Pro Tips To Investigate Human Trafficking Cases / How To End Human Trafficking / Intelligence OSINT
How To Investigate Human Trafficking Cases
The fight to end human trafficking is a worldwide problem. Because of the personal nature of the crime, advertising practices, and the habits of criminals, it is far easier to investigate than other crimes. Yet these cases get relatively little attention from law enforcement.
Here are just a few tips from three seasoned professionals who have investigated human traffic crime, pimps, international crime rings, and more. This includes observational tips and investigative work that does not require OSINT data collection. However, with modern OSINT tools, the investigation time can be even more productive.
These are just some of the types of things you will hear when listening to the OSINT podcast from ShadowDragon. Subscribe to our channel now to keep informed.
Watch the full podcast at: https://rumble.com/v2biizi-s02-e02-chinese-spy-balloon-outing-spies-islamic-attacks-and-human-traffick.html
272
views
What Is the Difference Between Open Source Information and Open Source Intelligence? OSINF vs OSINT
Open source information (OSINF) is the collection of information from open sources. Open source intelligence (OSINT) is information from open sources that is collected at a specific time through a specific request.
While seemingly similar, they are vastly different. The results, attribution, and legality of each may also be different. Be sure you know what you are getting.
Great discussions and information like this can be found in every ShadowDragon podcast. Be sure to subscribe to our channel. The full podcast episode is available at: https://rumble.com/v30tb6w-osint-podcast-s02-e04-breach-data-dumps-osint-then-and-now-what-is-osinf-te.html
365
views
Why Is The Country So Divided? Does Social Media Make Us Divisive? | OSINT Podcast Clip
Without even realizing it, people are becoming heavily influenced by their own online searches. Algorithms are customizing search results and making suggestions based on user history so quickly and comprehensively that beliefs are becoming reinforced at every turn.
Beware that your inquiries and searches are being reflected back at you in so many directions that other viewpoints are essentially suppressed, leaving you with limited counterpoints.
Political groups feed into this. Radical terrorists know this and use it to great effect.
All your internet information and data sources are affected by every action you take online. Be sure to actively seek alternate viewpoints and sources.
Learn about open source intelligence and online practices by listening to the ShadowDragon podcast.
Subscribe to this channel today and watch the full podcast at: https://rumble.com/v30tb6w-osint-podcast-s02-e04-breach-data-dumps-osint-then-and-now-what-is-osinf-te.html
177
views
Is Information From the Internet Valid? Should I Trust the Internet? Google? Reddit? ChatGPT?
Stricter rules for data integrity and the collection of information are being further defined by evolving changes in law, regulations, and practice. As processes become automated, it is integral to know the underlying assumptions that define the parameters that determine output. Algorithms and artificial intelligence operate in specific frameworks that can impact the presentation and collection of data.
Knowing these assumptions and being able to cohesively explain them can be essential when it comes to investigations and legal proceedings.
Being skeptical can help elevate the quality of information you acquire online. If using OSINT tools, know the integrity and methodology of the data collection.
We approach most topics with this discerning view, which we bring to a range of interesting topics in every podcast episode. Subscribe to our channel to keep up with the latest.
Watch the full podcast at: https://rumble.com/v30tb6w-osint-podcast-s02-e04-breach-data-dumps-osint-then-and-now-what-is-osinf-te.html
187
views
One Day Everything Posted Online Will Be Publicly Available Information | OSINT Podcast Clip
Any expectation that anything posted on the internet will remain private should be reconsidered. Widespread data hacks and flawed security architecture have shown the potential for further data breaches.
Years into the future, the massive capabilities of quantum computing might be able to open and extract the entire internet.
This should be a wakeup call to all online users that whatever you post online may eventually become available to the public. Post accordingly.
If you like topics like this, join us as OSINT investigators discuss the world in which we live from a different perspective than you will hear anywhere else. Subscribe to our channel today.
Watch the full podcast at: https://rumble.com/v30tb6w-osint-podcast-s02-e04-breach-data-dumps-osint-then-and-now-what-is-osinf-te.html
210
views
Can OSINT Help with Business Intelligence? Commercial Investigations? Executive Protection?
There are a variety of ways that open source intelligence can benefit commercial clients. Businesses can utilize OSINT, tools, and methodology to improve investigations and achieve goals.
