<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/needlestackbyauthentic8/" rel="self" type="application/rss+xml"/><title><![CDATA[NeedleStack]]></title><podcast:guid>229387de-4715-57c2-93e2-b2a9d4a32d9e</podcast:guid><lastBuildDate>Thu, 19 Mar 2026 07:30:24 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Authentic8]]></copyright><managingEditor>Authentic8</managingEditor><itunes:summary><![CDATA[NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. 

From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!]]></itunes:summary><image><url>https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png</url><title>NeedleStack</title><link><![CDATA[https://authentic8.com/needlestack]]></link></image><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><itunes:owner><itunes:name>Authentic8</itunes:name></itunes:owner><itunes:author>Authentic8</itunes:author><description>NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. 

From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!</description><link>https://authentic8.com/needlestack</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[The OSINT podcast]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="True Crime"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Alligator in the Boat</title><itunes:title>Alligator in the Boat</itunes:title><description><![CDATA[<p>Integrating security into our daily lives can feel overwhelming. From password management to encryption, it’s easy to feel frustrated. Robert Vamosi and AJ Nash share our experiences navigating security in our personal and professional lives. They discuss practical strategies like how to choose your seat in a restaurant for safety and the importance of encryption. Remember, security isn’t just a job; it’s a lifestyle. Finding the right balance is key, and it’s okay to have slip-ups along the way. </p>]]></description><content:encoded><![CDATA[<p>Integrating security into our daily lives can feel overwhelming. From password management to encryption, it’s easy to feel frustrated. Robert Vamosi and AJ Nash share our experiences navigating security in our personal and professional lives. They discuss practical strategies like how to choose your seat in a restaurant for safety and the importance of encryption. Remember, security isn’t just a job; it’s a lifestyle. Finding the right balance is key, and it’s okay to have slip-ups along the way. </p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">b894c8c3-1b4d-4023-83c0-500d56cd159e</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Thu, 19 Mar 2026 03:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/b894c8c3-1b4d-4023-83c0-500d56cd159e.mp3" length="66520781" type="audio/mpeg"/><itunes:duration>46:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>102</itunes:episode><podcast:episode>102</podcast:episode></item><item><title>Navigating the Ransomware Negotiation</title><itunes:title>Navigating the Ransomware Negotiation</itunes:title><description><![CDATA[<p>In this episode, hosts Robert Vamosi and AJ Nash engage with cybersecurity expert John DiMaggio to explore the complexities of ransomware negotiation. They discuss the process of responding to ransomware attacks, the stakeholders involved, and the legal and ethical considerations that companies face when deciding whether to pay a ransom. The conversation delves into the tactics used by ransomware groups, the importance of understanding target selection, and the role of insurance in these scenarios. Additionally, they highlight the need for standards in negotiation practices and preventative measures that organizations can take to mitigate risks. The episode concludes with a discussion on the future of ransomware negotiation and the importance of having knowledgeable advisors in the field.</p>]]></description><content:encoded><![CDATA[<p>In this episode, hosts Robert Vamosi and AJ Nash engage with cybersecurity expert John DiMaggio to explore the complexities of ransomware negotiation. They discuss the process of responding to ransomware attacks, the stakeholders involved, and the legal and ethical considerations that companies face when deciding whether to pay a ransom. The conversation delves into the tactics used by ransomware groups, the importance of understanding target selection, and the role of insurance in these scenarios. Additionally, they highlight the need for standards in negotiation practices and preventative measures that organizations can take to mitigate risks. The episode concludes with a discussion on the future of ransomware negotiation and the importance of having knowledgeable advisors in the field.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">61522880-e2c9-44f3-a9d9-9d0cadd9afc3</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 04 Mar 2026 22:45:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/61522880-e2c9-44f3-a9d9-9d0cadd9afc3.mp3" length="71871703" type="audio/mpeg"/><itunes:duration>49:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>101</itunes:episode><podcast:episode>101</podcast:episode></item><item><title>Best Practices For Open-Source Investigations</title><itunes:title>Best Practices For Open-Source Investigations</itunes:title><description><![CDATA[<p>In this special 100th episode of Needlestack, hosts Robert Vamosi and AJ Nash celebrate the milestone with former NeedleStack host, Matt Ashburn, discussing the evolution and importance of OSINT. They dive into best practices, the risks of normalized habits, and the significance of isolation in investigations. The conversation highlights the behavioral attributes that can identify investigators, the challenges of new generations in the field, and the need for accountability and reputation in intelligence work. They also explore the role of technology, the importance of first-hand access, and the balance between timeliness and accuracy in intelligence reporting.</p>]]></description><content:encoded><![CDATA[<p>In this special 100th episode of Needlestack, hosts Robert Vamosi and AJ Nash celebrate the milestone with former NeedleStack host, Matt Ashburn, discussing the evolution and importance of OSINT. They dive into best practices, the risks of normalized habits, and the significance of isolation in investigations. The conversation highlights the behavioral attributes that can identify investigators, the challenges of new generations in the field, and the need for accountability and reputation in intelligence work. They also explore the role of technology, the importance of first-hand access, and the balance between timeliness and accuracy in intelligence reporting.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">a69c5935-e202-4ffc-a9bc-82a3cdb48c98</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 18 Feb 2026 18:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/a69c5935-e202-4ffc-a9bc-82a3cdb48c98.mp3" length="73611046" type="audio/mpeg"/><itunes:duration>51:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>100</itunes:episode><podcast:episode>100</podcast:episode></item><item><title>Exploring the Dark Web: Myths and Realities</title><itunes:title>Exploring the Dark Web: Myths and Realities</itunes:title><description><![CDATA[<p>NeedleStack hosts, AJ Nash and Robert Vamosi engage with Roman Sannikov a seasoned expert in cyber threat intelligence, to explore the complexities of the dark web. The conversation delves into the myths surrounding the dark web, the community dynamics within cybercrime, and the professionalization of criminal enterprises. Roman shares insights on how trust and reputation are managed in these underground communities, the barriers to entry for new members, and the human element that often gets overlooked in discussions about cybercriminals.</p>]]></description><content:encoded><![CDATA[<p>NeedleStack hosts, AJ Nash and Robert Vamosi engage with Roman Sannikov a seasoned expert in cyber threat intelligence, to explore the complexities of the dark web. The conversation delves into the myths surrounding the dark web, the community dynamics within cybercrime, and the professionalization of criminal enterprises. Roman shares insights on how trust and reputation are managed in these underground communities, the barriers to entry for new members, and the human element that often gets overlooked in discussions about cybercriminals.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">2ac9ac28-138a-41e4-be35-d721d0088b00</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Thu, 05 Feb 2026 12:45:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/2ac9ac28-138a-41e4-be35-d721d0088b00.mp3" length="79799971" type="audio/mpeg"/><itunes:duration>55:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>99</itunes:episode><podcast:episode>99</podcast:episode></item><item><title>Navigating China&apos;s Strategic Landscape</title><itunes:title>Navigating China&apos;s Strategic Landscape</itunes:title><description><![CDATA[<p>In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with John Costello, a director at WireScreen, to discuss the complexities of China's strategic competition with the United States. The conversation covers China's technological advancements, the implications of its five-year plans, challenges in intelligence gathering, and the dynamics of military-civil fusion. The discussion also touches on the importance of due diligence for businesses engaging with Chinese companies and the role of Chinese students in U.S. education.</p>]]></description><content:encoded><![CDATA[<p>In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with John Costello, a director at WireScreen, to discuss the complexities of China's strategic competition with the United States. The conversation covers China's technological advancements, the implications of its five-year plans, challenges in intelligence gathering, and the dynamics of military-civil fusion. The discussion also touches on the importance of due diligence for businesses engaging with Chinese companies and the role of Chinese students in U.S. education.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">d0da02b1-0e5f-4698-93f6-dcd61d933563</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 21 Jan 2026 17:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/d0da02b1-0e5f-4698-93f6-dcd61d933563.mp3" length="64653130" type="audio/mpeg"/><itunes:duration>44:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>98</itunes:episode><podcast:episode>98</podcast:episode></item><item><title>Is Mass Surveillance Helping or Hindering Intelligence?</title><itunes:title>Is Mass Surveillance Helping or Hindering Intelligence?</itunes:title><description><![CDATA[<p>In this episode, the hosts discuss the implications of surveillance technology and AI on intelligence, journalism, and civil liberties. They explore the dual nature of surveillance as both a tool for security and a potential threat to privacy. The conversation delves into the challenges posed by misinformation, the importance of expertise in navigating these issues, and the ethical considerations surrounding the use of surveillance technology. The episode concludes with reflections on the future of journalism and the role of AI in shaping public perception and trust.</p>]]></description><content:encoded><![CDATA[<p>In this episode, the hosts discuss the implications of surveillance technology and AI on intelligence, journalism, and civil liberties. They explore the dual nature of surveillance as both a tool for security and a potential threat to privacy. The conversation delves into the challenges posed by misinformation, the importance of expertise in navigating these issues, and the ethical considerations surrounding the use of surveillance technology. The episode concludes with reflections on the future of journalism and the role of AI in shaping public perception and trust.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">81bdac79-16f9-4d51-9546-336f8dda17a4</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 07 Jan 2026 13:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/81bdac79-16f9-4d51-9546-336f8dda17a4.mp3" length="79266889" type="audio/mpeg"/><itunes:duration>55:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>97</itunes:episode><podcast:episode>97</podcast:episode></item><item><title>Mastering the Art of Disappearing Online</title><itunes:title>Mastering the Art of Disappearing Online</itunes:title><description><![CDATA[<p>In this episode of Needlestack, hosts AJ Nash and Robert Vamosi delve into the complexities of disappearing online, drawing insights from their experiences and the book '<a href="https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380520/" rel="noopener noreferrer" target="_blank">The Art of Invisibility'</a> by Kevin Mitnick. They discuss practical steps for maintaining anonymity, the role of technology in obfuscation, and the challenges of creating and sustaining multiple identities. The conversation also touches on the impact of AI on privacy and the importance of understanding personal risks in a digital world. Through engaging anecdotes and expert insights, the hosts provide a comprehensive overview of the art of invisibility in today's interconnected society.</p>]]></description><content:encoded><![CDATA[<p>In this episode of Needlestack, hosts AJ Nash and Robert Vamosi delve into the complexities of disappearing online, drawing insights from their experiences and the book '<a href="https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380520/" rel="noopener noreferrer" target="_blank">The Art of Invisibility'</a> by Kevin Mitnick. They discuss practical steps for maintaining anonymity, the role of technology in obfuscation, and the challenges of creating and sustaining multiple identities. The conversation also touches on the impact of AI on privacy and the importance of understanding personal risks in a digital world. Through engaging anecdotes and expert insights, the hosts provide a comprehensive overview of the art of invisibility in today's interconnected society.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">14b38785-534d-4782-bf5a-744d77e178d7</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Thu, 11 Dec 2025 15:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/14b38785-534d-4782-bf5a-744d77e178d7.mp3" length="71530022" type="audio/mpeg"/><itunes:duration>49:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>96</itunes:episode><podcast:episode>96</podcast:episode></item><item><title>The Rise of Citizen OSINT, and What to Do About It</title><itunes:title>The Rise of Citizen OSINT, and What to Do About It</itunes:title><description><![CDATA[<p>In this episode, hosts Robert Vamosi and AJ Nash engage with Neil Ysart, a seasoned expert in cyber investigations and open source intelligence (OSINT). They discuss the Coalition of Cyber Investigators, its role in promoting OSINT, and the importance of establishing standards in the field. The conversation delves into the challenges and risks associated with OSINT, emphasizing the need for ethical practices and the potential dangers of unregulated citizen intelligence efforts. The episode concludes with a call to action for listeners to advocate for the development of global standards in OSINT.</p>]]></description><content:encoded><![CDATA[<p>In this episode, hosts Robert Vamosi and AJ Nash engage with Neil Ysart, a seasoned expert in cyber investigations and open source intelligence (OSINT). They discuss the Coalition of Cyber Investigators, its role in promoting OSINT, and the importance of establishing standards in the field. The conversation delves into the challenges and risks associated with OSINT, emphasizing the need for ethical practices and the potential dangers of unregulated citizen intelligence efforts. The episode concludes with a call to action for listeners to advocate for the development of global standards in OSINT.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">fcc3ec6c-ea93-413f-ab16-37210c18fabb</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 26 Nov 2025 13:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/fcc3ec6c-ea93-413f-ab16-37210c18fabb.mp3" length="61515302" type="audio/mpeg"/><itunes:duration>42:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>95</itunes:episode><podcast:episode>95</podcast:episode></item><item><title>What is Cyber HUMINT?</title><itunes:title>What is Cyber HUMINT?</itunes:title><description><![CDATA[<p>In this episode, Michael DeBolt joins Robert Vamosi and AJ Nash to dive into the world of Cyber HUMINT — the application of traditional human intelligence (HUMINT) tradecraft in cyberspace. They discuss how investigators use digital personas (sometimes called “sock puppets”) to infiltrate online threat actor communities, collect intelligence, and even engage adversaries safely. Michael explains how credibility, language, slang, and cultural nuance are essential to blending in, while AJ highlights the risks of untrained amateurs attempting such operations. They explore the art, ethics, and operational security challenges of conducting human intelligence in the digital realm.</p>]]></description><content:encoded><![CDATA[<p>In this episode, Michael DeBolt joins Robert Vamosi and AJ Nash to dive into the world of Cyber HUMINT — the application of traditional human intelligence (HUMINT) tradecraft in cyberspace. They discuss how investigators use digital personas (sometimes called “sock puppets”) to infiltrate online threat actor communities, collect intelligence, and even engage adversaries safely. Michael explains how credibility, language, slang, and cultural nuance are essential to blending in, while AJ highlights the risks of untrained amateurs attempting such operations. They explore the art, ethics, and operational security challenges of conducting human intelligence in the digital realm.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">00664e5c-4c8b-4acb-b361-5976bb285b4e</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 12 Nov 2025 13:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/00664e5c-4c8b-4acb-b361-5976bb285b4e.mp3" length="67657421" type="audio/mpeg"/><itunes:duration>46:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>94</itunes:episode><podcast:episode>94</podcast:episode></item><item><title>Dealing with AI Slop in OSINT Investigations</title><itunes:title>Dealing with AI Slop in OSINT Investigations</itunes:title><description><![CDATA[<p>In this episode, AJ Nash and Robert Vamosi discuss the challenges posed by misinformation and the rise of AI-generated content. They explore the evolution of journalism, the impact of social media on information consumption, and the importance of critical thinking and media literacy. The conversation also touches on the role of AI in content creation, the balance between technology and human oversight, and the potential positive aspects of AI technology. Ultimately, they emphasize the need for source verification and the ongoing struggle to navigate the post-truth era.</p>]]></description><content:encoded><![CDATA[<p>In this episode, AJ Nash and Robert Vamosi discuss the challenges posed by misinformation and the rise of AI-generated content. They explore the evolution of journalism, the impact of social media on information consumption, and the importance of critical thinking and media literacy. The conversation also touches on the role of AI in content creation, the balance between technology and human oversight, and the potential positive aspects of AI technology. Ultimately, they emphasize the need for source verification and the ongoing struggle to navigate the post-truth era.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">e815e0b8-f7d3-49ab-b6c2-97057e93367e</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 29 Oct 2025 16:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e815e0b8-f7d3-49ab-b6c2-97057e93367e.mp3" length="83127762" type="audio/mpeg"/><itunes:duration>57:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>93</itunes:episode><podcast:episode>93</podcast:episode></item><item><title>What is GEOINT in OSINT?</title><itunes:title>What is GEOINT in OSINT?</itunes:title><description><![CDATA[<p>In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with James Villenueve, a geospatial intelligence expert, to explore the world of GEOINT and its intersection with open source intelligence (OSINT). They discuss the importance of understanding geospatial data, the ethical implications of its use, and the challenges of protecting personal information in a data-rich environment. The conversation also highlights positive applications of geospatial intelligence, including environmental monitoring and humanitarian efforts, while addressing the risks associated with data misuse and the evolving role of AI in the field.