the information war • Why major news outlets refuse to admit they've been duped by terroristsWatch how one man's keyboard is doing the work of an army—and why the West's naïveté is Hamas's greatest weapon.
Technology is a double-edged sword. It can empower us, connect us, and solve problems, but it can also be used to exploit, manipulate, and harm. When it comes to protecting children online, that line gets especially thin. Digital forensics, AI-powered image classification, and global law enforcement collaboration are now essential tools for keeping families safe in a world that moves faster than most of us can keep up. Debbie Garner knows this world intimately. She's a retired Special Agent in charge with the Georgia Bureau of Investigation and former commander of the state's Internet Crimes Against Children Task Force. For years she led efforts to track down online predators and bring justice to survivors. These days she's working in the private sector, serving on the boards of Raven and Revere Technologies, pushing for smarter tech solutions and stronger training to support those still on the front lines. In this episode we talk about the growing problem of online child exploitation, the reality of underfunded cybercrime units and the ways technology is being used to fight back. Whether you're a parent, an educator or just someone who cares about kids online, you need to hear this. Show Notes: [00:58] Debbie shares her law enforcement background over 30 years. She even worked undercover buying crack! [02:19] She spent the last 8 years of her career as the Supervisor Special Agent in charge of GBI's Child Exploitation and Computer Crimes Unit. [02:45] Now that she's retired from law enforcement, she works in the private sector with technology companies. [05:36] It's become her passion, even in retirement, to help those who are victims of exploitation. [07:09] Most children are victimized by someone they know. There's also plenty of predators online. [08:55] There are multiple organizations that work on child exploitation investigations. [10:53] People in law enforcement do tend to prioritize these types of crimes. [12:12] We talk about how the investigations begin. [13:53] Cases have increased from 2400 tips a year to over 30,000. [15:17] There's never enough technology to keep up with the increase. [16:41] RAVEN is a lobbying group to request additional funding from Congress. [18:33] With over 30,000 tips last year Georgia made over 450 arrests. [22:13] There's now technology that will help find CSAM on phones. There are also some amazing investigations on the dark web. [25:15] OSINT is helping investigate and it's a collaborative community. [27:55] Channels to report exploitation. Start with the platform, then National Center for Missing and Exploited Children, and law enforcement. [31:34] Don't put images on the internet. Websites like Take It Down can help with images of underage people and Take It Down can help adults. [33:43] Always mention if the person is underage when you make a report. [34:10] Talk to your kids and start early with age appropriate conversations about CSAM. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Debbie Garner - LinkedIn Debbie@Hexordia.com The Innocent Justice Foundation Child Exploitation And Computer Crimes Unit National Center for Missing and Exploited Children StopNCII.org Take It Down
Five years after their first episode of the World of Intelligence podcast, Kate Cox, director of Janes RD&A Strategic Programmes, turns the table on Harry Kemsley and Sean Corbett to uncover the origins of the podcast and how it has evolved alongside the prominence of OSINT for intelligence analysis, and to offer a glimpse into the future of intelligence.
Eliana Johns hunts for nuclear weapons. She's a senior research associate at the Federation of American Scientists, where her team uses open-source intelligence — or OSINT — to uncover secrets about countries' nuclear capabilities and intentions. In fact, much of what we know today about China's nuclear arsenal comes from her colleagues' work, which used commercial satellite imagery to reveal that China is undertaking a massive nuclear buildup — at a pace far exceeding publicly available estimates from U.S. intelligence agencies. In our conversation, Johns explains where OSINT has worked best and why greater transparency around nuclear weapons is essential for a more stable and peaceful world. We recorded this live at the Carnegie International Nuclear Policy Conference.
