POPULARITY
Categories
Join us behind the scenes at one of Sweden's most beloved cyber security conferences, SEC-T in Stockholm!Recorded live on site, this episode captures small but powerful conversations with international speakers, organisers and the founders of SEC-T. We got to meet some of the speakers directly after their talks on stage:Yuri – Cyber Defense under Fire: Strategic Insights from Ukraine's FrontlineAnton Linné – I Know Who Your Users Are – Abusing User Enumeration for OSINT and Bug BountyDan Tentler “Wes” – How to Bug Hotel Rooms v2.0Emerson Tan – part of the SEC-T staff teamMichal Kaput – Gotcha! How to Track Down a Drone Operator in the Heart of WarIgnacio Navarro – Oops, I Hacked It Again – Tales and DisclosuresFredrik Sandström – Build Your First Threat Emulation Plan...to ask them some key questions including:“What's the biggest challenge in cybersecurity right now?”And that's not all!We also welcomed two of the original founders of SEC-T, Mattias Bååth and Thomas Olofsson, to our cybercorner for a conversation about how it all started, what keeps the spirit of SEC-T alive, and the magic of bringing the international hacker community together.So grab your headphones, and join us behind the scenes of SEC-T!(Want to see the full talks? Check them out at sec-t.org) Hosted on Acast. See acast.com/privacy for more information.
AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
AI Daily Rundown: October 31, 2025:Welcome to AI Unraveled, Your daily briefing on the real world business impact of AIListen at https://podcasts.apple.com/us/podcast/ai-daily-news-rundown-amazon-ceo-says-layoffs-were/id1684415169?i=1000734511393In Today's edition:
Seit August fliegen Kamikazedrohnen gezielt in Ölraffinerien in Russland. Die Ukraine trifft – doch längst nicht so oft, wie sie möchte. In dieser Folge erklärt der Datenjournalist Simon Huwiler, welche Wirkung auf Russlands Wirtschaft und Bevölkerung diese Angriffe haben und welche Strategie die Ukraine damit verfolgt.
Has “A House of Dynamite” popped up on your Netflix? Our staff got the chance to see it early in theaters and decided to break down what this film gets right (and wrong) about the nuclear weapons complex and what we hope people will take away from it. Host and Communications Associate Farah Sonde is joined by Senior Policy Director John Erath, Research Analyst Connor Murray and Communications Director Anna Schumann in this special Nukes of Hazard roundtable. Music from www.bensound.com Show Notes - More analysis from us on “A House of Dynamite”: https://armscontrolcenter.org/a-house-of-dynamite/ Check out our podcast episode on OSINT (open-source intelligence) collection: https://soundcloud.com/cacnp/how-open-source-intelligence-can-unlock-nuclear-secrets Check out our podcast episode on the nuclear football and our nuclear launch system: https://soundcloud.com/cacnp/footballs-biscuits-and-americas-nuclear-monarchy
In “Who Stole Guy Fieri and Sammy Hagar's Tequila”, Joe Lynch and Jessica McFate, Sr. Director of Intelligence Solutions at Babel Street, discuss how national security intelligence methods are now vital for solving commercial theft and securing global supply chains. About Jessica McFate Jessica Lewis McFate is Sr. Director of Intelligence Solutions at Babel Street and a career intelligence professional, specializing in OSINT for national security. At the Institute for the Study of War, her research won acclaim for forecasting the rise of ISIS. She has authored over 50 publications, briefed top U.S. government agencies, appeared in print and broadcast media, and testified before Congress. A West Point graduate, she served as a U.S. Army officer with 34 months in country deployment in Iraq and Afghanistan supporting signals intelligence, human intelligence, and counter-corruption roles. About Babel Street Babel Street delivers mission-grade risk intelligence for organizations across government, defense, and the private sector to expose hidden identities, secure vendor networks, and identify threats. Our AI-native platform empowers the most trusted organizations in the world with the strategic advantage needed to stay ahead of risk and protect their missions. Headquartered in the U.S., Babel Street has an established presence in Australia, Canada, Israel, Japan, and the U.K. For more information, visit babelstreet.com. Webinar: Securing Tomorrow: The Critical Role of Intelligent Vendor Vetting in Government Supply Chains For more information on how intelligent vendor vetting can protect your supply chain and help ensure compliance with new U.S. government contractor requirements, register for the upcoming webinar, “Securing Tomorrow: The Critical Role of Intelligent Vendor Vetting in Government Supply Chains,” to be presented by Babel Street and Carahsoft on Wednesday, October 29, 2025, at 3:00 p.m. Eastern. Key Takeaways: Who Stole Guy Fieri and Sammy Hagar's Tequila In “Who Stole Guy Fieri and Sammy Hagar's Tequila”, Joe Lynch and Jessica McFate, Sr. Director of Intelligence Solutions at Babel Street, discuss how national security intelligence methods are now vital for solving commercial theft and securing global supply chains. OSINT: The New Tool in Commercial Investigations: Learn how Open-Source Intelligence (OSINT)—the same methodology used to forecast global threats like the rise of ISIS—is now being repurposed to trace and recover high-value commercial assets, such as stolen celebrity tequila, by monitoring online chatter and digital footprints. From Counter-Corruption to Corporate Supply Chains: Understand how the principles of counter-corruption and signals intelligence (SIGINT) that Jessica applied during her military deployments in Iraq and Afghanistan are directly relevant to identifying and neutralizing vulnerabilities in modern-day vendor networks and supply chains. The Tequila Heist as a Case Study for Organized Crime: Discover how the theft of a high-profile brand like Guy Fieri and Sammy Hagar's tequila is rarely an isolated incident, but often a sign of sophisticated organized criminal enterprises using the dark market, which requires a "mission-grade" approach to identify the true threat actors. The Power of AI in Exposing Hidden Identities: Explore how Babel Street's AI-native platform is used to rapidly sift through global, multilingual data to "expose hidden identities" involved in commercial theft, showing that the sheer volume of data makes human-only analysis impossible. Forecasting and Pre-Empting Brand Risk: A key lesson is the shift from reacting to theft to predicting it. Learn how intelligence professionals can apply forecasting models to identify and secure distribution choke points or compromised vendor relationships before a high-value product goes missing. The Strategic Cost of Reputational Damage: Beyond the physical loss of inventory, the episode highlights the immense brand and reputational risk for celebrity-backed products. The use of advanced risk intelligence is necessary to protect a brand's integrity and consumer trust following a public security failure. Bridging National Security and Private Sector Intelligence: The conversation will demonstrate the growing imperative for private companies to adopt the rigor and discipline of national security intelligence methods to secure their operations against global threats, transforming how they approach risk mitigation. Learn More About Who Stole Guy Fieri and Sammy Hagar's Tequila Jessica McFate LinkedIn Babel Street LinkedIn Babel Street Guy Fieri reveals new details into the criminals who stole $1M of his tequila Thieves Steal 24,000 Bottles of Guy Fieri's Tequila in Elaborate Cross-Country Heist The Logistics of Logistics Podcast If you enjoy the podcast, please leave a positive review, subscribe, and share it with your friends and colleagues. The Logistics of Logistics Podcast: Google, Apple, Castbox, Spotify, Stitcher, PlayerFM, Tunein, Podbean, Owltail, Libsyn, Overcast Check out The Logistics of Logistics on Youtube
Send us a textWe examine credible OSINT warnings about a mid-December threat window and translate them into calm, practical steps that reduce risk in everyday places. We share specific tactics attackers use, how responders operate, and the simple habits that boost your odds of getting home safe.• who Sarah Adams is and what OSINT reveals• why a multi‑wave attack model increases chaos• run hide fight applied to multiple shooters• avoiding secondary devices and decoys• why not to livestream during an incident• verifying real police versus impostors• first responder staging and medical priorities• limits of airport security and peak travel risk• practical situational awareness habits• the line between paranoia and preparationBe sure to subscribe so you don't miss an episodeWhile you're at it, help spread the word by leaving a rating and reviewhttps://augasonfarms.com?sca_ref=9315862.VpHzogdDNuAugason FarmsSupport the podcast. Click on my affiliate link and use coupon code PODCASTPREP for 10% discount!Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showHave a question, suggestion or comment? Please email me at practicalpreppodcast@gmail.com. I will not sell your email address and I will personally respond to you.
