Intelligence

OSINT, espionage, surveillance, and information warfare

92 episodes · Page 3 of 4

#788: Dark Ships: The High-Stakes World of Maritime Tracking

Discover how OSINT investigators use satellite radar and AIS data to track "dark" ships and massive aircraft carriers across the open ocean.

situational-awarenesssecurity-logisticstelecommunications

#779: The Cost of a Click: Wartime OpSec in the Digital Age

In the age of instant uploads, your viral video of a strike could be the enemy's best intelligence. Learn why silence is security in modern war.

situational-awarenessoperational-securitygeoint

#778: How Your Pizza Order Could Start a War

Discover how smartphones and social media have turned the "digital exhaust" of daily life into a major tactical vulnerability in modern conflict.

social-engineeringsituational-awarenesselectronic-warfare

#776: Is Your Inbox Watching You Back?

A tiny 1x1 image is watching your every move. Explore how tracking pixels turn your inbox into a surveillance tool and how to fight back.

privacyfingerprintingemail-tracking

#742: The Dark Archive: Saving Extremism for History

When mainstream sites delete toxic content, how do researchers save it? Explore the "memory hole" of digital hate speech and dark archives.

data-integritydata-storageosintdata-sovereigntydigital-preservation

#706: DIY Geopolitical Intelligence: Building Your Dashboard

Learn how to bridge the gap between elite intelligence tools and home-grown situational awareness dashboards using AI.

situational-awarenesslarge-language-modelsosint

#679: The Sound of Secrets: Side-Channel Attacks in AI Clusters

Is your hardware whispering your secrets? Discover how side-channel attacks turn physical signals into data leaks in modern AI clusters.

ai-securityinfrastructure2026high-performance-computingside-channel-attacks

#629: The Earth is Metadata: AI’s New Geolocation Powers

Every pixel is a secret. Herman and Corn discuss how AI and OSINT are turning clouds and shadows into a global tracking system.

privacygeolocationosint

#582: Can We Hide Anything From a 30cm Satellite Lens?

Herman and Corn explore the "grey zone" of space, from high-res spy satellites to the terrifying reality of orbital "death hugs."

satellite-imageryelectronic-warfarecybersecurity

#569: The End of the Blur: High-Res Satellites over Israel

From 2-meter blurs to 40cm clarity: Herman and Corn explore how shifting satellite laws are changing the face of Israeli security.

satellite-imagerysituational-awarenessprivacy

#567: The Orbital Shell Game: AI and Satellite Deception

How do you hide a nuclear site from a satellite that sees everything? Explore the high-tech game of orbital cat and mouse and the AI that tracks it.

satellite-imagerymilitary-strategysurveillance-technologyosintnational-security

#553: The SITREP Method: AI-Powered Intelligence Briefing

Learn how to transform chaotic news cycles into high-protein intelligence using AI and the "Bottom Line Up Front" method for security reporting.

situational-awarenessprompt-engineeringsecurity-logistics

#537: The Architecture of Secrecy: From State Secrets to Zero Trust

Is there a master list of state secrets? Explore the evolution of government classification and its impact on modern digital security.

national-securitycybersecuritymilitary-strategydata-securityzero-trust

#521: Hidden in Plain Sight: Safe Houses and Front Companies

Explore the world of urban camouflage, from fake London facades to the "deep cover" front companies embedded in our global supply chain.

supply-chain-securitysecurity-logisticsurban-planning

#466: Inside the Silence: The Engineering of Modern SCIFs

Explore the physics of high-tech fortresses as Herman and Corn dive into the engineering, history, and future of modern SCIFs.

security-logisticselectronic-warfarestructural-engineering

#424: Shadows in the Embassy: Diplomatic Immunity and Spies

Explore the high-stakes world of diplomatic cover, NOCs, and the "digital dust" that makes modern espionage more dangerous than ever.

diplomatic-immunityespionage-tacticsnon-official-cover

#404: Beyond the Screenshot: Proving Your Digital Evidence

Can a thumbs-up be a binding contract? Learn how to authenticate digital messages and protect your legal rights in the age of AI forgeries.

digital-evidencecryptographylegal-technology

#381: Is Your Phone Hacking Itself?

Imagine getting hacked without ever clicking a link. Herman and Corn explore the terrifying world of zero-click exploits and Pegasus spyware.

privacyexecutive-protectionzero-day-exploits

#380: The Illusion of Spontaneity: Inside High-Level VIP Security

When a minister goes for candy, it’s a tactical operation. Explore the psychology of protection and the illusion of spontaneity for high-level VIPs.

executive-protectionsituational-awarenesssecurity-logistics

#379: Corporate Spies: When Business Intelligence Goes Dark

Is it legal to dig through a rival's trash? Herman and Corn explore the high-stakes world of corporate espionage and the gray lines of business.

competitive-intelligencecorporate-espionagedumpster-diving

#376: Hardwired for Havoc: Inside Mossad’s Pager Operation

Explore the chilling reality of supply chain poisoning and how a decade-long operation turned everyday pagers into targeted weapons.

electronic-warfaretelecommunicationssupply-chain-security

#370: Bunkers and Bytes: The Secret World of Gov Clouds

How do you host the nation's secrets on the same tech that runs Netflix? Corn and Herman explore the high-stakes world of air-gapped government clo...

government-cloudair-gapped-networksscif-data-centers

#334: Subsea Secrets: How AI Taps the World's Fiber Optics

Herman and Corn reveal how governments ingest the internet through subsea cables and use Agentic AI to filter the global digital firehose.

subsea-cablessignals-intelligenceinfrastructure-sovereignty

#333: Before the CIA: The Secret History of Spying

Before the CIA, spying was a world of forged wax seals and secret post offices. Discover how intelligence evolved into an institution.

renaissance-espionagediplomatic-intelligencewalsingham-network

#292: Deterrence or Danger? Decoding the Signals of War

Is it a bluff or a real threat? Corn and Herman dive into OSINT to reveal the hidden logistical signals that separate posturing from invasion.

open-source-intelligenceinvasion-indicatorsmilitary-logistics