New and effective methods are being applied to business uses with great effectiveness. An OSINT investigator can help in ways that industries might not have yet considered, including executive protection, intellectual property, and trade secrets.
Financial institutions, insurance companies, securities specialists, and private investigators are just a few of the industries taking advantage of OSINT tools.
Get the real stories behind the scenes with the latest season of the industry’s most compelling podcast from an OSINT angle. Be sure to subscribe to our channel.
Watch the full podcast at https://rumble.com/v30tb6w-osint-podcast-s02-e04-breach-data-dumps-osint-then-and-now-what-is-osinf-te.html
295
views
Why Are System Hacks and Breached Data Dumps On The Rise? | OSINT Podcast Clip
From what we are seeing from a data collection standpoint, breaches and hacks are expected to continue. System security seems more lax than ever. Old vulnerabilities continue to be used. Penetration testing is not rising to the standard at which it should be.
If you like interesting topics and thoughtful discussions about open source intelligence be sure to check out the ShadowDragon podcast from your favorite podcast source.
Subscribe to our channel today. Watch the full podcast at https://rumble.com/v30tb6w-osint-podcast-s02-e04-breach-data-dumps-osint-then-and-now-what-is-osinf-te.html
244
views
OSINT Podcast S02 E04: Breach Data Dumps, OSINT Then & Now, What is OSINF, Tech Job Interviews
Season 02, Episode 04: Breaking Down Systems, Breach Data Dumps, OSINT Then & Now, What is OSINF, Tech Job Interviews
Hosts:
Daniel Clemens, CEO
Elliott Anderson, CTO
Nico Dekens (Dutch_OSINTguy), Director of Intelligence and Collection
This time around the guys get together and talk about breaking down systems, especially as it relates to online data. You might be surprised to discover how social media algorithms are self-radicalizing people, computer experts are not what they used to be, and artificial intelligence could be headed down a destructive path.
They visit the past with a look at what open source intelligence was like ten years ago and glimpse what the future might look like with artificial intelligence and Apple Vision Pro goggles. It is all here as three old school open source intelligence investigators once again look at the world through the perspective of analytical intelligence.
Reasons we are seeing a recent increase in hacker and breach data activity, likely due to:
• School summer break gives kids more free time
• Ukraine war personnel returning to computers from battle lines
• Hacker message boards feuding and hacking each other
Here is what we are seeing when we interview computer job candidates:
• Many claim to be an “expert of experts” without the underlying basic knowledge
• These days people rarely build computers from parts – Apple security may be part of that
• Programmers throw around the term API and then cannot explain an API
Nico gives us a glimpse of the evolution of his OSINT work:
• Used to manually log into various accounts to make them look active daily
• Over time the rise of hundreds of viable platforms required scaling account activity
• Now finds that AI and ML results are outdated, biased, or untrue and does not use them for OSINT
The guys discuss modern day pros and cons of OSINT data collection:
• Elliott finds people trust their niche communities and reveal more in those platforms
• Content is moving from text to photos, moving images, and multiple languages, creating challenges
• Analysts need to understand various AI programming languages and methodologies to vet the assumptions that produced the results
• OSINT data collection processed through artificial intelligence is being questioned and invalidated in courts
Social media continues to influence society in unchecked ways:
• Social media algorithms are quicker and more comprehensive in showing content that feeds your interests
• People are essentially becoming self-radicalized online through constant reinforcement of their beliefs
• Terrorist groups are getting better at planting seeds pushed by algorithms
The potential for chaos and societal disruption is increasing:
• Overloading systems and organizations are old concepts being applied in new ways through technology
• Immigration policies need to address feelings of displacement, accelerated by slow processes and online radicalization
• The creation of fake AI-generated content has the potential to push unstable people into violent action
The guys continue the in-depth discussion, further exploring challenges and scenarios brought on by technology, especially that crossing into the world of OSINT.
Thank you for joining us. Subscribe to this channel for more info OSINT content and podcasts.
469
views
How To Make Great Deep Fake Photos Using Artificial Intelligence Apps. Open AI Hugging Face Dream AI
As artificial intelligence software proliferates, there are techniques to learn to improve the quality and realism of content. Whether using the New Bing Chat, ChatGPT, or Google Bard to create A.I. generated writing, or photo apps such as OpenAI, HuggingFace, or Dream AI for images, the quality of the output depends on the quality of the input.