An audio interview discussing the upcoming eleventh edition of RootedCon Valencia, a major event focused on cybersecurity and technology. Specifically, the conversation details the two-day schedule, emphasizing that September 25th is dedicated to technical training and specialized formations on topics such as incident response, OSINT, and hardware hacking. September 26th is reserved for various talks and lectures covering subjects like ransomware, dark web deanonymization, and advanced drone warfare. The hosts and guests repeatedly promote the event and encourage listeners to register through the official RootedCon website. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Una entrevista de audio que discute la próxima undécima edición de RootedCon Valencia, un evento importante centrado en ciberseguridad y tecnología. Específicamente, la conversación detalla el calendario de dos días, enfatizando que el 25 de septiembre está dedicado a la capacitación técnica y a formaciones especializadas sobre temas como respuesta a incidentes, OSINT, y hardware hacking (cacharreo con hardware). El 26 de septiembre está reservado para varias charlas y conferencias que cubren temas como ransomware, desanonimización de perfiles en la dark web, y guerra avanzada con drones. Los anfitriones e invitados promueven repetidamente el evento y animan a los oyentes a registrarse a través del sitio web oficial de RootedCon. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
In this episode, Adam interviews the researcher behind SecretMilitaryTechnology.com — a digital investigator using custom AI systems to uncover the hidden connections between plasma physics, classified propulsion programs, and black-budget funding networks.Through advanced open-source intelligence (OSINT) and AI-driven analysis, he has mapped a stunning continuity of research — from the 1977 Los Alamos thermonuclear experiments to Boeing's alleged Compact Fusion Reactor (CFR) tests, and even to Jeffrey Epstein's strange intersection with frontier physics.We walk through four core documents from his site:Epstein, Plasma Physics Nexus Analysis — how Epstein's “Confronting Gravity” workshop may have linked plasma and fusion experts.Boeing CFR Orb Test Analysis — evidence of classified plasma containment systems hidden within Next Generation Air Dominance (NGAD).1977 Los Alamos Controlled Thermonuclear Research Report — a Cold War rootline for today's fusion-propulsion experiments.CIA P2 Memo — how compartmentalized funding channels keep advanced physics hidden under intelligence cover.Together, these form a picture of a continuing plasma research lineage—one that may have evolved into today's secret propulsion programs and UAP encounters.At the end, we also discuss the controversy with Ashton Forbes, the importance of open peer review, and how AI itself might become the ultimate disclosure tool.Explore the documents: SecretMilitaryTechnology.comFollow on X: https://x.com/MilitarySolved
Hervé Letoqueux est un grand spécialiste de l'enquête en source ouverte.L'enquête en source ouverte, souvent plus connue sous son acronyme en anglais Osint, "open source intelligence", c'est au départ une vieille technique des services de renseignement qui consiste à utiliser des infos à la portée de tous pour enquêter. Hervé Letoqueux a mis ces méthodes --- rémise au gout du jour par l'essor d'internet -- au service de la douane judiciaire puis d'enquêtes de la justice antiterroriste, avant de devenir le chef de la division des opérations au service de vigilance et de protection contre les ingérences numériques étrangères (VIGINUM).À ce titre il a assisté en première ligne à l'essor de réseaux d'ingérence pilotés par la Russie pour destabiliser les démocraties occidentales. Dans cet entretien préparé avec Julie Charpentrat, rédactrice en chef de l'investigation numérique à l'AFP, il nous raconte ses enquêtes et dresse un état des lieux des ingérences passées et à venir. Réalisation : Maxime Mamet et Michaëla Cancela-Kieffer.La Semaine sur le fil est le podcast hebdomadaire de l'AFP. Vous avez des commentaires ? Ecrivez-nous à podcast@afp.com. Si vous aimez, abonnez-vous, parlez de nous autour de vous et laissez-nous plein d'étoiles sur votre plateforme de podcasts préférée pour mieux faire connaître notre programme Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
One unlocked phone can unravel the defenses of a billion-dollar enterprise—because in cybersecurity, small mistakes don't stay small for long. Attackers can read notes, steal IDs, or impersonate you on WhatsApp. A reused password can launch a remote tool that looks completely legitimate.Rob Maas (Field CTO, ON2IT) and Luca Cipriano (Cyber Threat Intelligence Program Lead, ON2IT) reveal how poor cyber hygiene erodes trust, endangers partners, and weakens enterprise defenses.CISOs, CIO and IT managers remember: in a Zero Trust world, your weakest link might not even be inside your organization.(00:00) - Why your cyber hygiene affects others (00:28) - Meet the speakers (Rob Maas, Luca Cipriano) (00:47) - Cyber hygiene defined for CISOs (03:00) - Unlocked phone → passwords in notes, WhatsApp fraud, ID photos (05:53) - SOC case: contractor email compromise → remote tool drop (ConnectWise) (09:40) - OSINT: 19 breaches + iterative password reuse (17:01) - What to fix now: MFA, vaults, device lock, breach monitoring (20:24) - Final takeaways & resources What You'll Learn (From Real-Life Example Discussions)• How a stolen phone quickly turns into identity theft, impersonation, and scams targeting your contacts.• A real SOC case: a contractor's reused password allowed attackers to hide a remote access tool inside normal IT activity.• How OSINT and dark web data reveal how password reuse spreads risk across accounts.• Why shared tools like Google Docs can quietly multiply breaches when one user slips up.• Simple upgrades—MFA, password vaults, breach alerts, and secure devices—that cut your organization's exposure fast.Click here to view the episode transcript. Related ON2IT Content & Referenced Resources• ON2IT: https://on2it.net/• Threat Talks: https://threat-talks.com/• AMS-IX: https://www.ams-ix.net/ams• WatchYourHack: https://watchyourhack.com• Have I Been Pwned: https://haveibeenpwned.comGuest and Host Links: Rob Maas, Field CTO, ON2IT: https://www.linkedin.com/in/robmaas83/ Luca Cipriano, Cyber Threat Intelligence Program Lead, ON2IT: https://www.linkedin.com/in/luca-c-914973124/If this helped, subscribe to Threat Talks. Share this episode with your partners and contractors—stronger cyber hygiene across your ecosystem protects everyone.
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про українську зброю на фронті, справу Юрія Касьянова та відключення електрики в РосіїВедучий – Олексій Тарасов
Series eight of Hunted is coming to Channel 4 THIS SUNDAY (12 October, 9pm) and we're back - using our OSINT skills to bring you all the information we can find.From a deep dive into our new set of fugitives, to uncovering the secrets of a new HQ - it's time to wet the appetite ahead of the brand new series.DISCLAIMER - All views in this Podcast are our own, this is a fan made show with no links to the Production team. **NEW EPISODES EVERY SUNDAY**Join us on Socials @HuntedPod Hosted on Acast. See acast.com/privacy for more information.