</p>]]></description><content:encoded><![CDATA[<p>In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with James Villenueve, a geospatial intelligence expert, to explore the world of GEOINT and its intersection with open source intelligence (OSINT). They discuss the importance of understanding geospatial data, the ethical implications of its use, and the challenges of protecting personal information in a data-rich environment. The conversation also highlights positive applications of geospatial intelligence, including environmental monitoring and humanitarian efforts, while addressing the risks associated with data misuse and the evolving role of AI in the field.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">fd6595db-c719-417f-8800-c74f845ecec0</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 15 Oct 2025 13:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/fd6595db-c719-417f-8800-c74f845ecec0.mp3" length="70180849" type="audio/mpeg"/><itunes:duration>48:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>92</itunes:episode><podcast:episode>92</podcast:episode></item><item><title>Ransomware’s Collateral Damage</title><itunes:title>Ransomware’s Collateral Damage</itunes:title><description><![CDATA[<p>Jason Baker from the Guidepoint Research &amp; Intelligence Team (GRIT) shares his background and provides insights into ransomware attribution, the challenges of defending against ransomware, and the implications of AI in ransomware operations.</p>]]></description><content:encoded><![CDATA[<p>Jason Baker from the Guidepoint Research &amp; Intelligence Team (GRIT) shares his background and provides insights into ransomware attribution, the challenges of defending against ransomware, and the implications of AI in ransomware operations.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">9fa624a9-acb6-4195-bb31-06b1664aa6c8</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 01 Oct 2025 17:15:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/9fa624a9-acb6-4195-bb31-06b1664aa6c8.mp3" length="38358064" type="audio/mpeg"/><itunes:duration>26:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>91</itunes:episode><podcast:episode>91</podcast:episode></item><item><title>Identifying fraud in financial services</title><itunes:title>Identifying fraud in financial services</itunes:title><description><![CDATA[<p>How can Intelligence benefit financial sectors? It can address challenges like sanctions, data privacy, and cryptocurrency. Teresa Walsh highlights the importance of collaboration, the role of AI in intelligence, and the necessity to professionalize intelligence roles in the private sector. The conversation also delves into building mature and unified intelligence programs, emphasizing the need for a Chief Intelligence Officer role in any organization.</p>]]></description><content:encoded><![CDATA[<p>How can Intelligence benefit financial sectors? It can address challenges like sanctions, data privacy, and cryptocurrency. Teresa Walsh highlights the importance of collaboration, the role of AI in intelligence, and the necessity to professionalize intelligence roles in the private sector. The conversation also delves into building mature and unified intelligence programs, emphasizing the need for a Chief Intelligence Officer role in any organization.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">55112d75-a0ed-4e4b-adde-fccb55ada3af</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 17 Sep 2025 18:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/55112d75-a0ed-4e4b-adde-fccb55ada3af.mp3" length="60075223" type="audio/mpeg"/><itunes:duration>41:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>90</itunes:episode><podcast:episode>90</podcast:episode></item><item><title>Adding Agentic AI to Analysis</title><itunes:title>Adding Agentic AI to Analysis</itunes:title><description><![CDATA[<p>Ultimately, GenAI has the potential to create jobs in areas like data science and cybersecurity, but only if it is integrated responsibly. However, the consensus today is that AI should remain a just tool for analysts, not a direct decision-maker, until reliability and trust in its outputs significantly improve.</p><h2>About Brian Fuller</h2><p>Brian A. Fuller is Director of Operations for the Ridge College of Intelligence Studies and Applied Sciences at Mercyhurst University, a position he assumed in December 2019. As the Director of Operations, Fuller supports all operations related to the academic curriculum or Ridge College activities. This includes working as the Director for the Center of Intelligence Research, Analysis and Training (CIRAT) and Director of the Innovation Entente Lab (IEL). Previously, he served as a Senior Open Source Intelligence (OSINT) instructor for the Department of the Army’s OSINT Office, where he was charged with overseeing the Army’s OSINT training program for the Midwest and Rocky Mountain regions. He trained Army intelligence professionals at the strategic, tactical, and special operations levels. He managed the training curriculum, personnel, financial, and administrative affairs of the program while participating as a subject matter expert in the intelligence communities’ OSINT program and operational development working groups, ensuring the continued growth of the discipline and associated tradecraft and technologies.   </p>]]></description><content:encoded><![CDATA[<p>Ultimately, GenAI has the potential to create jobs in areas like data science and cybersecurity, but only if it is integrated responsibly. However, the consensus today is that AI should remain a just tool for analysts, not a direct decision-maker, until reliability and trust in its outputs significantly improve.</p><h2>About Brian Fuller</h2><p>Brian A. Fuller is Director of Operations for the Ridge College of Intelligence Studies and Applied Sciences at Mercyhurst University, a position he assumed in December 2019. As the Director of Operations, Fuller supports all operations related to the academic curriculum or Ridge College activities. This includes working as the Director for the Center of Intelligence Research, Analysis and Training (CIRAT) and Director of the Innovation Entente Lab (IEL). Previously, he served as a Senior Open Source Intelligence (OSINT) instructor for the Department of the Army’s OSINT Office, where he was charged with overseeing the Army’s OSINT training program for the Midwest and Rocky Mountain regions. He trained Army intelligence professionals at the strategic, tactical, and special operations levels. He managed the training curriculum, personnel, financial, and administrative affairs of the program while participating as a subject matter expert in the intelligence communities’ OSINT program and operational development working groups, ensuring the continued growth of the discipline and associated tradecraft and technologies.   </p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">12fd1369-2a95-445f-8ede-ad8379bfe30c</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 03 Sep 2025 16:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/12fd1369-2a95-445f-8ede-ad8379bfe30c.mp3" length="82819308" type="audio/mpeg"/><itunes:duration>57:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>89</itunes:episode><podcast:episode>89</podcast:episode></item><item><title>Hacker Summer Camp 2025</title><itunes:title>Hacker Summer Camp 2025</itunes:title><description><![CDATA[<p>Robert and AJ went to Hacker Summer Camp. What’s that? It’s a week of conferences such as Black Hat USA, BSidesLV, the Dianna Initiative, Squadcom, and of course DEF CON. Find out what’s relevant for the intelligence community during this first week in August annual event.</p>]]></description><content:encoded><![CDATA[<p>Robert and AJ went to Hacker Summer Camp. What’s that? It’s a week of conferences such as Black Hat USA, BSidesLV, the Dianna Initiative, Squadcom, and of course DEF CON. Find out what’s relevant for the intelligence community during this first week in August annual event.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">cf1bb127-2f24-4965-855a-d362c9b40cb1</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 20 Aug 2025 18:15:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/cf1bb127-2f24-4965-855a-d362c9b40cb1.mp3" length="49160846" type="audio/mpeg"/><itunes:duration>34:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>88</itunes:episode><podcast:episode>88</podcast:episode></item><item><title>Intelligence tradecraft in the digital age</title><itunes:title>Intelligence tradecraft in the digital age</itunes:title><description><![CDATA[<p>From street cop to OSINT expert, Nico Dekens aka “the Dutch OSINT Guy” shares his incredible journey and insights. Discover the evolution of OSINT and the challenges of integrating AI in intelligence collection and analysis.</p>]]></description><content:encoded><![CDATA[<p>From street cop to OSINT expert, Nico Dekens aka “the Dutch OSINT Guy” shares his incredible journey and insights. Discover the evolution of OSINT and the challenges of integrating AI in intelligence collection and analysis.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">6eeb64e5-1178-4508-9708-b14e1f0f4530</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 06 Aug 2025 17:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6eeb64e5-1178-4508-9708-b14e1f0f4530.mp3" length="58973065" type="audio/mpeg"/><itunes:duration>40:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>87</itunes:episode><podcast:episode>87</podcast:episode></item><item><title>Using OSINT to protect celebrities and athletes</title><itunes:title>Using OSINT to protect celebrities and athletes</itunes:title><description><![CDATA[<p>Sometimes, when a Hollywood actor stars in a blockbuster film or a hit TV show, or when an athlete wins the Super Bowl, their personal problems begin with scandalous photos, property theft, even death threats. That’s where OSINT can help them stay one step ahead.</p><h2>About Chad Brockway</h2><p>Chad Brockway, President of the Intelligence Operations Division at Edgeworth Security, is an industry expert in the fields of digital intelligence investigations and methodologies where he leverages his extensive background in intelligence, counterintelligence, counterterrorism, federal law enforcement and cyber operations to provide unique services and lectures to the professional and education industry. </p><p>Chad has worked across multiple federal law enforcement and national security agencies both within the United States as well as in cooperation with foreign government and law enforcement partners. </p><p>During his time with the Federal Bureau of Investigations, Chad served with the Special Technologies and Applications Section (STAS) where he oversaw multiple intelligence and cyber programs, personnel, and resources. Additionally, Chad served as the Deputy Watch Center Director for the Department of Defense Counterintelligence Field Activity (CIFA) agency and as a Military Police Officer in the Marine Corps where he was assigned to the Marine One Helicopter Squadron and the White House Liaison Office under the Clinton and Bush administrations.</p>]]></description><content:encoded><![CDATA[<p>Sometimes, when a Hollywood actor stars in a blockbuster film or a hit TV show, or when an athlete wins the Super Bowl, their personal problems begin with scandalous photos, property theft, even death threats. That’s where OSINT can help them stay one step ahead.</p><h2>About Chad Brockway</h2><p>Chad Brockway, President of the Intelligence Operations Division at Edgeworth Security, is an industry expert in the fields of digital intelligence investigations and methodologies where he leverages his extensive background in intelligence, counterintelligence, counterterrorism, federal law enforcement and cyber operations to provide unique services and lectures to the professional and education industry. </p><p>Chad has worked across multiple federal law enforcement and national security agencies both within the United States as well as in cooperation with foreign government and law enforcement partners. </p><p>During his time with the Federal Bureau of Investigations, Chad served with the Special Technologies and Applications Section (STAS) where he oversaw multiple intelligence and cyber programs, personnel, and resources. Additionally, Chad served as the Deputy Watch Center Director for the Department of Defense Counterintelligence Field Activity (CIFA) agency and as a Military Police Officer in the Marine Corps where he was assigned to the Marine One Helicopter Squadron and the White House Liaison Office under the Clinton and Bush administrations.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">810d886f-4913-4a5f-aa18-796ccb19b8de</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 23 Jul 2025 15:45:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/810d886f-4913-4a5f-aa18-796ccb19b8de.mp3" length="49510051" type="audio/mpeg"/><itunes:duration>34:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>86</itunes:episode><podcast:episode>86</podcast:episode></item><item><title>An OSINT investigator’s toolkit</title><itunes:title>An OSINT investigator’s toolkit</itunes:title><description><![CDATA[<p>There are OSINT tools that mirror or provide workarounds for hidden social media posts. Join us as we talk with an investigator who really knows his way around the internet, dark web, social platforms and more.</p>]]></description><content:encoded><![CDATA[<p>There are OSINT tools that mirror or provide workarounds for hidden social media posts. Join us as we talk with an investigator who really knows his way around the internet, dark web, social platforms and more.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">c568fd3a-d900-423b-8f4c-505eb9fa78f6</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 09 Jul 2025 13:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/c568fd3a-d900-423b-8f4c-505eb9fa78f6.mp3" length="57852725" type="audio/mpeg"/><itunes:duration>40:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>85</itunes:episode><podcast:episode>85</podcast:episode></item><item><title>AI as an insider threat</title><itunes:title>AI as an insider threat</itunes:title><description><![CDATA[<p>AJ and Robert explore the shadowy side of AI — how some users are becoming addicted, confiding in it like a personal therapist and then gaining confidence to take risky actions in their lives and at work. They discuss what this could mean for insider threats and the broader impact on security.</p>]]></description><content:encoded><![CDATA[<p>AJ and Robert explore the shadowy side of AI — how some users are becoming addicted, confiding in it like a personal therapist and then gaining confidence to take risky actions in their lives and at work. They discuss what this could mean for insider threats and the broader impact on security.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">8b562306-6bb6-49ca-b5c1-078726120aa1</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 25 Jun 2025 14:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/8b562306-6bb6-49ca-b5c1-078726120aa1.mp3" length="60127886" type="audio/mpeg"/><itunes:duration>41:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>84</itunes:episode><podcast:episode>84</podcast:episode></item><item><title>Adventures in OSINT Red Teaming</title><itunes:title>Adventures in OSINT Red Teaming</itunes:title><description><![CDATA[<p>Anna discusses her career trajectory from corporate security and financial crimes to becoming the CEO of Pine Risk Management. She shares her experiences in conducting complex risk assessments, fraud detection, and crisis communications, particularly highlighting her role at Meta where she led Silicon Valley's largest physical red team.</p>]]></description><content:encoded><![CDATA[<p>Anna discusses her career trajectory from corporate security and financial crimes to becoming the CEO of Pine Risk Management. She shares her experiences in conducting complex risk assessments, fraud detection, and crisis communications, particularly highlighting her role at Meta where she led Silicon Valley's largest physical red team.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">f07b49b5-9c20-4914-bcef-eee0495ab34f</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 11 Jun 2025 18:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/f07b49b5-9c20-4914-bcef-eee0495ab34f.mp3" length="68080605" type="audio/mpeg"/><itunes:duration>47:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>83</itunes:episode><podcast:episode>83</podcast:episode></item><item><title>How culture can inform OSINT investigations</title><itunes:title>How culture can inform OSINT investigations</itunes:title><description><![CDATA[<p>An OSINT Arabic instructor and geopolitical risk expert joins the show to discuss what can get lost in translation when performing OSINT investigations. Plus learn how cultural knowledge can unlock key insights.</p><p>About Paolo Walcher</p><p>Paolo Walcher is a leading OSINT trainer and security consultant, recognized for his expertise in Arabic-language investigations, geopolitical risk, and strategic intelligence. With a background in counterterrorism and crisis management, Paolo delivers advanced OSINT training to law enforcement, military, and intelligence agencies on both national and international levels.</p><p>At i-intelligence GmbH, he equips private and governmental organizations with the tools to navigate complex security environments, specializing in Arabic OSINT and Middle East-focused research. Formerly a Security Business Intelligence Analyst at BMW Group, he provided strategic insights on global threats, including the war in Ukraine, supporting corporate decision-making and conflict monitoring.</p><p>Paolo holds a B.A. in Safety and Security Management and an M.Sc. in Crisis and Security Management from Leiden University, with a specialization in the Governance of Radicalism, Extremism, and Terrorism. His work spans illicit networks, military conflict analysis, and supply chain security. As a Bellingcat volunteer, he has contributed to civilian harm verification and human rights investigations—and continues to explore the full potential of OSINT as a force for accountability and justice in the human rights space.</p><p>Fluent in English, German, and Italian, Paolo brings a cultural lens to OSINT, advocating for the ethical use of AI in intelligence gathering while emphasizing the enduring value of human-led analysis. His passion for maritime OSINT, regional dynamics, and investigative training makes him a key voice in the future of open-source intelligence.</p>]]></description><content:encoded><![CDATA[<p>An OSINT Arabic instructor and geopolitical risk expert joins the show to discuss what can get lost in translation when performing OSINT investigations. Plus learn how cultural knowledge can unlock key insights.</p><p>About Paolo Walcher</p><p>Paolo Walcher is a leading OSINT trainer and security consultant, recognized for his expertise in Arabic-language investigations, geopolitical risk, and strategic intelligence. With a background in counterterrorism and crisis management, Paolo delivers advanced OSINT training to law enforcement, military, and intelligence agencies on both national and international levels.</p><p>At i-intelligence GmbH, he equips private and governmental organizations with the tools to navigate complex security environments, specializing in Arabic OSINT and Middle East-focused research. Formerly a Security Business Intelligence Analyst at BMW Group, he provided strategic insights on global threats, including the war in Ukraine, supporting corporate decision-making and conflict monitoring.</p><p>Paolo holds a B.A. in Safety and Security Management and an M.Sc. in Crisis and Security Management from Leiden University, with a specialization in the Governance of Radicalism, Extremism, and Terrorism. His work spans illicit networks, military conflict analysis, and supply chain security. As a Bellingcat volunteer, he has contributed to civilian harm verification and human rights investigations—and continues to explore the full potential of OSINT as a force for accountability and justice in the human rights space.