POPULARITY
Categories
CX Goalkeeper - Customer Experience, Business Transformation & Leadership
Learn why human voices drive digital transformation. Alex Wunschel explains how voice builds trust, shapes culture, and makes leaders relatable. Get concrete tips to speak authentically, train voice skills, and embed audio into internal communication. Hear real examples and pitfalls to avoid in corporate podcasting. About Alexander Wunschel Alexander Wunschel is a founder, podcast pioneer, and producer with over 17 years of experience in the audio industry. He is the owner and executive of Klangstelle, a podcast company that offers the finest audio pieces from strategy and conception to production and marketing. He has produced and managed over 1.000 episodes in over 35 podcasts with about 8 million downloads and streams for clients such as Telekom, Fujitsu, Playboy, Starbucks, Datev, GAD, Microsoft, and many more. He is also a strategy consultant for digital media, a keynote speaker. He is passionate about the impact of sound, immersive and augmented audio, voice user interface, privacy, security, OSINT, MarTech, AdTech, meditation, and cooking. Resources Klangstelle: https://www.linkedin.com/in/alexanderwunschel/ Please, hit the follow button and leave your feedback: Apple Podcast: https://www.cxgoalkeeper.com/apple Spotify: https://www.cxgoalkeeper.com/spotify Follow Gregorio Uglioni on Linkedin: https://www.linkedin.com/in/gregorio-uglioni/ Gregorio Uglioni is a seasoned transformation leader with over 15 years of experience shaping business and digital change, consistently delivering service excellence and measurable impact. As an Associate Partner at Forward, he is recognized for his strategic vision, operational expertise, and ability to drive sustainable growth. A respected keynote speaker and host of the well-known global podcast Business Transformation Pitch with the CX Goalkeeper, Gregorio energizes and inspires organizations worldwide with his customer-centric approach to innovation.
#SecurityConfidential #DarkRhiinoSecurityHusam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He's the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA, ASFSFM, and 3D Forensics, known for his hands-on expertise in uncovering digital evidence and analyzing complex cyber incidents.00:00 Intro02:20 What's new in Cybersecurity?04:05 Companies in the news04:56 How does your data get leaked?17:10 Do you have to list all your processes?22:37 Technology is changing29:00 The Life span of a CISO31:50 The CISO, the CEO, and the CIO34:40 Penetration testing36:40 The Digital Forensics procedure44:00 More about Husam----------------------------------------------------------------------To learn more about Husam visit https://husamshbib.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!Instagram: @securityconfidential and @DarkrhiinosecurityFacebook: @Dark-Rhiino-Security-IncTwitter: @darkrhiinosecLinkedIn: @dark-rhiino-securityYoutube: @DarkRhiinoSecurity ----------------------------------------------------------------------
#SecurityConfidential #DarkRhiinoSecurityHusam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He's the founder of Memory Forensic and the author of Captain Cyber and the Safe Surfing Adventure. Husam is also a global speaker featured at events like BlackHat MEA, ASFSFM, and 3D Forensics, known for his hands-on expertise in uncovering digital evidence and analyzing complex cyber incidents.----------------------------------------------------------------------To learn more about Husam visit https://husamshbib.com/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
Hur tänker en hotaktör? Följ med rakt in i hotaktörens huvud.I det här avsnittet lägger vi försvarsperspektivet åt sidan och följer angriparen inifrån, när vi dissekerar Cyber Kill Chain steg för steg för att förstå hur en modern attack faktiskt kan byggas upp.Till vår cyberhörna har vi bjudit in Viktor Hedberg, cybersäkerhetsspecialist på Truesec och Senior Technical Architect i deras CSIRT-team. Med över tio års erfarenhet av incidenthantering, digital forensik och recovery tar han oss på ett avsnitt hur en hotaktör tänker, steg för steg.Tillsammans går vi igenom varje fas i kedjan: från den första, tysta kartläggningen av ett mål, vidare till valet av angreppsmetod, leverans, exploatering och etablering av ”command & control”, hela vägen till den punkt där angriparen i praktiken äger hela miljön.Viktor kopplar anonymiserade verkliga händelser till Cyber Kill Chain-modellen, förklarar hur cyberkriminella samarbetar som en organiserad industri, varför ditt digitala fotavtryck är rena guldgruvan för en hotaktör, och vad som krävs för att bryta attackkedjan innan det är för sent.I avsnittet pratar vi bland annat om:- Cyber Kill Chain: de sju stegen i en modern cyberattack- Statsaktörer vs ransomware-gäng: ”low and slow” kontra ”smash and grab”- Initial Access Brokers och hur mycket ett kapat konto kostar på dark web- OSINT och sociala medier: hur vanliga vardagsinlägg kan bli startskottet för en attack- Varför adminseparering, smart backupstrategi och riktig övervakning är avgörande- Viktors bästa tips till privatpersoner: så gör du lösenord och ”hemligheter” mindre sårbaraEtt avsnitt för dig som vill förstå angriparens mindset, och använda den kunskapen för att försvara både din organisation och dig själv. Hosted on Acast. See acast.com/privacy for more information.
En este episodio abordamos uno de los mayores desafíos de nuestra era: la desaparición progresiva de la verdad verificable. Los deepfakes en tiempo real, las identidades sintéticas hiperrealistas y la erosión de las cadenas de verificación están transformando la manera en que investigamos, confiamos y tomamos decisiones. Analizamos en profundidad: • Cómo las videollamadas corporativas ya pueden ser manipuladas en directo. • Por qué el OSINT clásico está entrando en colapso. • Qué puede y qué no puede detectar la forensia biométrica. • Cómo la “negación plausible” se ha convertido en un escudo de impunidad. • Por qué la validación híbrida (digital + física) será la única confianza real en 2025 y más allá. Un episodio imprescindible para investigadores, periodistas, fuerzas de seguridad, analistas de ciberinteligencia y cualquier ciudadano que quiera entender cómo se manipula la percepción en la era de la inteligencia artificial. SRIA - Investigación, Ciberseguridad y Verdad Digital.