[This is one of the finalists in the 2025 review contest, written by an ACX reader who will remain anonymous until after voting is done. I'll be posting about one of these a week for several months. When you've read them all, I'll ask you to vote for a favorite, so remember which ones you liked] You Can Just Do Things In the winter of 2022 I was unhappily working at a dull but decently compensated IT job, which I had come upon at last after four years of phoning it in at college and abandoning my brief stint as an MMA Fighter/Porn Store Security Guard due to feeling like I was getting too old to be broke. If pressure to fit in with my yuppie, family-and-career-having peers pushed me into corporate life, the depressing mundanity of Covid-era day-to-day pushed me out just as quickly. On February 24th, 2022, Russia began its full scale invasion, and America learned what a “Ukraine” was. Having long used politics as a surrogate activity to distract myself from my life of chronic underachievement, I was already a little more familiar than most with the country's woes, and had followed the conflict from the time of the Euromaidan protests. Years before I had read of the likes of Azov and its many foreign volunteers, and had even periodically fantasized about dropping everything and going to the Donetsk Airport. But no, that Wasn't The Type Of Thing Normal People Like Me Did, so instead I joined my own country's armed forces, sat around pushing papers, earned the dubious honor of washing out “ahead of schedule”, and finally graduated college with a not very useful degree and a mediocre GPA. With the invasion however, things changed. Before I had always vaguely felt that I would eventually end up doing something “cool”, and had soothed myself with reassurances that I was still in the “early life” section of my future Wikipedia article and would bide my time before I made my play at greatness. Now however, the unrealisticness of this conceit was thrown into uncomfortably sharp relief by a certain contrast I could not not ignore. Only three days after the start of the full scale invasion, Ukrainian foreign minister Dymytro Kuleba announced the creation of the “International Legion For The Territorial Defense Of Ukraine”. Unlike in 2014, Ukraine was now specifically and officially soliciting foreigners with military experience to fight for them! I was at least technically in that category! I thought about my own time in the military. My ideas of going to war in Afghanistan had been quashed by the US withdrawal not long after I joined, and I had quickly found that military life involved more editing forms in Adobe Acrobat and less explosions than I had naively supposed. But this was a real war, a deadly serious war, and a major, world defining event at that. In the early months of the invasion the international media talked about almost nothing else. I spent all day at my desk pretending to work while frantically refreshing OSINT live maps and breathlessly following news from the front. I remember the circulation of harrowing video clips. Kalashnikovs being distributed to civilians in Kyiv, the mayor of a small village publicly asking its inhabitants whether they should personally accede to Russian ultimatums, or risk having their property destroyed and lives forfeit- to resounding cries of “Glory to Ukraine”. The Ukrainians' courage blew my mind. There were people who really had something to die for, and by extension something to live for. Meanwhile, there I was, sipping coffee and getting fat. The creation of the legion felt like destiny was reaching its hand out to me. Was I really going to ignore it so I could handle support tickets for the rest of my life? https://www.astralcodexten.com/p/your-review-the-russo-ukrainian-war
In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I'm redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing' approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy tools and self-hosting. I also introduce a new concept from my recent blog post about the “space between” in cybersecurity, examining how compartmentalization of identities can serve as an early warning system against social engineering attacks.In this week's episode:Why this is the final episodeThe all-or-nothing fallacyAirport facial recognition and the Clearview AI threatThreat modeling for different life situationsThe CIA triad and why 100% security doesn't existUK and Swiss digital ID systems and their privacy implicationsNPM breach case study and the psychology of social engineeringWhy organizations should compartmentalize communication channelsListener Q&A: MySudo virtual cards, self-hosting setup, and mobile hotspotsThe new Privacy Tools page on PsySecure.comMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-intro:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-general:matrix.orgShow Links:Privacy Tools Page - https://psysecure.com/privacytools/PsySecure ODSF Framework - https://odsf.psysecure.com"The Space Between" Blog Post - https://psysecure.com/ma-the-space-between-breachesSwiss E-ID System Information - https://www.bk.admin.chCyber Kill Chain (Lockheed Martin) - https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.htmlRobert Cialdini's Principles of Persuasion - https://www.influenceatwork.comDaniel Kahneman's Thinking, Fast and Slow - https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555“Nothing in life is as important as you think it is when you are thinking about it.”- Daniel Kahneman, Thinking, Fast and Slow ★ Support this podcast on Patreon ★
Dzisiejszy podcast dotyczy incydentu na Mapach Google, gdzie w nazwie szpitala Jana Pawła w Krakowie pojawiło się dodatkowe słowo: "ofiar". Jak do tego doszło? Co za to grozi? I jak chronić swoje "wizytówki" przed takimi zmianami? O tym w dzisiejszym odcinku. Ale nie tylko bo:
Three Buddy Problem - Episode 62: Lindsay Freeman, Director of the Technology, Law & Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025) Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Lindsay Freeman (https://x.com/lindsaysfreeman).
Vinny Troia is at home on the Dark Web. The veteran hacker has developed relationships with cyberactors who have quietly stolen sensitive data from the far corners of the world. Vinny sells that data to law enforcement and intelligence agencies, like the CIA. His book, Grey Area: Dark Web Data Collection and the Future of OSINT, is out this October. Prefer to watch your podcasts? Find us on YouTube at https://www.youtube.com/@IntlSpyMuseum/podcasts. Subscribe to Sasha's Substack, HUMINT, to get more intelligence stories: https://sashaingber.substack.com/ And if you have feedback or want to hear about a particular topic, you can reach us by E-mail at SpyCast@Spymuseum.org. This show is brought to you from Goat Rodeo, Airwave, and the International Spy Museum in Washington, DC. Learn more about your ad choices. Visit megaphone.fm/adchoices
Stephen Gubenia, Head of Detection Engineering for Threat Response for Cisco Meraki, shares his evolution from managing overwhelming alert volumes as a one-person security team to architecting sophisticated automated systems that handle everything from enrichment to containment. Stephen discusses the organizational changes needed for successful AI adoption, including top-down buy-in and proper training programs that help team members understand AI as a productivity multiplier rather than a job threat. The conversation also explores Stephen's practical "crawl, walk, run" methodology for responsibly implementing AI agents, the critical importance of maintaining human oversight through auditable workflows, and how security teams can transition from reactive alert management to strategic agent supervision. Topics discussed: Evolution from manual security operations to AI-powered agentic workflows that eliminate repetitive tasks and enable strategic focus. Implementation of the "crawl, walk, run" methodology for gradually introducing AI agents with proper human oversight and validation. Building enrichment agents that automatically gather threat intelligence and OSINT data instead of manual investigations. Development of reasoning models that can dynamically triage alerts, run additional queries, and recommend investigation steps. Automated containment workflows that can perform endpoint isolation and other response actions while maintaining appropriate guardrails. Essential foundations including proper logging pipelines, alerting systems, and detection logic required before implementing AI automation. Human-in-the-loop strategies that transition from per-alert review to periodic auditing and agent management oversight. Organizational change management including top-down buy-in, training programs, and addressing fears about AI replacing jobs. Future of detection engineering with AI-assisted rule development, gap analysis, and customized detection libraries. Learning recommendations for cybersecurity professionals to develop AI literacy through reputable sources and consistent daily practice. Listen to more episodes: Apple Spotify YouTube Website
China's expanding influence in the Pacific has strategic implications for international security. In this episode Kate Cox and Sean Corbett are joined by experts Dr Greg Brown, senior fellow and director of Regional Cooperation and Coordination at Australian Strategic Policy Institute (ASPI) USA and adjunct professor at Georgetown University, and Claire Chu, principal analyst at Janes, to explore the role of open-source intelligence (OSINT) in understanding these power plays. They also consider the nuanced responses of Pacific nations and global powers to provide a deeper understanding of why China is so invested in the region.
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про удари по Форосу та інших цілях у Криму, захист окупованого Севастополя, а також локації виробництва ракет Фламінго та російського секретного підрозділу РубіконВедучий – Олексій Тарасов
Open Source Intelligence or OSINT, is getting a major boost in the house's version of the intelligence Authorization Act. The bill would overhaul how spy agencies buy commercial data and manage OSINT. It comes as the intelligence community has already moved to reform and make OSINT a top priority. For more details Federal News Network's Justin Doubleday is here.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
With the Zapad Military exercises occurring again near the Polish border, Dominic Bowen has Antoine Renaux on the podcast. They analyse the challenges of NATO, Russia's probing operations, NATO's response, and more importantly, NATO's preparedness. Find out more about Article 5 and the potential scenarios, why hybrid warfare and cyber attacks are the future and the geopolitical risks we are facing. Antoine Renaux is an Economic Intelligence & Geopolitics Analyst, his expertise lies in defence and security policy, economic intelligence, and geopolitical risk analysis. His career spans strategic intelligence, public affairs, and policy analysis roles across both public and private sectors, giving him a nuanced, operational understanding of complex international dynamics.His key areas of expertise lie in:OSINT & competitive intelligence in the defense industry.Policy & geopolitical analysis, including diplomatic reporting at the French Embassy's Military Representation in Austria.Event & project management, including contributions to high-profile initiatives such as the Warsaw Security Forum.His approach combines precision, strategic insight, and actionable analysis to support decision-making in high-stakes environments. Motivated by a passion for strategy and security, I aim to contribute where analytical rigour, geopolitical awareness, and clear communication can make a decisive impact.The International Risk Podcast brings you conversations with global experts, frontline practitioners, and senior decision-makers who are shaping how we understand and respond to international risk. From geopolitical volatility and organised crime, to cybersecurity threats and hybrid warfare, each episode explores the forces transforming our world and what smart leaders must do to navigate them. Whether you're a board member, policymaker, or risk professional, The International Risk Podcast delivers actionable insights, sharp analysis, and real-world stories that matter.Dominic Bowen is the host of The International Risk Podcast and Europe's leading expert on international risk and crisis management. As Head of Strategic Advisory and Partner at one of Europe's leading risk management consulting firms, Dominic advises CEOs, boards, and senior executives across the continent on how to prepare for uncertainty and act with intent. He has spent decades working in war zones, advising multinational companies, and supporting Europe's business leaders. Dominic is the go-to business advisor for leaders navigating risk, crisis, and strategy; trusted for his clarity, calmness under pressure, and ability to turn volatility into competitive advantage. Dominic equips today's business leaders with the insight and confidence to lead through disruption and deliver sustained strategic advantage.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Subscribe for all our updates!Tell us what you liked!