</p><p>Fluent in English, German, and Italian, Paolo brings a cultural lens to OSINT, advocating for the ethical use of AI in intelligence gathering while emphasizing the enduring value of human-led analysis. His passion for maritime OSINT, regional dynamics, and investigative training makes him a key voice in the future of open-source intelligence.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">ef9ab6f1-faf6-426a-a23e-8454869e00d0</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 28 May 2025 13:15:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/ef9ab6f1-faf6-426a-a23e-8454869e00d0.mp3" length="48400369" type="audio/mpeg"/><itunes:duration>33:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>82</itunes:episode><podcast:episode>82</podcast:episode></item><item><title>Ransomware gangs and OSINT</title><itunes:title>Ransomware gangs and OSINT</itunes:title><description><![CDATA[<p>Ransomware groups continue to generate significant profits, frequently relying on recycled or leaked code—leading researchers to describe them as “lazy.” OSINT analysts follow cryptocurrency transactions to trace financial trails, while effective defense depends on early detection, system-level visibility, and staying alert to shifts in attacker techniques.</p>]]></description><content:encoded><![CDATA[<p>Ransomware groups continue to generate significant profits, frequently relying on recycled or leaked code—leading researchers to describe them as “lazy.” OSINT analysts follow cryptocurrency transactions to trace financial trails, while effective defense depends on early detection, system-level visibility, and staying alert to shifts in attacker techniques.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">5e61ccab-c567-4546-8421-bddc30926a35</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 14 May 2025 13:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/5e61ccab-c567-4546-8421-bddc30926a35.mp3" length="27886306" type="audio/mpeg"/><itunes:duration>19:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>81</itunes:episode><podcast:episode>81</podcast:episode></item><item><title>Using AI in OSINT investigations</title><itunes:title>Using AI in OSINT investigations</itunes:title><description><![CDATA[<p>Discover how AI is revolutionizing OSINT, from speeding up data collection to generating comprehensive reports, while also addressing the challenges and ethical considerations. Hosts AJ and Robert dive deep with Lance James, discussing real-world insights and the potential for misuse.</p>]]></description><content:encoded><![CDATA[<p>Discover how AI is revolutionizing OSINT, from speeding up data collection to generating comprehensive reports, while also addressing the challenges and ethical considerations. Hosts AJ and Robert dive deep with Lance James, discussing real-world insights and the potential for misuse.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">e9e82109-cfff-4355-b075-34745688aebf</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 30 Apr 2025 16:30:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/e9e82109-cfff-4355-b075-34745688aebf.mp3" length="75939909" type="audio/mpeg"/><itunes:duration>52:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>80</itunes:episode><podcast:episode>80</podcast:episode></item><item><title>Entering infosec as an outsider! Tips from a librarian turned cyber analyst</title><itunes:title>Entering infosec as an outsider! Tips from a librarian turned cyber analyst</itunes:title><description><![CDATA[<p>A librarian and an OSINT analyst may have more in common than you realize. That’s how Tracy Maleeff found her way into cyber and made a name as InfoSec Sherpa.</p>]]></description><content:encoded><![CDATA[<p>A librarian and an OSINT analyst may have more in common than you realize. That’s how Tracy Maleeff found her way into cyber and made a name as InfoSec Sherpa.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">6f8aa613-5901-4c83-bd00-bbc87d5ffdca</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 16 Apr 2025 15:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/6f8aa613-5901-4c83-bd00-bbc87d5ffdca.mp3" length="63067602" type="audio/mpeg"/><itunes:duration>43:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>79</itunes:episode><podcast:episode>79</podcast:episode></item><item><title>What is counterintelligence?</title><itunes:title>What is counterintelligence?</itunes:title><description><![CDATA[<p>From government to private enterprise, counterintelligence can unlock big benefits in cybersecurity. We sit down with a counterintelligence professional to define the practice, and how everyone can benefit by employing it.</p>]]></description><content:encoded><![CDATA[<p>From government to private enterprise, counterintelligence can unlock big benefits in cybersecurity. We sit down with a counterintelligence professional to define the practice, and how everyone can benefit by employing it.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/what-is-counterintelligence?utm_medium=podcast&utm_source=captivate]]></link><guid isPermaLink="false">01f654b0-3a61-47b0-a48c-8a79dccfd9a4</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 02 Apr 2025 13:00:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/01f654b0-3a61-47b0-a48c-8a79dccfd9a4.mp3" length="57549914" type="audio/mpeg"/><itunes:duration>39:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>78</itunes:episode><podcast:episode>78</podcast:episode></item><item><title>&quot;We’re back, and we’re your new hosts&quot;</title><itunes:title>&quot;We’re back, and we’re your new hosts&quot;</itunes:title><description><![CDATA[<p>Meet the new hosts of NeedleStack. Robert Vamosi is a CISSP and award-winning journalist. AJ Nash has two decades of experience in the Intelligence community. Together they will host new episodes of NeedleStack, with an array of amazing guests.</p>]]></description><content:encoded><![CDATA[<p>Meet the new hosts of NeedleStack. Robert Vamosi is a CISSP and award-winning journalist. AJ Nash has two decades of experience in the Intelligence community. Together they will host new episodes of NeedleStack, with an array of amazing guests.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/e77-were-back-new-hosts-aj-nash-robert-vamosi]]></link><guid isPermaLink="false">3424289a-4b90-42f6-be00-5754b7375755</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 19 Mar 2025 15:15:00 -0400</pubDate><enclosure url="https://episodes.captivate.fm/episode/3424289a-4b90-42f6-be00-5754b7375755.mp3" length="48678103" type="audio/mpeg"/><itunes:duration>33:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>77</itunes:episode><podcast:episode>77</podcast:episode></item><item><title>Using OSINT to investigate organized animal crime</title><itunes:title>Using OSINT to investigate organized animal crime</itunes:title><description><![CDATA[<p>Jacob Lloyd, head of investigations at Animal Welfare Investigations Project, has been putting OSINT skills to use to stop organized animal crime — dogfights, puppy mills, badger baiting and more. Jacob discusses how these crimes are often neglected by law enforcement due to lack of training and are thus dealt with reactively. He explains how to leverage pedigree sites, social media and other online sources to proactively investigate animal crime and save animals from this horrible fate.&nbsp;</p><p><strong>Key takeaways</strong></p><ul><li>What pedigree sites can tell you about fighting dogs and their owners</li><li>How prevalent information on organized animal crime is on the surface web</li><li>How to get involved with Animal Welfare Investigations Project</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Jacob Lloyd, head of investigations at Animal Welfare Investigations Project, has been putting OSINT skills to use to stop organized animal crime — dogfights, puppy mills, badger baiting and more. Jacob discusses how these crimes are often neglected by law enforcement due to lack of training and are thus dealt with reactively. He explains how to leverage pedigree sites, social media and other online sources to proactively investigate animal crime and save animals from this horrible fate.&nbsp;</p><p><strong>Key takeaways</strong></p><ul><li>What pedigree sites can tell you about fighting dogs and their owners</li><li>How prevalent information on organized animal crime is on the surface web</li><li>How to get involved with Animal Welfare Investigations Project</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">d2c10db6-ccfc-4e33-9464-b195d668470d</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 13 Aug 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3bdb5af0-173b-425d-8d16-7f295fb81e24/s3e76-audio.mp3" length="45194686" type="audio/mpeg"/><itunes:duration>18:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>76</itunes:episode><podcast:episode>76</podcast:episode><podcast:season>3</podcast:season></item><item><title>Investigating influence operations</title><itunes:title>Investigating influence operations</itunes:title><description><![CDATA[<p>From influence operations and Telegram to using marketing tools for OSINT insights, our guest gives pro tips on OSINT and cyber investigations for professional practitioners.</p><p>Key takeaways</p><ul><li>Digital forensics incident response</li><li>Cyberthreat and OSINT crossover</li><li>Marketing tools for OSINT</li></ul><br/>]]></description><content:encoded><![CDATA[<p>From influence operations and Telegram to using marketing tools for OSINT insights, our guest gives pro tips on OSINT and cyber investigations for professional practitioners.</p><p>Key takeaways</p><ul><li>Digital forensics incident response</li><li>Cyberthreat and OSINT crossover</li><li>Marketing tools for OSINT</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">09b30e59-2f3f-46c0-bc0c-c86a2179f9d0</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Mon, 05 Aug 2024 15:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1ad7113e-2470-4a3e-b2e8-8f2543737db3/s3e75-audio.mp3" length="57990862" type="audio/mpeg"/><itunes:duration>24:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>75</itunes:episode><podcast:episode>75</podcast:episode><podcast:season>3</podcast:season></item><item><title>Is Telegram the place for cyber investigators?</title><itunes:title>Is Telegram the place for cyber investigators?</itunes:title><description><![CDATA[<p>In this episode, we sit down with cyber threat analyst and SANS OSINT instructor, Steven Harris. Steven discusses how Telegram is a must-use channel for investigating the war in Ukraine, and why cyber threat actors are flocking to the app.</p><p>Key Takeaways</p><ul><li>SOCMINT from law enforcement to cyber threats</li><li>Investigating on Telegram</li><li>Why Telegram allows cyber threat actors a lower barrier to entry</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this episode, we sit down with cyber threat analyst and SANS OSINT instructor, Steven Harris. Steven discusses how Telegram is a must-use channel for investigating the war in Ukraine, and why cyber threat actors are flocking to the app.</p><p>Key Takeaways</p><ul><li>SOCMINT from law enforcement to cyber threats</li><li>Investigating on Telegram</li><li>Why Telegram allows cyber threat actors a lower barrier to entry</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">e797877f-8b47-46da-9f7f-f21437eb2742</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 25 Jun 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/060ef7e7-16a1-4c29-b633-a320a7895a32/s3e74-audio.mp3" length="70862960" type="audio/mpeg"/><itunes:duration>29:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>74</itunes:episode><podcast:episode>74</podcast:episode><podcast:season>3</podcast:season></item><item><title>OSINT for executive protection</title><itunes:title>OSINT for executive protection</itunes:title><description><![CDATA[<p>Alex Lozano of Cybergy joins us to discuss how he uses OSINT and social media to protect executive clients, resources for his cyber students at University of Barcelona and the best tools for real-time monitoring.</p><p>Key takeaways</p><ul><li>How to use OSINT for executive protection</li><li>Resources for students and OSINT newbies</li><li>Tools for real-time monitoring</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Alex Lozano of Cybergy joins us to discuss how he uses OSINT and social media to protect executive clients, resources for his cyber students at University of Barcelona and the best tools for real-time monitoring.</p><p>Key takeaways</p><ul><li>How to use OSINT for executive protection</li><li>Resources for students and OSINT newbies</li><li>Tools for real-time monitoring</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">c886a6aa-af7f-49f8-92b6-f8064b7c59f5</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 18 Jun 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/223f270c-a77b-4a50-8484-358c60009719/s3e73-audio.mp3" length="40954846" type="audio/mpeg"/><itunes:duration>17:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>73</itunes:episode><podcast:episode>73</podcast:episode><podcast:season>3</podcast:season></item><item><title>Word up: learning foreign languages for OSINT with Skip Schiphorst</title><itunes:title>Word up: learning foreign languages for OSINT with Skip Schiphorst</itunes:title><description><![CDATA[<p>Language can limit or expand your worldview. That’s important to remember in OSINT where what you’re able to find and analyze can greatly affect the intelligence you build. Skip Schiphorst, OSINT instructor at i-Intelligence, shares his expertise on why even baseline knowledge of a foreign language is important in a world flush with translation services; how foreign language content can counteract bias; and tips for verifying automated translations.</p><p>Key takeaways</p><ul><li>You can find a lot more online than you may think by using foreign languages — even those using non-Latin characters</li><li>You don’t need to be a ninja with years of training to find foreign content online, or outsource everything to language experts</li><li>Know the basics of OSINT, be critical and&nbsp;be patient when searching online in a foreign language</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Language can limit or expand your worldview. That’s important to remember in OSINT where what you’re able to find and analyze can greatly affect the intelligence you build. Skip Schiphorst, OSINT instructor at i-Intelligence, shares his expertise on why even baseline knowledge of a foreign language is important in a world flush with translation services; how foreign language content can counteract bias; and tips for verifying automated translations.</p><p>Key takeaways</p><ul><li>You can find a lot more online than you may think by using foreign languages — even those using non-Latin characters</li><li>You don’t need to be a ninja with years of training to find foreign content online, or outsource everything to language experts</li><li>Know the basics of OSINT, be critical and&nbsp;be patient when searching online in a foreign language</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">5b13c5bd-1b53-4ba6-8f79-6429009c8b41</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 11 Jun 2024 15:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/74bf4f15-4399-43ff-98ae-8716216e980e/s3e72-audio-re-export.mp3" length="56141393" type="audio/mpeg"/><itunes:duration>23:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>72</itunes:episode><podcast:episode>72</podcast:episode><podcast:season>3</podcast:season></item><item><title>OSINT after dark with MJ Banias</title><itunes:title>OSINT after dark with MJ Banias</itunes:title><description><![CDATA[<p>MJ Banias discusses how one man’s late-night OpSec fail is an OSINTer’s treasure. If that’s too salacious for you, we also talk about how awesome newspaper archives and librarians are.</p><p>Key takeaways</p><ul><li>Put yourself in your targets shoes to understand what sites could give you your next selector</li><li>The sites and services every OSINTer should subscribe to</li><li>How overcoming a millennial’s worst nightmare could be the break you need</li></ul><br/>]]></description><content:encoded><![CDATA[<p>MJ Banias discusses how one man’s late-night OpSec fail is an OSINTer’s treasure. If that’s too salacious for you, we also talk about how awesome newspaper archives and librarians are.</p><p>Key takeaways</p><ul><li>Put yourself in your targets shoes to understand what sites could give you your next selector</li><li>The sites and services every OSINTer should subscribe to</li><li>How overcoming a millennial’s worst nightmare could be the break you need</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/osint-after-dark-mj-banias?utm_medium=podcast&utm_source=captivate]]></link><guid isPermaLink="false">56091477-ef32-4a50-b25c-482441ef4db1</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 14 May 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/087e344e-8f60-49f4-a166-798db36f61c5/s3e71-audio.mp3" length="90047287" type="audio/mpeg"/><itunes:duration>37:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>71</itunes:episode><podcast:episode>71</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-087e344e-8f60-49f4-a166-798db36f61c5.json" type="application/json+chapters"/></item><item><title>Securing high-risk communities</title><itunes:title>Securing high-risk communities</itunes:title><description><![CDATA[<p>Journalists, academics and NGOs face unprecedented levels of threats in real life and in the digital world. With limited resources, they often lack secure methods to collect OSINT. That’s why a digital investigations platform is being offered pro bono as part of a larger CISA initiative.&nbsp;</p><p>Key takeaways</p><ul><li>New threats in the digital landscape</li><li>The risks for journalists, NGOs and academics collecting OSINT</li><li>How digital investigative teams can protect themselves</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Journalists, academics and NGOs face unprecedented levels of threats in real life and in the digital world. With limited resources, they often lack secure methods to collect OSINT. That’s why a digital investigations platform is being offered pro bono as part of a larger CISA initiative.&nbsp;</p><p>Key takeaways</p><ul><li>New threats in the digital landscape</li><li>The risks for journalists, NGOs and academics collecting OSINT</li><li>How digital investigative teams can protect themselves</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/securing-high-risk-communities]]></link><guid isPermaLink="false">3d6aafa0-95b5-4723-a8f5-6a847ccc2ea4</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 07 May 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/40c8cb99-5cab-48eb-aa33-c1c820998f7d/s3-e70-audio.mp3" length="51392332" type="audio/mpeg"/><itunes:duration>21:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>70</itunes:episode><podcast:episode>70</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-40c8cb99-5cab-48eb-aa33-c1c820998f7d.json" type="application/json+chapters"/></item><item><title>Demystifying dark web research for enterprise and law enforcement</title><itunes:title>Demystifying dark web research for enterprise and law enforcement</itunes:title><description><![CDATA[<p>An analysts from DarkOwl joins us to discuss dark web research and all its facets. From AI and other trends on the dark web, to operational security, learn how to turn on the light beneath the surface of the internet.</p><p>Key takeaways</p><ul><li>AI and other dark web trends</li><li>Operational security in dark web research</li><li>How to search an unindexed environment</li></ul><br/>]]></description><content:encoded><![CDATA[<p>An analysts from DarkOwl joins us to discuss dark web research and all its facets. From AI and other trends on the dark web, to operational security, learn how to turn on the light beneath the surface of the internet.