

NeedleStack
Authentic8
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web.
From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
Episodes
Mentioned books

Sep 17, 2025 • 41min
Identifying fraud in financial services
How can Intelligence benefit financial sectors? It can address challenges like sanctions, data privacy, and cryptocurrency. Teresa Walsh highlights the importance of collaboration, the role of AI in intelligence, and the necessity to professionalize intelligence roles in the private sector. The conversation also delves into building mature and unified intelligence programs, emphasizing the need for a Chief Intelligence Officer role in any organization.

Sep 3, 2025 • 57min
Adding Agentic AI to Analysis
Ultimately, GenAI has the potential to create jobs in areas like data science and cybersecurity, but only if it is integrated responsibly. However, the consensus today is that AI should remain a just tool for analysts, not a direct decision-maker, until reliability and trust in its outputs significantly improve.About Brian FullerBrian A. Fuller is Director of Operations for the Ridge College of Intelligence Studies and Applied Sciences at Mercyhurst University, a position he assumed in December 2019. As the Director of Operations, Fuller supports all operations related to the academic curriculum or Ridge College activities. This includes working as the Director for the Center of Intelligence Research, Analysis and Training (CIRAT) and Director of the Innovation Entente Lab (IEL). Previously, he served as a Senior Open Source Intelligence (OSINT) instructor for the Department of the Army’s OSINT Office, where he was charged with overseeing the Army’s OSINT training program for the Midwest and Rocky Mountain regions. He trained Army intelligence professionals at the strategic, tactical, and special operations levels. He managed the training curriculum, personnel, financial, and administrative affairs of the program while participating as a subject matter expert in the intelligence communities’ OSINT program and operational development working groups, ensuring the continued growth of the discipline and associated tradecraft and technologies.

Aug 20, 2025 • 34min
Hacker Summer Camp 2025
Robert and AJ went to Hacker Summer Camp. What’s that? It’s a week of conferences such as Black Hat USA, BSidesLV, the Dianna Initiative, Squadcom, and of course DEF CON. Find out what’s relevant for the intelligence community during this first week in August annual event.

Aug 6, 2025 • 41min
Intelligence tradecraft in the digital age
Join an engaging discussion featuring a former street cop turned OSINT expert who shares an inspiring journey into the world of open-source intelligence. Explore the evolution of network analysis and its early challenges in the digital age. Delve into the transformative role of AI in intelligence, balancing speed with the need for critical thinking. The talk highlights the risks of data leakage and bias, emphasizing the essential skills analysts must retain while navigating the complexities of digital investigations.

Jul 23, 2025 • 34min
Using OSINT to protect celebrities and athletes
Sometimes, when a Hollywood actor stars in a blockbuster film or a hit TV show, or when an athlete wins the Super Bowl, their personal problems begin with scandalous photos, property theft, even death threats. That’s where OSINT can help them stay one step ahead.About Chad BrockwayChad Brockway, President of the Intelligence Operations Division at Edgeworth Security, is an industry expert in the fields of digital intelligence investigations and methodologies where he leverages his extensive background in intelligence, counterintelligence, counterterrorism, federal law enforcement and cyber operations to provide unique services and lectures to the professional and education industry. Chad has worked across multiple federal law enforcement and national security agencies both within the United States as well as in cooperation with foreign government and law enforcement partners. During his time with the Federal Bureau of Investigations, Chad served with the Special Technologies and Applications Section (STAS) where he oversaw multiple intelligence and cyber programs, personnel, and resources. Additionally, Chad served as the Deputy Watch Center Director for the Department of Defense Counterintelligence Field Activity (CIFA) agency and as a Military Police Officer in the Marine Corps where he was assigned to the Marine One Helicopter Squadron and the White House Liaison Office under the Clinton and Bush administrations.

Jul 9, 2025 • 40min
An OSINT investigator’s toolkit
There are OSINT tools that mirror or provide workarounds for hidden social media posts. Join us as we talk with an investigator who really knows his way around the internet, dark web, social platforms and more.

Jun 25, 2025 • 41min
AI as an insider threat
AJ and Robert explore the shadowy side of AI — how some users are becoming addicted, confiding in it like a personal therapist and then gaining confidence to take risky actions in their lives and at work. They discuss what this could mean for insider threats and the broader impact on security.

Jun 11, 2025 • 47min
Adventures in OSINT Red Teaming
Anna discusses her career trajectory from corporate security and financial crimes to becoming the CEO of Pine Risk Management. She shares her experiences in conducting complex risk assessments, fraud detection, and crisis communications, particularly highlighting her role at Meta where she led Silicon Valley's largest physical red team.

May 28, 2025 • 33min
How culture can inform OSINT investigations
An OSINT Arabic instructor and geopolitical risk expert joins the show to discuss what can get lost in translation when performing OSINT investigations. Plus learn how cultural knowledge can unlock key insights.About Paolo WalcherPaolo Walcher is a leading OSINT trainer and security consultant, recognized for his expertise in Arabic-language investigations, geopolitical risk, and strategic intelligence. With a background in counterterrorism and crisis management, Paolo delivers advanced OSINT training to law enforcement, military, and intelligence agencies on both national and international levels.At i-intelligence GmbH, he equips private and governmental organizations with the tools to navigate complex security environments, specializing in Arabic OSINT and Middle East-focused research. Formerly a Security Business Intelligence Analyst at BMW Group, he provided strategic insights on global threats, including the war in Ukraine, supporting corporate decision-making and conflict monitoring.Paolo holds a B.A. in Safety and Security Management and an M.Sc. in Crisis and Security Management from Leiden University, with a specialization in the Governance of Radicalism, Extremism, and Terrorism. His work spans illicit networks, military conflict analysis, and supply chain security. As a Bellingcat volunteer, he has contributed to civilian harm verification and human rights investigations—and continues to explore the full potential of OSINT as a force for accountability and justice in the human rights space.Fluent in English, German, and Italian, Paolo brings a cultural lens to OSINT, advocating for the ethical use of AI in intelligence gathering while emphasizing the enduring value of human-led analysis. His passion for maritime OSINT, regional dynamics, and investigative training makes him a key voice in the future of open-source intelligence.

May 14, 2025 • 19min
Ransomware gangs and OSINT
Ransomware groups continue to generate significant profits, frequently relying on recycled or leaked code—leading researchers to describe them as “lazy.” OSINT analysts follow cryptocurrency transactions to trace financial trails, while effective defense depends on early detection, system-level visibility, and staying alert to shifts in attacker techniques.