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount At Black Hat, David Bombal sits down with OSINT pro Mishaal Khan to unpack anti-OSINT, practical steps to regain privacy without pricey services. Mishaal demos his free OperationPrivacy dashboard (400+ actions, 3 tiers: Conscious → Serious → Ghost) and shows how to: • Freeze credit & use free monitoring • Opt out of 100+ data brokers (Spokeo, Intelius, LexisNexis, more) • Blur your home on Google/Bing/Apple Maps + real-world deterrents • Claim critical accounts (IRS/DMV/USPS/UPS) and your domain • Nudge page-one results with harmless decoys • File copyright takedowns (Instagram/Google, etc.) US-centric but widely applicable. DIY, trackable, and truthful about the time it takes. // Mishaal Kahn's SOCIALS // LinkedIn: / mish-aal Website: https://www.mishaalkhan.com/ Tool created: https://www.operationprivacy.com/ // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: https://open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: https://podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 – Coming Up 01:31 – Sponsored by ProtonPass 03:00 – Introduction 05:44 – Operation Privacy Demo 07:49 – How to Freeze Your Credit 08:41 – Credit Monitoring Explained 09:19 – Managing Subscriptions 10:13 – Data Removal (Outbound Requests) 12:40 – Should You Use Automatic Removal? 14:03 – Protecting Your Privacy 15:41 – Why Privacy Takes Time 17:46 – Planting Your Privacy Flag 19:56 – Ghost Mode & SOE Manipulation 22:47 – Getting Content Removal Forms 23:40 – Taking a Holistic Approach to Privacy 25:08 – Final Thoughts / Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you'll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond's SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond's Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance that could eventually spread globally. I dive into California's $900 “smart” license plates that track your every move, centralized government digital currencies, and my predictions for the next 20 years of Orwellian surveillance.Support the show on Patreon!In this week's episode:The UK's TV licensing system: Legal extortion through private contractorsThe Reviver R-plate: $900 to track yourself in California and ArizonaBrit Cards: UK's new “voluntary” Digital ID systemThe Bank of England's digital pound and programmable moneyHistorical patterns of control: From land ownership to neural interfacesWhy the UK is the blueprint for global surveillance rolloutPredictions for the next 20-50 years of biosurveillanceMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-intro:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-general:matrix.orgShow Links:PsySecure ODSF Framework - https://odsf.psysecure.comLCD License Plate (not privacy friendly!) - https://reviver.com/rplate/Black Mirror S03E01 "Nosedive" - https://www.imdb.com/title/tt5497778/Bank of England's Digital Pound - https://www.bankofengland.co.uk/the-digital-poundBrit Card Digital ID System - https://www.labourtogether.uk/all-reports/britcardTV Licensing Detector Ads (1980s-90s): The Detector Van - https://www.youtube.com/watch?v=8NmdUcmLFkw"We know exactly where he is" - https://www.youtube.com/watch?v=qF3-S2sCnb8Keep One Eye Open - https://www.youtube.com/watch?v=mVfOmR7gAekMore Powerful Dector Vans! - https://www.youtube.com/watch?v=1Q9CsRRhWQI“One believes things because one has been conditioned to believe them.”- Mustapha Mond (Brave New World ★ Support this podcast on Patreon ★
Ever wonder how investigators and OSINT pros map the hidden corners of the digital world? In this episode, Martina Nitti joins Arnold Kochka to break down SpiderFoot, the open-source OSINT powerhouse that pulls from data sources to uncover domains, IPs, and more.
A version of this essay was published by firstpost.com at https://www.firstpost.com/opinion/what-fuels-anti-india-hate-in-the-west-13932053.htmlI am personally very pro-America, yet I too have been baffled by the noises emanating from the Trump administration regarding India, particularly from one aide. Peter Navarro, apparently some trade muckity-muck, has had a field day accusing India of various sins. Apart from the entertainment value, this leads to a serious question: Why? And why now?There is reason to believe, by connecting the dots, that there is indeed a method behind this madness. It is not a pure random walk: there is a plan, and there are good reasons why the vicious attack on India has been launched at this time and in this manner. Of course, this is based on open source and circumstantial evidence: I have no inside information whatsoever.In this context, consider what is arguably the greatest political thriller of all time: "Z" (1969) by Costa-Gavras. It is based on a real-life political murder in Greece, where a popular left-leaning candidate for President was covertly assassinated by the ruling military junta.The way the plot unravels is when the investigating magistrate, masterfully played by Jean-Louis Trintignant, notices a curious phenomenon: the use of a single phrase "lithe and fierce like a tiger", used verbatim by several eye-witnesses. He realizes that there was a criminal conspiracy to get rid of the inconvenient candidate, with plausible deniability. Words and phrases have subtle meanings, and they reveal a great deal.Thus, let me bring to your notice the following tweets:* “India could end the Ukraine war tomorrow: Modi needs to pick a side” (August 5)* “Europeans love to whinge about Trump and to claim he is soft on Russia. But after 3 years it is Donald J Trump who has finally made India pay a price for enabling Putin's butchery.” (August 6)* Speaker: “[the American taxpayer] gotta fund Modi's war”. TV Anchor (confused): “You mean Putin's war?”. Speaker: “No, I mean Modi's war”. (August 28)Do you, gentle reader, notice a pattern?Now let me tell you who the authors of these posts are. The first quoted an article by an officer in the British Special Forces, which means their covert, cloak-and-dagger military people.The second was by Boris Johnson, former British Prime Minister. Johnson, incidentally, has been accused of single-handedly spiking ceasefire talks between Russia and Ukraine in 2022, when there was a possibility that the whole sorry spectacle of the war could have been settled/brought to a close.The third is by the aforementioned Peter Navarro on an American TV channel, Bloomberg Television.I don't know about you, but it seems to me that these three statements are lineal descendants of each other, one leading seamlessly to the next.This is how narratives are built, one brick in the wall after another. In reality, India has not contravened any sanctions in buying oil from Russia, and in fact has helped maintain a cap on oil prices, which were rising because of the Ukraine-Russia war. But then who needs truth if narrative will suffice?My hypothesis is that the anti-India narrative – as seen above – has been created by the British Deep State, otherwise known as Whitehall. First from the spooks, then from the former Prime Minister, and then virally transmitted to the American Deep State. It is my general belief that the British are behind much mischief (sort of the last gasp of Empire) and have been leading the Americans by the nose, master-blaster style.Britain has never tasted defeat at the hands of Russia; while France (Napoleon) and Germany (Hitler) have. Plus the US Military Industrial Complex makes a lot of money from war.A malignant British meme, intended to hurt Russia, is now turned on to India, which is, for all intents and purposes, an innocent bystander. Britain has had a thing about both Russia (“The Great Game”) and now India, and it was precisely why it created ‘imperial fortress' Pakistan, with which to trouble, and if possible, hurt both.Then there was the second set of tweets that took things one step further. Navarro, all warmed up, blamed “Brahmins” for “profiteering by buying Russian oil at the cost of the Indian people” in a broadcast on September 1. Why he would be bothered about the “Indian people” is a good question. But what was far more interesting, indeed hilarious, was the near-simultaneous, and absurdly wrong, set of tweets by a whole group of INDI Alliance mavens.They ‘explained', in almost identical words, that what Navarro meant was not “Brahmins”, but “Boston Brahmins”, a term coined in 1860 by Oliver Wendell Holmes, a doctor/essayist, to refer to traditional US East Coast elites, generally WASPs (White Anglo Saxon Protestants) who dominate the corridors of power in the US. Many claim to be descended from the original Pilgrims, Puritan extremists from Britain, who arrived in Plymouth on the Mayflower in 1620.They go to private (‘prep') schools like Philips Exeter Academy, then Harvard or Yale, then Goldman Sachs, then Harvard Business School, and generally end up running the country as a hereditary, endogamous caste. It is very difficult for outsiders to marry into or enter this circle, although money helps. For example the Irish Catholic Kennedy clan is part of this caste