Besides the basic content information, think about context, perspective, and peripheral influences. Conveying these elements in words will dramatically improve the quality of an A.I. photo or article. This absence of this level of detail is also something to examine when discerning deep fake photos or A.I. written content.
These are just some of the many interesting tips you’ll hear when listening to the ShadowDragon podcast, where experts look at current events from an OSINT perspective.
Watch the full podcast at: https://rumble.com/v2hurzo-podcast-s02-e03-osint-view-of-svb-protests-terrorists-hacker-forums-deep-fa.html
3
views
Do Protests Work? What Happens At A Protest? Should I Protest? ShadowDragon OSINT Podcast
As OSINT investigators we track trends and impact from social media, and from what we see, protests barely move the needle. Most people are inundated with protests and opinions from each side of a position to the degree that it no longer holds meaning. Consider redirecting your energy into actions that will have a more direct impact on your well-being.
Honestly, you never know where our podcast discussion takes us, but you can count on the unadulterated truth based on unbiased evidence gleaned from open source intelligence and years of investigative experience.
Subscribe to our channel today to view recent events through an OSINT investigative lens.
Watch the full podcast at: https://rumble.com/v2hurzo-podcast-s02-e03-osint-view-of-svb-protests-terrorists-hacker-forums-deep-fa.html
217
views
How To Prevent Targeted Influence Campaigns. What Happened to Silicon Valley Bank and Credit Suisse?
The speed of information is blinding. That includes false information. Without a plan in place, a targeted influence campaign can take down a company in short time.
Silicon Valley Bank had inadequate or non-existent plans and took the fall. Other targeted banks had measures in place that helped prevent or minimize damage.
Investigation and monitoring tools should be part of a comprehensive strategy to protect your company and brand from attacks by competitors, disruptors, or shadowy operators.
Subscribe to our channel today to keep up with the latest OSINT information.
Watch the full podcast at: https://rumble.com/v2hurzo-podcast-s02-e03-osint-view-of-svb-protests-terrorists-hacker-forums-deep-fa.html
52
views
Podcast S02 E03: OSINT View of SVB, Protests, Terrorists, Hacker Forums, Deep Fakes & Donald Trump
Season 02, Episode 03: Silicon Valley Bank, Protest Groups, Terrorist Threats, Hacker Forums, Deep Fakes & Donald Trump
Hosts:
Daniel Clemens, ShadowDragon CEO
Nico Dekens (Dutch_OSINTguy), ShadowDragon Director of Intelligence and Collection
This time it’s a one-on-one conversation as Daniel and Nico cover the latest news in and outside the OSINT world. Their intel perspective on the news is fascinating, But the discussions between the headlines that make this episode even more compelling.
Listen in as the guys discuss the increasing importance of incident response, crisis management, and operational security, while throwing in advice on protesting, voting, personal security awareness, and more that will add clarity in an ever-changing digital world.
Silicon Valley Bank
• Learn what went wrong in 60 seconds
• Keyword monitoring detected early what other banks were at risk (i.e., Credit Suisse)
• Disruptors started pushing false messages about US and EU bank failures
• Getting messages, true or false, out to one or two key influencers can topple a company quickly
• OSINT data could help drive aggressive investment strategies
Extinction Rebellion (XR)
• Protest group was infiltrated by Dutch law enforcement
• Group feels abused being investigated by the same technique used on terrorists
• Amnesty International calls the working method of the police and judiciary "particularly problematic"
• Police have an obligation to maintain public order and prevent civil unrest
Update: Stabbing Incidents and Alerts in Europe
• There have been more stabbing incidents and lone wolf attacks since we discussed the rising trend in a recent episode
• U.S. defense employee was stabbed in the United Kingdom near her GCHQ office
• Intel agencies issued alerts for increased risk to Vienna prayer houses from Islamic State jihadis
• Brussels metro stations are on high alert; U.S. embassy issued an alert for stabbing threat
Terrorist Threat Response
• Islamic terrorists may go silent for a while, but they are playing a long game and will return
• Include native foreign language and dialects for OSINT search queries
• Individuals need to increase situational awareness and safety protocols
Breached.vc Hacker Forum Owner Arrested
• Young man arrested and labeled “kingpin” of hacker info sharing stie
• Suspect Conor Brian Fitzpatrick of Peekskill, NY looks like every hacker kid of the last 25 years
• Profile does not fit old school hardcore criminal type
• Hacker surprisingly made basic mistakes with operational security (opsec)
• Unless law enforcement has a replacement in place, the forum will re-emerge elsewhere
Donald Trump Announced Pending Arrest
• More social media responses are from the left than the right
• Messages are so extreme there is an indication they may be generated by bots
• People on the right are not responding or mobilizing as they did with January 6th events
• The realistic deep fake photos have had a limited effectiveness
Deep Fake Tools Are Getting Better
• The quality of fakes is getting so good they are making into mainstream media
• Nico likes tools from Open AI, Midjourney, and HuggingFace.co
• With text to image get very specific with visual details, but also perspective, camera angle, lens, etc.
