Intelligence

OSINT, espionage, surveillance, and information warfare

92 episodes · Page 4 of 4

#287: The Chain of Custody: Proving Reality in a Post-Truth Era

In a world of deepfakes, hitting record isn’t enough. Learn how to use WORM media and cryptographic hashes to create undeniable digital evidence.

digital-forensicschain-of-custodycryptographic-hashing

#285: Hidden in Plain Sight: The Engineering of Modern Spy Gear

Explore the high-tech world of covert audio, from MEMS microphones to digital signatures, and how these tiny devices stand up in court.

covert-audio-recordingmems-microphonesforensic-audio-analysis

#284: The Ghost in the Radio: Why Number Stations Still Exist

Why do spies still use creepy radio broadcasts in 2026? Herman and Corn dive into the unbreakable math and physics of number stations.

number-stationsone-time-padshortwave-radio

#282: Why Spying Is Now a Service You Can Subscribe To

Why do CEOs pay for Stratfor when they have Reuters? Herman and Corn dive into the high-stakes world of private intelligence and global forecasting.

private-intelligencegeopolitical-forecastingstratfor-janes

#281: Why Deepfakes Are the New Face of Investigative Journalism

Forget silhouettes and voice distortion. Discover how AI "digital veils" are revolutionizing whistleblower protection in modern journalism.

whistleblower-protectiondeepfake-anonymizationinvestigative-journalism

#279: Caught on Tape: The Tech of Covert Evidence Gathering

When a landlord dispute gets messy, a smartphone isn't enough. Discover the professional tools and laws for gathering reliable audio evidence.

audio-evidencecovert-recordingsingle-party-consent

#273: The Masked Author: From Ben Franklin to AI Stylometry

Can you truly hide behind a pen name? Herman and Corn explore the history of pseudonyms and how AI is revolutionizing the art of staying anonymous.

adversarial-stylometrypseudonymous-writinganonymous-publishing

#256: Breaking the Blackout: CENO and the P2P Fight for Truth

When governments cut the internet, CENO turns users into a library. Explore how peer-to-peer tech is bypassing state censorship in Iran.

internet-censorshipceno-browserouinet-protocol

#254: Why Your Metadata Is Louder Than Your Message

Every file has a digital shadow. Discover how metadata tracks your life, from ancient libraries to modern AI surveillance.

metadata-analysisdigital-privacydata-governance

#239: High-Altitude Spies: Why Planes and Balloons Beat Satellites

Why do we still use planes and balloons in the age of satellites? Herman and Corn explore the physics and politics of high-altitude spying.

high-altitude-surveillancespy-balloonsreconnaissance-technology

#213: Eyes Everywhere: The Hidden World of Modern Surveillance

Explore the tech behind professional security and the "iceberg" of hidden sensors watching our every move in the modern age.

surveillance-technologyptz-camerasglobal-shutters

#208: Can Spies See Your Footprints From Space?

Herman and Corn explore how AI and advanced satellites are stripping away the fog of war, from tracking footprints to seeing through clouds.

synthetic-aperture-radarsatellite-imageryintelligence-gathering

#207: The End of Secrecy: How OSINT is Redefining Intelligence

Explore how hobbyists and satellites are revolutionizing intelligence, from tracking tanks on TikTok to high-res commercial space imagery.

open-source-intelligencesatellite-imagerydigital-verification

#168: Digital Vaults: The Mainstream Rise of Air-Gapped AI

Discover why air-gapping is going mainstream in 2026 and how organizations are securing local AI models using "digital vaults."

air-gappingai-securitycybersecuritydigital-vaultslocal-llms

#167: Why Are Hackers Hiding in Your System for Decades?

They don't just hack; they move in. Discover how state-sponsored APTs stay hidden in networks for years and the signatures they leave behind.

aptadvanced-persistent-threatcyber-espionagecyber-warfarestate-sponsored-hacking

#141: Hidden in Plain Sight: The Secrets of Steganography

Explore the invisible world of steganography, from secret printer dots to AI watermarking and digital dead drops hidden in plain sight.

steganographyhidden-messagesinvisible-inkprinter-dotsai-watermarking

#71: Dark Web Deception: Google's Monitoring Shift

Google's "dark web monitoring" isn't what you think. We reveal the hidden corners of the internet and Google's true capabilities.

dark-webgooglemonitoringdeep-webinternet-security