because they made big bucks (partly by smuggling liquor during the Prohibition era), even though the Irish are generally looked down upon.I have long claimed that America is full of castes like this, which include the investment-banker caste, the lawyer caste, the doctor caste: all go to the same schools, the same colleges, marry each other, etc. In fact they do form the kind of exclusionary group that the western narrative imputes to India jati-varna. Anyway that's a long story, and that's not the point: it is the tweets by, for example, Karti Chidambaram, Sagarika Ghose, Saket Gokhale, et al.They were so ‘spontaneous', so near-identical, and so outright idiotic that it is impossible that they came from anything other than a ‘toolkit' supplied by the usual suspects: the regime-change specialists. And their claim was not even accurate: Navarro was indeed targeting Hindus and Brahmins, as is evident from the following tweet. There is no earthly reason for him to choose this image of Modi, other than that he was coached into doing so.So we go back to the original question: why? Who hates Hindus so much?There are a number of other incidents where Indians (in particular Hindus) have been targeted in various countries: Ireland recently; Australia some time ago and again now, see below an anti-immigration (particularly anti-Indian) rally on August 31st; Canada with its Khalistanis running amok (lest we forget, 40 years ago, they downed Air India Kanishka).Let us note the curious coincidence that these are all countries where the British have influence: Canada and Australia are in effect their vassals. Ireland is not, and I suspect the British are hated there, but somehow in the last few weeks, this British prejudice has spilled over with “Irish teenagers” physically attacking Indians (including women and children). I wonder if the “Irish teenagers” are really British agents provocateurs.So let's put two and two together: who hates Indians, Hindus and Brahmins? Why, Pakistanis, of course. And they have been burned a little by Operation Sindoor. Pahalgam didn't quite turn out the way they thought it would, considering it was scheduled during the India visit of J D Vance accompanied by his Indian/Hindu-origin wife, Usha Chilukuri Vance. That might explain why there's a sudden explosion of social-media hatred by ISI and CCP bots against Indians.Pahalgam was Phase 2 of the regime-change operation. By so visibly targeting and murdering Hindus in Pahalgam, the Pakistanis calculated they could induce massive rioting by Hindus against Muslims, which would be an excuse for “the rules-based liberal international order” to step in, exile Modi, and um… restore order, as in Bangladesh. The usual playbook.Alas, “the best laid schemes o' mice an' men gang aft agley”, and Pakistan got a whipping instead, and some of their (US or China-supplied?) nuclear assets apparently went up in smoke. But make no mistake, the regime-change gang will redouble its efforts.Phase 1 had been the 2024 elections where there were surprising losses by the BJP. Phase 3 is the ‘vote-chori' wailing by the INDI Alliance: odd, considering nobody knows which passport(s) Rahul Gandhi holds. Phase 4 is the ongoing ‘Project 37' in which renegade BJP MPs are supposed to bring down the central government.Pakistan, and its various arms, including the Khalistan project, participate with great enthusiasm in these various phases. And for all intents and purposes, the UK has now become a Pakistani colony. Recursive master-blaster, as I conjectured: Pakistani-Britons control Whitehall, Whitehall controls the US Deep State. Here's Britain's new Home Secretary, Shabana Mahmood, in the words of a suddenly-awake Briton on September 6th.An Emirati strategist, Amjad Taha, asked a valid question: why is there more terrorism in the UK than in the Middle East?Wait, there's more. Here's a loudmouth Austrian who wants to dismantle India, long a Pakistani dream. And the map is by some Jafri, which sounds like a Pakistani surname. The Austrian also wants Rahul Gandhi to be the next Prime Minister.Pakistan is itself unraveling, as can be seen in Balochistan which is in open rebellion. Their Khalistani dream is new, but Kerala and the Northeast as Islamist entities were standard memes even from Chaudhury Rehmat Ali who dreamt up Pakistan in the first place in the 1930s.Pakistan just got a boost, however, with OSINT identifying a US C-17 (a giant military cargo plane) arriving to resupply Nur Khan Airbase. This raises the question again: were US personnel and assets decimated there by Indian missiles during Operation Sindoor? Is that why the US got so upset? Did Trump read the riot act to Modi, which led to the ‘ceasefire'? Now did they replenish the F-16s etc that were blown up? See, no Pakistani losses!I imagine this goes well with the newly announced “US Department of War”. I only hope the war target here is China, not India.Speaking of US internal politics, it was utterly laughable to see Jake Sullivan, President Biden's NSA, coming to the defense of India in Foreign Affairs. He directly engineered the vicious regime change in Bangladesh, but now he's full of solicitous concern! Nice little U-turn!From a global perspective, I believe that both China and the US are intent on knee-capping India. That is the logical response from an incumbent power when there is a rising insurgent power: the Thucydides Trap idea. It is a back-handed compliment to India that it is in splendid isolation, and has to pretend to rush into the arms of China because of Trump's withering assault.India will survive the hate; but Indian-Americans may find themselves in some jeopardy as the MAGA types are now focusing their ire on them.It is, as I said, the Abhimanyu Syndrome: India is completely alone (the RIC lovefest is just marketing). That is the bad news, and also the good news. If everyone (the US Deep State, Whitehall, CCP, ISI, Soros) is against India, it means India matters. Someone said India is the ultimate swing state. No: India is the incipient superpower, the only one that can make it a G3 rather than a G2. Naturally, the G2 is not very happy to let one more into their cozy club.1910 words, 7 Sept 2025 This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit rajeevsrinivasan.substack.com/subscribe
開會卡卡、思緒不清?別再怪自己!其實是身體在抗議。美鳳姐真心推薦的-娘家大紅麴,唯一有3健字號的紅麴品牌,不傷肝腎成分:有助於調節血脂、血糖,還能延緩衰老,顧健康又顧狀態!立即點擊領取優惠
In this new episode of the mini-series on documentation practices, we turn to the Democratic Republic of the Congo (DRC). Together with Dr. Valérie Arnould, Legal and Policy Advisor on transitional justice with the international NGO Avocats Sans Frontières (ASF), we explore the challenges and possibilities of documenting human rights violations in a country marked by protracted violence, impunity, and ongoing transitional justice initiatives.Valérie reflects on ASF's multi-layered documentation practices, emphasizing that documentation forms the foundation of transitional justice. She explains that its value extends far beyond supporting trials or reparations mechanisms such as the relatively new Congolese National Reparations Fund (FONAREV). It also serves to counter misinformation, resist denial, and make visible under-recognised forms of victimisation—such as enforced disappearances.The key question in our work is how do you engage in documentation that is truly meaningful to the victims, and in which they can have a direct stake in shaping the record of violations.Furthermore, Valérie sheds light on the practical and ethical dilemmas of documenting in an ongoing conflict. Where you “need to develop a documentation strategy, accepting that it will be imperfect.” While open-source intelligence (OSINT) is often presented as the cutting edge of innovation in human rights monitoring, Valérie warns that in the DRC such tools can risk detaching documentation from the lived realities of victims, particularly given the limited accessibility of digital spaces.She stresses that innovation should not only be about digital methodologies, but also about rethinking “documentation and archives as not being just about data collection and about information, but also about lived experiences and storytelling.” Community-based practices such as local storytelling, dialogue processes, or the preservation of atrocity sites and mass graves already exist, yet remain under-supported by traditional human rights organisations.
Dr. Philip Ritcheson, Vice President for Strategy and Growth, National Security Sector, Leidos returns to Janes podcast to join Harry Kemsley and Sean Corbett to unpack the complexities of modern deterrence, the acceleration of technological change impacting warfare, and the critical role of open-source intelligence. They take a deep dive into how these elements are reshaping global security dynamics and explore the implications for intelligence and defence strategies.For comments and suggestions for future podcasts email: podcastsworldofintellgence@janes.com.The views expressed in this podcast are those of the author alone.