</p><p>Key takeaways</p><ul><li>AI and other dark web trends</li><li>Operational security in dark web research</li><li>How to search an unindexed environment</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">9d18451b-d4ad-43a9-8ce0-18f31760f8f6</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 30 Apr 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1fc508dc-b37c-46ff-b59d-0c1f0faa86f2/s3e69-audio.mp3" length="48759189" type="audio/mpeg"/><itunes:duration>20:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>69</itunes:episode><podcast:episode>69</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-1fc508dc-b37c-46ff-b59d-0c1f0faa86f2.json" type="application/json+chapters"/></item><item><title>Breaking in: how to use OSINT for pen testing</title><itunes:title>Breaking in: how to use OSINT for pen testing</itunes:title><description><![CDATA[<p>How can I get in? Steve Stasiukonis knows the power OSINT brings to this crucial pen testing question. From uncovering who to pose as, what to wear and how to forge a badge, OSINT can be the key you need to unlock a client's physical security. Steve also discusses the gold mine OSINT brings to cyber pen tests and what CTI pros need to know before going on the dark web.</p><p>Key takeaways</p><ul><li>How OSINT is used in pen testing</li><li>Dark web OPSEC considerations</li><li>How Steve easily broke into banks (for good!)</li></ul><br/>]]></description><content:encoded><![CDATA[<p>How can I get in? Steve Stasiukonis knows the power OSINT brings to this crucial pen testing question. From uncovering who to pose as, what to wear and how to forge a badge, OSINT can be the key you need to unlock a client's physical security. Steve also discusses the gold mine OSINT brings to cyber pen tests and what CTI pros need to know before going on the dark web.</p><p>Key takeaways</p><ul><li>How OSINT is used in pen testing</li><li>Dark web OPSEC considerations</li><li>How Steve easily broke into banks (for good!)</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">0fe70395-9c66-4ffa-b1cb-82e360f4149f</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 16 Apr 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/541dbd06-f195-4e77-a6d9-d2e55f39f65c/s3e68-audio.mp3" length="48680822" type="audio/mpeg"/><itunes:duration>20:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>68</itunes:episode><podcast:episode>68</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-541dbd06-f195-4e77-a6d9-d2e55f39f65c.json" type="application/json+chapters"/></item><item><title>Lockbit and the stories behind ransomware with Jon DiMaggio</title><itunes:title>Lockbit and the stories behind ransomware with Jon DiMaggio</itunes:title><description><![CDATA[<p>We go behind the scenes with Jon DiMaggio of Ransomware Diaries. As the chief security strategist at Analyst 1, Jon has conducted in-depth investigations of ransomware groups, including the famed Lockbit gang. He tells us the open-source tactics he uses and how cyber threats can take a mental toll.</p><p>Key takeaways</p><ul><li>Tracking the Lockbit story</li><li>Where OSINT meets ransomware investigations</li><li>The human element in threat detection</li></ul><br/>]]></description><content:encoded><![CDATA[<p>We go behind the scenes with Jon DiMaggio of Ransomware Diaries. As the chief security strategist at Analyst 1, Jon has conducted in-depth investigations of ransomware groups, including the famed Lockbit gang. He tells us the open-source tactics he uses and how cyber threats can take a mental toll.</p><p>Key takeaways</p><ul><li>Tracking the Lockbit story</li><li>Where OSINT meets ransomware investigations</li><li>The human element in threat detection</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/lockbit-and-the-stories-behind-ransomware?utm_medium=podcast&utm_source=captivate]]></link><guid isPermaLink="false">9740a32f-e81d-4f40-80c6-6928fd77ff97</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 19 Mar 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7ebe6499-ea12-424e-b2e2-9ea42717fe4f/s3e67-audio.mp3" length="68876609" type="audio/mpeg"/><itunes:duration>28:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>67</itunes:episode><podcast:episode>67</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-7ebe6499-ea12-424e-b2e2-9ea42717fe4f.json" type="application/json+chapters"/></item><item><title>Legal and OSINT: hunting down the bullsh*t</title><itunes:title>Legal and OSINT: hunting down the bullsh*t</itunes:title><description><![CDATA[<p>Bullsh*t Hunting creators Justin Seitz and Some Lawyer share their tips on how OSINT and legal investigation tactics can benefit one another. They talk about their series “The Hunt” as it examines suspicious legal proceedings and possible wrongful convictions. Plus we dive deep into public records requests with tips of how to get the information you need.</p><p>Key Takeaways</p><ul><li>How to effectively submit a public records request</li><li>What OSINTers can learn from legal professionals and vice versa</li><li>Think like a lawyer when searching legal databases</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Bullsh*t Hunting creators Justin Seitz and Some Lawyer share their tips on how OSINT and legal investigation tactics can benefit one another. They talk about their series “The Hunt” as it examines suspicious legal proceedings and possible wrongful convictions. Plus we dive deep into public records requests with tips of how to get the information you need.</p><p>Key Takeaways</p><ul><li>How to effectively submit a public records request</li><li>What OSINTers can learn from legal professionals and vice versa</li><li>Think like a lawyer when searching legal databases</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/legal-osint-justin-seitz?utm_medium=podcast&utm_source=captivate]]></link><guid isPermaLink="false">ec9f5a87-60e6-4494-9830-e0ced92642b5</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 12 Mar 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8e62ea0f-d8f7-49b1-93fc-2ea12de3733d/s3e66-audio.mp3" length="68549556" type="audio/mpeg"/><itunes:duration>28:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>66</itunes:episode><podcast:episode>66</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-8e62ea0f-d8f7-49b1-93fc-2ea12de3733d.json" type="application/json+chapters"/></item><item><title>Security research: humans in the loop with John Hammond</title><itunes:title>Security research: humans in the loop with John Hammond</itunes:title><description><![CDATA[<p>Cybersecurity is rife with technological solutions, but as security researcher John Hammond knows all too well, it’s people that make the difference. Hear how people make or break security intel, both as researchers and threat actors. We’ll talk sock puppets, the role of OSINT for your own OPSEC and intelligence building, cybergang leaders as businessmen and more. Plus we’ll dive into John’s recent OSINT work on the ScreenConnect vulnerabilities and how they’re being leveraged in the wild.</p><p>Key takeaways</p><ul><li>Using OSINT for opsec to protect your identity and enhance security intelligence</li><li>Lurking in dark web forums, sock puppets and engaging with threat actors</li><li>The role OSINT played in dissecting ScreenConnect vulnerabilities and exploits in the wild</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Cybersecurity is rife with technological solutions, but as security researcher John Hammond knows all too well, it’s people that make the difference. Hear how people make or break security intel, both as researchers and threat actors. We’ll talk sock puppets, the role of OSINT for your own OPSEC and intelligence building, cybergang leaders as businessmen and more. Plus we’ll dive into John’s recent OSINT work on the ScreenConnect vulnerabilities and how they’re being leveraged in the wild.</p><p>Key takeaways</p><ul><li>Using OSINT for opsec to protect your identity and enhance security intelligence</li><li>Lurking in dark web forums, sock puppets and engaging with threat actors</li><li>The role OSINT played in dissecting ScreenConnect vulnerabilities and exploits in the wild</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">ec3bbbc9-9f8d-45a3-ac7e-14c09398064b</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 05 Mar 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b53fe377-a62b-49ef-a7d3-5717eee1711c/s3e65.mp3" length="68979009" type="audio/mpeg"/><itunes:duration>28:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>65</itunes:episode><podcast:episode>65</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-b53fe377-a62b-49ef-a7d3-5717eee1711c.json" type="application/json+chapters"/></item><item><title>What’s up with OSINTUp?</title><itunes:title>What’s up with OSINTUp?</itunes:title><description><![CDATA[<p>Do you wish you had more training opportunities or just chances to flex your OSINT skills? We’re hosting a big event this month where we’ll talk ways to level up your tradecraft, training opportunities, take-home tips and more.</p>]]></description><content:encoded><![CDATA[<p>Do you wish you had more training opportunities or just chances to flex your OSINT skills? We’re hosting a big event this month where we’ll talk ways to level up your tradecraft, training opportunities, take-home tips and more.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">6de3fc8c-e5c4-45d1-bc91-90d8863fb941</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 13 Feb 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f2e20f59-e446-4fdd-9c31-e5f3bdc44c23/s3-e64-audio-with-intro.mp3" length="40015483" type="audio/mpeg"/><itunes:duration>16:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>64</itunes:episode><podcast:episode>64</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-f2e20f59-e446-4fdd-9c31-e5f3bdc44c23.json" type="application/json+chapters"/></item><item><title>OSINT training in 2024</title><itunes:title>OSINT training in 2024</itunes:title><description><![CDATA[<p>There are many paths to OSINT — one of them is through training programs and online resources! Aubrey and Shannon break down what’s available, what’s free (or not) to keep you abreast of how you can gain and further your OSINT skills.</p>]]></description><content:encoded><![CDATA[<p>There are many paths to OSINT — one of them is through training programs and online resources! Aubrey and Shannon break down what’s available, what’s free (or not) to keep you abreast of how you can gain and further your OSINT skills.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">0e092b27-31d7-4c5c-b652-355d175a7f5a</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 06 Feb 2024 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8b6aa159-3f79-483f-b140-1851bde8be73/needlestack-s3-e63-audio.mp3" length="33438895" type="audio/mpeg"/><itunes:duration>13:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>63</itunes:episode><podcast:episode>63</podcast:episode><podcast:season>3</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-8b6aa159-3f79-483f-b140-1851bde8be73.json" type="application/json+chapters"/></item><item><title>Digital investigation techniques with Craig Silverman</title><itunes:title>Digital investigation techniques with Craig Silverman</itunes:title><description><![CDATA[<p>Propublica reporter and author of the Digital Investigations newsletter, Craig Silverman joins the podcast to discuss disinformation trends on social media platforms, elections around the world in 2024 and what journalists and OSINT investigators can learn from each other.</p><p>Key takeaways</p><ul><li>OSINT for investigative journalism</li><li>Disinformation trends on social media</li><li>Documenting evidence during an investigation</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Propublica reporter and author of the Digital Investigations newsletter, Craig Silverman joins the podcast to discuss disinformation trends on social media platforms, elections around the world in 2024 and what journalists and OSINT investigators can learn from each other.</p><p>Key takeaways</p><ul><li>OSINT for investigative journalism</li><li>Disinformation trends on social media</li><li>Documenting evidence during an investigation</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">488a6f6f-af12-4f28-93a1-d0b2028eec3a</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 05 Dec 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/96f14caa-7ffb-4995-af9a-84eca700a039/S2E62-with-Craig-Silverman-1.mp3" length="51588355" type="audio/mpeg"/><itunes:duration>35:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>62</itunes:episode><podcast:episode>62</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-96f14caa-7ffb-4995-af9a-84eca700a039.json" type="application/json+chapters"/></item><item><title>OPSEC on the internet’s dark side with Sam Bent</title><itunes:title>OPSEC on the internet’s dark side with Sam Bent</itunes:title><description><![CDATA[<p>DefCon speaker and host of DoingFedTime on YouTube, Sam Bent joins the podcast to shine light on operational security concerns on the dark web. The reformed darknet marketplace seller shares insights and advice for best practices when investigating on the dark web.&nbsp;</p><p>Key takeaways:</p><ul><li>OPSEC on the dark web</li><li>The different darknets</li><li>Linguistic analysis in evidence gathering</li></ul><br/>]]></description><content:encoded><![CDATA[<p>DefCon speaker and host of DoingFedTime on YouTube, Sam Bent joins the podcast to shine light on operational security concerns on the dark web. The reformed darknet marketplace seller shares insights and advice for best practices when investigating on the dark web.&nbsp;</p><p>Key takeaways:</p><ul><li>OPSEC on the dark web</li><li>The different darknets</li><li>Linguistic analysis in evidence gathering</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">ca72a9af-d86f-4b64-a398-724b31401033</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 28 Nov 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1327dc83-4faa-4468-b5d9-8335489e27e0/S2E61-with-Sam-Bent-FINAL.mp3" length="72193952" type="audio/mpeg"/><itunes:duration>50:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>61</itunes:episode><podcast:episode>61</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-1327dc83-4faa-4468-b5d9-8335489e27e0.json" type="application/json+chapters"/></item><item><title>Social media intelligence gathering with Ritu Gill</title><itunes:title>Social media intelligence gathering with Ritu Gill</itunes:title><description><![CDATA[<p>Ritu Gill, or @OSINTtechniques as she’s known online, joins the podcast to give tips for social media intelligence gathering. What are the little-known platforms to look at and how do you gather safely? Tune in to hear the tips.</p><p>Key takeaways</p><ul><li>Overlooked social media platforms for evidence gathering</li><li>OPSEC for law enforcement</li><li>Tips for beginning OSINT practitioners</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Ritu Gill, or @OSINTtechniques as she’s known online, joins the podcast to give tips for social media intelligence gathering. What are the little-known platforms to look at and how do you gather safely? Tune in to hear the tips.</p><p>Key takeaways</p><ul><li>Overlooked social media platforms for evidence gathering</li><li>OPSEC for law enforcement</li><li>Tips for beginning OSINT practitioners</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">0bd2409b-df36-477a-8992-1cd3636cd56e</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 14 Nov 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a71371a6-69cb-43a2-92b1-1de661f6c710/S2E60-with-Ritu-Gill.mp3" length="34802069" type="audio/mpeg"/><itunes:duration>24:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>60</itunes:episode><podcast:episode>60</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-a71371a6-69cb-43a2-92b1-1de661f6c710.json" type="application/json+chapters"/></item><item><title>Training law enforcement on trafficking with Griffin Glynn</title><itunes:title>Training law enforcement on trafficking with Griffin Glynn</itunes:title><description><![CDATA[<p>The chief investigations officer of the National Child Protection Task Force shares the tools and methods he trains law enforcement on, how he protects his mental health in a such a devastating field and the latest platforms and technology to stay on top of.</p><p>Key takeaways</p><ul><li>OSINT for child protection</li><li>The importance of mental health</li><li>What law enforcement need to know about trafficking</li></ul><br/>]]></description><content:encoded><![CDATA[<p>The chief investigations officer of the National Child Protection Task Force shares the tools and methods he trains law enforcement on, how he protects his mental health in a such a devastating field and the latest platforms and technology to stay on top of.</p><p>Key takeaways</p><ul><li>OSINT for child protection</li><li>The importance of mental health</li><li>What law enforcement need to know about trafficking</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">4349cdba-d49c-4b3c-8e92-3bea03fcb459</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 17 Oct 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/69966a0d-db0a-4685-ab40-17d6f98c7588/S2E59-with-Griffin-Glynn-Enhanced-Audio.mp3" length="54487945" type="audio/mpeg"/><itunes:duration>37:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>59</itunes:episode><podcast:episode>59</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-69966a0d-db0a-4685-ab40-17d6f98c7588.json" type="application/json+chapters"/></item><item><title>The myths and misconceptions of child protection</title><itunes:title>The myths and misconceptions of child protection</itunes:title><description><![CDATA[<p>Jessica Smith, president and founder of ClickSafe intelligence and special investigations lead with the National Child Protection Task Force, joins the podcast to dispel misconceptions about child protection. From who is being targeted to where and how, Jessica Smith shares how misinformation about child exploitation can derail investigations, and how OSINT helps pave the way for child protection.</p><p>Key takeaways</p><ul><li>Misinformation around child protection can adversely affect investigations</li><li>How OSINT plays a role in helping victims</li><li>The new platforms where kids are targeted</li><li>Tips for vigilance and education</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Jessica Smith, president and founder of ClickSafe intelligence and special investigations lead with the National Child Protection Task Force, joins the podcast to dispel misconceptions about child protection. From who is being targeted to where and how, Jessica Smith shares how misinformation about child exploitation can derail investigations, and how OSINT helps pave the way for child protection.</p><p>Key takeaways</p><ul><li>Misinformation around child protection can adversely affect investigations</li><li>How OSINT plays a role in helping victims</li><li>The new platforms where kids are targeted</li><li>Tips for vigilance and education</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">ddcb769b-f4e2-486f-ae6f-374dda7c27db</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 10 Oct 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1e892f80-54eb-4292-a24a-003247640485/S2E58-with-Jessica-Smith.mp3" length="65268159" type="audio/mpeg"/><itunes:duration>45:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>58</itunes:episode><podcast:episode>58</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-1e892f80-54eb-4292-a24a-003247640485.json" type="application/json+chapters"/></item><item><title>Can AI identify AI?</title><itunes:title>Can AI identify AI?</itunes:title><description><![CDATA[<p>We discuss recent <a href="https://www.bellingcat.com/" rel="noopener noreferrer" target="_blank">Bellingcat</a> reports on whether AI has the capability to reliably identify AI. The reporter and fellow shares his research on AI for OSINT and the results.</p><p>Key takeaways</p><ul><li>Testing AI’s ability to recognize AI art</li><li>Blending journalism and OSINT at Bellingcat</li><li>How machine learning should and shouldn’t be used in OSINT</li></ul><br/>]]></description><content:encoded><![CDATA[<p>We discuss recent <a href="https://www.bellingcat.com/" rel="noopener noreferrer" target="_blank">Bellingcat</a> reports on whether AI has the capability to reliably identify AI. The reporter and fellow shares his research on AI for OSINT and the results.