• People are creating AI-generated text and visual content without proper attribution
Thank you for joining us. Subscribe to this channel for info about upcoming OSINT podcasts.
434
views
What Are RTL SDR Sticks? How Can I Track Air Traffic, Boat Traffic and Weather Balloons?
People across the United States tracked the China spy balloon as it traveled the airspace using simple, at-home devices.
What are RTL-SDR USB sticks? How does RTL-SDR work? How can I track air traffic for free? How can I track boat traffic?
If you like intelligence gathering news and information, be sure to subscribe to the ShadowDragon podcast where we cover interesting topics of the day.
Watch the full podcast at: https://rumble.com/v2biizi-s02-e02-chinese-spy-balloon-outing-spies-islamic-attacks-and-human-traffick.html
15
views
Are Smart Devices Spying On Us? Why Does A Flashlight App Need Access To Photos? OSINT Podcast
We are making ourselves more vulnerable by giving access to our activities and habits to data collectors for unknown purposes. Household appliances and electronic devices are continuously streaming usage data to unknown sources.
Stop granting permissions that infringe on your privacy. Reject apps that request contact and photo access. Disable appliance internet connectivity when unnecessary.
With open source intelligence emerging as a social disruptor, protect yourself against these technological threats.
Subscribe today to keep up with the latest.
Watch the full podcast at: https://rumble.com/v2biizi-s02-e02-chinese-spy-balloon-outing-spies-islamic-attacks-and-human-traffick.html
6
views
Is This What World War 3 Is Going To Look Like? Has WW III Already Started In Russia Ukraine?
Are we watching the future of warfare play out in the Ukraine conflict? Computer exploitations and open source intelligence are expanding the battlefield and creating unforeseen advantages. Daniel Clemens opines that we may be witnessing something close to what the next World War looks like.
Subscribe today to keep up with the latest.
Watch the full podcast at: https://rumble.com/v2biizi-s02-e02-chinese-spy-balloon-outing-spies-islamic-attacks-and-human-traffick.html
6
views
How Are Influence Campaigns Impacting International Conflicts? OSINT Podcast
The use of influence campaigns in social media continues to be a disruptive force in conflicts around the world. From election campaigns to civil protests, disrupters stir dissent on both sides to keep societies on edge. Hear what’s going on domestically and abroad in the latest OSINT podcast.
Subscribe today to keep up with the latest.
Watch the full podcast at: https://rumble.com/v2biizi-s02-e02-chinese-spy-balloon-outing-spies-islamic-attacks-and-human-traffick.html
144
views
How Is People Leaving Twitter Helping OSINT Data Collection? What Is The ROI For OSINT? Podcast
As people leave Twitter and other mainstream platforms they tend to gravitate toward smaller groups with shared ideology and viewpoints. They become more extreme, outspoken, and easier to find.
Engaging people in these target rich environments increases OSINT success and return on investment. Learn how cyber investigations are changing the playing field by listening to the ShadowDragon podcast.
Subscribe today to keep up with the latest.
Watch the full podcast at: https://rumble.com/v2biizi-s02-e02-chinese-spy-balloon-outing-spies-islamic-attacks-and-human-traffick.html
187
views
Podcast S02 E02: Chinese Spy Balloon, Outing Spies, Islamic Attacks, & Human Trafficking As Seen Thru OSINT
About this Episode
Hosts: Daniel Clemens, ShadowDragon CEO; Elliott Anderson, ShadowDragon CTO; Nico Dekens, ShadowDragon Director of Intelligence and Innovation Collection (aka Dutch_OSINTguy)
The guys are on top of the latest espionage and OSINT news around the world. From lone wolf activity to coordinated attacks, they examine recent events from an intelligence perspective, discussing new methodology and emerging patterns.