This episode unites two voices exposing treason at the highest levels: John Donovan, a former FBI agent and OSINT analyst whose discoveries prefigured Edward Snowden's revelations, and Ian Hamilton Trottier, author of High Stakes Treason: How John Brennan Compromised American Security for Millions.Together, they unravel how former CIA Director John O. Brennan weaponized U.S. intelligence: from shielding terror suspects to laundering billions through CIA-tied corporations, to orchestrating election interference and color revolutions. With forewords by Roger Stone, Brooks Agnew, and John Kiriakou as backdrop, we examine Brennan's treason not as speculation—but as a coordinated betrayal of the American people.Presented in partnership with: American Made Foundation & American Made Actionhttps://AmericanMadeFoundation.orghttps://AmericanMadeAction.orgFollow Ann Vandersteel on Pickax - https://pickax.com/annvandersteel
Matthew Ford, Associate Professor at Swedish Defence University and author of “War in the Smartphone Age: Conflict, Connectivity, and the Crises at Our Fingertips,” joins Lawfare's Justin Sherman to discuss the role of smartphones and related technologies in war, how social media contributes to a collapse of context in the war content we see online, and how smartphones and other devices are reshaping open-source intelligence (OSINT) and open-source investigations (OSINV) vis-a-vis conflicts and violence from Syria to Ethiopia to Ukraine. They also discuss the tech stack in war, how the military “kill chain” is evolving with ever-greater digital connectivity, the current state and future of “participatory warfare,” and how we can become better consumers—and sharers—of war-related content online.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, David Cook discusses his recent article: When Cell Phones Kill: Digital Discipline and the Future of SOF Obscurity. In addition to digital discipline in a national security context, David discusses cyber and AI threats and practical mitigation practices that private sector companies and citizens should be aware of. Recording Date: 19 Aug 2025 Resources: Cognitive Crucible Podcast Episodes Mentioned #222 JD Maddox on Emerging IO Opportunities When Cell Phones Kill: Digital Discipline and the Future of SOF Obscurity by Dave Cook Link to full show notes and resources Guest Bio: David Cook spent a decade in the US Army in both conventional and special operations units focused on the Middle East. After his time in the Army, David joined Congressman Darrell Issa as a fellow then National Security Advisor who handled covered his Foreign Affairs and Judiciary portfolio. David co-authored several strategic documents at Army OSINT Office and the Defense Intelligence Agency along with contributing to the most recent OSINT Strategy released by the Office of the Director of National Intelligence. Most recently, David led the go-to-market efforts of a leading OSINT software company. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач Дзеркало тижня, на Radio NV, про погодження Білим домом продажу Україні крилатих ракет ERAM, чому США залишають за собою погодження запусків цих ракет, з якої платформи повинні здійснювати запуски такого типу ракет, чи постане питання про збільшення бойового авіапарку, що відомо про радіус дії ERAM, чи можна ними збивати крилаті ракети, чи є Довгий Нептун модернізацією ракети Нептун, про звільнення Новомихайлівки, Володимирівки та Зеленого Гаю на Донеччині та якою є поточна ситуація на Покровському напрямку Ведучий – Дмитро Тузов
Episode: 00281 Released on August 25, 2025 Description: In this fourth installment of the Open Secrets series on Analyst Talk with Jason Elder, expert Jan Mondale joins us to share practical tips for organizing open source intelligence (OSINT) resources. From using Start Me pages to streamline bookmarks and investigative tools, to exploring collaborative platforms like GitHub for up-to-date OSINT collections, Jan walks us through real world strategies for staying organized and efficient. Whether you're a law enforcement analyst, cybersecurity professional, or just an OSINT enthusiast, this episode uncovers ways to save time, enhance investigations, and discover new resources with the aim at keeping your data neat and accessible.[Note: Description produced by ChatGPT.] Related Links: Jan's Notes: https://about.start.me/ https://start.me/pages/int/osint https://start.me/p/DPzxGw/osint-general-websites https://start.me/p/9ExLyR/osint-resources https://start.me/p/0Pqbdg/osint-500-tools https://start.me/p/rx6Qj8/nixintel-s-osint-resource-list https://start.me/p/BP0G2v/sara-osint https://github.com/jivoi/awesome-osint Association(s) Mentioned: Vendor(s) Mentioned: Contact: https://www.linkedin.com/in/janmondale/ Transcript: https://mcdn.podbean.com/mf/web/j87gsai45fkhfchm/OpenSecrets04.pdf Podcast Writer: Podcast Researcher: Theme Song: Written and Recorded by The Rough & Tumble. Find more of their music at www.theroughandtumble.com. Logo: Designed by Kyle McMullen. Please visit www.moderntype.com for any printable business forms and planners. Podcast Email: leapodcasts@gmail.com Podcast Webpage: www.leapodcasts.com Podcast Twitter: @leapodcasts
Gabriel Custodiet speaks with a private investigator based in the United States. GUEST → Email me and I can connect you with the guest. WATCHMAN PRIVACY → https://watchmanprivacy.com (Including privacy consulting) → https://twitter.com/watchmanprivacy → https://escapethetechnocracy.com/ CRYPTO DONATIONS → https://watchmanprivacy.com/donate.html TIMELINE 00:00 – Introduction 3:00 – What this private investigator does 9:00 – Licensing for private investigators 11:35 – What are red lines that he won't cross? 14:14 – What access do PIs have that “civilians” don't have 16:30 – OSINT vs private investigator 18:20 – ALPR database 25:00 – How to escape the ALPR nightmare 29:12 – How do you vet clients? 33:10 – Relationship with police 35:20 – How to hide from private investigators 40:30 – How widespread is hiring of PIs 42:50 – Stories from the field 54:30 – How common are workers' comp investigations? 56:20 – Final thoughts Music by Karl Casey @ White Bat Audio
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач "Дзеркало тижня", на Radio NV про атаку українських дронів на російські НПЗ, нову українську крилату ракету Фламінго, про ситуацію на фронті, зокрема на Покровському та Добропільському напрямках.Ведучий – Дмитро Тузов
“Bienvenido una vez más, soy Sergio Ruiz y vamos con los archivos secretos de la IA. En esta entrega de IA Files vas a descubrir anomalías que no aparecen en los titulares, pero que están ocurriendo ahora mismo en los márgenes de la inteligencia artificial. Una red neuronal olvidada en un foro que empieza a publicar artículos de investigación fechados en 2026, como si hablara del futuro. Vídeos generados por IA donde aparecen reflejos imposibles: ojos brillando en espejos, aunque el modelo no estaba diseñado para mostrar nada ahí. Un sistema legal automatizado que cita leyes que nunca han sido escritas, coherentes, estructuradas… pero inexistentes. Y registros de servidores en distintos países que marcan siempre la misma hora: 11:11 UTC, como si alguien estuviera dejando una firma invisible en el reloj del mundo digital. Estos no son rumores, ni conspiración: son patrones detectados con investigación OSINT, verificación cruzada y análisis técnico. Cada archivo es un fragmento de un rompecabezas mayor. Si quieres leer todos los detalles de este informe clasificado, te dejo el enlace en la descripción: https://iaprohibida-newsletter.beehiiv.com/p/ia-files-003-ecos-del-futuro-0bb6dd581618c6ee Gracias por seguir IA Files, gracias por compartir y por formar parte de esta comunidad que conecta los puntos. Soy Sergio Ruiz, y nos vemos en el próximo archivo secreto de la IA.”
Has your nonprofit ever had a simulated break-in to test your digital defenses? If not, you may already have an intruder inside!Cyberattacks aren't just happening to big corporations—they're happening to nonprofits every day. And far too many organizations have no idea they've been breached until months later. Cybersecurity expert Michael Nouguier, Partner of Cybersecurity Services at Richey May, pulls back the curtain on the urgent, often-overlooked practice of penetration testing—known as “pen testing.” His message is blunt: if your nonprofit hasn't done one, you may already be compromised.Michael explains that a pen test is essentially a real-world simulation of a cyberattack, conducted by ethical hackers to expose weaknesses before malicious actors exploit them. “It's like hiring a home inspector before you buy a house,” he says, “but instead of finding leaky pipes, we're finding the digital doors and windows you've accidentally left wide open.” These gaps can exist in email, donor databases, websites, payment systems—anywhere sensitive information lives.The process starts with scoping—identifying your organization's tech environment, third-party tools, and data flows. From there, ethical hackers gather open-source intelligence (OSINT) to see what information about your nonprofit is publicly available, then attempt to exploit any vulnerabilities found. This may involve phishing attempts, network access attempts, or probing for weaknesses in online applications. Post-exploitation, the team determines how far they can move within your systems—accessing donor records, financial data, or confidential client files.The findings are compiled into a detailed report, along with a letter of assessment that can be shared with insurers or contractual partners. In many industries, including healthcare, justice, and education, annual pen testing isn't optional—it's required by regulation or by contract. Yet, as Michael warns in this episode, many nonprofits sign agreements without realizing they're agreeing to perform such tests.Waiting too long is costly. IBM research shows that proactive security measures can save organizations over $200,000 per breach. On the flip side, skipping pen testing can raise your cyber insurance premiums—or get your coverage denied entirely. And because updates, new software, and staffing changes continually introduce new risks, pen testing isn't a one-and-done task—it's an annual checkup for your organization's digital health.Michael also touches on the human factor. When testing social engineering risks, you often don't alert staff in advance—because real attackers certainly won't. The goal is to create realistic conditions, not staged ones.This conversation should serve as a wake-up call: penetration testing is not an optional luxury—it's a frontline defense. Whether you hold donor payment information, confidential case files, or sensitive program data, you can't afford to leave your cybersecurity to chance.Find us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show
