Privacy Security OSINT public
[search 0]
More

Download the App!

show episodes
 
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and occasionally the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, find your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who illuminate a complex universe. A HUMINT e ...
 
Loading …
show series
 
This week I discuss the importance of claiming your health portal profile, considerations when disclosing online vulnerabilities, and the new threat with voice cloning.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponso…
 
Marc Polymeropoulos has had to live with the consequences of decisions made under the most high-stress circumstances you can imagine as a senior intelligence officer in the CIA, retiring from his 26 years of service as one of the CIA’s most decorated field officers. In his book Clarity in Crisis, Marc shares how true leaders need to lead in and thr…
 
In Episode 77, Josh Amishav talks with Nate Warfield about threat intel, CTI League and cloud risk. My three main takeaways from the episode are: How to use tags to easily search Shodan for systems vulnerable to specific CVEs The most common threats the medical sector faces A couple of interesting techniques he uses to collect threat intel For more…
 
In his new book Proof of Life, American author Daniel Levin dives into the Syrian shadows - an underground industry of war where everything is for sale: arms, drugs, even people. In this thriller/memoir he draws on his perceptions and experience as a a lawyer turned armed conflict negotiator who, for the past twenty years, has worked with governmen…
 
This week I wrap up several loose ends from previous shows and clear out my notes.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.Listen to A…
 
In Episode 76, Josh Amishav chats with Chris Dale about several techniques to associate a given asset back to a company. Three takeaways from the episode are: How to generate a custom wordlist for brute forcing your target A bunch of methods to correlate associated company assets via things like the DOM, JARM and TLS How to automate vulnerability d…
 
This week Jason Edison joins me to discuss many new OSINT topics, resources, and tools.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.Listen…
 
Back in April 2021, Todd Bensman talked with me about the nexus between immigration and national security in his book America’s Covert Border War: the Untold Story of the Nation’s Battle to Prevent Jihadist Infiltration. Todd is an award-winning journalist who transitioned to a career as a national security intelligence professional for the Texas D…
 
In episode 75, Jeff Man joins us to talk about his time in the NSA, PCI, Hak4Kidz and content creation. My 3 main takeaways were 1) What red teaming was like in the 80s 2) Why PCI gets a bad reputation and 3) His tips for giving great conference talks. For more information, including the show notes check out: https://breachsense.io/podcast…
 
This week I discuss a way to obtain a free employer background check on yourself, an Android app which will scan for AirTags, and a new California law that shares all gun owner details.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminate…
 
Toby Harnden is an awarded journalist, foreign correspondent and former bureau chief of the Sunday Times. His most recent book is First Casualty: The untold story of he CIA mission to avenge 911. After numerous interviews with key players and having visited Afganistan several times over the last decades, Toby documents the unconventional success st…
 
EPISODE 235-iOS 15 Privacy GuideThis week I discuss several new privacy and security considerations for the latest Apple iOS release. This might be a great time to revisit your iPhone strategy.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support e…
 
This week I discuss the importance of offline maps, a recent Protonmail court order, online petition privacy issues, and another site which provides free historical domain information.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates…
 
In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now. For more information…
 
This week I finish the last two segments about an anonymous phone, including a new SMS VOIP solution, number porting issues, and feedback from the previous episode.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, …
 
In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now. For more information…
 
In episode 72, Nathan Sweaney joins us talk about the future of privacy. My 3 main takeaways were 1) Who's collecting our bluetooth and wifi signals 2) How to get your talk accepted to a security con and 3) How he used OSINT to steal (in air quotes) his twitter handle from a Nazi. For more information, including the show notes check out: https://br…
 
This week I begin a 3-part series revisiting the anonymous mobile device. I share my experiences after a few months without Google or Apple services, and provide new DIY VOIP solutions.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminate…
 
In episode 71, Peter Taylor "The Fraud Guy" joins us talk about various aspects of fraud. My 3 main takeaways were 1) The common types of fraud he sees in his investigations 2) How Covid has influenced the fraud space and 3) Why aged shell companies and email addresses are so valuable For more information, including the show notes check out: https:…
 
This week I offer discussions on the latest T-Mobile breach, a US Census breach, another lesson on "Journalism" and doing your own research, macOS telemetry updates, and an OSINT tip for image forensics.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your…
 
In episode 70, Volodymyr "Bob" Diachenko joins us talk about his research around open databases. My 3 main takeaways were 1) How he finds open databases 2) How he stays on the legal side when verifying his research and 3) Some cyber hygiene tips to prevent allowing unauthorized access to your critical infrastructure For more information, including …
 
This week I revisit my methods for personal online data removal, offer a new free removal workbook, plus two new OSINT tips.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or com…
 
In episode 69, James Linton joins us talk about his email pranking days and Business Email Compromise in general. My 3 main takeaways were 1) some tactical tips on how he gained rapport on the initial contact 2) common risks associated with email related fraud and 3) how to protect yourself against email scams For more information, including the sh…
 
This is a special episode in which I attempt a rational explanation of both sides of the latest Apple child protection features.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or…
 
EPISODE 228-New Privacy & OSINT StrategiesThis week I present two new privacy strategies, including a new opt-out platform and macOS telemetry minimization, plus the latest privacy news and a new OSINT tip about government database downloads.Direct support for this podcast comes from sales of my books, services, and online video training. More deta…
 
In episode 68, Christian Espinosa joins us talk about effective communication. My 3 main takeaways were 1) Why we need to stop listening for agreement and instead look for insights 2) how acknowledging yourself plays a critical role in your ability to recognize others achievements and 3) The advantages of mono-tasking vs multi-tasking For more info…
 
EPISODE 227-Eleven TopicsThis week I present Eleven assorted topics surrounding privacy, security, and OSINT including a Pegasus recap, ID.Me challenges, more Airtag concerns, the Protonmail audit, results from a ProtonMail search warrant, new uBlock Origin features, another email masking option, upcoming Google Voice changes, GrapheneOS updates, L…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login