In a world where it isn’t always easy to know what’s real and what to dismiss as disinformation, we look at data to tell the true story.
Islamic Terrorism:
• An uprise of lone wolf attacks by the Islamic State have been observed in in Europe. Different than the terrorist cells we saw around 2015, but similar methods for achieving maximum damage with a knife.
• There is more activity than the last five years so there's clearly something going on. We hope to get more insight on if these were orchestrated or coordinated attacks.
• Islamic State simply wants to show they are still present and can do whatever they want when they want. That scares people and also makes some people choose sides.
Tyranny Against Farmers:
• Farmers in Europe are rising up against strict limits on emissions and nitrogen and have been aggressively protesting, blocking roads and going to politicians’ homes to make their point.
• Farmers seek to work out a long-term plan with the government, but so far it hasn't been going that well. It takes time to make big changes. The US took 12 years to switch consumers from analog to digital TV.
• Reminiscent of how the United States was started with overburdensome government interference impacting those without appropriate representation.
Irregular Warfare/Asymmetric Warfare:
• It is all about disrupting society through pinching. Russian election influence didn’t just pick one side, they picked both sides.
• It took a long time for many to realize the ability of the internet to interfere with geopolitics. The vast majority will never spot the manipulation.
• Irregular warfare uses hacker math to find two or three low-risk vulnerabilities that can affect one super critical vulnerability. Smaller groups can exploit weaknesses and tilt the scales in their favor.
Data Dumps:
• Super spies that successfully worked covertly for many years are being exposed with data dumps. Also revealing their families disrupts their daily lives for maximum damage.
• Foreign policy connections and illegal surveillance on Russian citizens are being exposed through a Snowden type of leak. What we're seeing with data dumps is similar to the Berlin Wall coming down. We believe WWIII has started.
• We are now seeing ransomware groups incorporate public relations and openly post job openings with benefits.
Data Collection
• People don't question the tech they use like they should.
• Vulnerability is on the rise with smart devices and household appliances transmitting usage data across the web and basic apps requesting access to phone data for no good reason.
• In China, TikTok users that had anti-government pictures on their phone suddenly found those pictures deleted from their camera roll. We should rename TikTok to DickTok.
Splintered Social Media
• People are being pulled out of their comfort zone on certain platforms. It is hard for them to adjust to new restrictions. Splintering mostly affected right-leaning groups. Now we see the same pattern with the left.
• Social aspects of the internet started in a very raw state with IRC type things and Yahoo chats. After that it became more polished like Instagram. Parents have stayed but kids have moved on.
• Every 7-10 years there is a generational change in social media platforms. The new wave of social media is a little more personal. To some extent it started with Snapchat and now with Be Real.
State of OSINT
• For a few years we saw a mass exodus from platforms like YouTube, Twitter, and Facebook. New groups rose but most have died off.
• In smaller ecosystems users tend to trust each other and act more extremely. Bad actors can do a lot more damage in these small groups.
• This is great for OSINT investigation and attribution. We can target them easier in a smaller space and get better results.
Human Trafficking
• Sex workers tend to advertise online, which can lead to a trove of open source intelligence.
• We see handlers slip up on operational security when they get into new platforms.
• Even with faces blurred, connections can be made through identifying the same phone number, lingerie, hotel décor, bedspread, carpet, and power outlets.
Catching Spies
• Spies are being outed at a high rate through open source intelligence, similar to that used in the Ukraine war. Spies in Russia, Brazil, Sweden, U.S., Germany, Sweden, the Netherlands, and more have recently been exposed.
• Searching for those 35-65 is ideal. Younger people have more knowledge of online intelligence and older people have little or no online presence.
• At-home spy hunters are now finding people and “unlocking achievements” like a video game.
Chinese Spy Balloon
• Hobbyists were tracking and identifying the Chinese spy balloon starting in the Western United States.
• A low-cost RTL USB stick and antenna has democratized the radio spectrum, enabling anyone to access the signals. People use the Flight Aware app to monitor local air traffic.
• Databases like ADS-B exchange will also give you free access to their global coverage for planes and boats. There are also weather balloon tracking apps.
Using Data To Tell The Story
• News today can cause anxiety from not knowing what is the real truth or what is behind it.