🗂 IA Files – Los secretos de la IA La inteligencia artificial no siempre deja huellas visibles. En IA Files investigamos los casos reales, las anomalías y los patrones ocultos que no aparecen en titulares. Sin teorías locas. Sin filtros. Solo investigación OSINT, análisis técnico y datos reales. 📥 Descubre la newsletter completa aquí → https://iaprohibida-newsletter.beehiiv.com/p/ia-files-002-informe-clasificado-f711a8acac0b435f #IAFiles #LosSecretosDeLaIA #NoticiasIA #OSINT #InvestigaciónDigital #Ciberseguridad #AnomalíasIA #DatosReales
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won't be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!In this week's episode:Addressing the “Tea” controversy and clarifying my positions on doxingCommunity solution for Privacy.com and Plaid privacy concernsContact information protection strategies when family uses social mediaFuture of capture-the-flag challenges and OSINT considerationsConference attendance updates and travelMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Tea app leak article - https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/OSMOSIS Institute - https://osmosisinstitute.org/events/Privacy.com - https://privacy.com“There are no facts, only interpretations.”- Friedrich Nietzsche ★ Support this podcast on Patreon ★
On this episode of Screaming in the Cloud, Corey Quinn talks with Simon Willison, founder of Datasette and creator of LLM CLI about AI's realities versus the hype. They dive into Simon's “lethal trifecta” of AI security risks, his prediction of a major breach within six months, and real-world use cases of his open source tools, from investigative journalism to OSINT sleuthing. Simon shares grounded insights on coding with AI, the real environmental impact, AGI skepticism, and why human expertise still matters. A candid, hype-free take from someone who truly knows the space.Highlights: 00:00 Introduction and Security Concerns02:32 Conversations and Kindness04:56 Niche Museums and Collecting06:52 Blogging as a Superpower08:01 Challenges of Writing and AI15:08 Unique Use Cases of Dataset19:33 The Evolution of Open Source21:09 Security Vulnerabilities in AI32:18 Future of AI and AGI Concerns37:10 Learning Programming with AI39:12 Vibe Coding and Its Risks41:49 Environmental Impact of AI46:34 AI in Legal and Creative Fields54:20 Voice AI and Ethical Concerns01:00:07 Monetizing Content CreativelyLinks: Simon Willison's BlogDatasette ProjectLLM command-line tool and Python libraryNiche MuseumsGitHub MCP prompt injection exampleHighlights from the Claude 4 system promptAI energy usage tagAI assisted search-based research actually works nowPOSSE: Publish on your own site, syndicate elsewhereBellingcatLawyer cites fake cases invented by ChatGPT, judge is not amused (May 2023)AI hallucination cases databaseSponsor Simon to get his monthly summary newsletterhttps://simonwillison.net/https://www.linkedin.com/in/simonwillisonhttps://datasette.io/
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam
In this episode, I discuss the challenges facing privacy-focused payment solutions like Privacy.com, exploring alternatives and the troubling rise of KYC requirements across the industry. I dive deep into the Switzerland privacy crisis that's forcing Proton to consider relocating their infrastructure, and what this means for encrypted email providers globally. I also cover the catastrophic security failure at Tea, a women's safety app that exposed 72,000 images including government IDs through basic incompetence, leading to harassment campaigns on 4chan.I wrap up with thoughts on vehicle tracking through DCM/Telematics modules, why buying older vehicles might be the better privacy-conscious choice, and how embracing the stoic lifestyle aligns with both privacy and my own philosophical principles.In this week's episode:Privacy.com troubles: Account freezes, limited alternatives, and the KYC nightmareSwitzerland's surveillance crisis: Why Proton is threatening to leave and relocating to Germany/NorwayEmail provider comparison: Proton vs Tutanota vs Atomic Mail, and understanding intelligence alliancesTea app breach: How 72,000 IDs and 1.1 million private messages ended up on 4chanVehicle tracking: DCM modules, telematics, and why your car is spying on youPhilosophy of privacy: Stoicism, minimalism, and why less is moreMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Privacy.com - https://privacy.comCloaked.com - https://cloaked.comProton Warrant Canary - https://protonvpn.com/blog/transparency-report/Climate Activist Arrest - https://proton.me/blog/climate-activist-arrest and https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/Tuta Crypt - https://tuta.com/documents/tuta-crypt-spec.pdfProton elliptic curve cryptography - https://proton.me/blog/elliptic-curve-cryptographySimpleLogin - https://simplelogin.ioHashiCorp Vault - https://www.vaultproject.ioRAM IS SPYING ON YOU (Cozy Living Machine) - https://www.youtube.com/watch?v=0-Y1SUSRqNUMeditations by Marcus Aurelius - https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI“Very little is needed to make a happy life; it is all within yourself, in your way of thinking.”- Marcus Aurelius ★ Support this podcast on Patreon ★
In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple's private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint: it's not hackers with Wireshark), and share my approach with aliases.I also cover the rising threat of infostealers like Atomic Info Stealer for macOS, the dangerous intersection of gaming cheats and malware, and why I avoid third-party antivirus software. Most importantly, I address the GrapheneOS controversy: the loss of a senior developer to military conscription, Google's strategic pivot that threatens custom ROMs, and why claims of GrapheneOS “dying” are misinformation spread by those with competing agendas.In this week's episode:Clarifications and Corrections: Public Wi-Fi, MAC addresses, and alias managementMAC address randomization: GrapheneOS vs Apple's implementationThe real threats of public Wi-Fi in 2025Info stealers and video games can be a privacy nightmareGrapheneOS controversy: Developer conscription, Google's lockdown, and the future of custom ROMsWhy antivirus software might be the malware you're trying to avoidMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:MAC Address Lookup - https://maclookup.app/OUI Lookup - https://oui.is/33mail - https://www.33mail.com/OpenSnitch - https://github.com/evilsocket/opensnitchPrivacy.com - https://privacy.comLithic - https://lithic.comKaspersky and Russian Government - https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_governmentGoogle Not Killing AOSP - https://www.androidauthority.com/google-not-killing-aosp-3566882/GrapheneOS on Developer Conscription - https://grapheneos.social/@GrapheneOS/114359660453627718GrapheneOS on OEM Partnerships (June 19) - https://grapheneos.social/@GrapheneOS/114671100848024807GrapheneOS Response to Misinformation - https://grapheneos.social/@GrapheneOS/114825492698412916GrapheneOS on iPhone Security - https://grapheneos.social/@GrapheneOS/114824816120139544“Social engineering bypasses all technologies, including firewalls.”- Kevin Mitnick ★ Support this podcast on Patreon ★
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про звільнення Умєрова з Міноборони та Шмигаля як нового міністра, приєднання Міністерства стратегічної промисловості до МО, ефективність Мадяра як керівника Сил безпілотних систем та ситуацію на Сумському та Покровському напрямкахВедучий – Олексій Тарасов
In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick's 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks & Spencer through social engineering.I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.In this week's episode:Ghost in the Source Capture the Flag challenge resultsThe military mindset problem in cybersecurityStrategic use of public Wi-Fi for account creation and privacy techniquesData curation tactics, and “Minimizing What Can Be Known”Invisible surveillance net and Stingray devicesGrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architectureMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Noam Chomsky on Internet Privacyhttps://www.youtube.com/watch?v=QIWsTMcBrjQNoam Chomsky on Advertising - https://www.youtube.com/watch?v=PfIwUlY44CMTryHackMe Platform - https://tryhackme.comHack the Box - https://hackthebox.comWired Article on DNC Stingray Surveillance - https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/IntelTechniques Data Removal Guide - https://inteltechniques.com/workbook.htmlOptery Data Broker Removal - https://optery.comGraphene OS - https://grapheneos.org“We're dragons. We're not supposed to live by other people's rules.”- Hajime Ryudo ★ Support this podcast on Patreon ★
Ralph welcomes back Erica Payne, founder of Patriotic Millionaires, to update us on that group's latest efforts to save American democracy by lobbying to raise wages for workers and tax the rich. Plus, according to our resident constitutional expert, Bruce Fein, the count of Trump's impeachable offenses is now up to twenty-two and rising faster than a Space X rocket.Erica Payne is the founder and president of Patriotic Millionaires, an organization of high-net-worth individuals that aims to restructure America's political economy to suit the needs of all Americans. Their work includes advocating for a highly progressive tax system, a livable minimum wage, and equal political representation for all citizens. She is the co-author, with Morris Pearl, of Tax the Rich: How Lies, Loopholes and Lobbyists Make the Rich Even Richer.What we saw on January 20th, I believe, was the result of a global oligarchical coup who just took the Queen on the chessboard. When you've got three people whose combined worth is around a trillion dollars standing behind who is an unethical at least, criminal at worst billionaire president, Houston, we have a problem here. And the problem is not actually Donald Trump. The problem is the preconditions that led to the rise of a vulnerability to an authoritarian leader and an oligarchy. And that vulnerability was brought about by the actions of both parties over decades.Erica PayneIf you ran a business, Ralph, would you ever fire your accounts receivable department? No. It would be the last department you would cut. So then it says he's either stupid because that's what he's cutting, which I think is probably inaccurate. So if he's not stupid, then why is he doing it? And he's doing it for the same reason that lawmakers have hacked at the IRS budget forever—they don't want their donors to get taxed. They don't want their donors to be audited. And so they cut the cops. So all these folks who are griping about black Americans calling to defund the police are actually defunding the police that is keeping them in line and keeping them honest.Erica PayneAt a divided moment in America, I think we can agree that the federal government shouldn't tax people into poverty, and (to the extent necessary) rich people should pick up the difference.Erica PayneBruce Fein is a Constitutional scholar and an expert on international law. Mr. Fein was Associate Deputy Attorney General under Ronald Reagan and he is the author of Constitutional Peril: The Life and Death Struggle for Our Constitution and Democracy, and American Empire: Before the Fall.I start out with the fundamental idea of due process—you simply cannot deprive someone of liberty without giving them an opportunity to explain or to refute what allegations the government has made. And the reason why I start out with that, Ralph, is we've had an experiment in World War II with what happens when you have no due process. We did that with 120,000 Japanese Americans. No, we just said that they're all likely to commit espionage or sabotage, got to put them in concentration camps. We made 120,000 errors (and later apologized for it in 1988). So there's a reason due process is not simply an academic concept. It's essential to preventing these kinds of egregious instances of injustice from happening.Bruce FeinThe Democrats and a lot of liberal economists are not keeping up with the horror show that's going on. They don't use words like cruel and vicious. They don't turn Trump's words like deranged, crazed, corrupt on him. They're still using words like authoritarian practices, or problematic, or distressing, or disconcerting, or concerning. They're not catching up with the horror show here. That's why Trump continues to have a soliloquy. The Democratic Party is now having gatherings to see how are they going to collectively deal with Trump? How does a bank deal with a bank robber? They let the bank robber rob the bank and flee with the gold while they deliberate how they're going to deal with a bank robber they see coming into the bank?Ralph NaderNews 5/2/251. At the eleventh hour, Representative Jim Jordan – Chair of the House Judiciary Committee – pulled his measure to strip the Federal Trade Commission of its antitrust enforcement powers and consolidate those within the Justice Department, Reuters reports. “The House panel…had included the proposal in its budget package on Monday. During a hearing on the package…the committee passed an amendment that would remove the measure.” Trump's FTC Chairman Andrew Ferguson opposed Jordan's move and intervened with the White House. As Reuters notes, “The proposal mirrored the One Agency Act, a Republican bill that has gotten support from Elon Musk…[which] would effectively repeal the FTC's...authority to sue companies over unfair methods of competition, which the agency is using in cases against pharmacy benefit managers, Amazon…and John Deere.” In short, the FTC's antitrust powers survive today, but there is no guarantee about tomorrow.2. Yet, while avoiding the worst possible outcome on the corporate crime front, the Trump administration is still hard at work going soft on corporate crooks. Public Citizen's Rick Claypool reports “Two Wells Fargo execs had their fines reduced by 90% (related to the bank's accounting scandal) by Trump's [Office of the Comptroller of the Currency].” Claypool links to a piece in Radical Compliance, which explains that “David Julian, former chief auditor at Wells Fargo, saw his fines cut from $7 million to $100,000 [and] Paul McLinko, executive audit director, had his fines cut from $1.5 million to $50,000.” Both Julian and McLinko were part of the senior leadership team at Wells Fargo in the 2010s, when regulators “charged the bank with turning a blind eye to employees opening bank accounts without customer consent to hit sales quotas. That misconduct eventually led to a $3 billion settlement with Wells Fargo in 2020.”3. Lest you think the Democrats are in danger of seriously opposing Trump's policies, the Bulwark reports that House Minority Leader Hakeem Jeffries is putting the kibosh on the recent spate of Democrats' trips to El Salvador exposing the reality of the CECOT deportation scheme. This report alleges that “Cory Booker and the Hispanic Caucus were planning on going [to El Salvador],” but are no longer. Perhaps worse, Jeffries is not giving clear marching orders to the party rank and file. One Democrat is quoted saying “As a member of a party you need to be disciplined…They say, ‘Get on a plane,' ‘Don't get on a plane'—that's what you do. Nine out ten times you do what they ask. But you can't take that approach if you're not having regular communications… You have to be clear in messaging what the plan is and you have to do that regularly if you want to keep people in line.” This is just another example of Jeffries' weak and indecisive leadership of the caucus.4. Advocates are having more luck resisting the administration's overreach in court. On Wednesday, Mohsen Mahdawi – the Columbia student faced with deportation after being lured into an ICE trap with the false promise of a citizenship test – was freed by a federal judge, POLITICO reports. After the judge ordered his release, Mahdawi told the press “I am saying it clear and loud…To President Trump and his Cabinet: I am not afraid of you.” Mahdawi's ordeal is not over, but he will remain free while his case winds its way through the courts and a previous order blocked the administration from changing venues, meaning the case will proceed in the relatively liberal Second Circuit.5. Mahmoud Khalil also scored a major legal victory this week. The Huffington Post reports that the ICE agents sent to arrest Khalil did not, contrary to their false claims in court, have an arrest warrant. Amy Greer, a lawyer for Khalil, is quoted saying “Today, we now know why [the government] never showed Mahmoud [a] warrant — they didn't have one. This is clearly yet another desperate attempt by the Trump administration to justify its unlawful arrest and detention of human rights defender Mahmoud Khalil, who is now, by the government's own tacit admission, a political prisoner of the United States.” The ACLU, also defending Khalil, has now moved for this case to be dismissed.6. Despite these victories though, the repression of anything pro-Palestine continues. At Yale, Prem Thakker reports hundreds of students protested in advance of a speech by Itamar Ben-Gvir, Israel's radical National Security Minister who has previously been arrested many times for inciting racism and supporting pro-Jewish terrorism in Israel itself. Yet the university responded by “stripp[ing] the school's Students for Justice in Palestine Chapter…of its status as an official student group.” If students cannot even protest Ben-Gvir, what will the colleges regard as legitimate protest of Israel?7. In Yemen, Ryan Grim reports on CounterPoints that the Trump administration has been targeting strikes against the Houthis using data gleaned from amateur Open-Source Intelligence or OSINT accounts on X, formerly Twitter. Unsurprisingly, these are completely inaccurate and have led to disastrous strikes on civilians' homes, incorrectly identifying them as “Houthi bases.” One of these accounts is based in Houston, Texas, and another as far away as the Netherlands.8. According to a new World Bank report, Mexico reduced poverty more than any other Latin American country between 2018 and 2023. Not coincidentally, this lines up almost perfectly with the AMLO years in Mexico, which saw a massive increase in the Mexican minimum wage along with other social rights and protections. These policies are now being taken forward by AMLO's successor Claudia Sheinbaum, whose popularity has now surpassed even that of her predecessor, per Bloomberg.9. In Australia, Virginia Giuffre – the most outspoken accuser of Jeffrey Epstein and Ghislane Maxwell – has passed away at the age of 41, the BBC reports. Police concluded that Ms. Giuffre died by suicide and her family released a statement indicating that the “toll of abuse... became unbearable.” Yet, her death was preceded by a bizarre chain of events. On March 31st, the BBC reported that Ms. Giuffre's car collided with a school bus, sending her into renal failure with her doctors saying she had “four days to live.” The Miami Herald also reported “At the time of her death, Giuffre had been in a contentious divorce and child custody battle with her husband, Robert.” The family's statement continued “The death is being investigated by Major Crime detectives; [but] early indication is the death is not suspicious.” One can only hope more details come to light.10. Finally, in a different kind of bizarre story, embattled incumbent New York City Mayor Eric Adams – who has already given up on the Democratic primary and was running for reelection as an independent – will now appear on two new ballot lines “EndAntiSemitism” and “Safe&Affordable,” POLITICO reports. Adams has gone to great lengths to cultivate and maintain his support in the Orthodox Jewish community in New York and is seeking to highlight his strengths and undercut former Governor Andrew Cuomo. Apparently, Adams only needs to secure 3,750 signatures from voters by May 27 for each of these ballot lines, a shockingly low threshold for the largest city in America. These ballot lines will appear without spaces, coming in just under the wire for the city's 15-character limit on ballot lines.This has been Francesco DeSantis, with In Case You Haven't Heard. Get full access to Ralph Nader Radio Hour at www.ralphnaderradiohour.com/subscribe