</p><p>Key takeaways</p><ul><li>Testing AI’s ability to recognize AI art</li><li>Blending journalism and OSINT at Bellingcat</li><li>How machine learning should and shouldn’t be used in OSINT</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">735103a3-b6b8-4763-bc5d-3b74840928f6</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 03 Oct 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e0c9e05e-aa3b-4155-a9c4-7a488cdee881/S2E57-with-Dennis-Kovtun.mp3" length="54349393" type="audio/mpeg"/><itunes:duration>37:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>57</itunes:episode><podcast:episode>57</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-e0c9e05e-aa3b-4155-a9c4-7a488cdee881.json" type="application/json+chapters"/></item><item><title>OSINT by day and night</title><itunes:title>OSINT by day and night</itunes:title><description><![CDATA[<p>We talk to an OSINT professional about what he learned when he applied his daytime skills to a moonlighting hobby. On YouTube, Gary Ruddell shares 3-minute tips, geolocates scenes from movies and shares the OSINT discipline he learned from the U.K. military with hobbyists and practitioners just starting out.</p><p>Key takeaways:</p><ul><li>Applying the intelligence cycle</li><li>Executive protection with social media</li><li>Geolocation clues from the shortest frame</li></ul><br/>]]></description><content:encoded><![CDATA[<p>We talk to an OSINT professional about what he learned when he applied his daytime skills to a moonlighting hobby. On YouTube, Gary Ruddell shares 3-minute tips, geolocates scenes from movies and shares the OSINT discipline he learned from the U.K. military with hobbyists and practitioners just starting out.</p><p>Key takeaways:</p><ul><li>Applying the intelligence cycle</li><li>Executive protection with social media</li><li>Geolocation clues from the shortest frame</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">c29b811d-4c56-40ea-a622-af5ad166d9eb</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 26 Sep 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ec9b92eb-a18c-40bb-b6a5-e896dcf960cb/aubrey-byron-6b7bavtz3-raw-synced-video-cfr-aubrey-byron-gary-j.mp3" length="50946369" type="audio/mpeg"/><itunes:duration>35:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>56</itunes:episode><podcast:episode>56</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-ec9b92eb-a18c-40bb-b6a5-e896dcf960cb.json" type="application/json+chapters"/></item><item><title>How AI is disrupting OSINT for better or worse</title><itunes:title>How AI is disrupting OSINT for better or worse</itunes:title><description><![CDATA[<p>Producers Aubrey and Shannon review the latest articles and research on using AI in OSINT. Should you consider using AI chatbots in research now or in the future? And if so, how can you do so securely and with verification in mind?</p><p>Key takeaways</p><ul><li>AI chatbots aren’t great at OSINT right now, but they might be one day</li><li>Verification is key</li><li>You need an access policy</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Producers Aubrey and Shannon review the latest articles and research on using AI in OSINT. Should you consider using AI chatbots in research now or in the future? And if so, how can you do so securely and with verification in mind?</p><p>Key takeaways</p><ul><li>AI chatbots aren’t great at OSINT right now, but they might be one day</li><li>Verification is key</li><li>You need an access policy</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">18946204-4680-487c-9a8b-e4ee032dc995</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 29 Aug 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/efc35959-d64c-4ec9-9be6-a10a8c1e6a2c/S2E55-fireside-chat-1.mp3" length="29148335" type="audio/mpeg"/><itunes:duration>20:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>55</itunes:episode><podcast:episode>55</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-efc35959-d64c-4ec9-9be6-a10a8c1e6a2c.json" type="application/json+chapters"/></item><item><title>Keeping up with AI and social media</title><itunes:title>Keeping up with AI and social media</itunes:title><description><![CDATA[<p>How can researchers keep up with all the changes in the OSINT landscape? From AI to constantly shifting social media platforms, Neil Spencer from LifeRaft gives tips for how to adapt and optimize your OSINT practice.</p><p>Key takeaways</p><ul><li>How AI has evolved</li><li>Massive shifts on social media platforms</li><li>Threat verification</li></ul><br/>]]></description><content:encoded><![CDATA[<p>How can researchers keep up with all the changes in the OSINT landscape? From AI to constantly shifting social media platforms, Neil Spencer from LifeRaft gives tips for how to adapt and optimize your OSINT practice.</p><p>Key takeaways</p><ul><li>How AI has evolved</li><li>Massive shifts on social media platforms</li><li>Threat verification</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">e8b057ac-942d-4164-9380-6a2b104261df</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 22 Aug 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/fecbad3f-d34d-4359-93b4-690ff7c2dea3/S2E53-with-Neil-Spencer.mp3" length="41823156" type="audio/mpeg"/><itunes:duration>29:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-fecbad3f-d34d-4359-93b4-690ff7c2dea3.json" type="application/json+chapters"/></item><item><title>AI-enhanced technology for frictionless borders</title><itunes:title>AI-enhanced technology for frictionless borders</itunes:title><description><![CDATA[<p>As analysts assess how AI could improve their workflow, <a href="https://www.babelstreet.com/" rel="noopener noreferrer" target="_blank">Babel Street</a> is presenting technology that can help border agents better name-match terrorist watchlist to travelers. Declan Trezise, vice president of global solutions engineering, joins the show to discuss how AI can create more seamless borders for agents and innocent travelers.</p><p>Key Takeaways</p><ul><li>Digitization and the future of borders</li><li>Name–matching technology for terrorism watchlists</li><li>Creating faster, seamless travel for citizens</li></ul><br/>]]></description><content:encoded><![CDATA[<p>As analysts assess how AI could improve their workflow, <a href="https://www.babelstreet.com/" rel="noopener noreferrer" target="_blank">Babel Street</a> is presenting technology that can help border agents better name-match terrorist watchlist to travelers. Declan Trezise, vice president of global solutions engineering, joins the show to discuss how AI can create more seamless borders for agents and innocent travelers.</p><p>Key Takeaways</p><ul><li>Digitization and the future of borders</li><li>Name–matching technology for terrorism watchlists</li><li>Creating faster, seamless travel for citizens</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">1b2ae9a4-73c2-41de-8b29-cc2cccb07e92</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 15 Aug 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/0281c8e6-d9e8-4402-a3b1-5c60559b7cf4/S2E53-with-Declan-Trezise.mp3" length="56016423" type="audio/mpeg"/><itunes:duration>38:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-0281c8e6-d9e8-4402-a3b1-5c60559b7cf4.json" type="application/json+chapters"/></item><item><title>The ethical use of AI in open-source investigations</title><itunes:title>The ethical use of AI in open-source investigations</itunes:title><description><![CDATA[<p>Everyone is talking about using AI for OSINT, but what are the ethical considerations before you fire up your first chat? Before you start feeding a machine learning model your data and relying on it’s results, our guest from <a href="https://www.fivecast.com/" rel="noopener noreferrer" target="_blank">Fivecast</a> tells us what you should consider.</p><p>Key takeaways</p><ul><li>ChatGPT has built-in biases (just like humans)</li><li>Understand the human toll behind machine learning</li><li>How to use AI responsibly</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Everyone is talking about using AI for OSINT, but what are the ethical considerations before you fire up your first chat? Before you start feeding a machine learning model your data and relying on it’s results, our guest from <a href="https://www.fivecast.com/" rel="noopener noreferrer" target="_blank">Fivecast</a> tells us what you should consider.</p><p>Key takeaways</p><ul><li>ChatGPT has built-in biases (just like humans)</li><li>Understand the human toll behind machine learning</li><li>How to use AI responsibly</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">0988278f-2b2a-4a6f-93da-67f010bf0b7e</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Thu, 03 Aug 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a81c3885-4970-41b0-960d-f82de6a47646/S2E52-with-Trent-Lewis.mp3" length="51642272" type="audio/mpeg"/><itunes:duration>35:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-a81c3885-4970-41b0-960d-f82de6a47646.json" type="application/json+chapters"/></item><item><title>Leveraging generative AI for OSINT</title><itunes:title>Leveraging generative AI for OSINT</itunes:title><description><![CDATA[<p>Wondering how to incorporate AI into your OSINT framework? We asked the CEO and founder of the popular training organization, <a href="https://www.osintcombine.com/" rel="noopener noreferrer" target="_blank">OSINT Combine</a>. </p><p>Key takeaways</p><ul><li>How can OSINT researchers leverage generative AI?</li><li>Tips for spotting disinformation in an AI world</li><li>Teaching ChatGPT your company datasets</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Wondering how to incorporate AI into your OSINT framework? We asked the CEO and founder of the popular training organization, <a href="https://www.osintcombine.com/" rel="noopener noreferrer" target="_blank">OSINT Combine</a>. </p><p>Key takeaways</p><ul><li>How can OSINT researchers leverage generative AI?</li><li>Tips for spotting disinformation in an AI world</li><li>Teaching ChatGPT your company datasets</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">201a10ab-fe80-42b8-9470-121d54ca9a2d</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 25 Jul 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/90831472-2877-414e-94d9-b9bc99119fa4/S2E51-with-Chris-Poulter-1-1.mp3" length="26540897" type="audio/mpeg"/><itunes:duration>18:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-90831472-2877-414e-94d9-b9bc99119fa4.json" type="application/json+chapters"/></item><item><title>LifeRaft: What security teams need to know about ChatGPT</title><itunes:title>LifeRaft: What security teams need to know about ChatGPT</itunes:title><description><![CDATA[<p>We’re handing the mic over to our friends at <a href="Talking Threat Intelligence" rel="noopener noreferrer" target="_blank">Talking Threat Intelligence</a>, a podcast by LifeRaft today. On the show, they had our very own Daniel Ben-Chitrit on to discuss the security implications of ChatGPT, how it could be used by phishing scammers to up their skills and the safest way for OSINT researchers to prompt AI.</p><p>Key takeaways</p><ul><li>Security implications of ChatGPT</li><li>“A force multiplier” for phishing scammers</li><li>The safest way for OSINT researchers to prompt AI</li></ul><br/>]]></description><content:encoded><![CDATA[<p>We’re handing the mic over to our friends at <a href="Talking Threat Intelligence" rel="noopener noreferrer" target="_blank">Talking Threat Intelligence</a>, a podcast by LifeRaft today. On the show, they had our very own Daniel Ben-Chitrit on to discuss the security implications of ChatGPT, how it could be used by phishing scammers to up their skills and the safest way for OSINT researchers to prompt AI.</p><p>Key takeaways</p><ul><li>Security implications of ChatGPT</li><li>“A force multiplier” for phishing scammers</li><li>The safest way for OSINT researchers to prompt AI</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/liferaft-chatgpt-security]]></link><guid isPermaLink="false">26f486ad-713f-421d-bad2-eedac8758170</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 18 Jul 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/104f81a3-5562-4fa1-a7b5-f54b65447665/S2E51-with-LifeRaft.mp3" length="55245916" type="audio/mpeg"/><itunes:duration>38:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-104f81a3-5562-4fa1-a7b5-f54b65447665.json" type="application/json+chapters"/></item><item><title>Maritime OSINT deep dive with Rae Baker</title><itunes:title>Maritime OSINT deep dive with Rae Baker</itunes:title><description><![CDATA[<p>We sit down with the author of the new OSINT reference book Deep Dive: Exploring the Real-world Value of Open Source Intelligence, Rae Baker. Baker is an expert in OSINT with an emphasis on maritime intelligence, analyzing vessels and ports around the world. In this episode, she shares tips from her book, blog and career, and we explore her one-of-a-kind OSINT training game, Kase Scenarios.</p>]]></description><content:encoded><![CDATA[<p>We sit down with the author of the new OSINT reference book Deep Dive: Exploring the Real-world Value of Open Source Intelligence, Rae Baker. Baker is an expert in OSINT with an emphasis on maritime intelligence, analyzing vessels and ports around the world. In this episode, she shares tips from her book, blog and career, and we explore her one-of-a-kind OSINT training game, Kase Scenarios.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">4b86a7cf-c141-4331-a71f-fdc1f872c1d4</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 13 Jun 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bf657fd6-8617-4582-baa6-fdefb6ce520a/S2E49-with-Rae-Baker.mp3" length="35433396" type="audio/mpeg"/><itunes:duration>24:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-bf657fd6-8617-4582-baa6-fdefb6ce520a.json" type="application/json+chapters"/></item><item><title>GEOINT for funsies with JoseMonkey</title><itunes:title>GEOINT for funsies with JoseMonkey</itunes:title><description><![CDATA[<p>Not his real name, but there’s real fun to be had learning how JoseMonkey geolocates videos on his wildly popular TikTok channel. Hear the tools, techniques and process he uses to pinpoint even the trickiest videos, the wildest things he’s seen and how this supersleuth got into the GEOINT game.</p>]]></description><content:encoded><![CDATA[<p>Not his real name, but there’s real fun to be had learning how JoseMonkey geolocates videos on his wildly popular TikTok channel. Hear the tools, techniques and process he uses to pinpoint even the trickiest videos, the wildest things he’s seen and how this supersleuth got into the GEOINT game.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">eaaae000-dd71-4cc2-bb9f-c7298360d3c0</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 06 Jun 2023 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ab096029-6084-4812-b83f-0f03fb6f0204/NeedleStack-S2E48-1.mp3" length="40428845" type="audio/mpeg"/><itunes:duration>28:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-ab096029-6084-4812-b83f-0f03fb6f0204.json" type="application/json+chapters"/></item><item><title>USGIF GEOINT Symposium acronym spectacular</title><itunes:title>USGIF GEOINT Symposium acronym spectacular</itunes:title><description><![CDATA[<p>We attended USGIF’s GEOINT Symposium so you don’t have to (but you should – it’s great). NeedleStack producers Aubrey and Shannon break down the geospatial intelligence conference (and its many, many acronyms) and the presence of OSINT on the floor, in keynotes and the Innovation Hub. If you’re an open-source researcher, tune in to understand what’s out there and how to leverage this adjacent INT.</p>]]></description><content:encoded><![CDATA[<p>We attended USGIF’s GEOINT Symposium so you don’t have to (but you should – it’s great). NeedleStack producers Aubrey and Shannon break down the geospatial intelligence conference (and its many, many acronyms) and the presence of OSINT on the floor, in keynotes and the Innovation Hub. If you’re an open-source researcher, tune in to understand what’s out there and how to leverage this adjacent INT.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">95538d5b-92ed-4e9b-8111-4d66ba8be6b7</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 31 May 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c52253e0-f807-4cae-92a1-6461b60849ee/GEOINT-Symposium-recap-1.mp3" length="42080201" type="audio/mpeg"/><itunes:duration>29:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-c52253e0-f807-4cae-92a1-6461b60849ee.json" type="application/json+chapters"/></item><item><title>The good and bad of geotags</title><itunes:title>The good and bad of geotags</itunes:title><description><![CDATA[<p>In this episode, our guest brings more than 30 years of experience from the Department of Defense to the conversation. James A. Samuel, Jr. is now in the private sector working as an entrepreneur in the GEOINT space, using his military knowledge to create apps that use location data to protect safety.</p>]]></description><content:encoded><![CDATA[<p>In this episode, our guest brings more than 30 years of experience from the Department of Defense to the conversation. James A. Samuel, Jr. is now in the private sector working as an entrepreneur in the GEOINT space, using his military knowledge to create apps that use location data to protect safety.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/the-good-and-bad-geotags]]></link><guid isPermaLink="false">7c3e476f-32dd-4c0b-977e-992af852c3d8</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 16 May 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/74b17787-35e0-4791-ba95-4b998621e765/S2E46-with-James-Samuel-Jr.mp3" length="51167052" type="audio/mpeg"/><itunes:duration>35:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-74b17787-35e0-4791-ba95-4b998621e765.json" type="application/json+chapters"/></item><item><title>The future of GEOINT</title><itunes:title>The future of GEOINT</itunes:title><description><![CDATA[<p>As commercial satellites increase and technology advances, what does the future of geospatial intelligence look like? We ask our guest to explain the basics of GEOINT, where it’s headed and how other industries can utilize one of the most fascinating -INTs.</p>]]></description><content:encoded><![CDATA[<p>As commercial satellites increase and technology advances, what does the future of geospatial intelligence look like? We ask our guest to explain the basics of GEOINT, where it’s headed and how other industries can utilize one of the most fascinating -INTs.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/the-future-of-geoint]]></link><guid isPermaLink="false">0c185588-ea1d-4271-8bcc-875377c2c28a</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 09 May 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3b717622-d6c7-4c96-86c3-2f82d2986d28/needlestack-jeff-mark-thom-and-1-more-thom-kaye-531w099a1-cfr-s.mp3" length="43742216" type="audio/mpeg"/><itunes:duration>30:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-3b717622-d6c7-4c96-86c3-2f82d2986d28.json" type="application/json+chapters"/></item><item><title>Hard-to-hear OSINT truths</title><itunes:title>Hard-to-hear OSINT truths</itunes:title><description><![CDATA[<p>Abbi Dobbertin of Fivecast and Adam Huenke join the podcast to talk hot takes. As tradecraft and training leads, respectively, and years of OSINT practitioner experience between them, they’ve come to form opinions on some of OSINT’s more heated topics.</p>]]></description><content:encoded><![CDATA[<p>Abbi Dobbertin of Fivecast and Adam Huenke join the podcast to talk hot takes. As tradecraft and training leads, respectively, and years of OSINT practitioner experience between them, they’ve come to form opinions on some of OSINT’s more heated topics.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/OSINT-hot-takes]]></link><guid isPermaLink="false">36c01c27-250f-4ec5-bffd-4e9173ff9648</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 11 Apr 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/197a79cc-9d16-4c52-933d-f38860245763/S2E44-OSINT-Hot-Takes-w-Abbi-from-Fivecast-1-converted.mp3" length="32603663" type="audio/mpeg"/><itunes:duration>34:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-197a79cc-9d16-4c52-933d-f38860245763.json" type="application/json+chapters"/></item><item><title>The youths and their TikTok: a SOCMINT symposium recap</title><itunes:title>The youths and their TikTok: a SOCMINT symposium recap</itunes:title><description><![CDATA[<p>Producers Shannon and Aubrey attend the 2023 Symposium on Open Source, Social Media and National Security. They discuss highlights, panel topics and advice for people hoping to break into a career in OSINT, INFOSEC and NATSEC.</p>]]></description><content:encoded><![CDATA[<p>Producers Shannon and Aubrey attend the 2023 Symposium on Open Source, Social Media and National Security. They discuss highlights, panel topics and advice for people hoping to break into a career in OSINT, INFOSEC and NATSEC.