This episode is brought to you by Extreme Networks, the company radically improving customer experiences with AI-powered automation for networking.Extreme is driving the convergence of AI, networking, and security to transform the way businesses connect and protect their networks, delivering faster performance, stronger security, and a seamless user experience. Visit https://www.extremenetworks.com/ to learn more. In this episode of Eye on AI, we sit down with Ivan Shkvarun, CEO of Social Links and founder of the Dark Side AI Initiative, to uncover how cybercriminals are leveraging generative AI to orchestrate fraud, deepfakes, and large-scale digital attacks—often with just a few lines of code. Ivan shares how his team is building real-time OSINT (Open Source Intelligence) tools to help governments, enterprises, and law enforcement fight back. From dark web monitoring to ethical AI frameworks, we explore what it takes to protect the digital world from the next wave of AI-powered crime. Whether you're in tech, cybersecurity, or policy—this conversation is a wake-up call. AGNTCY - Unlock agents at scale with an open Internet of Agents. Visit https://agntcy.org/ and add your support. From cybersecurity to law enforcement — discover how Social Links brings the full potential of OSINT to your team at http://bit.ly/44sytzk Stay Updated: Craig Smith on X:https://x.com/craigss Eye on A.I. on X: https://x.com/EyeOn_AI (00:00) Preview (02:11) Meet Ivan Shkvarun & Social Links (03:41) Launching the Dark Side AI Initiative (05:16) What OSINT Actually Means Today (08:39) How Law Enforcement Trace Digital Footprints (12:50) Connecting Surface Web to Darknet (16:12) OSINT Methodology in Action (20:23) Why Most Companies Waste Their Own Data (21:09) Cybersecurity Threats Beyond the IT Department (26:25) BrightSide AI vs. DarkSide AI (30:10) Should AI-Generated Content Be Labeled? (31:26) Why We Can't “Stop” AI (35:37) Why AI-Driven Fraud Is Exploding (41:39) The Reality of Criminal Syndicates
The National Security Hour with Blanquita Cullum – Join host Blanquita Cullum and OSINT specialist Jason Sullivan as they explore the shifting landscape of truth, uncovering how events can be covered or concealed. Learn to navigate misinformation, verify forensic data trails, and question who shapes reality—from assassination plots to election fallout. Discover the tools to prove genuine facts.
We review the recent spate of local elections that has everybody deciding retroactively that the Labour Party was always full of dangerous liars who could not be trusted to govern the country - if only someone had figured this out sooner. To start, though, we also look at the spate of religious and spiritual experiences people are attributing to AI, and Riley updates his favourite little bit of OSINT. Get more TF episodes each week by subscribing to our Patreon here! *MILO ALERT* Check out Milo's tour dates here: https://miloedwards.co.uk/live-shows *TF LIVE ALERT* We'll be performing at the Big Fat Festival hosted by Big Belly Comedy on Saturday, 21st June! You can get tickets for that here! Trashfuture are: Riley (@raaleh), Milo (@Milo_Edwards), Hussein (@HKesvani), Nate (@inthesedeserts), and November (@postoctobrist)
Ralph welcomes back Erica Payne, founder of Patriotic Millionaires, to update us on that group's latest efforts to save American democracy by lobbying to raise wages for workers and tax the rich. Plus, according to our resident constitutional expert, Bruce Fein, the count of Trump's impeachable offenses is now up to twenty-two and rising faster than a Space X rocket.Erica Payne is the founder and president of Patriotic Millionaires, an organization of high-net-worth individuals that aims to restructure America's political economy to suit the needs of all Americans. Their work includes advocating for a highly progressive tax system, a livable minimum wage, and equal political representation for all citizens. She is the co-author, with Morris Pearl, of Tax the Rich: How Lies, Loopholes and Lobbyists Make the Rich Even Richer.What we saw on January 20th, I believe, was the result of a global oligarchical coup who just took the Queen on the chessboard. When you've got three people whose combined worth is around a trillion dollars standing behind who is an unethical at least, criminal at worst billionaire president, Houston, we have a problem here. And the problem is not actually Donald Trump. The problem is the preconditions that led to the rise of a vulnerability to an authoritarian leader and an oligarchy. And that vulnerability was brought about by the actions of both parties over decades.Erica PayneIf you ran a business, Ralph, would you ever fire your accounts receivable department? No. It would be the last department you would cut. So then it says he's either stupid because that's what he's cutting, which I think is probably inaccurate. So if he's not stupid, then why is he doing it? And he's doing it for the same reason that lawmakers have hacked at the IRS budget forever—they don't want their donors to get taxed. They don't want their donors to be audited. And so they cut the cops. So all these folks who are griping about black Americans calling to defund the police are actually defunding the police that is keeping them in line and keeping them honest.Erica PayneAt a divided moment in America, I think we can agree that the federal government shouldn't tax people into poverty, and (to the extent necessary) rich people should pick up the difference.Erica PayneBruce Fein is a Constitutional scholar and an expert on international law. Mr. Fein was Associate Deputy Attorney General under Ronald Reagan and he is the author of Constitutional Peril: The Life