
Risky Bulletin Between Two Nerds: Beating back state espionage
Dec 1, 2025
Tom Uren and The Grugq dive into the fascinating world of state cyber espionage. The Grugq, a savvy operational security commentator, discusses the impact of the recent Charming Kitten document leak and debates whether such disclosures can effectively deter espionage. They explore how leaks force adversaries like Iran to adapt swiftly and restructure their operations. The conversation also highlights the strategic implications of targeting high-value groups and how unique vulnerabilities within ecosystems can be exploited, making for a captivating discussion.
AI Snips
Chapters
Transcript
Episode notes
Doxxing Disrupts Units Not The State
- Public doxxing can disrupt a state's unit without ending state espionage entirely.
- Disclosures force countermeasures and structural changes that slow operations for months.
Past Leaks Prompted Real Restructuring
- Tom Uren compared Charming Kitten to the APT1 and Snowden cases as past disruptive revelations.
- He noted those leaks prompted restructuring and accelerated countermeasures like encryption.
Dragging Out Leaks Magnifies Impact
- Stretching releases over time magnifies perceived damage and keeps pressure on the target.
- Repeated leaks remind stakeholders and force sustained countermeasures and reputational harm.