Allan Deneuville, maître de conférence à l'université Bordeaux-Montaigne et chercheur au centre GEODE (Géopolitique de la datasphère), vient de publier OSINT : enquêtes et démocratie (INA éditions). Dans ce livre, il explore cette méthodologie d'investigation qui a explosé depuis une quinzaine d'années dans l'écosystème informationnel mais qui a aussi un côté sombre, la dark OSINT. L'acronyme OSINT, pour Open Source Intelligence (ROSO pour Renseignement d'origine sources ouvertes, en français), désigne la collecte et l'analyse d'informations accessibles à tous. C'est l'art de collecter et analyser des infos que tout le monde peut, en théorie, consulter. L'exemple des « Strava Leaks », en 2018, a montré la puissance du phénomène : en faisant leur footing, des soldats américains déployés en Afghanistan avaient sans le savoir cartographié méticuleusement des installations ultra sensibles. La pratique de l'OSINT n'est donc « pas qu'un truc de journaliste ni d'espion, c'est un peu l'affaire de tout le monde », résume Steven Jambot. Le poison et le remède : la double nature de l'OSINT L'OSINT est devenue un enjeu démocratique majeur, une méthodologie protéiforme, à la fois salutaire et dangereuse. Pour en décrire la nature ambivalente, Allan Deneuville utilise la notion philosophique de pharmakon, un terme grec qui signifie qu'une substance est à la fois « remède et poison ». S'il est utilisé à une certaine dose, l'OSINT peut être bénéfique, mais si elle est utilisée « avec une mauvaise dose, elle peut être un poison ». Ce phénomène prend une ampleur inédite en raison de l'omniprésence des données dans notre environnement, un contexte marqué par la « documentalité » et l'« hyperdocumentation », qu'explique Allan Deneuville. En effet, grâce à la numérisation du monde et à l'hyperlien, « tout document, grâce à l'hyperdocumentation, est apporté de main ». Cette hyperaccessibilité a rendu l'OSINT incontournable. Elle repose sur le « bricolage » numérique, l'art de détourner, bricoler numériquement pour avoir accès à des informations en les croisant avec d'autres informations, en utilisant des données disponibles publiquement comme Flight Radar 24 ou MarineTraffic. Allan Deneuville propose une définition large pour englober ses multiples usages : « L'OSINT est une méthode potentiellement itérative et collaborative qui consiste en la collecte, l'analyse et l'exploitation systématique de documents et de données provenant de sources accessibles au public légalement, gratuitement ou non, dans le but de répondre à un besoin d'information. » La face sombre : Dark OSINT et fragilité démocratique Malgré son rôle crucial dans la lutte contre la désinformation (fact-checking) et pour l'émancipation citoyenne, l'OSINT possède une part sombre, désignée par l'auteur comme la « dark OSINT ». Celle-ci recouvre les usages antidémocratiques qui se manifestent, à l'échelle individuelle, par le stalking et le doxxing. Le doxxing, qui consiste à collecter et diffuser des informations privées dans le but de nuire, de harceler ou de menacer, ainsi que le « vigilantisme numérique », menacent l'État de droit. À l'échelle étatique et géopolitique, l'OSINT révèle l'« asymétrie structurelle fondamentale » entre les démocraties et les régimes autoritaires. Les sociétés ouvertes sont paradoxalement plus vulnérables, car, comme le rappelle Deneuville : « Un des risques, c'est le fait que nos ennemis géopolitiques ont accès à nos informations et puisse s'en servir contre nous. » Les régimes autoritaires exploitent cette transparence pour mener des opérations d'influence et de surveillance de masse. De plus, l'OSINT est confrontée au risque d'instrumentalisation de ses propres codes visuels. Les enquêtes vidéo utilisent une « grammaire visuelle de la véridiction », qui peut être imitée par la propagande pour diffuser des contre-récits, notamment lors du massacre de Boutcha (Ukraine) ou de l'explosion de l'hôpital Al-Ahli (Gaza). Face à des vérités divergentes, la méthodologie doit s'accompagner d'un « regard réflexif ». L'OSINT : une compétence de base pour la résilience Pour Allan Deneuville, il est essentiel que l'OSINT soit couplée à l'enquête de terrain et à l'expertise. L'OSINT « ne se suffit pas en tant que telle ». La collaboration est nécessaire, il faut « travailler avec le terrain, [...] avoir accès à des spécialistes », pour mieux comprendre et analyser les données. En conclusion, l'apprentissage de l'OSINT devient un enjeu de citoyenneté et d'éducation. « Pour moi, il faut vraiment penser l'OSINT aujourd'hui comme une compétence numérique de base à enseigner au plus grand nombre », explique Allan Deneuville. Cet apprentissage est la clé de la « résilience de nos sociétés face à la désinformation et face aux manœuvres et aux ingérences étrangères ». Le Festival de l'OSINT, co-organisé par l'association OpenFacto, contribue à cette démocratisation, étant ouvert au plus grand nombre. Sa 3e édition se tient les 5 et 6 décembre 2025 à Paris.
** VIDEO EN NUESTRO CANAL DE YOUTUBE **** https://youtube.com/live/3y6NGrTm48Q +++++ Hazte con nuestras camisetas en https://www.bhmshop.app +++++ #Geopolítica #actualidad #actualidad militar #venezuela Una tormenta geopolítica se cierne sobre Venezuela. El despliegue naval de EE.UU. ya ha destruido 25 embarcaciones del narco en el Caribe y mantiene drones, F-18 y B-52 volando a lo largo del arco marítimo venezolano. Todo indica que Washington ya ha fijado los objetivos clave para un posible ataque limitado. En este episodio de ¿Hablamos?, Francisco García Campa analiza con datos verificados y fuentes abiertas (OSINT) los blancos estratégicos más probables. ¿Qué detonaría una intervención? ¿Cuáles serían los riesgos para la región? ¿Puede Maduro resistir un golpe quirúrgico? ¿Estaría EE.UU. preparado para una escalada mayor? Un programa que pone el foco donde nadie más quiere mirar. LIBRO DE PACO "UN MUNDO CONVULSO. CLAVES GEOPOLÍTICAS DEL SIGLO XXI" https://amzn.to/482b9d4 SUSCRÍBETE para no perderte ningún programa y únete a nuestra comunidad de apasionados por la historia militar, la geopolítica y los conflictos del mundo. Apóyanos para seguir creando contenido riguroso e independiente: Patreon: https://www.patreon.com/bellumartis PayPal: https://www.paypal.me/bellumartis Bizum: 656 778 825 Síguenos también en redes: Instagram: https://www.instagram.com/bellumartis X / Twitter: https://twitter.com/Bellumartis Bellumartis Historia Militar — Porque entender el pasado es prepararse para el futuro. #LanzaDelSur #Venezuela #Maduro #EstadosUnidos #OperacionLanzaDelSur #Geopolitica #CrisisVenezuela #CártelDeLosSoles #SouthCom #USSgeraldRFord #Apure #ArcoMinero #LaGuaira #PuertoCabello #Bellumartis #AnalisisGeopolitico #FranciscoGarciaCampa #ActualidadMilitar
Former NSA senior executive Mike Driscoll joins Cipher Brief's Brad Christian to dissect how America - and its allies - win or lose in the cognitive domain. From post-9/11 SIGINT dominance and its pitfalls to today's OSINT revolution powered by AI, Driscoll details why democracies keep ceding the narrative, what Oct. 7 revealed about messaging at speed, and how to rebalance "the exquisite" with the open. They break down gray zone tactics, attribution lags, tunnel warfare, and the policy/risk mindset shifts needed to shrink decision timelines from months to seconds. Driscoll argues that education, public-private integration, and mission-driven AI are now decisive. If you care about how the next conflict is fought - and who shapes the truth - this conversation is essential.
Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168Website / Donations / Support - https://closednetwork.io/support/BTC Lightning Donations - closednetwork@getalby.com / simon@primal.netThank You Patreons! - https://www.patreon.com/closednetworkMichael Bates - Privacy Bad AssDavid - Privacy Bad AssDaniel J Martin - Privacy Bad AssTK - Privacy Bad AssDavid - Privacy Bad AssMrMilkMustache - Privacy SupporterHutch - Privacy AdvocateTOP LIGHTNING BOOSTERS !!!! THANK YOU !!!@bon@somealphabeticcharacters@basedpotato@Turquoise Panda@wartime@Grounded-GridThank You To Our Moderators:Unintelligentseven - Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354dMaddestMax - Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavtJoin Our CommunityClosed Network Forum - https://forum.closednetwork.ioJoin Our Matrix Channels!Main - https://matrix.to/#/#closedntwrk:matrix.orgOff Topic - https://matrix.to/#/#closednetworkofftopic:matrix.orgSimpleX Group Chat - https://smp9.simplex.im/g#SRBJK7JhuMWa1jgxfmnOfHz7Bl5KjnKUFL5zy-Jn-j0Join Our Mastodon server!https://closednetwork.socialFollow Simon On The SocialsMastodon - https://closednetwork.social/@simonNOSTR - Public Address - npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 - primal.net/simonTwitter / X - @ClosedNtwrkInstagram - https://www.instagram.com/closednetworkpodcast/YouTube - https://www.youtube.com/@closednetworkEmail - simon@closednetwork.ioFollow Zach - https://github.com/ZamicolCoze JS - https://github.com/Cyphrme/CozeJS
On 18 November 2025, I watched Andrew Tate's Hyperliquid balance collapse in real time. Months of reckless, high-leverage trading came to a brutal end as his account dropped to just $984. More than $727,000 of his own money and around $75,000 in referral bonuses had been wiped out with no withdrawals ever recorded.Four days earlier, GOLIATH VENTURES INC — a “quant fund” promoted across the same influencer ecosystem — suddenly froze payouts and claimed a “forensic audit” had begun. Their 14 November distribution never arrived. No transparency, no timeline, just familiar excuses.The timing alone doesn't prove a direct connection. But when two collapses unfold within days of each other inside the same circle of influencers, people start asking questions.THE ON-CHAIN COLLAPSEBefore that final liquidation, Tate had already racked up an astonishing list of losses: a $597,000 ETH long in June, a $67,500 WLFI wipeout in September, a $93,000 BTC liquidation shortly after, a $235,000 BTC loss on 14 November, and then the $112,000 final blow that drained his account entirely.Across more than 80 trades, his win rate sat around 35%.Behind the motivational speeches and alpha branding, the blockchain told a very different story.THE GOLIATH FREEZEWhile Tate's losses were playing out on-chain, GOLIATH VENTURES INC was telling investors everything was “healthy” — even as they locked the doors.Less than 1% of their claimed trading activity ever touched a blockchain.Their audit firm remains unnamed.Whistleblowers reported insiders withdrawing millions just before the freeze.That behaviour does not belong to a legitimate trading operation. It matches the collapse pattern of every modern Ponzi I've investigated.THE SHARED ECOSYSTEMGoliath's leadership has repeatedly appeared within Andrew Tate's wider influencer network. They've praised him, networked with him, replicated his “brotherhood” aesthetic, and even surfaced in his promotional yacht videos — though their faces are blurred across their own website.Tate's “War Room” sells itself as a global network of elite men operating behind the scenes.Goliath sells itself as a private, high-yield investment circle.The language is similar.The secrecy is similar.The imagery is nearly identical.None of this proves their money flowed together, but it proves they move through the same influencer machinery — and that matters.WHAT WE CAN PROVETate lost roughly $802,000 on Hyperliquid with no withdrawals.GOLIATH VENTURES INC froze payouts and refuses to provide evidence of actual trading.Less than 1% of their claimed activity appears on a blockchain.Their leadership occupies the same social and promotional orbit as Tate's network.Those are facts.WHAT REMAINS THEORYThere is no confirmed evidence that Goliath investor funds were placed into leveraged trades.There is no proof that Tate's liquidation directly triggered the freeze.There is no documented formal partnership between the two operations.But the behaviour, secrecy, timing, and shared ecosystem tell a story worth following.When luxury yachts, blurred identities, whispered networks, and promises of effortless returns collide, the ending is rarely surprising.I've watched this pattern unfold too many times to pretend otherwise.READ THE FULL INVESTIGATION:https://www.dehek.com/general/scam-fraud-investigations/andrew-tates-hyperliquid-wipeout-and-why-goliath-ventures-investors-should-pay-attentBuy Me a Coffee I'm on @buymeacoffee. If you like my work, you can buy me a coffee and share your thoughts.Support the show
Threat Intelligence klingt nach Hightech-Geheimdienst – aber was steckt wirklich dahinter? In dieser Folge werfen Andreas und Sandro einen kritischen Blick auf den Hype und die Realität hinter Bedrohungsinformationen. Sie diskutieren Tools, Plattformen und Feeds, zeigen, wie OSINT zur echten Waffe wird und warum ein CISA-Eintrag nicht ignoriert werden darf. Dabei geht es wie immer praxisnah zur Sache – mit Beispielen aus dem Security-Alltag. Wer wissen will, wie man aus Daten echte Erkenntnisse gewinnt, ist hier genau richtig.
Today I welcome Anthony Miller onto the podcast. Anthony shares his journey through a series of ontologically shocking events ranging from cultural to political to religious to exploring the very fabric of reality. This resulted in him developing a contact protocol that, to put it lightly, was a success. Anthony Miller is the co-host of "Fire In The Cosmos" (formerly "Obliterate The Construct"), a video podcast with Sinéad Whelehan examining the wide-ranging connections between consciousness, various anomalous phenomena, mystical experiences, and human potential. He is also the state lead for the Virginia chapter of Citizens for Disclosure, a volunteer activist group under the New Paradigm Institute pushing for UFO disclosure in Congress and destigmatizing the topic throughout society.Anthony is an experiencer of various anomalous phenomena who has learned the importance of taking a broad, non-dualistic, and integral approach in the exploration of consciousness and our greater reality, seeking to communicate this in both his public and private outreach efforts. With a career in open source intelligence (OSINT), he leverages his expertise in media and disinformation analysis to raise awareness on the narratives and constructs that have co-created and continue to permeate our perceived realities, and how we can regain agency and re-enchant our world. Anthony holds a master's degree in Public Policy & National Security from George Mason University and a B.A. in International Studies from Virginia Tech. Recently, he has started a position as Fundraiser for the nonprofit Consciousness Hub -- a community for those exploring the nature of reality, inner growth, and expanded awareness, featuring live events, meditations, imagination journeys, and practical tools that support real change.Fire In The Cosmos LinksYouTube (Video)Spotify (Audio)Patreon (Support & Community)InstagramX/TwitterFacebookListen to my recent appearance on Gods, Ghosts and UFOs.Become a patron at the EarthLovers $10 tier by visiting patreon.com/robinlassiter and get access to two Community Gatherings per month. Earth: A Love Story is now an AUDIOBOOK!My book Earth: A Love Story exists as a physical object in the world. Deep forever gratitude to those of you who have purchased the book and left reviews on Amazon. Thank you, thank you, thank you.Our beautiful musical soundscapes are provided by Morgan Jenks. You can support his new album on bandcamp, or find out more at morganjenks.comFind me on instagram @robin_lassiter_honeyheart and @earth_a_love_storyTo join my mailing list or book a 1:1 session with me, visit robinlassiter.com
durée : 00:03:03 - Un monde connecté - par : François Saltiel - Nouvelle enquête pour le magazine d'investigation en OSINT d'arte, la rédaction s'intéresse au sort des réfugiés Nord-coréens qui tente de rejoindre la Chine au péril de leur vie.
AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
AI Daily News Rundown November 12 2025:Welcome to AI Unraveled, Your daily briefing on the real world business impact of AI
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You'll also get 20% off and annual premium subscription Two veteran OSINT investigators show how they pull hidden data from TikTok, Telegram, X, Cash App and WordPress using simple browser bookmarklets. No malware, no exploits, just JavaScript in your browser. They also show how to build these tools with AI in minutes, even if you can't code, and how to stay safe with sock puppets, VMs and VPNs. Timestamps below. // Affiliate LINKS // Get 10% off our All OSINT Course Bundle and our OSINT Immersion Bundle by using the Coupon Code: bombal-mot-10 Bundle links and descriptions are https://www.myosint.training/pages/bu... // MOT SOCIAL // LinkedIn: / my-osint-training Blueskyhttps://bsky.app/profile/myosint.trai... X: https://x.com/myosinttrainer // Micah SOCIAL // LinkedIn - / micahhoffman Bluesky - https://bsky.app/profile/webbreacher.com X - https://x.com/webbreacher // Griffin SOCIAL // LinkedIn - / griffin-g BlueSky - https://bsky.app/profile/hatless1der.com X - https://x.com/hatless1der // David's YouTube PLAYLIST // OSINT: • OSINT: You can't hide // Your privacy is d... // My OSINT Training SOCIAL // OSINT Training: https://myosint.training OSINT Newsletter: https://myosint.link/newsletter Twitter: / myosinttrainer LinkedIn: / my-osint-training YouTube: / @myosinttraining // Resources SHARED // My OSINT Training (MOT) free courses: Introduction to OSINT - https://www.myosint.training/courses/... Careers Using OSINT Skills https://www.myosint.training/courses/... or on YouTube • Careers in OSINT Griffin's Start.me page: https://myosint.link/hatless or https://start.me/p/DPYPMz/the-ultimat... Newsletter – My OSINT News (through My OSINT Training): https://myosint.link/newsletter (https://link.myosint.training/my-osin...) // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:41 - Updates with Griffin and Micah 02:44 - Brilliant sponsored segment 03:42 - Bookmarklet explained 08:16 - Real-world use cases of bookmarklets 11:11 - How do bookmarklets work 13:17 - Free tools // Tools walkthrough 16:55 - Using AI for safe bookmarklets // Protecting your system 21:24 - Using AI for safe bookmarklets demo 23:56 - More bookmarklet demos 31:20 - Efficiency with bookmarklets 33:09 - More bookmarklet demos 39:31 - Making a bookmarklet with AI 43:38 - Easter egg bookmarklet 44:56 - OSINT online training academy 48:32 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
I'm DANNY DEHEK https://www.dehek.com, a New York Times–featured investigative journalist (print edition, by David Segal, featured in a Bloomberg documentary by Alice Kantor, and quoted by The Guardian Australia in coverage by Sarah Martin.I use open-source intelligence (OSINT https://www.dehek.com/general/scam-fraud-investigations/what-is-osint-the-power-of-open-source-intelligence-in-scam-busting/) to expose scams, Ponzi schemes, and MLM frauds — naming and shaming the bad actors behind the lies.This site is my home base, protected by PROJECT SHIELD https://projectshield.google/, Google's defence system for journalists under digital attack. Scammers have taken down my social media, filed fake copyright strikes, and launched SMEAR CAMPAIGNS https://www.dehek.com/smear-campaigns/ to silence me — but I'm still here, because the truth doesn't fold.Most people know me from my YouTube channel, DANNY DE HEK INVESTIGATIONS https://www.youtube.com/@DEHEK, where I crash live scam meetings, confront fraudsters on camera, and expose deception in real time. My interviews aren't rehearsed or polite — they happen in the moment, when scammers realise they're being held accountable. My investigations have been featured by The New York Times, Bloomberg, The Guardian Australia, ABC News Australia, and others — because this work matters.The BLOG https://www.dehek.com/blog/ is where everything connects — hundreds of detailed Scam & Fraud Investigations that don't vanish when scammers report or censor my content elsewhere. Every post is backed by evidence — screenshots, transcripts, court documents, and blockchain data — creating a public record that can't be erased. My PODCAST https://podcast.dehek.com is an extension of that work. It's distributed across 18 major platforms — including Apple Podcasts, Spotify, Amazon Music, YouTube, and iHeartRadio — so when scammers try to hide, my content follows them everywhere.I collaborate with whistleblowers, regulators, journalists, and private companies that need real intelligence — not PR spin. Everything published here is verifiable and legally sourced: corporate filings, domain data, blockchain records, and the digital footprints scammers can't hide.“I've taken it upon myself to fight back — exposing fraudsters, confronting scammers, and making sure their lies don't go unchecked.”Everything I do here is about turning exposure into prevention — helping victims, informing the public, and making it harder for bad actors to hide.You can BOOK ME https://www.dehek.com/book-me/ for private consultations:- EXPRESS CHAT https://ko-fi.com/s/750489e6fe — quick private sessions for victims or anyone needing immediate guidance.- SPONSOR A REVIEW https://ko-fi.com/s/e450de6745 — commission an in-depth public investigation or company review.- SUPPORT SESSION https://ko-fi.com/s/fd88f16cb0 — one-to-one calls for victims rebuilding after financial loss.These sessions and donations keep the investigations running — funding research, legal work, and the tools needed to expose fraud at scale.Show your backing with official NO SCAM gear from the MERCH store https://store.dehek.com.I'm also available for SPEAKING ENGAGEMENTS https://www.dehek.com/speaking-engagements/, sharing what I've learned as a cult survivor, dyslexia advocate, and front-line investigator — raw, unscripted, and real.If you've been scammed or have insider information, screenshots, or video evidence that could help uncover criminal activity, you can reach me through CONTACT https://www.dehek.com/contact. Anonymity is fine — every message is treated as confidential. Many of my best leads come from ordinary people who decidSupport the show
Join us behind the scenes at one of Sweden's most beloved cyber security conferences, SEC-T in Stockholm!Recorded live on site, this episode captures small but powerful conversations with international speakers, organisers and the founders of SEC-T. We got to meet some of the speakers directly after their talks on stage:Yuri – Cyber Defense under Fire: Strategic Insights from Ukraine's FrontlineAnton Linné – I Know Who Your Users Are – Abusing User Enumeration for OSINT and Bug BountyDan Tentler “Wes” – How to Bug Hotel Rooms v2.0Emerson Tan – part of the SEC-T staff teamMichal Kaput – Gotcha! How to Track Down a Drone Operator in the Heart of WarIgnacio Navarro – Oops, I Hacked It Again – Tales and DisclosuresFredrik Sandström – Build Your First Threat Emulation Plan...to ask them some key questions including:“What's the biggest challenge in cybersecurity right now?”And that's not all!We also welcomed two of the original founders of SEC-T, Mattias Bååth and Thomas Olofsson, to our cybercorner for a conversation about how it all started, what keeps the spirit of SEC-T alive, and the magic of bringing the international hacker community together.So grab your headphones, and join us behind the scenes of SEC-T!(Want to see the full talks? Check them out at sec-t.org) Hosted on Acast. See acast.com/privacy for more information.
AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
AI Daily Rundown: October 31, 2025:Welcome to AI Unraveled, Your daily briefing on the real world business impact of AIListen at https://podcasts.apple.com/us/podcast/ai-daily-news-rundown-amazon-ceo-says-layoffs-were/id1684415169?i=1000734511393In Today's edition:
Seit August fliegen Kamikazedrohnen gezielt in Ölraffinerien in Russland. Die Ukraine trifft – doch längst nicht so oft, wie sie möchte. In dieser Folge erklärt der Datenjournalist Simon Huwiler, welche Wirkung auf Russlands Wirtschaft und Bevölkerung diese Angriffe haben und welche Strategie die Ukraine damit verfolgt.