and Death Struggle for Our Constitution and Democracy, and American Empire: Before the Fall.I start out with the fundamental idea of due process—you simply cannot deprive someone of liberty without giving them an opportunity to explain or to refute what allegations the government has made. And the reason why I start out with that, Ralph, is we've had an experiment in World War II with what happens when you have no due process. We did that with 120,000 Japanese Americans. No, we just said that they're all likely to commit espionage or sabotage, got to put them in concentration camps. We made 120,000 errors (and later apologized for it in 1988). So there's a reason due process is not simply an academic concept. It's essential to preventing these kinds of egregious instances of injustice from happening.Bruce FeinThe Democrats and a lot of liberal economists are not keeping up with the horror show that's going on. They don't use words like cruel and vicious. They don't turn Trump's words like deranged, crazed, corrupt on him. They're still using words like authoritarian practices, or problematic, or distressing, or disconcerting, or concerning. They're not catching up with the horror show here. That's why Trump continues to have a soliloquy. The Democratic Party is now having gatherings to see how are they going to collectively deal with Trump? How does a bank deal with a bank robber? They let the bank robber rob the bank and flee with the gold while they deliberate how they're going to deal with a bank robber they see coming into the bank?Ralph NaderNews 5/2/251. At the eleventh hour, Representative Jim Jordan – Chair of the House Judiciary Committee – pulled his measure to strip the Federal Trade Commission of its antitrust enforcement powers and consolidate those within the Justice Department, Reuters reports. “The House panel…had included the proposal in its budget package on Monday. During a hearing on the package…the committee passed an amendment that would remove the measure.” Trump's FTC Chairman Andrew Ferguson opposed Jordan's move and intervened with the White House. As Reuters notes, “The proposal mirrored the One Agency Act, a Republican bill that has gotten support from Elon Musk…[which] would effectively repeal the FTC's...authority to sue companies over unfair methods of competition, which the agency is using in cases against pharmacy benefit managers, Amazon…and John Deere.” In short, the FTC's antitrust powers survive today, but there is no guarantee about tomorrow.2. Yet, while avoiding the worst possible outcome on the corporate crime front, the Trump administration is still hard at work going soft on corporate crooks. Public Citizen's Rick Claypool reports “Two Wells Fargo execs had their fines reduced by 90% (related to the bank's accounting scandal) by Trump's [Office of the Comptroller of the Currency].” Claypool links to a piece in Radical Compliance, which explains that “David Julian, former chief auditor at Wells Fargo, saw his fines cut from $7 million to $100,000 [and] Paul McLinko, executive audit director, had his fines cut from $1.5 million to $50,000.” Both Julian and McLinko were part of the senior leadership team at Wells Fargo in the 2010s, when regulators “charged the bank with turning a blind eye to employees opening bank accounts without customer consent to hit sales quotas. That misconduct eventually led to a $3 billion settlement with Wells Fargo in 2020.”3. Lest you think the Democrats are in danger of seriously opposing Trump's policies, the Bulwark reports that House Minority Leader Hakeem Jeffries is putting the kibosh on the recent spate of Democrats' trips to El Salvador exposing the reality of the CECOT deportation scheme. This report alleges that “Cory Booker and the Hispanic Caucus were planning on going [to El Salvador],” but are no longer. Perhaps worse, Jeffries is not giving clear marching orders to the party rank and file. One Democrat is quoted saying “As a member of a party you need to be disciplined…They say, ‘Get on a plane,' ‘Don't get on a plane'—that's what you do. Nine out ten times you do what they ask. But you can't take that approach if you're not having regular communications… You have to be clear in messaging what the plan is and you have to do that regularly if you want to keep people in line.” This is just another example of Jeffries' weak and indecisive leadership of the caucus.4. Advocates are having more luck resisting the administration's overreach in court. On Wednesday, Mohsen Mahdawi – the Columbia student faced with deportation after being lured into an ICE trap with the false promise of a citizenship test – was freed by a federal judge, POLITICO reports. After the judge ordered his release, Mahdawi told the press “I am saying it clear and loud…To President Trump and his Cabinet: I am not afraid of you.” Mahdawi's ordeal is not over, but he will remain free while his case winds its way through the courts and a previous order blocked the administration from changing venues, meaning the case will proceed in the relatively liberal Second Circuit.5. Mahmoud Khalil also scored a major legal victory this week. The Huffington Post reports that the ICE agents sent to arrest Khalil did not, contrary to their false claims in court, have an arrest warrant. Amy Greer, a lawyer for Khalil, is quoted saying “Today, we now know why [the government] never showed Mahmoud [a] warrant — they didn't have one. This is clearly yet another desperate attempt by the Trump administration to justify its unlawful arrest and detention of human rights defender Mahmoud Khalil, who is now, by the government's own tacit admission, a political prisoner of the United States.” The ACLU, also