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/youths-and-tiktok-symposium]]></link><guid isPermaLink="false">fa499dab-4fd7-475b-a119-d0c232fbb81b</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 04 Apr 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1f7d5212-a2d8-411c-b3b7-0dfa853dd1ff/S2E43-OSINT-Symposium-recap-converted.mp3" length="31981082" type="audio/mpeg"/><itunes:duration>33:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-1f7d5212-a2d8-411c-b3b7-0dfa853dd1ff.json" type="application/json+chapters"/></item><item><title>What if we taught OSINT to high schoolers?</title><itunes:title>What if we taught OSINT to high schoolers?</itunes:title><description><![CDATA[<p>This week, a high school criminology teacher joins the podcast to discuss how teaching open-source research helped engage his students during distant learning. In the classroom, OSINT can show students the power of open-source information and serves as a cautionary tale for sharing personally identifiable information online.</p>]]></description><content:encoded><![CDATA[<p>This week, a high school criminology teacher joins the podcast to discuss how teaching open-source research helped engage his students during distant learning. In the classroom, OSINT can show students the power of open-source information and serves as a cautionary tale for sharing personally identifiable information online.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/what-if-we-taught-OSINT-in-high-school]]></link><guid isPermaLink="false">65fe64ca-ffb8-4d29-b9dc-06e06d02908e</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 28 Mar 2023 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f0032bc4-cc6f-40ec-a262-6e6a57b0b563/S2E42-with-Chris-Kemp-1.mp3" length="20576132" type="audio/mpeg"/><itunes:duration>21:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-f0032bc4-cc6f-40ec-a262-6e6a57b0b563.json" type="application/json+chapters"/></item><item><title>Think like an investigator</title><itunes:title>Think like an investigator</itunes:title><description><![CDATA[<p>Our guest is a former FBI investigator and current university professor who has tips for practitioners in every industry. From the protocol before you log on to conduct OSINT research to the resources and reporting, here are the tips for approaching your OSINT like law enforcement. </p>]]></description><content:encoded><![CDATA[<p>Our guest is a former FBI investigator and current university professor who has tips for practitioners in every industry. From the protocol before you log on to conduct OSINT research to the resources and reporting, here are the tips for approaching your OSINT like law enforcement. </p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/think-like-an-investigator]]></link><guid isPermaLink="false">5f606417-600b-443a-b561-8a89fc97b57f</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 07 Mar 2023 13:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e3952319-f2f3-4c67-96b8-36ad75dffd1a/Needlestack-S2-E41-r.mp3" length="34883785" type="audio/mpeg"/><itunes:duration>36:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><podcast:season>2</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-e3952319-f2f3-4c67-96b8-36ad75dffd1a.json" type="application/json+chapters"/></item><item><title>Take-home tips for OSINT Curious researchers</title><itunes:title>Take-home tips for OSINT Curious researchers</itunes:title><description><![CDATA[<p>A founding member of the OSINT Curious Project joins us to give practical tips and advice for researchers. We discuss tools, tradecraft and trends with Micah Hoffman.</p>]]></description><content:encoded><![CDATA[<p>A founding member of the OSINT Curious Project joins us to give practical tips and advice for researchers. We discuss tools, tradecraft and trends with Micah Hoffman.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/take-home-tips-OSINT-Curious]]></link><guid isPermaLink="false">89ccfa0d-e371-4703-9aa8-e85e536a7df8</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 28 Feb 2023 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ec03ce4c-e72b-4374-b793-cc2a2ca7d715/Needlestack-S2-MichahHoffman.mp3" length="42269257" type="audio/mpeg"/><itunes:duration>22:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><podcast:season>2</podcast:season></item><item><title>Networking your way to better OSINT</title><itunes:title>Networking your way to better OSINT</itunes:title><description><![CDATA[<p>The president of the OSMOSIS Association and host of OSINT Cocktail, Cynthia Navarro, joins the podcast to discuss how creating a community of open-source researchers had allowed her to learn from others and hone her skills.</p>]]></description><content:encoded><![CDATA[<p>The president of the OSMOSIS Association and host of OSINT Cocktail, Cynthia Navarro, joins the podcast to discuss how creating a community of open-source researchers had allowed her to learn from others and hone her skills.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/networking-to-better-OSINT]]></link><guid isPermaLink="false">5eaf1747-664e-47a7-80d5-bfa17ab84604</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 21 Feb 2023 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ab8cb588-4419-4882-a655-ad3b0b420945/S2E39-with-Cynthia-Navarro-1.mp3" length="31446488" type="audio/mpeg"/><itunes:duration>32:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><podcast:season>2</podcast:season></item><item><title>How OSINT is changing in federal government</title><itunes:title>How OSINT is changing in federal government</itunes:title><description><![CDATA[<p>The times they are a’changing. Open-source intelligence was once the lesser celebrated branch and now makes up the bulk of analytical reporting. Our guest tells how the federal government is changing its views on OSINT.</p>]]></description><content:encoded><![CDATA[<p>The times they are a’changing. Open-source intelligence was once the lesser celebrated branch and now makes up the bulk of analytical reporting. Our guest tells how the federal government is changing its views on OSINT.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/osint-changes-federal-govt]]></link><guid isPermaLink="false">15a96bde-1592-4319-8c31-e446805aa2f9</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 14 Feb 2023 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/0827881b-d0cf-40c9-96f4-6ad3e22cbb4d/S2E38-1.mp3" length="11440495" type="audio/mpeg"/><itunes:duration>11:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode><podcast:season>2</podcast:season></item><item><title>OSINT’s journey from academia to decision-makers</title><itunes:title>OSINT’s journey from academia to decision-makers</itunes:title><description><![CDATA[<p>The director of the soon-to-open Open-Source Intelligence Laboratory of University of Albany joins the podcast to discuss the definition of OSINT and how his students will research its effect on society.</p>]]></description><content:encoded><![CDATA[<p>The director of the soon-to-open Open-Source Intelligence Laboratory of University of Albany joins the podcast to discuss the definition of OSINT and how his students will research its effect on society.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/academia-to-decision-makers]]></link><guid isPermaLink="false">59c46cbd-86a7-4fee-9f06-9d9dcc8715bc</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 07 Feb 2023 12:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/af455709-8819-4088-924a-b35e68a0ae1f/S2E27-with-Stephen-Coulthart-1.mp3" length="30176722" type="audio/mpeg"/><itunes:duration>31:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode><podcast:season>2</podcast:season></item><item><title>Is your digital fingerprint following you into 2023?</title><itunes:title>Is your digital fingerprint following you into 2023?</itunes:title><description><![CDATA[<p>It’s a new year and as researchers work to hit their goals, we want to revisit some of our most important advice for securely investigating online. It’s time to take stock of your security hygiene and revisit how your digital fingerprint may be getting in the way of finding the data you need.</p>]]></description><content:encoded><![CDATA[<p>It’s a new year and as researchers work to hit their goals, we want to revisit some of our most important advice for securely investigating online. It’s time to take stock of your security hygiene and revisit how your digital fingerprint may be getting in the way of finding the data you need.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/s2e36-digital-fingerprint-following-you-2023]]></link><guid isPermaLink="false">3ac7db25-80c7-4953-b0ba-7e398e8a47cd</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 31 Jan 2023 11:45:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ae9bb62e-53f3-42ae-a693-8a5bd3f323bf/S2E36-Revisiting-the-digital-fingerprint.mp3" length="11871672" type="audio/mpeg"/><itunes:duration>12:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><podcast:season>2</podcast:season></item><item><title>The Best of Season 1</title><itunes:title>The Best of Season 1</itunes:title><description><![CDATA[<p>Watch when Jack Rhysider of Darknet Diaries shares his amazement at what hackers will do “for a free burrito,” or the moment Rob Fuller, a read team and CTI director, condemns security awareness training. From journalists to OSINT investigators to dark web experts, here are some of the best moments we shared with guests last season.</p>]]></description><content:encoded><![CDATA[<p>Watch when Jack Rhysider of Darknet Diaries shares his amazement at what hackers will do “for a free burrito,” or the moment Rob Fuller, a read team and CTI director, condemns security awareness training. From journalists to OSINT investigators to dark web experts, here are some of the best moments we shared with guests last season.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/s2e35-best-of-season-1]]></link><guid isPermaLink="false">ab00b6d2-7e25-4d40-bbda-e4a9e92a2d11</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 24 Jan 2023 12:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/964b2fc6-d9d4-4329-824b-51ffa717e499/S2E35-Best-of-Season-1-1.mp3" length="39548381" type="audio/mpeg"/><itunes:duration>41:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><podcast:season>2</podcast:season></item><item><title>Book club: This Is How They Tell Me The World Ends</title><itunes:title>Book club: This Is How They Tell Me The World Ends</itunes:title><description><![CDATA[<p>Our second book club episode features essential reading for threat intelligence. New York Times reporter, Nicole Perloth, gives a history of the zero-day market and how it has changed the cyber weapons arms race. Learn how this market was created and what it means for future cyber defense.</p>]]></description><content:encoded><![CDATA[<p>Our second book club episode features essential reading for threat intelligence. New York Times reporter, Nicole Perloth, gives a history of the zero-day market and how it has changed the cyber weapons arms race. Learn how this market was created and what it means for future cyber defense.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">5704bce8-7395-45c8-b9a6-c9f48fb609f1</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 13 Dec 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a9582b50-019a-4f48-b9b4-4569c4f602e6/S1E34-This-Is-How-They-Tell-Me-Book-Club-1.mp3" length="22127372" type="audio/mpeg"/><itunes:duration>23:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode><podcast:season>1</podcast:season></item><item><title>Book club: We Are Bellingcat</title><itunes:title>Book club: We Are Bellingcat</itunes:title><description><![CDATA[<p>This special edition of NeedleStack features a must-read for open-source researchers, We Are Bellingcat by Eliot Higgins. Our producer Shannon discusses what she learned from the founder of Bellingcat’s tell-all and how researchers can learn from the organization’s practices.</p>]]></description><content:encoded><![CDATA[<p>This special edition of NeedleStack features a must-read for open-source researchers, We Are Bellingcat by Eliot Higgins. Our producer Shannon discusses what she learned from the founder of Bellingcat’s tell-all and how researchers can learn from the organization’s practices.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">c4d71c6c-726d-4269-87c6-471fa087d815</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 06 Dec 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4f6accff-06b1-438b-abf0-cce5a7dc3e02/S1E33-Book-Club-We-Are-Bellingcat-1.mp3" length="26582183" type="audio/mpeg"/><itunes:duration>27:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode><podcast:season>1</podcast:season></item><item><title>Practical OSINT tips from the field</title><itunes:title>Practical OSINT tips from the field</itunes:title><description><![CDATA[<p>In this episode, an expert OSINT practitioner from both government and private sector practices joins to share hands-on tips from in the field. He also shares what the students of Center for Intelligence and Research and Training are learning from their real-world client experiences.</p>]]></description><content:encoded><![CDATA[<p>In this episode, an expert OSINT practitioner from both government and private sector practices joins to share hands-on tips from in the field. He also shares what the students of Center for Intelligence and Research and Training are learning from their real-world client experiences.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">52f88f98-9689-4d99-9a31-8b5d3d9adbf0</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 15 Nov 2022 12:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9170edb6-6629-47c6-8112-826aa07bc15a/S1E32-20with-20Brian-20Fuller-1-converted.mp3" length="23613951" type="audio/mpeg"/><itunes:duration>24:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode><podcast:season>1</podcast:season></item><item><title>Subverting censorship through tech</title><itunes:title>Subverting censorship through tech</itunes:title><description><![CDATA[<p>Authoritarian regimes create propaganda and disinformation, in part, by blocking citizens’ access to traditional news sources. In this episode, co-founder of Samizdat Online, Yevgeny Simkin, walks us through how their program works in partnership with outlets to syndicate articles to bypass censorship in Russia and other countries — to get citizens and researchers the information they need.</p>]]></description><content:encoded><![CDATA[<p>Authoritarian regimes create propaganda and disinformation, in part, by blocking citizens’ access to traditional news sources. In this episode, co-founder of Samizdat Online, Yevgeny Simkin, walks us through how their program works in partnership with outlets to syndicate articles to bypass censorship in Russia and other countries — to get citizens and researchers the information they need.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">0ce314ca-5025-4bdc-a703-5b0ea27e40d7</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 08 Nov 2022 12:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/68eddb65-24f3-4580-a2ca-14b3a23d278e/S1E31-20with-20Yevgeny-20Simkin-1-converted.mp3" length="22655988" type="audio/mpeg"/><itunes:duration>23:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><podcast:season>1</podcast:season></item><item><title>How to perform a fact-check: from start to finish</title><itunes:title>How to perform a fact-check: from start to finish</itunes:title><description><![CDATA[<p>Nick Hardinges from the Reuters fact-checking team joins the podcast to walk us through how to go about debunking information online, from deciding what’s worth covering to why grainy images should make you skeptical. Ultimately, fact-checking takes time, persistence and a healthy dose of intrigue. </p><p><strong>Key takeaways</strong></p><ul><li>Know these telltale signs of doctored content</li><li>Check your sources</li><li>Do some digging on what you see</li></ul><br/><p><strong>About Nick</strong></p><p>Nick Hardinges is a former digital news editor and current fact-checker for Reuters, whose job is to find harmful, widely circulating and topical misinformation, and then address those claims in articles directly responding to the claims being made. Nick’s main focus is on setting the record straight on social media but to sometimes address claims from elsewhere, such as outright lies in politics, or damaging conclusions reached in unscientific ‘research’ papers.</p><p><strong>Where to find Nick</strong></p><ul><li><a href="https://twitter.com/NickHardinges" rel="noopener noreferrer" target="_blank"><strong>@NickHardinges</strong></a></li><li><a href="https://www.reuters.com/article/factcheck-coronavirus-sport/fact-check-list-of-108-fifa-soccer-players-is-not-proof-of-a-common-link-between-covid-19-vaccines-and-athlete-deaths-idUSL1N2T81NY" rel="noopener noreferrer" target="_blank">FIFA COVID misinformation story</a></li><li><a href="https://www.reuters.com/article/factcheck-rosieholt-conservative/fact-check-parody-video-of-comedian-pretending-to-be-a-uk-conservative-mp-explaining-mini-budget-and-trickle-down-economics-taken-seriously-online-idUSL1N3150X8" rel="noopener noreferrer" target="_blank">Spotting the difference</a> between legitimate videos and satire</li></ul><br/>]]></description><content:encoded><![CDATA[<p>Nick Hardinges from the Reuters fact-checking team joins the podcast to walk us through how to go about debunking information online, from deciding what’s worth covering to why grainy images should make you skeptical. Ultimately, fact-checking takes time, persistence and a healthy dose of intrigue. </p><p><strong>Key takeaways</strong></p><ul><li>Know these telltale signs of doctored content</li><li>Check your sources</li><li>Do some digging on what you see</li></ul><br/><p><strong>About Nick</strong></p><p>Nick Hardinges is a former digital news editor and current fact-checker for Reuters, whose job is to find harmful, widely circulating and topical misinformation, and then address those claims in articles directly responding to the claims being made. Nick’s main focus is on setting the record straight on social media but to sometimes address claims from elsewhere, such as outright lies in politics, or damaging conclusions reached in unscientific ‘research’ papers.</p><p><strong>Where to find Nick</strong></p><ul><li><a href="https://twitter.com/NickHardinges" rel="noopener noreferrer" target="_blank"><strong>@NickHardinges</strong></a></li><li><a href="https://www.reuters.com/article/factcheck-coronavirus-sport/fact-check-list-of-108-fifa-soccer-players-is-not-proof-of-a-common-link-between-covid-19-vaccines-and-athlete-deaths-idUSL1N2T81NY" rel="noopener noreferrer" target="_blank">FIFA COVID misinformation story</a></li><li><a href="https://www.reuters.com/article/factcheck-rosieholt-conservative/fact-check-parody-video-of-comedian-pretending-to-be-a-uk-conservative-mp-explaining-mini-budget-and-trickle-down-economics-taken-seriously-online-idUSL1N3150X8" rel="noopener noreferrer" target="_blank">Spotting the difference</a> between legitimate videos and satire</li></ul><br/>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">2769b9e8-3510-413d-be7e-5238a0cd32b0</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 18 Oct 2022 10:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a132cc01-42cb-4697-8c11-579785adb24f/S1E30-20with-20Nick-20Hardinges-1-converted.mp3" length="25006173" type="audio/mpeg"/><itunes:duration>26:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>30</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>30</podcast:season></item><item><title>Verifying what you see in the media</title><itunes:title>Verifying what you see in the media</itunes:title><description><![CDATA[<p>Social media and traditional media overlap now more than ever, with social media providing an opportunity to reach and resonate with new audiences – for better or worse. Rachel Baig knows this intersection well. As a social media journalist and trainer for Deutsche Welle, she knows the ins and outs of not only using social to identify a great story but also how to spot a fake one. In this episode, Rachel breaks down important lessons from her training to understand media spoofs, verify images and videos, spot tell-tale signs of bots and more.