Has “A House of Dynamite” popped up on your Netflix? Our staff got the chance to see it early in theaters and decided to break down what this film gets right (and wrong) about the nuclear weapons complex and what we hope people will take away from it. Host and Communications Associate Farah Sonde is joined by Senior Policy Director John Erath, Research Analyst Connor Murray and Communications Director Anna Schumann in this special Nukes of Hazard roundtable. Music from www.bensound.com Show Notes - More analysis from us on “A House of Dynamite”: https://armscontrolcenter.org/a-house-of-dynamite/ Check out our podcast episode on OSINT (open-source intelligence) collection: https://soundcloud.com/cacnp/how-open-source-intelligence-can-unlock-nuclear-secrets Check out our podcast episode on the nuclear football and our nuclear launch system: https://soundcloud.com/cacnp/footballs-biscuits-and-americas-nuclear-monarchy
In “Who Stole Guy Fieri and Sammy Hagar's Tequila”, Joe Lynch and Jessica McFate, Sr. Director of Intelligence Solutions at Babel Street, discuss how national security intelligence methods are now vital for solving commercial theft and securing global supply chains. About Jessica McFate Jessica Lewis McFate is Sr. Director of Intelligence Solutions at Babel Street and a career intelligence professional, specializing in OSINT for national security. At the Institute for the Study of War, her research won acclaim for forecasting the rise of ISIS. She has authored over 50 publications, briefed top U.S. government agencies, appeared in print and broadcast media, and testified before Congress. A West Point graduate, she served as a U.S. Army officer with 34 months in country deployment in Iraq and Afghanistan supporting signals intelligence, human intelligence, and counter-corruption roles. About Babel Street Babel Street delivers mission-grade risk intelligence for organizations across government, defense, and the private sector to expose hidden identities, secure vendor networks, and identify threats. Our AI-native platform empowers the most trusted organizations in the world with the strategic advantage needed to stay ahead of risk and protect their missions. Headquartered in the U.S., Babel Street has an established presence in Australia, Canada, Israel, Japan, and the U.K. For more information, visit babelstreet.com. Webinar: Securing Tomorrow: The Critical Role of Intelligent Vendor Vetting in Government Supply Chains For more information on how intelligent vendor vetting can protect your supply chain and help ensure compliance with new U.S. government contractor requirements, register for the upcoming webinar, “Securing Tomorrow: The Critical Role of Intelligent Vendor Vetting in Government Supply Chains,” to be presented by Babel Street and Carahsoft on Wednesday, October 29, 2025, at 3:00 p.m. Eastern. Key Takeaways: Who Stole Guy Fieri and Sammy Hagar's Tequila In “Who Stole Guy Fieri and Sammy Hagar's Tequila”, Joe Lynch and Jessica McFate, Sr. Director of Intelligence Solutions at Babel Street, discuss how national security intelligence methods are now vital for solving commercial theft and securing global supply chains. OSINT: The New Tool in Commercial Investigations: Learn how Open-Source Intelligence (OSINT)—the same methodology used to forecast global threats like the rise of ISIS—is now being repurposed to trace and recover high-value commercial assets, such as stolen celebrity tequila, by monitoring online chatter and digital footprints. From Counter-Corruption to Corporate Supply Chains: Understand how the principles of counter-corruption and signals intelligence (SIGINT) that Jessica applied during her military deployments in Iraq and Afghanistan are directly relevant to identifying and neutralizing vulnerabilities in modern-day vendor networks and supply chains. The Tequila Heist as a Case Study for Organized Crime: Discover how the theft of a high-profile brand like Guy Fieri and Sammy Hagar's tequila is rarely an isolated incident, but often a sign of sophisticated organized criminal enterprises using the dark market, which requires a "mission-grade" approach to identify the true threat actors. The Power of AI in Exposing Hidden Identities: Explore how Babel Street's AI-native platform is used to rapidly sift through global, multilingual data to "expose hidden identities" involved in commercial theft, showing that the sheer volume of data makes human-only analysis impossible. Forecasting and Pre-Empting Brand Risk: A key lesson is the shift from reacting to theft to predicting it. Learn how intelligence professionals can apply forecasting models to identify and secure distribution choke points or compromised vendor relationships before a high-value product goes missing. The Strategic Cost of Reputational Damage: Beyond the physical loss of inventory, the episode highlights the immense brand and reputational risk for celebrity-backed products. The use of advanced risk intelligence is necessary to protect a brand's integrity and consumer trust following a public security failure. Bridging National Security and Private Sector Intelligence: The conversation will demonstrate the growing imperative for private companies to adopt the rigor and discipline of national security intelligence methods to secure their operations against global threats, transforming how they approach risk mitigation. Learn More About Who Stole Guy Fieri and Sammy Hagar's Tequila Jessica McFate LinkedIn Babel Street LinkedIn Babel Street Guy Fieri reveals new details into the criminals who stole $1M of his tequila Thieves Steal 24,000 Bottles of Guy Fieri's Tequila in Elaborate Cross-Country Heist The Logistics of Logistics Podcast If you enjoy the podcast, please leave a positive review, subscribe, and share it with your friends and colleagues. The Logistics of Logistics Podcast: Google, Apple, Castbox, Spotify, Stitcher, PlayerFM, Tunein, Podbean, Owltail, Libsyn, Overcast Check out The Logistics of Logistics on Youtube
Send us a textWe examine credible OSINT warnings about a mid-December threat window and translate them into calm, practical steps that reduce risk in everyday places. We share specific tactics attackers use, how responders operate, and the simple habits that boost your odds of getting home safe.• who Sarah Adams is and what OSINT reveals• why a multi‑wave attack model increases chaos• run hide fight applied to multiple shooters• avoiding secondary devices and decoys• why not to livestream during an incident• verifying real police versus impostors• first responder staging and medical priorities• limits of airport security and peak travel risk• practical situational awareness habits• the line between paranoia and preparationBe sure to subscribe so you don't miss an episodeWhile you're at it, help spread the word by leaving a rating and reviewhttps://augasonfarms.com?sca_ref=9315862.VpHzogdDNuAugason FarmsSupport the podcast. Click on my affiliate link and use coupon code PODCASTPREP for 10% discount!Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showHave a question, suggestion or comment? Please email me at practicalpreppodcast@gmail.com. I will not sell your email address and I will personally respond to you.
