NeedleStack

Authentic8
undefined
Nov 12, 2025 • 47min

What is Cyber HUMINT?

In this episode, Michael DeBolt joins Robert Vamosi and AJ Nash to dive into the world of Cyber HUMINT — the application of traditional human intelligence (HUMINT) tradecraft in cyberspace. They discuss how investigators use digital personas (sometimes called “sock puppets”) to infiltrate online threat actor communities, collect intelligence, and even engage adversaries safely. Michael explains how credibility, language, slang, and cultural nuance are essential to blending in, while AJ highlights the risks of untrained amateurs attempting such operations. They explore the art, ethics, and operational security challenges of conducting human intelligence in the digital realm.
undefined
Oct 29, 2025 • 58min

Dealing with AI Slop in OSINT Investigations

In this episode, AJ Nash and Robert Vamosi discuss the challenges posed by misinformation and the rise of AI-generated content. They explore the evolution of journalism, the impact of social media on information consumption, and the importance of critical thinking and media literacy. The conversation also touches on the role of AI in content creation, the balance between technology and human oversight, and the potential positive aspects of AI technology. Ultimately, they emphasize the need for source verification and the ongoing struggle to navigate the post-truth era.
undefined
Oct 15, 2025 • 49min

What is GEOINT in OSINT?

In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with James Villenueve, a geospatial intelligence expert, to explore the world of GEOINT and its intersection with open source intelligence (OSINT). They discuss the importance of understanding geospatial data, the ethical implications of its use, and the challenges of protecting personal information in a data-rich environment. The conversation also highlights positive applications of geospatial intelligence, including environmental monitoring and humanitarian efforts, while addressing the risks associated with data misuse and the evolving role of AI in the field.
undefined
Oct 1, 2025 • 27min

Ransomware’s Collateral Damage

In this engaging discussion, Jason Baker, an expert in security consultancy and former U.S. Marine, dives into the complex world of ransomware. He explores the intricacies of ransomware attribution, emphasizing the significance of understanding threat actor behavior. Jason highlights the alarming trend of healthcare becoming a prime target and discusses how AI is reshaping both the attack strategies of adversaries and the defenses of cybersecurity teams. His insights into operational security and the dynamics of noisy versus stealthy attacks provide a thought-provoking look at the evolving landscape of cybersecurity.
undefined
Sep 17, 2025 • 42min

Identifying fraud in financial services

How can Intelligence benefit financial sectors? It can address challenges like sanctions, data privacy, and cryptocurrency. Teresa Walsh highlights the importance of collaboration, the role of AI in intelligence, and the necessity to professionalize intelligence roles in the private sector. The conversation also delves into building mature and unified intelligence programs, emphasizing the need for a Chief Intelligence Officer role in any organization.
undefined
Sep 3, 2025 • 58min

Adding Agentic AI to Analysis

Ultimately, GenAI has the potential to create jobs in areas like data science and cybersecurity, but only if it is integrated responsibly. However, the consensus today is that AI should remain a just tool for analysts, not a direct decision-maker, until reliability and trust in its outputs significantly improve.About Brian FullerBrian A. Fuller is Director of Operations for the Ridge College of Intelligence Studies and Applied Sciences at Mercyhurst University, a position he assumed in December 2019. As the Director of Operations, Fuller supports all operations related to the academic curriculum or Ridge College activities. This includes working as the Director for the Center of Intelligence Research, Analysis and Training (CIRAT) and Director of the Innovation Entente Lab (IEL). Previously, he served as a Senior Open Source Intelligence (OSINT) instructor for the Department of the Army’s OSINT Office, where he was charged with overseeing the Army’s OSINT training program for the Midwest and Rocky Mountain regions. He trained Army intelligence professionals at the strategic, tactical, and special operations levels. He managed the training curriculum, personnel, financial, and administrative affairs of the program while participating as a subject matter expert in the intelligence communities’ OSINT program and operational development working groups, ensuring the continued growth of the discipline and associated tradecraft and technologies.
undefined
Aug 20, 2025 • 34min

Hacker Summer Camp 2025

Robert and AJ went to Hacker Summer Camp. What’s that? It’s a week of conferences such as Black Hat USA, BSidesLV, the Dianna Initiative, Squadcom, and of course DEF CON. Find out what’s relevant for the intelligence community during this first week in August annual event.
undefined
Aug 6, 2025 • 41min

Intelligence tradecraft in the digital age

Join an engaging discussion featuring a former street cop turned OSINT expert who shares an inspiring journey into the world of open-source intelligence. Explore the evolution of network analysis and its early challenges in the digital age. Delve into the transformative role of AI in intelligence, balancing speed with the need for critical thinking. The talk highlights the risks of data leakage and bias, emphasizing the essential skills analysts must retain while navigating the complexities of digital investigations.
undefined
Jul 23, 2025 • 34min

Using OSINT to protect celebrities and athletes

Sometimes, when a Hollywood actor stars in a blockbuster film or a hit TV show, or when an athlete wins the Super Bowl, their personal problems begin with scandalous photos, property theft, even death threats. That’s where OSINT can help them stay one step ahead.About Chad BrockwayChad Brockway, President of the Intelligence Operations Division at Edgeworth Security, is an industry expert in the fields of digital intelligence investigations and methodologies where he leverages his extensive background in intelligence, counterintelligence, counterterrorism, federal law enforcement and cyber operations to provide unique services and lectures to the professional and education industry. Chad has worked across multiple federal law enforcement and national security agencies both within the United States as well as in cooperation with foreign government and law enforcement partners. During his time with the Federal Bureau of Investigations, Chad served with the Special Technologies and Applications Section (STAS) where he oversaw multiple intelligence and cyber programs, personnel, and resources. Additionally, Chad served as the Deputy Watch Center Director for the Department of Defense Counterintelligence Field Activity (CIFA) agency and as a Military Police Officer in the Marine Corps where he was assigned to the Marine One Helicopter Squadron and the White House Liaison Office under the Clinton and Bush administrations.
undefined
Jul 9, 2025 • 40min

An OSINT investigator’s toolkit

There are OSINT tools that mirror or provide workarounds for hidden social media posts. Join us as we talk with an investigator who really knows his way around the internet, dark web, social platforms and more.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app