</p>]]></description><content:encoded><![CDATA[<p>Social media and traditional media overlap now more than ever, with social media providing an opportunity to reach and resonate with new audiences – for better or worse. Rachel Baig knows this intersection well. As a social media journalist and trainer for Deutsche Welle, she knows the ins and outs of not only using social to identify a great story but also how to spot a fake one. In this episode, Rachel breaks down important lessons from her training to understand media spoofs, verify images and videos, spot tell-tale signs of bots and more.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">8ea183de-4507-46a5-973b-5eda086d61fb</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 11 Oct 2022 12:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8e4f08e5-5be8-41f6-9958-76e1e2e77cef/S1E29-20witch-20Rachel-20Baig-converted.mp3" length="19670506" type="audio/mpeg"/><itunes:duration>20:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><podcast:season>1</podcast:season></item><item><title>Why Russian disinformation is so effective</title><itunes:title>Why Russian disinformation is so effective</itunes:title><description><![CDATA[<p>Fact-checkers’ biggest nemesis is the proliferation of disinformation in the digital age. Chris Paul joins the episode to talk about Russian propaganda and disinformation techniques. Why are they so effective? Is it skill or just an innate vulnerability for humans to want to believe what they see? Chris Paul walks us through his research from the technical to the psychological.</p>]]></description><content:encoded><![CDATA[<p>Fact-checkers’ biggest nemesis is the proliferation of disinformation in the digital age. Chris Paul joins the episode to talk about Russian propaganda and disinformation techniques. Why are they so effective? Is it skill or just an innate vulnerability for humans to want to believe what they see? Chris Paul walks us through his research from the technical to the psychological.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">8006d969-90aa-4bda-a460-1d3873f6b7f4</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 04 Oct 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bf14e717-6311-4bc5-87db-56ebe8f35db6/S1E28-20Chris-20Paul-1-converted.mp3" length="24328661" type="audio/mpeg"/><itunes:duration>25:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><podcast:season>1</podcast:season></item><item><title>Where Woodward meets Holmes: OSINT and investigative journalism</title><itunes:title>Where Woodward meets Holmes: OSINT and investigative journalism</itunes:title><description><![CDATA[<p>The intersection of open-source information, disinformation, social media and journalism has spawned a new breed of investigator. </p><p>Meet Brecht Castel, fact-checking journalist and OSINT aficionado. In this episode, Brecht shares his advice on how to be good at both. Learn how his background as a journalist helps him dig deeper, beyond “hashtag OSINT” and get the bigger story. And how his passion for OSINT has led down many interesting paths — from locating one tree in the whole of Africa to explaining why a mosquito with a number on its back is not part of Bill Gates’ plan for world domination (or even a mosquito, for that matter).</p>]]></description><content:encoded><![CDATA[<p>The intersection of open-source information, disinformation, social media and journalism has spawned a new breed of investigator. </p><p>Meet Brecht Castel, fact-checking journalist and OSINT aficionado. In this episode, Brecht shares his advice on how to be good at both. Learn how his background as a journalist helps him dig deeper, beyond “hashtag OSINT” and get the bigger story. And how his passion for OSINT has led down many interesting paths — from locating one tree in the whole of Africa to explaining why a mosquito with a number on its back is not part of Bill Gates’ plan for world domination (or even a mosquito, for that matter).</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">dbb1deb5-4b8d-4f43-b268-8f3fb0abf6db</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 27 Sep 2022 11:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8cbfe7fd-e179-4722-8ad6-14d6002317ec/S1E27-20with-20Brecht-20Castel-converted.mp3" length="29596596" type="audio/mpeg"/><itunes:duration>20:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/337d0c4d-c3f3-43d7-91e8-9e22487c69b7/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/337d0c4d-c3f3-43d7-91e8-9e22487c69b7/index.html" type="text/html"/></item><item><title>The AI tracking alt-social media</title><itunes:title>The AI tracking alt-social media</itunes:title><description><![CDATA[<p>Mis- and disinformation abound on social media. But as violating users are deplatformed from mainstream sites, they’ve become hyper-concentrated on alternative social media where anything goes. We sit down with Dr. Welton Chang, CEO and co-founder of Pyrra Technologies, to discuss how AI/ML is helping researchers zero-in on disinformation, domestic extremism, hate speech and more, and understand how to counteract it.</p>]]></description><content:encoded><![CDATA[<p>Mis- and disinformation abound on social media. But as violating users are deplatformed from mainstream sites, they’ve become hyper-concentrated on alternative social media where anything goes. We sit down with Dr. Welton Chang, CEO and co-founder of Pyrra Technologies, to discuss how AI/ML is helping researchers zero-in on disinformation, domestic extremism, hate speech and more, and understand how to counteract it.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">3b1dd3f7-85d0-4d99-bba0-174ae47ab047</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 20 Sep 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/093661e7-2248-4c05-a54a-8efb82bc1d6a/S1E26-20with-20Welton-20Chang-1-converted.mp3" length="22131449" type="audio/mpeg"/><itunes:duration>23:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><podcast:season>1</podcast:season></item><item><title>Autopsy of a story: the art and science of fact-checking</title><itunes:title>Autopsy of a story: the art and science of fact-checking</itunes:title><description><![CDATA[<p>Fact-checking can be seen as the undoing of a story, tearing apart the salacious tidbits to get at the bloody — or perhaps just boring — truth. In this episode, veteran journalist and lead of AFP's award-winning digital verification team in Africa, Nina Lamparski, sits down in the NeedleStack guest seat to discuss fact-checking and debunking in the age of misinformation, how local media consumption habits impact her work, fact-checking in election cycles and more.</p>]]></description><content:encoded><![CDATA[<p>Fact-checking can be seen as the undoing of a story, tearing apart the salacious tidbits to get at the bloody — or perhaps just boring — truth. In this episode, veteran journalist and lead of AFP's award-winning digital verification team in Africa, Nina Lamparski, sits down in the NeedleStack guest seat to discuss fact-checking and debunking in the age of misinformation, how local media consumption habits impact her work, fact-checking in election cycles and more.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">9a5f2c4a-0bd1-4c3d-af90-8d56979d9e06</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 13 Sep 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/475a9d8b-5a43-45f1-bc90-04a7023e9473/S1E25-20with-20Nina-20Lamparski-1-converted.mp3" length="24374636" type="audio/mpeg"/><itunes:duration>25:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><podcast:season>1</podcast:season></item><item><title>Pro tips for intel team “care and feeding”</title><itunes:title>Pro tips for intel team “care and feeding”</itunes:title><description><![CDATA[<p>From a love of Tom Clancy novels to military intelligence to “the ivory tower” of industry analysts, Rick Holland’s road to Digital Shadow’s CISO taught him many lessons along the way. Rick shares his advice for building an intel team, including: avoid homogenous groups; take time to strategize — and follow — processes for OSINT collection on the surface, deep and dark (or derp) web; and remember the importance of human relationships even in the tech-heavy world of threat intelligence.</p>]]></description><content:encoded><![CDATA[<p>From a love of Tom Clancy novels to military intelligence to “the ivory tower” of industry analysts, Rick Holland’s road to Digital Shadow’s CISO taught him many lessons along the way. Rick shares his advice for building an intel team, including: avoid homogenous groups; take time to strategize — and follow — processes for OSINT collection on the surface, deep and dark (or derp) web; and remember the importance of human relationships even in the tech-heavy world of threat intelligence.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">be02d539-86e7-4f00-b73f-3bb5a96ba2b3</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 31 Aug 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/65c8fb31-eeae-4819-9b04-2d99816bf446/S1E24-20with-20Rick-20Holland-converted.mp3" length="20809862" type="audio/mpeg"/><itunes:duration>21:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:season>1</podcast:season></item><item><title>Using OSINT to identify weaknesses</title><itunes:title>Using OSINT to identify weaknesses</itunes:title><description><![CDATA[<p>OSINT is a powerful tool to identify vulnerabilities in your organization. But with all the information out there, how do you zero-in on the data you need quickly? In this episode, host and former CISO Matt Ashburn gives his advice on go-to resources, where to automate, how to truly gain an outside perspective and tradecraft considerations.</p>]]></description><content:encoded><![CDATA[<p>OSINT is a powerful tool to identify vulnerabilities in your organization. But with all the information out there, how do you zero-in on the data you need quickly? In this episode, host and former CISO Matt Ashburn gives his advice on go-to resources, where to automate, how to truly gain an outside perspective and tradecraft considerations.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">b297c84a-f2d5-415d-8829-f3c51d32f6c2</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 09 Aug 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ba7c304c-41a9-4712-9de1-a5dcf8ee3ad0/S1E23-converted.mp3" length="13983335" type="audio/mpeg"/><itunes:duration>14:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><podcast:season>1</podcast:season></item><item><title>Intelligence sharing for the greater good</title><itunes:title>Intelligence sharing for the greater good</itunes:title><description><![CDATA[<p>After spending 22 years in the U.S. Air Force building the branch’s cyber presence worldwide and reshaping its cyber curriculum, Lance Taylor now applies his background to the private sector. From lessons he’s learned along the way to the best tools for the job, Lance tells us how companies can improve their intel.</p>]]></description><content:encoded><![CDATA[<p>After spending 22 years in the U.S. Air Force building the branch’s cyber presence worldwide and reshaping its cyber curriculum, Lance Taylor now applies his background to the private sector. From lessons he’s learned along the way to the best tools for the job, Lance tells us how companies can improve their intel.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e22-intelligence-sharing-greater-good]]></link><guid isPermaLink="false">7772bd6e-b752-4147-b05c-06e19876ff83</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 02 Aug 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/25aad7c3-a5b6-412f-8dd0-408ed985c945/S1E22-20with-20Lance-20Taylor-2-converted.mp3" length="21301466" type="audio/mpeg"/><itunes:duration>25:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/39de4c5b-bb5e-4051-9e54-0f80fc0e2e29/index.html" type="text/html"/></item><item><title>Information is not intelligence</title><itunes:title>Information is not intelligence</itunes:title><description><![CDATA[<p>Without the right appreciation for intelligence, organizations may be hiring themselves into a problem. Vice President of Intelligence at ZeroFox A.J. Nash sits down with NeedleStack to discuss the fundamentals of intelligence, how to build and lead the best teams, and why as analysts doing the easy thing may be doing the best thing.</p>]]></description><content:encoded><![CDATA[<p>Without the right appreciation for intelligence, organizations may be hiring themselves into a problem. Vice President of Intelligence at ZeroFox A.J. Nash sits down with NeedleStack to discuss the fundamentals of intelligence, how to build and lead the best teams, and why as analysts doing the easy thing may be doing the best thing.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">fbefbdad-29de-45b3-aca9-e87e10dab4cd</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 26 Jul 2022 13:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/704deaee-5607-4435-936e-811eaf1dccc6/S1E21-20with-20A-J-1.mp3" length="26511682" type="audio/mpeg"/><itunes:duration>27:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/43b830ba-aa29-4b7a-94aa-cfbd927d889a/index.html" type="text/html"/></item><item><title>Red team, blue team, stopping hack fiends</title><itunes:title>Red team, blue team, stopping hack fiends</itunes:title><description><![CDATA[<p>In episode 20 we interview Rob Fuller, the red team and CTI director for a major U.S. airline. Rob discusses how red teams can better leverage CTI, the grand mistakes of even the most security-conscious individuals, and why he thinks most security awareness training gets it wrong.</p>]]></description><content:encoded><![CDATA[<p>In episode 20 we interview Rob Fuller, the red team and CTI director for a major U.S. airline. Rob discusses how red teams can better leverage CTI, the grand mistakes of even the most security-conscious individuals, and why he thinks most security awareness training gets it wrong.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e20-red-team-blue-team-stopping-hack-fiends]]></link><guid isPermaLink="false">a7d6bf5f-20b1-44ee-8438-c807c30fc265</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 12 Jul 2022 14:15:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7f822e33-7e1c-41ff-ac7c-e3ff6582c2b3/S1E20-20with-20Rob-20Fuller-1.mp3" length="35489692" type="audio/mpeg"/><itunes:duration>37:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/67c38287-167f-4554-ba29-bc4f2e771ca3/index.html" type="text/html"/></item><item><title>Your dark web questions answered</title><itunes:title>Your dark web questions answered</itunes:title><description><![CDATA[<p>In this listeners live episode, Matt answers questions from the audience that have come up over our dark web episodes. Get sage advice on safely accessing the dark web without running afoul of policy, blockchain analysis (or the lack thereof with Monero), how to use PGP encryption to communicate with dark web actors and more.</p>]]></description><content:encoded><![CDATA[<p>In this listeners live episode, Matt answers questions from the audience that have come up over our dark web episodes. Get sage advice on safely accessing the dark web without running afoul of policy, blockchain analysis (or the lack thereof with Monero), how to use PGP encryption to communicate with dark web actors and more.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack/s1e19-dark-web-questions-answered]]></link><guid isPermaLink="false">e8fe5f78-d206-4923-9e6f-95d58867b338</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 14 Jun 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1b4ec264-b8be-4080-86fe-84a7c68b2de4/s1e19-dark-web-Q-A-listeners-live.mp3" length="19503163" type="audio/mpeg"/><itunes:duration>20:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/9554dc17-c8bd-4107-9e70-7966c554eab3/index.html" type="text/html"/></item><item><title>Dear Darknet Diaries: dark web stories with Jack Rhysider</title><itunes:title>Dear Darknet Diaries: dark web stories with Jack Rhysider</itunes:title><description><![CDATA[<p>The surprising identity behind some of the internet’s most nefarious hacks and why sometimes criminals are more willing to talk than victims of a crime, we discuss the dark side of the web with Darknet Diaries host Jack Rhysider.</p>]]></description><content:encoded><![CDATA[<p>The surprising identity behind some of the internet’s most nefarious hacks and why sometimes criminals are more willing to talk than victims of a crime, we discuss the dark side of the web with Darknet Diaries host Jack Rhysider.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e18-dear-darknet-diaries-dark-web-stories-jack-rhysider?UTM=social]]></link><guid isPermaLink="false">6d469e13-963d-4dc4-b559-311fedf6de51</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 07 Jun 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/815a5f0f-bcc2-48e4-86b1-2b8f8ba2df1a/S1E18-20Dear-20Darknet-20Diaries-20w-20Jack-20Rysider.mp3" length="27799378" type="audio/mpeg"/><itunes:duration>29:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Silk Road and other dark destinations with Eileen Ormsby</title><itunes:title>The Silk Road and other dark destinations with Eileen Ormsby</itunes:title><description><![CDATA[<p>Eileen Ormsby has chatted with drug lords, been threatened by purported hitmen and written books about The Silk Road. Her investigative journalism led her to the dark web, where she has been reporting her findings ever since.</p>]]></description><content:encoded><![CDATA[<p>Eileen Ormsby has chatted with drug lords, been threatened by purported hitmen and written books about The Silk Road. Her investigative journalism led her to the dark web, where she has been reporting her findings ever since.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e17-silk-road-and-other-dark-destinations]]></link><guid isPermaLink="false">cc97d1ca-3eb5-423f-a8b3-09ded97c33bb</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 31 May 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9d73c7ed-d7e4-4dbc-a365-1a32a704d3c2/S1E16-20The-20Silk-20Road-20and-20other-20dark-20destinations-1.mp3" length="23998006" type="audio/mpeg"/><itunes:duration>25:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:season>1</podcast:season></item><item><title>Dark web research tips for the OSINT-curious</title><itunes:title>Dark web research tips for the OSINT-curious</itunes:title><description><![CDATA[<p>Michael James of the <a href="https://osintcurio.us/" rel="noopener noreferrer" target="_blank">OSINT Curious Project</a> joins the podcast to give expert tips on conducting dark web research. From GitHub tools to Discord resources— Michael has practical guidance on finding information in the dark.</p>]]></description><content:encoded><![CDATA[<p>Michael James of the <a href="https://osintcurio.us/" rel="noopener noreferrer" target="_blank">OSINT Curious Project</a> joins the podcast to give expert tips on conducting dark web research. From GitHub tools to Discord resources— Michael has practical guidance on finding information in the dark.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e16-dark-web-research-tips-osint-curious]]></link><guid isPermaLink="false">0d833889-48b6-4b8d-8514-1fe070aab287</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 24 May 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8e86ac52-cf2b-4f47-9947-ce594d7b5c7d/S1E16-20OSINT-20Curious.mp3" length="26572981" type="audio/mpeg"/><itunes:duration>27:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/8a242306-3aa9-42a4-a247-33f41ca4890b/index.html" type="text/html"/></item><item><title>Investigating financial crimes on the dark web</title><itunes:title>Investigating financial crimes on the dark web</itunes:title><description><![CDATA[<p>In this episode, podcast contributor Adam Huenke discusses how to investigate financial crimes on the dark web. How do stolen credit card numbers affect the victim of theft, the institution and those who investigate fraud? Tune in to hear all about it.</p>]]></description><content:encoded><![CDATA[<p>In this episode, podcast contributor Adam Huenke discusses how to investigate financial crimes on the dark web. How do stolen credit card numbers affect the victim of theft, the institution and those who investigate fraud? Tune in to hear all about it.