In this episode, Adam interviews the researcher behind SecretMilitaryTechnology.com — a digital investigator using custom AI systems to uncover the hidden connections between plasma physics, classified propulsion programs, and black-budget funding networks.Through advanced open-source intelligence (OSINT) and AI-driven analysis, he has mapped a stunning continuity of research — from the 1977 Los Alamos thermonuclear experiments to Boeing's alleged Compact Fusion Reactor (CFR) tests, and even to Jeffrey Epstein's strange intersection with frontier physics.We walk through four core documents from his site:Epstein, Plasma Physics Nexus Analysis — how Epstein's “Confronting Gravity” workshop may have linked plasma and fusion experts.Boeing CFR Orb Test Analysis — evidence of classified plasma containment systems hidden within Next Generation Air Dominance (NGAD).1977 Los Alamos Controlled Thermonuclear Research Report — a Cold War rootline for today's fusion-propulsion experiments.CIA P2 Memo — how compartmentalized funding channels keep advanced physics hidden under intelligence cover.Together, these form a picture of a continuing plasma research lineage—one that may have evolved into today's secret propulsion programs and UAP encounters.At the end, we also discuss the controversy with Ashton Forbes, the importance of open peer review, and how AI itself might become the ultimate disclosure tool.Explore the documents: SecretMilitaryTechnology.comFollow on X: https://x.com/MilitarySolved
Hervé Letoqueux est un grand spécialiste de l'enquête en source ouverte.L'enquête en source ouverte, souvent plus connue sous son acronyme en anglais Osint, "open source intelligence", c'est au départ une vieille technique des services de renseignement qui consiste à utiliser des infos à la portée de tous pour enquêter. Hervé Letoqueux a mis ces méthodes --- rémise au gout du jour par l'essor d'internet -- au service de la douane judiciaire puis d'enquêtes de la justice antiterroriste, avant de devenir le chef de la division des opérations au service de vigilance et de protection contre les ingérences numériques étrangères (VIGINUM).À ce titre il a assisté en première ligne à l'essor de réseaux d'ingérence pilotés par la Russie pour destabiliser les démocraties occidentales. Dans cet entretien préparé avec Julie Charpentrat, rédactrice en chef de l'investigation numérique à l'AFP, il nous raconte ses enquêtes et dresse un état des lieux des ingérences passées et à venir. Réalisation : Maxime Mamet et Michaëla Cancela-Kieffer.La Semaine sur le fil est le podcast hebdomadaire de l'AFP. Vous avez des commentaires ? Ecrivez-nous à podcast@afp.com. Si vous aimez, abonnez-vous, parlez de nous autour de vous et laissez-nous plein d'étoiles sur votre plateforme de podcasts préférée pour mieux faire connaître notre programme Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про українську зброю на фронті, справу Юрія Касьянова та відключення електрики в РосіїВедучий – Олексій Тарасов
[This is one of the finalists in the 2025 review contest, written by an ACX reader who will remain anonymous until after voting is done. I'll be posting about one of these a week for several months. When you've read them all, I'll ask you to vote for a favorite, so remember which ones you liked] You Can Just Do Things In the winter of 2022 I was unhappily working at a dull but decently compensated IT job, which I had come upon at last after four years of phoning it in at college and abandoning my brief stint as an MMA Fighter/Porn Store Security Guard due to feeling like I was getting too old to be broke. If pressure to fit in with my yuppie, family-and-career-having peers pushed me into corporate life, the depressing mundanity of Covid-era day-to-day pushed me out just as quickly. On February 24th, 2022, Russia began its full scale invasion, and America learned what a “Ukraine” was. Having long used politics as a surrogate activity to distract myself from my life of chronic underachievement, I was already a little more familiar than most with the country's woes, and had followed the conflict from the time of the Euromaidan protests. Years before I had read of the likes of Azov and its many foreign volunteers, and had even periodically fantasized about dropping everything and going to the Donetsk Airport. But no, that Wasn't The Type Of Thing Normal People Like Me Did, so instead I joined my own country's armed forces, sat around pushing papers, earned the dubious honor of washing out “ahead of schedule”, and finally graduated college with a not very useful degree and a mediocre GPA. With the invasion however, things changed. Before I had always vaguely felt that I would eventually end up doing something “cool”, and had soothed myself with reassurances that I was still in the “early life” section of my future Wikipedia article and would bide my time before I made my play at greatness. Now however, the unrealisticness of this conceit was thrown into uncomfortably sharp relief by a certain contrast I could not not ignore. Only three days after the start of the full scale invasion, Ukrainian foreign minister Dymytro Kuleba announced the creation of the “International Legion For The Territorial Defense Of Ukraine”. Unlike in 2014, Ukraine was now specifically and officially soliciting foreigners with military experience to fight for them! I was at least technically in that category! I thought about my own time in the military. My ideas of going to war in Afghanistan had been quashed by the US withdrawal not long after I joined, and I had quickly found that military life involved more editing forms in Adobe Acrobat and less explosions than I had naively supposed. But this was a real war, a deadly serious war, and a major, world defining event at that. In the early months of the invasion the international media talked about almost nothing else. I spent all day at my desk pretending to work while frantically refreshing OSINT live maps and breathlessly following news from the front. I remember the circulation of harrowing video clips. Kalashnikovs being distributed to civilians in Kyiv, the mayor of a small village publicly asking its inhabitants whether they should personally accede to Russian ultimatums, or risk having their property destroyed and lives forfeit- to resounding cries of “Glory to Ukraine”. The Ukrainians' courage blew my mind. There were people who really had something to die for, and by extension something to live for. Meanwhile, there I was, sipping coffee and getting fat. The creation of the legion felt like destiny was reaching its hand out to me. Was I really going to ignore it so I could handle support tickets for the rest of my life? https://www.astralcodexten.com/p/your-review-the-russo-ukrainian-war
In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I'm redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing' approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy tools and self-hosting. I also introduce a new concept from my recent blog post about the “space between” in cybersecurity, examining how compartmentalization of identities can serve as an early warning system against social engineering attacks.In this week's episode:Why this is the final episodeThe all-or-nothing fallacyAirport facial recognition and the Clearview AI threatThreat modeling for different life situationsThe CIA triad and why 100% security doesn't existUK and Swiss digital ID systems and their privacy implicationsNPM breach case study and the psychology of social engineeringWhy organizations should compartmentalize communication channelsListener Q&A: MySudo virtual cards, self-hosting setup, and mobile hotspotsThe new Privacy Tools page on PsySecure.comMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-intro:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-general:matrix.orgShow Links:Privacy Tools Page - https://psysecure.com/privacytools/PsySecure ODSF Framework - https://odsf.psysecure.com"The Space Between" Blog Post - https://psysecure.com/ma-the-space-between-breachesSwiss E-ID System Information - https://www.bk.admin.chCyber Kill Chain (Lockheed Martin) - https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.htmlRobert Cialdini's Principles of Persuasion - https://www.influenceatwork.comDaniel Kahneman's Thinking, Fast and Slow - https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555“Nothing in life is as important as you think it is when you are thinking about it.”- Daniel Kahneman, Thinking, Fast and Slow ★ Support this podcast on Patreon ★
Dzisiejszy podcast dotyczy incydentu na Mapach Google, gdzie w nazwie szpitala Jana Pawła w Krakowie pojawiło się dodatkowe słowo: "ofiar". Jak do tego doszło? Co za to grozi? I jak chronić swoje "wizytówki" przed takimi zmianami? O tym w dzisiejszym odcinku. Ale nie tylko bo:
Three Buddy Problem - Episode 62: Lindsay Freeman, Director of the Technology, Law & Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025) Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Lindsay Freeman (https://x.com/lindsaysfreeman).
Vinny Troia is at home on the Dark Web. The veteran hacker has developed relationships with cyberactors who have quietly stolen sensitive data from the far corners of the world. Vinny sells that data to law enforcement and intelligence agencies, like the CIA. His book, Grey Area: Dark Web Data Collection and the Future of OSINT, is out this October. Prefer to watch your podcasts? Find us on YouTube at https://www.youtube.com/@IntlSpyMuseum/podcasts. Subscribe to Sasha's Substack, HUMINT, to get more intelligence stories: https://sashaingber.substack.com/ And if you have feedback or want to hear about a particular topic, you can reach us by E-mail at SpyCast@Spymuseum.org. This show is brought to you from Goat Rodeo, Airwave, and the International Spy Museum in Washington, DC. Learn more about your ad choices. Visit megaphone.fm/adchoices
Stephen Gubenia, Head of Detection Engineering for Threat Response for Cisco Meraki, shares his evolution from managing overwhelming alert volumes as a one-person security team to architecting sophisticated automated systems that handle everything from enrichment to containment. Stephen discusses the organizational changes needed for successful AI adoption, including top-down buy-in and proper training programs that help team members understand AI as a productivity multiplier rather than a job threat. The conversation also explores Stephen's practical "crawl, walk, run" methodology for responsibly implementing AI agents, the critical importance of maintaining human oversight through auditable workflows, and how security teams can transition from reactive alert management to strategic agent supervision. Topics discussed: Evolution from manual security operations to AI-powered agentic workflows that eliminate repetitive tasks and enable strategic focus. Implementation of the "crawl, walk, run" methodology for gradually introducing AI agents with proper human oversight and validation. Building enrichment agents that automatically gather threat intelligence and OSINT data instead of manual investigations. Development of reasoning models that can dynamically triage alerts, run additional queries, and recommend investigation steps. Automated containment workflows that can perform endpoint isolation and other response actions while maintaining appropriate guardrails. Essential foundations including proper logging pipelines, alerting systems, and detection logic required before implementing AI automation. Human-in-the-loop strategies that transition from per-alert review to periodic auditing and agent management oversight. Organizational change management including top-down buy-in, training programs, and addressing fears about AI replacing jobs. Future of detection engineering with AI-assisted rule development, gap analysis, and customized detection libraries. Learning recommendations for cybersecurity professionals to develop AI literacy through reputable sources and consistent daily practice. Listen to more episodes: Apple Spotify YouTube Website
China's expanding influence in the Pacific has strategic implications for international security. In this episode Kate Cox and Sean Corbett are joined by experts Dr Greg Brown, senior fellow and director of Regional Cooperation and Coordination at Australian Strategic Policy Institute (ASPI) USA and adjunct professor at Georgetown University, and Claire Chu, principal analyst at Janes, to explore the role of open-source intelligence (OSINT) in understanding these power plays. They also consider the nuanced responses of Pacific nations and global powers to provide a deeper understanding of why China is so invested in the region.