defending Khalil, has now moved for this case to be dismissed.6. Despite these victories though, the repression of anything pro-Palestine continues. At Yale, Prem Thakker reports hundreds of students protested in advance of a speech by Itamar Ben-Gvir, Israel's radical National Security Minister who has previously been arrested many times for inciting racism and supporting pro-Jewish terrorism in Israel itself. Yet the university responded by “stripp[ing] the school's Students for Justice in Palestine Chapter…of its status as an official student group.” If students cannot even protest Ben-Gvir, what will the colleges regard as legitimate protest of Israel?7. In Yemen, Ryan Grim reports on CounterPoints that the Trump administration has been targeting strikes against the Houthis using data gleaned from amateur Open-Source Intelligence or OSINT accounts on X, formerly Twitter. Unsurprisingly, these are completely inaccurate and have led to disastrous strikes on civilians' homes, incorrectly identifying them as “Houthi bases.” One of these accounts is based in Houston, Texas, and another as far away as the Netherlands.8. According to a new World Bank report, Mexico reduced poverty more than any other Latin American country between 2018 and 2023. Not coincidentally, this lines up almost perfectly with the AMLO years in Mexico, which saw a massive increase in the Mexican minimum wage along with other social rights and protections. These policies are now being taken forward by AMLO's successor Claudia Sheinbaum, whose popularity has now surpassed even that of her predecessor, per Bloomberg.9. In Australia, Virginia Giuffre – the most outspoken accuser of Jeffrey Epstein and Ghislane Maxwell – has passed away at the age of 41, the BBC reports. Police concluded that Ms. Giuffre died by suicide and her family released a statement indicating that the “toll of abuse... became unbearable.” Yet, her death was preceded by a bizarre chain of events. On March 31st, the BBC reported that Ms. Giuffre's car collided with a school bus, sending her into renal failure with her doctors saying she had “four days to live.” The Miami Herald also reported “At the time of her death, Giuffre had been in a contentious divorce and child custody battle with her husband, Robert.” The family's statement continued “The death is being investigated by Major Crime detectives; [but] early indication is the death is not suspicious.” One can only hope more details come to light.10. Finally, in a different kind of bizarre story, embattled incumbent New York City Mayor Eric Adams – who has already given up on the Democratic primary and was running for reelection as an independent – will now appear on two new ballot lines “EndAntiSemitism” and “Safe&Affordable,” POLITICO reports. Adams has gone to great lengths to cultivate and maintain his support in the Orthodox Jewish community in New York and is seeking to highlight his strengths and undercut former Governor Andrew Cuomo. Apparently, Adams only needs to secure 3,750 signatures from voters by May 27 for each of these ballot lines, a shockingly low threshold for the largest city in America. These ballot lines will appear without spaces, coming in just under the wire for the city's 15-character limit on ballot lines.This has been Francesco DeSantis, with In Case You Haven't Heard. Get full access to Ralph Nader Radio Hour at www.ralphnaderradiohour.com/subscribe
We've got a veritable smörgåsbord for you this week on The Europeans, from human rights in Hungary to the sorry tale of two Danish sustainability influencers whose eco-resort business went spectacularly wrong. We discuss why Viktor Orbán is concentrating so much effort on bullying the LGBTQI community at a time when Hungary has major problems to fix, and whether anything can be done to stop him. Plus, Daria Verbytska calls in from Kyiv to explain how an army of volunteer online sleuths helps Ukrainian authorities use open-source intelligence to fight back against Russia. Daria is the executive director and cofounder of the Molfar Intelligence Institute. You can find out about Molfar on their website and read their investigations here. This week's Inspiration Station offerings: LA NIÑA and Den stora älgvandringen ('The Great Moose Migration' on Sweden's STV). Thanks for listening. If you enjoy our podcasts, we'd love it if you'd consider supporting our work. You can chip in to help us cover the weekly research and production of The Europeans at patreon.com/europeanspodcast (many currencies are available), or gift a donation to a super fan here. We'd also love it if you could tell two friends about this podcast! Other resources for this episode 'Hungary's ban on Pride has little to do with being gay' - BalkanInsight, March 27, 2025 https://balkaninsight.com/2025/03/27/hungarys-ban-on-pride-has-little-to-do-with-being-gay/ 'Anti-spying phone pouches offered to EU lawmakers for trip to Hungary' - Politico Europe, April 16, 2025 https://www.politico.eu/article/lawmakers-offered-anti-espionage-phone-pouches-in-hungary/ 00:00:46 Welcome to Europe, land of toxic eggs and tomatoes 00:06:50 Bad Week: Hungary gives constitutional backing to its Pride ban 00:22:59 Good Week (?) for Guatemala-bound tourists 00:44:51 Interview: Daria Verbytska on how OSINT is being used to help Ukraine's fightback against Russia 00:59:55 The Inspiration Station: LA NIÑA and Den stora älgvandringen ('The Great Moose Migration') 01:03:07 Happy Ending: The amazing cross-border teenagers tackling antibiotic resistance Producers: Morgan Childs and Wojciech Oleksiak Mixing and mastering: Wojciech Oleksiak Music: Jim Barne and Mariska Martina YouTube | Bluesky | Instagram | Mastodon | hello@europeanspodcast.com