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">d648e2d9-56a5-447a-a0db-68cb8bde4c15</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 17 May 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7ed2f1ed-c48d-4ab4-a0b1-a18bd66fb13c/S1E15-20Finfraud.mp3" length="18381850" type="audio/mpeg"/><itunes:duration>19:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:season>1</podcast:season></item><item><title>Follow the money: how cryptocurrency shines a light in the dark web</title><itunes:title>Follow the money: how cryptocurrency shines a light in the dark web</itunes:title><description><![CDATA[<p>There’s a (false) assumption that cryptocurrency is inherently anonymous, concealing the identity of those who use it. But in fact, crypto has been used in countless investigations to unmask criminals and bring them to justice. We sit down with Matt Price, former IRS-CI special agent and current head of investigations and intelligence at Binance, to bust the myths of crypto and the dark web, and learn how the best advice to any investigator holds true for crypto: follow the money.</p>]]></description><content:encoded><![CDATA[<p>There’s a (false) assumption that cryptocurrency is inherently anonymous, concealing the identity of those who use it. But in fact, crypto has been used in countless investigations to unmask criminals and bring them to justice. We sit down with Matt Price, former IRS-CI special agent and current head of investigations and intelligence at Binance, to bust the myths of crypto and the dark web, and learn how the best advice to any investigator holds true for crypto: follow the money.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">5577adc2-6118-4b48-a3f9-78441079f706</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 10 May 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d34a55ef-ea45-4bb1-823b-2aaef38d1199/S1E14-20Crypto.mp3" length="18005716" type="audio/mpeg"/><itunes:duration>18:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:season>1</podcast:season></item><item><title>Ready to turn out the light? An intro to the dark web</title><itunes:title>Ready to turn out the light? An intro to the dark web</itunes:title><description><![CDATA[<p>In this episode, host Matt Ashburn, and co-host Jeff Phillips, break down everything you needed to know about the dark web. From how it works and why it was invented to things to consider before conducting your research there – we cover all the questions you were too afraid to ask.</p>]]></description><content:encoded><![CDATA[<p>In this episode, host Matt Ashburn, and co-host Jeff Phillips, break down everything you needed to know about the dark web. From how it works and why it was invented to things to consider before conducting your research there – we cover all the questions you were too afraid to ask.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">c1d4c3e5-ca4c-4a30-82c0-f87be08f36f2</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 03 May 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/15f975ee-ac2d-41e5-95d5-c7dac7c6283a/S1E13-20Intro-20to-20the-20dark-20web.mp3" length="14772715" type="audio/mpeg"/><itunes:duration>15:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:season>1</podcast:season></item><item><title>Listeners live April 2022</title><itunes:title>Listeners live April 2022</itunes:title><description><![CDATA[<p>Needlestack hosts answered live questions from our listeners in this special episode. From use cases in different industries to world news to tools to help researchers – Matt and Jeff discussed the role of OSINT in professional research.</p>]]></description><content:encoded><![CDATA[<p>Needlestack hosts answered live questions from our listeners in this special episode. From use cases in different industries to world news to tools to help researchers – Matt and Jeff discussed the role of OSINT in professional research.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e12-listeners-live-april-2022]]></link><guid isPermaLink="false">512c6c32-1064-466c-beed-4cbaf2f320ed</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Wed, 13 Apr 2022 12:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e78d540c-e7ae-46e3-91d5-b809fa6f3df8/NeedleStack-20E12-20Live-20Q-A-1.mp3" length="23126059" type="audio/mpeg"/><itunes:duration>24:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:season>1</podcast:season></item><item><title>OSINT’s crucial role in CTI</title><itunes:title>OSINT’s crucial role in CTI</itunes:title><description><![CDATA[<p>This week the team is joined by threat intelligence researcher Adam Huenke to go over the importance of open-source intelligence to CTI research. From social media to the dark web, freely available information can be found to help improve security.</p>]]></description><content:encoded><![CDATA[<p>This week the team is joined by threat intelligence researcher Adam Huenke to go over the importance of open-source intelligence to CTI research. From social media to the dark web, freely available information can be found to help improve security.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">c625df3a-ccc2-4436-8f70-f5fd25e90104</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 05 Apr 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4432228f-ce56-4be7-acaa-2784c9e5a217/S1E11-20OSINT-20in-20CTI-20ON-20DEMAND.mp3" length="18012388" type="audio/mpeg"/><itunes:duration>18:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:season>1</podcast:season></item><item><title>How OSINT informs executive protection</title><itunes:title>How OSINT informs executive protection</itunes:title><description><![CDATA[<p>It takes a team of people to provide protection to executives and one of their most important tools for offering the best protection is OSINT. Whether searching Facebook for public protests or getting a tip from Twitter, guest Mick Baccio explains how open-source is a key tool in the field.</p>]]></description><content:encoded><![CDATA[<p>It takes a team of people to provide protection to executives and one of their most important tools for offering the best protection is OSINT. Whether searching Facebook for public protests or getting a tip from Twitter, guest Mick Baccio explains how open-source is a key tool in the field.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">8bb14b64-8c5a-456b-b381-dd05c8f714e6</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 29 Mar 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/202d8933-9965-4acf-8166-1d5da30cab8f/S1E10-20OSINT-20in-20Exec-20Protection.mp3" length="14458714" type="audio/mpeg"/><itunes:duration>15:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:season>1</podcast:season></item><item><title>Where trust and safety meets OSINT</title><itunes:title>Where trust and safety meets OSINT</itunes:title><description><![CDATA[<p>Trust and safety is a constantly growing and evolving field. In this episode, we cover the basics of the industry and the role of OSINT in minimizing risk to end users. We also discuss the risks to researchers when their investigations take them off-platform and into the wild of the web.</p>]]></description><content:encoded><![CDATA[<p>Trust and safety is a constantly growing and evolving field. In this episode, we cover the basics of the industry and the role of OSINT in minimizing risk to end users. We also discuss the risks to researchers when their investigations take them off-platform and into the wild of the web.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">2b00c30c-e423-4340-aa84-c1c2a73d8091</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 22 Mar 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d974623c-af20-401d-a6bc-132b04417ca2/s1e9-osint-in-trust-safety.mp3" length="12206497" type="audio/mpeg"/><itunes:duration>12:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:season>1</podcast:season></item><item><title>How law enforcement is using OSINT</title><itunes:title>How law enforcement is using OSINT</itunes:title><description><![CDATA[<p>The latest episode in our OSINT use case tour covers how open-source can be applied to law enforcement. The popular use of social media has made it so that more and more of the clues investigators are looking for can be freely found.</p>]]></description><content:encoded><![CDATA[<p>The latest episode in our OSINT use case tour covers how open-source can be applied to law enforcement. The popular use of social media has made it so that more and more of the clues investigators are looking for can be freely found.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">a952cd37-2a78-491c-8b63-77da8fa0f206</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 15 Mar 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3606eb19-d733-4db7-b8a8-a953d94288c2/s1e8-osint-in-law-enforcement-on-demand.mp3" length="19584061" type="audio/mpeg"/><itunes:duration>20:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:season>1</podcast:season></item><item><title>OSINT in a tense world</title><itunes:title>OSINT in a tense world</itunes:title><description><![CDATA[<p>Open-source intelligence (OSINT) has been playing out on the world stage in a big way over the past few weeks. Social media platforms like TikTok have become insightful sources for analysts to track Russian military movements in the Ukraine invasion. Tracking disinformation on various sites shows a war being fought with more than tanks — Russia is using culture and the power of the media. And auxiliary intelligence is a growing resource in governments gaining OSINT.</p>]]></description><content:encoded><![CDATA[<p>Open-source intelligence (OSINT) has been playing out on the world stage in a big way over the past few weeks. Social media platforms like TikTok have become insightful sources for analysts to track Russian military movements in the Ukraine invasion. Tracking disinformation on various sites shows a war being fought with more than tanks — Russia is using culture and the power of the media. And auxiliary intelligence is a growing resource in governments gaining OSINT.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">70d61ee5-10f8-4f54-9c5d-397cb0c9d7dc</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 08 Mar 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bcfc6db9-1ebc-41b2-b695-0362b049a829/s1e7-osint-panel-1.mp3" length="18020311" type="audio/mpeg"/><itunes:duration>18:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:season>1</podcast:season></item><item><title>Listeners live February 2022</title><itunes:title>Listeners live February 2022</itunes:title><description><![CDATA[<p>In our first listeners live episode, Matt and Jeff take questions from our live audience. They cover resources that can be useful in finding the best OSINT tools; advantages to using native-language search engines in international research; free training for OSINT analysts; and managing attribution to access the information you need. Listen on-demand, or sign up for our upcoming live events at authentic8.com/events/needlestack. </p>]]></description><content:encoded><![CDATA[<p>In our first listeners live episode, Matt and Jeff take questions from our live audience. They cover resources that can be useful in finding the best OSINT tools; advantages to using native-language search engines in international research; free training for OSINT analysts; and managing attribution to access the information you need. Listen on-demand, or sign up for our upcoming live events at authentic8.com/events/needlestack. </p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">ae4cd779-73f3-48e3-852b-0d009a6a6f0d</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 15 Feb 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c565ec18-7e65-4a5e-a579-7c389f08a35a/s1e6-live-on-demand-q-a.mp3" length="13017562" type="audio/mpeg"/><itunes:duration>13:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:season>1</podcast:season></item><item><title>Know thyself, disguise thyself</title><itunes:title>Know thyself, disguise thyself</itunes:title><description><![CDATA[<p>Disguising your digital fingerprint is imperative to the results of online research. This episode, the hosts dive into the tools that can help investigators understand and manage their identity online. From websites to browsers, extensions and full-service managed attribution platforms, here are the tools you need to blend in online.</p>]]></description><content:encoded><![CDATA[<p>Disguising your digital fingerprint is imperative to the results of online research. This episode, the hosts dive into the tools that can help investigators understand and manage their identity online. From websites to browsers, extensions and full-service managed attribution platforms, here are the tools you need to blend in online.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">1b4ef2cc-343a-421b-80b0-01fe10e8baf8</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 08 Feb 2022 15:15:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/50970e07-579f-4fec-abf0-b728329bb7ee/multi-cam-e5.mp3" length="24984211" type="audio/mpeg"/><itunes:duration>26:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:season>1</podcast:season></item><item><title>Hidden dangers of the digital fingerprint</title><itunes:title>Hidden dangers of the digital fingerprint</itunes:title><description><![CDATA[<p>You’re conducting your research. It seems like it’s going successfully. But unbeknownst to you, the subject of your research is onto you, knows you’re snooping and is working to spoil your investigation. This is thanks to your digital fingerprint being passed by your browser. In this panel discussion, we dive deeeep into all the ways details of your digital fingerprint can be discovered — even when using tools built to disguise it — and how adversaries can take advantage of it.</p>]]></description><content:encoded><![CDATA[<p>You’re conducting your research. It seems like it’s going successfully. But unbeknownst to you, the subject of your research is onto you, knows you’re snooping and is working to spoil your investigation. This is thanks to your digital fingerprint being passed by your browser. In this panel discussion, we dive deeeep into all the ways details of your digital fingerprint can be discovered — even when using tools built to disguise it — and how adversaries can take advantage of it.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">467fcf99-7791-4c7e-b560-568b4061c0a8</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 01 Feb 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/05976fae-471f-4b77-9180-079b7a0ea5d9/s1e4-on-demand.mp3" length="30296521" type="audio/mpeg"/><itunes:duration>31:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season></item><item><title>VPNs, Incognito, free Wi-Fi, oh my!</title><itunes:title>VPNs, Incognito, free Wi-Fi, oh my!</itunes:title><description><![CDATA[<p>In an effort to conceal their identity, online researchers may turn to the solutions they know: VPNs, Inocgnito Mode and free Wi-Fi. While these solutions may appear to be working on the surface, there’s lots of details still being disclosed to sites they visit. Tune in to learn what these solutions miss and what’s needed to truly blend in with the crowd to ensure quality research.</p>]]></description><content:encoded><![CDATA[<p>In an effort to conceal their identity, online researchers may turn to the solutions they know: VPNs, Inocgnito Mode and free Wi-Fi. While these solutions may appear to be working on the surface, there’s lots of details still being disclosed to sites they visit. Tune in to learn what these solutions miss and what’s needed to truly blend in with the crowd to ensure quality research.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e3-vpns-incognito-free-wi-fi-oh-my]]></link><guid isPermaLink="false">9a6cebff-86cd-48ed-909f-43ac37212dc7</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 25 Jan 2022 08:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/50453dd1-0a2e-420b-aede-b59c058af655/s1e3-vpn-incognito.mp3" length="19544863" type="audio/mpeg"/><itunes:duration>20:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season></item><item><title>What&apos;s in your digital fingerprint</title><itunes:title>What&apos;s in your digital fingerprint</itunes:title><description><![CDATA[<p>Blending in with the crowd is critical to performing successful online research. If adversaries or the targets of your research can recognize your digital fingerprint, you could get blocked, targeted, infected, identified or tracked. In this episode, we’ll explain what’s in a digital fingerprint, how traditional browsers share this information, what it can mean for research projects and what’s needed to manage it.</p>]]></description><content:encoded><![CDATA[<p>Blending in with the crowd is critical to performing successful online research. If adversaries or the targets of your research can recognize your digital fingerprint, you could get blocked, targeted, infected, identified or tracked. In this episode, we’ll explain what’s in a digital fingerprint, how traditional browsers share this information, what it can mean for research projects and what’s needed to manage it.</p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e2-whats-your-digital-fingerprint]]></link><guid isPermaLink="false">f05ff084-a624-41fe-b1ac-9f79a0d9e579</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 25 Jan 2022 08:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6daea7ba-fe63-4395-969c-482eb6389101/s1e2-digital-fingerprint.mp3" length="19281319" type="audio/mpeg"/><itunes:duration>20:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season></item><item><title>The podcast for professional online research</title><itunes:title>The podcast for professional online research</itunes:title><description><![CDATA[<p>Tune into the podcast every week to learn how to hone your online research skills with better tradecraft. Hear from our host Matt Ashburn and co-host Jeff Phillips as they share tips, tricks and tools to protect your identity, stay safe while you search and improve the efficiency of your investigations. Learn more at authentic8.com/needlestack.</p>]]></description><content:encoded><![CDATA[<p>Tune into the podcast every week to learn how to hone your online research skills with better tradecraft. Hear from our host Matt Ashburn and co-host Jeff Phillips as they share tips, tricks and tools to protect your identity, stay safe while you search and improve the efficiency of your investigations. Learn more at authentic8.com/needlestack.</p>]]></content:encoded><link><![CDATA[https://authentic8.com/needlestack]]></link><guid isPermaLink="false">a4e39e63-f86a-464a-9dba-49c6112b15e4</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Mon, 24 Jan 2022 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7564736c-57c2-469e-8719-e8f7291d16ca/needlestack-trailer-audio.mp3" length="2347783" type="audio/mpeg"/><itunes:duration>02:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>trailer</itunes:episodeType><itunes:season>1</itunes:season><podcast:season>1</podcast:season></item><item><title>Online research: your risk, your reward</title><itunes:title>Online research: your risk, your reward</itunes:title><description><![CDATA[<p>The use cases for online research have exploded in recent years and have become critical practices not just in government and law enforcement agencies, but also in commercial organizations of all sizes. We look at the impact online research has, what are the risks to those who perform sensitive research and what needs to change in the practice. </p>]]></description><content:encoded><![CDATA[<p>The use cases for online research have exploded in recent years and have become critical practices not just in government and law enforcement agencies, but also in commercial organizations of all sizes. We look at the impact online research has, what are the risks to those who perform sensitive research and what needs to change in the practice. </p>]]></content:encoded><link><![CDATA[https://www.authentic8.com/needlestack/s1e1-online-research-your-risk-your-reward]]></link><guid isPermaLink="false">e771fdea-afac-4ba4-a41a-9bcda5571c7f</guid><itunes:image href="https://artwork.captivate.fm/bfe8da84-ff4b-4f22-8e1b-58f2a144a2d1/wgALg2ov21YlADZIn9_bpJxX.png"/><pubDate>Tue, 18 Jan 2022 12:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/78a95cbf-4136-49ab-bd70-a8f6069bfc7a/s1e1-online-research.mp3" length="13361587" type="audio/mpeg"/><itunes:duration>13:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season></item></channel></rss>