Віталій Кононученко, OSINT-аналітик, військовий оглядач Дзеркала тижня, на Radio NV про удари по Форосу та інших цілях у Криму, захист окупованого Севастополя, а також локації виробництва ракет Фламінго та російського секретного підрозділу РубіконВедучий – Олексій Тарасов
Open Source Intelligence or OSINT, is getting a major boost in the house's version of the intelligence Authorization Act. The bill would overhaul how spy agencies buy commercial data and manage OSINT. It comes as the intelligence community has already moved to reform and make OSINT a top priority. For more details Federal News Network's Justin Doubleday is here.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
With the Zapad Military exercises occurring again near the Polish border, Dominic Bowen has Antoine Renaux on the podcast. They analyse the challenges of NATO, Russia's probing operations, NATO's response, and more importantly, NATO's preparedness. Find out more about Article 5 and the potential scenarios, why hybrid warfare and cyber attacks are the future and the geopolitical risks we are facing. Antoine Renaux is an Economic Intelligence & Geopolitics Analyst, his expertise lies in defence and security policy, economic intelligence, and geopolitical risk analysis. His career spans strategic intelligence, public affairs, and policy analysis roles across both public and private sectors, giving him a nuanced, operational understanding of complex international dynamics.His key areas of expertise lie in:OSINT & competitive intelligence in the defense industry.Policy & geopolitical analysis, including diplomatic reporting at the French Embassy's Military Representation in Austria.Event & project management, including contributions to high-profile initiatives such as the Warsaw Security Forum.His approach combines precision, strategic insight, and actionable analysis to support decision-making in high-stakes environments. Motivated by a passion for strategy and security, I aim to contribute where analytical rigour, geopolitical awareness, and clear communication can make a decisive impact.The International Risk Podcast brings you conversations with global experts, frontline practitioners, and senior decision-makers who are shaping how we understand and respond to international risk. From geopolitical volatility and organised crime, to cybersecurity threats and hybrid warfare, each episode explores the forces transforming our world and what smart leaders must do to navigate them. Whether you're a board member, policymaker, or risk professional, The International Risk Podcast delivers actionable insights, sharp analysis, and real-world stories that matter.Dominic Bowen is the host of The International Risk Podcast and Europe's leading expert on international risk and crisis management. As Head of Strategic Advisory and Partner at one of Europe's leading risk management consulting firms, Dominic advises CEOs, boards, and senior executives across the continent on how to prepare for uncertainty and act with intent. He has spent decades working in war zones, advising multinational companies, and supporting Europe's business leaders. Dominic is the go-to business advisor for leaders navigating risk, crisis, and strategy; trusted for his clarity, calmness under pressure, and ability to turn volatility into competitive advantage. Dominic equips today's business leaders with the insight and confidence to lead through disruption and deliver sustained strategic advantage.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Subscribe for all our updates!Tell us what you liked!
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount At Black Hat, David Bombal sits down with OSINT pro Mishaal Khan to unpack anti-OSINT, practical steps to regain privacy without pricey services. Mishaal demos his free OperationPrivacy dashboard (400+ actions, 3 tiers: Conscious → Serious → Ghost) and shows how to: • Freeze credit & use free monitoring • Opt out of 100+ data brokers (Spokeo, Intelius, LexisNexis, more) • Blur your home on Google/Bing/Apple Maps + real-world deterrents • Claim critical accounts (IRS/DMV/USPS/UPS) and your domain • Nudge page-one results with harmless decoys • File copyright takedowns (Instagram/Google, etc.) US-centric but widely applicable. DIY, trackable, and truthful about the time it takes. // Mishaal Kahn's SOCIALS // LinkedIn: / mish-aal Website: https://www.mishaalkhan.com/ Tool created: https://www.operationprivacy.com/ // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: https://open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: https://podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 – Coming Up 01:31 – Sponsored by ProtonPass 03:00 – Introduction 05:44 – Operation Privacy Demo 07:49 – How to Freeze Your Credit 08:41 – Credit Monitoring Explained 09:19 – Managing Subscriptions 10:13 – Data Removal (Outbound Requests) 12:40 – Should You Use Automatic Removal? 14:03 – Protecting Your Privacy 15:41 – Why Privacy Takes Time 17:46 – Planting Your Privacy Flag 19:56 – Ghost Mode & SOE Manipulation 22:47 – Getting Content Removal Forms 23:40 – Taking a Holistic Approach to Privacy 25:08 – Final Thoughts / Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance that could eventually spread globally. I dive into California's $900 “smart” license plates that track your every move, centralized government digital currencies, and my predictions for the next 20 years of Orwellian surveillance.Support the show on Patreon!In this week's episode:The UK's TV licensing system: Legal extortion through private contractorsThe Reviver R-plate: $900 to track yourself in California and ArizonaBrit Cards: UK's new “voluntary” Digital ID systemThe Bank of England's digital pound and programmable moneyHistorical patterns of control: From land ownership to neural interfacesWhy the UK is the blueprint for global surveillance rolloutPredictions for the next 20-50 years of biosurveillanceMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-intro:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-general:matrix.orgShow Links:PsySecure ODSF Framework - https://odsf.psysecure.comLCD License Plate (not privacy friendly!) - https://reviver.com/rplate/Black Mirror S03E01 "Nosedive" - https://www.imdb.com/title/tt5497778/Bank of England's Digital Pound - https://www.bankofengland.co.uk/the-digital-poundBrit Card Digital ID System - https://www.labourtogether.uk/all-reports/britcardTV Licensing Detector Ads (1980s-90s): The Detector Van - https://www.youtube.com/watch?v=8NmdUcmLFkw"We know exactly where he is" - https://www.youtube.com/watch?v=qF3-S2sCnb8Keep One Eye Open - https://www.youtube.com/watch?v=mVfOmR7gAekMore Powerful Dector Vans! - https://www.youtube.com/watch?v=1Q9CsRRhWQI“One believes things because one has been conditioned to believe them.”- Mustapha Mond (Brave New World ★ Support this podcast on Patreon ★
Ever wonder how investigators and OSINT pros map the hidden corners of the digital world? In this episode, Martina Nitti joins Arnold Kochka to break down SpiderFoot, the open-source OSINT powerhouse that pulls from data sources to uncover domains, IPs, and more.
開會卡卡、思緒不清?別再怪自己!其實是身體在抗議。美鳳姐真心推薦的-娘家大紅麴,唯一有3健字號的紅麴品牌,不傷肝腎成分:有助於調節血脂、血糖,還能延緩衰老,顧健康又顧狀態!立即點擊領取優惠
Dr. Philip Ritcheson, Vice President for Strategy and Growth, National Security Sector, Leidos returns to Janes podcast to join Harry Kemsley and Sean Corbett to unpack the complexities of modern deterrence, the acceleration of technological change impacting warfare, and the critical role of open-source intelligence. They take a deep dive into how these elements are reshaping global security dynamics and explore the implications for intelligence and defence strategies.For comments and suggestions for future podcasts email: podcastsworldofintellgence@janes.com.The views expressed in this podcast are those of the author alone.