• Figuring out what is going on is a rush. It lowers the anxiety level and lets you be at peace with whatever is the conclusion.
• With OSINT investigations, data tells the unbiased story.
ShadowDragon is excited to have Nico Dekens officially join the team. For those interested in improving their open source investigative techniques and methodology, ShadowDragon now offers a special 5-day OSINT training class that is not advertised on the website. Contact us for details.
Thank you for joining us. You can look forward to more interesting news and information from the OSINT perspective in new episodes coming soon.
872
views
1
comment
Why Is Social Media Like A New Form of Drug? Why Is Rumble Popular?
The public perception of social media is a far cry from its reality or potential. Our latest podcast episode talks about where social media has been, where it is headed, and what could we be doing with it instead.
Subscribe to this video channel for compelling discussions from the world of open source intelligence from some of the industry’s most innovative professionals.
Watch the full podcast at: https://rumble.com/v1znt6h-podcast-s02-e01-what-weve-learned-in-the-last-year-about-social-media-osint.html
3
views
What Was The Twitter Business Model and Will Elon Musk Change It?
The future of Twitter is anyone’s guess, but our OSINT professionals take their shots at what happened and where it might be going with Elon Musk at the helm.
When you want to hear the most compelling conversations from the OSINT community, tune into the podcast where ShadowDragon founder, Daniel Clemens, has candid conversations with other intelligence professionals around the globe.
Follow us or subscribe today to keep up with the latest.
Watch the full podcast at: https://rumble.com/v1znt6h-podcast-s02-e01-what-weve-learned-in-the-last-year-about-social-media-osint.html
49
views
What Happened to The Wagner Group - Russia’s Most Feared Terrorist Group? Podcast Clip S2 E1
What Happened to The Wagner Group - Russia’s Most Feared Terrorist Group?
The use of propaganda and fear tactics may have led to a critical strike against the Wagner Group, notorious for their brutal practices in Ukraine and abroad. While details are not widely known, open source intelligence (OSINT) may have played a crucial role in locating and confronting the paramilitary unit.
Tune in to our Season 2 podcast premiere to learn how social media, OSINT, and the Ukraine have intertwined in ways that may have changed the world forever.
Watch the full podcast at: https://rumble.com/v1znt6h-podcast-s02-e01-what-weve-learned-in-the-last-year-about-social-media-osint.html
29
views
The History of Social Media You Forgot | When Did Social Media Start | ShadowDragon Podcast Clip
Anyone who uses social media today will enjoy this quick and fascinating road trip through the Evolution of Social Media.
Chances are you will be surprised to hear all the iterations that got us to where social media is today.
An internet pro takes us through a fascinating recap spanning a 30-year history. From the days of Compuserve, AOL, Yahoo, and Friendster to Twitter and BeReal. Where did you enter the social media timeline?
Watch the full podcast at: https://rumble.com/v1znt6h-podcast-s02-e01-what-weve-learned-in-the-last-year-about-social-media-osint.html
7
views
Is There Freedom of Speech on Social Media? Do I Have 1st Amendment Rights on Twitter?
Will Elon Musk buying twitter protect 1st Amendment rights? What impact will it have? Do people want free speech for all? Check out our first podcast episode of Season 02 to hear an open discussion about this and more.
Watch this full podcast episodes at https://rumble.com/v1znt6h-podcast-s02-e01-what-weve-learned-in-the-last-year-about-social-media-osint.html
7
views
How To Find The Best Job Candidates Using OSINT – Open Source Social Media Intelligence Hire Recruit
Recruiters are wisely using open source intelligence to vet candidates at every level. Here’s just one way to help protect your business using #OSINT to improve your hiring practices.
Companies are using open source intelligence to protect their businesses in a variety of ways. Fully vetting your new hires increases ROI and finds great job candidates. This is just one of the many ways OSINT is protecting and improving the corporate environment.
Watch this full podcast episodes at https://rumble.com/v1znt6h-podcast-s02-e01-what-weve-learned-in-the-last-year-about-social-media-osint.html
54
views
You Don't Need Spying Devices Anymore. Eyes And Ears Are Literally Everywhere Now.
Get unpolished takes on spying, social media, and OSINT from three pros deep on the inside. Here’s a peek at the kind of things you’ll hear on the podcast Season 2 premiere.
16
views