This episode unites two voices exposing treason at the highest levels: John Donovan, a former FBI agent and OSINT analyst whose discoveries prefigured Edward Snowden's revelations, and Ian Hamilton Trottier, author of High Stakes Treason: How John Brennan Compromised American Security for Millions.Together, they unravel how former CIA Director John O. Brennan weaponized U.S. intelligence: from shielding terror suspects to laundering billions through CIA-tied corporations, to orchestrating election interference and color revolutions. With forewords by Roger Stone, Brooks Agnew, and John Kiriakou as backdrop, we examine Brennan's treason not as speculation—but as a coordinated betrayal of the American people.Presented in partnership with: American Made Foundation & American Made Actionhttps://AmericanMadeFoundation.orghttps://AmericanMadeAction.orgFollow Ann Vandersteel on Pickax - https://pickax.com/annvandersteel
Matthew Ford, Associate Professor at Swedish Defence University and author of “War in the Smartphone Age: Conflict, Connectivity, and the Crises at Our Fingertips,” joins Lawfare's Justin Sherman to discuss the role of smartphones and related technologies in war, how social media contributes to a collapse of context in the war content we see online, and how smartphones and other devices are reshaping open-source intelligence (OSINT) and open-source investigations (OSINV) vis-a-vis conflicts and violence from Syria to Ethiopia to Ukraine. They also discuss the tech stack in war, how the military “kill chain” is evolving with ever-greater digital connectivity, the current state and future of “participatory warfare,” and how we can become better consumers—and sharers—of war-related content online.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, David Cook discusses his recent article: When Cell Phones Kill: Digital Discipline and the Future of SOF Obscurity. In addition to digital discipline in a national security context, David discusses cyber and AI threats and practical mitigation practices that private sector companies and citizens should be aware of. Recording Date: 19 Aug 2025 Resources: Cognitive Crucible Podcast Episodes Mentioned #222 JD Maddox on Emerging IO Opportunities When Cell Phones Kill: Digital Discipline and the Future of SOF Obscurity by Dave Cook Link to full show notes and resources Guest Bio: David Cook spent a decade in the US Army in both conventional and special operations units focused on the Middle East. After his time in the Army, David joined Congressman Darrell Issa as a fellow then National Security Advisor who handled covered his Foreign Affairs and Judiciary portfolio. David co-authored several strategic documents at Army OSINT Office and the Defense Intelligence Agency along with contributing to the most recent OSINT Strategy released by the Office of the Director of National Intelligence. Most recently, David led the go-to-market efforts of a leading OSINT software company. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач Дзеркало тижня, на Radio NV, про погодження Білим домом продажу Україні крилатих ракет ERAM, чому США залишають за собою погодження запусків цих ракет, з якої платформи повинні здійснювати запуски такого типу ракет, чи постане питання про збільшення бойового авіапарку, що відомо про радіус дії ERAM, чи можна ними збивати крилаті ракети, чи є Довгий Нептун модернізацією ракети Нептун, про звільнення Новомихайлівки, Володимирівки та Зеленого Гаю на Донеччині та якою є поточна ситуація на Покровському напрямку Ведучий – Дмитро Тузов
Episode: 00281 Released on August 25, 2025 Description: In this fourth installment of the Open Secrets series on Analyst Talk with Jason Elder, expert Jan Mondale joins us to share practical tips for organizing open source intelligence (OSINT) resources. From using Start Me pages to streamline bookmarks and investigative tools, to exploring collaborative platforms like GitHub for up-to-date OSINT collections, Jan walks us through real world strategies for staying organized and efficient. Whether you're a law enforcement analyst, cybersecurity professional, or just an OSINT enthusiast, this episode uncovers ways to save time, enhance investigations, and discover new resources with the aim at keeping your data neat and accessible.[Note: Description produced by ChatGPT.] Related Links: Jan's Notes: https://about.start.me/ https://start.me/pages/int/osint https://start.me/p/DPzxGw/osint-general-websites https://start.me/p/9ExLyR/osint-resources https://start.me/p/0Pqbdg/osint-500-tools https://start.me/p/rx6Qj8/nixintel-s-osint-resource-list https://start.me/p/BP0G2v/sara-osint https://github.com/jivoi/awesome-osint Association(s) Mentioned: Vendor(s) Mentioned: Contact: https://www.linkedin.com/in/janmondale/ Transcript: https://mcdn.podbean.com/mf/web/j87gsai45fkhfchm/OpenSecrets04.pdf Podcast Writer: Podcast Researcher: Theme Song: Written and Recorded by The Rough & Tumble. Find more of their music at www.theroughandtumble.com. Logo: Designed by Kyle McMullen. Please visit www.moderntype.com for any printable business forms and planners. Podcast Email: leapodcasts@gmail.com Podcast Webpage: www.leapodcasts.com Podcast Twitter: @leapodcasts
Віталій Кононученко, журналіст, OSINT-аналітик, військовий оглядач "Дзеркало тижня", на Radio NV про атаку українських дронів на російські НПЗ, нову українську крилату ракету Фламінго, про ситуацію на фронті, зокрема на Покровському та Добропільському напрямках.Ведучий – Дмитро Тузов
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won't be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!In this week's episode:Addressing the “Tea” controversy and clarifying my positions on doxingCommunity solution for Privacy.com and Plaid privacy concernsContact information protection strategies when family uses social mediaFuture of capture-the-flag challenges and OSINT considerationsConference attendance updates and travelMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Tea app leak article - https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/OSMOSIS Institute - https://osmosisinstitute.org/events/Privacy.com - https://privacy.com“There are no facts, only interpretations.”- Friedrich Nietzsche ★ Support this podcast on Patreon ★
On this episode of Screaming in the Cloud, Corey Quinn talks with Simon Willison, founder of Datasette and creator of LLM CLI about AI's realities versus the hype. They dive into Simon's “lethal trifecta” of AI security risks, his prediction of a major breach within six months, and real-world use cases of his open source tools, from investigative journalism to OSINT sleuthing. Simon shares grounded insights on coding with AI, the real environmental impact, AGI skepticism, and why human expertise still matters. A candid, hype-free take from someone who truly knows the space.Highlights: 00:00 Introduction and Security Concerns02:32 Conversations and Kindness04:56 Niche Museums and Collecting06:52 Blogging as a Superpower08:01 Challenges of Writing and AI15:08 Unique Use Cases of Dataset19:33 The Evolution of Open Source21:09 Security Vulnerabilities in AI32:18 Future of AI and AGI Concerns37:10 Learning Programming with AI39:12 Vibe Coding and Its Risks41:49 Environmental Impact of AI46:34 AI in Legal and Creative Fields54:20 Voice AI and Ethical Concerns01:00:07 Monetizing Content CreativelyLinks: Simon Willison's BlogDatasette ProjectLLM command-line tool and Python libraryNiche MuseumsGitHub MCP prompt injection exampleHighlights from the Claude 4 system promptAI energy usage tagAI assisted search-based research actually works nowPOSSE: Publish on your own site, syndicate elsewhereBellingcatLawyer cites fake cases invented by ChatGPT, judge is not amused (May 2023)AI hallucination cases databaseSponsor Simon to get his monthly summary newsletterhttps://simonwillison.net/https://www.linkedin.com/in/simonwillisonhttps://datasette.io/
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam