Logo

    osint

    Explore " osint" with insightful episodes like "270. Ileana Damaso.", "Project Management Lessons from Marine Special Operations and Beyond with Sean Salomé", "S03 E01: From Rest to Protecting Your Kids", "S02 E05: AI Discussion and Projections" and "Pivoting from Physical Security to INFOSEC with Kyle Croll" from podcasts like ""The Bid Picture with Bidemi Ologunde - Cybersecurity & Intelligence Analysis", "The Security Student Podcast", "OSINT with ShadowDragon & Digital Tools For Modern Investigations", "OSINT with ShadowDragon & Digital Tools For Modern Investigations" and "The Security Student Podcast"" and more!

    Episodes (74)

    270. Ileana Damaso.

    270. Ileana Damaso.

    Host Bidemi Ologunde spoke with Ileana Damaso for the second time on TBP. Ileana is an open-source intelligence (OSINT) aficionado and the conversation touched on ways to stay safe online and on social media, as well as how she uses OSINT to assist with Amber Alerts investigations and other cyber investigations. She was previously a guest on TBP (Episode 145 - May 4, 2022).

    Support the show

    Project Management Lessons from Marine Special Operations and Beyond with Sean Salomé

    Project Management Lessons from Marine Special Operations and Beyond with Sean Salomé

    #031 - In this next episode, I was joined by Sean Salomé, who has a very unique career that's spanned from 0311 and special operations as a MARSOC Operator to leading intelligence programs in the US Marine Corps. Plus, his work on the private side in intelligence and physical security. Additionally, Sean studied international relations at UT Austin.

    Our conversation today was focused on project management and leadership. It was fascinating to hear Sean's thoughts and experience on this topic since he's taken the road less traveled through small unit leadership, leading intelligence teams, leading physical security projects, and so much more.

    It was a great honor to have Sean as a guest!

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    S03 E01: From Rest to Protecting Your Kids

    S03 E01: From Rest to Protecting Your Kids
    About this Episode Hosts: Daniel Clemens, ShadowDragon CEO Elliott Anderson, ShadowDragon CTO Nico Dekens, ShadowDragon Director of Intelligence and Innovation Collection (aka Dutch_OSINTguy) David Cook, ShadowDragon Director of National Security In this podcast episode, the hosts and guests delve into various topics, from the importance of rest and mindfulness to the challenges of investigative work and the impact of technology on attention spans. Through personal anecdotes and professional experiences, they highlight the need for patience, methodical workflow, and critical thinking in investigative processes, emphasizing the value of asking the right questions rather than seeking immediate answers. They also discuss the evolving nature of technology and its effects on human cognition, cautioning against the pitfalls of constant stimulation and advocating for a balance between productivity and mental well-being. Furthermore, they draw parallels between investigative work and historical societal shifts, reflecting on the tension between industrialism and agrarian workflows and the implications for modern-day practices. Ultimately, the episode offers valuable insights into navigating the complexities of investigative work in an increasingly fast-paced and technology-driven world, emphasizing the importance of rest, reflection, and methodical inquiry.

    S02 E05: AI Discussion and Projections

    S02 E05: AI Discussion and Projections
    About this Episode Hosts: Daniel Clemens, ShadowDragon CEO Elliott Anderson, ShadowDragon CTO Nico Dekens, ShadowDragon Director of Intelligence and Innovation Collection (aka Dutch_OSINTguy) David Cook, ShadowDragon Director of National Security In our last podcast of 2023, the ShadowDragon crew talked about the importance of veterans’ service, disinformation, and gave some of our best predictions for 2024. One of ShadowDragon’s newest employees, David Cook, talks about running a non-profit focused on Special Operations Forces (SOF) advocacy: • The Special Operations Association of America (SOAA.org) is a veteran service organization that advocates for the past, present and future SOF community. • David first found SOAA during the Afghanistan withdrawal and has been involved ever since. • SOAA, Congress, and several other organizations’ use of open-source information during the withdrawal to help Americans and our Afghan allies. • Bringing service to veterans everywhere we go – ShadowDragon included. • Launching a SkillBridge partnership to assist active-duty service members transitioning to the civilian world. • OSINT use in the Afghanistan withdrawal • Injection of false information into crisis situations and how to triage fact from fiction. Automation in OSINT, according to Nico, the Dutch OSINT Guy: • OSINT is an arduous process – automation can be a powerful tool in highlighting what’s important. • Utilizing ChatGPT to ‘stress-test’ narratives and large amounts of content to narrow down actor motives. • Automated image searches are best used in open-source investigations where the margin for human error is high. • Automation allows investigators and analysts to scale with the amount and volume of information and data that is ubiquitous today. Dependency of Large-Language Models (LLMs), and other tech: • Utilizing LLMs for analysis must be used with caution – there are AI ‘hallucinations’ that return false information. • Remember: the models are trained using data from humans, so it still has a margin of error. • Investigators and analysts should be aware of AI ‘hallucinations’ within their OSINT tools they use. • Small cognitive conditioning happens with the dependency of technology and devices – we’re in for an interesting year with external catalysts (election, emerging LLMs/deepfake tech, etc.). “2024 is gonna be…crazy”, Daniel Clemens, CEO of ShadowDragon • People are not going to be able to trust what hear and see at the end of 2024 due to deepfake technology advances, segregation in the digital world manifesting itself in the physical world. • Regulation for ‘disinformation’ will not go anywhere, but there will be broad discussion and public discourse surrounding automated information – videos, audio recordings, and images. • Disinformation needs to be re-branded and specifically defined in contrast to foreign malign influence operations. Elliott’s OSINT recommendations: • The popularity of OSINT will spurn regulatory action and we’ll see laws made and legal decisions on OSINT. Daniel’s OSINT recommendations: • The value of discernment will be ‘gold’ and being able to deconstruct what information is in front of them will need to be developed and honed. • The ‘AI’ buzzword in OSINT will start to collapse – but some capabilities will get better because of automation, especially Geo-Spatial Intelligence (GEOINT), geo-political use-cases, and supply chain risk management. David’s OSINT recommendations: • More people will find they’ve been utilizing open-source information and creating subsequent intelligence than previously thought, re-valuing OSINT as a sector to the upside, broadening and expanding what OSINT is. • OSINT as an intelligence discipline will take share from GEOINT and Signals Intelligence (SIGINT). • AI and automation will create an ‘information inequality’ where a premium is placed on the truth. Nico’s OSINT recommendations: • More and more people will understand that tradecraft in OSINT is so important. • Understanding, or the lack of understanding, the tradecraft, will dictate how good or how bad any regulation or legislation will be surrounding OSINT. • There will be more charlatans in the OSINT space. Listen to the full podcast for all the guys’ book and podcast recommendations. This podcast is available in video and audio versions at your favorite podcast outlet, popular video platforms, and the ShadowDragon website. Subscribe to the podcast to stay up to date on the latest. Thank you for listening.

    Pivoting from Physical Security to INFOSEC with Kyle Croll

    Pivoting from Physical Security to INFOSEC with Kyle Croll

    #030 - In this next episode, I was stoked to be joined by Kyle Croll, GMON, GCIH, Sec+, and MBA candidate at UT Austin. 

    He's lived the life of a physical security practitioner, from being in the US Navy to protecting high-net-worth clients and advising organizations — what's more is that he's also pivoted from purely physical security projects to technical information/cyber security projects. And this is the focus of our conversation: 

    - What was his experience like making that career change?
    - What advice does he have for others following a similar path?
    - Are there special vocational programs that military vets should consider?
    - And so much more.

    This was an insightful conversation to kick off 2024 with a bang! I hope you enjoy it.

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    Crypto Risk, Improving Industry Practices, and Beyond with Ilya Umanskiy GRCP

    Crypto Risk, Improving Industry Practices, and Beyond with Ilya Umanskiy GRCP

    #029 - In this next episode, I was joined (once again) by Ilya Umanskiy, an experienced security consultant who has advised security organizations and supported physical security, resilience, and investigative projects worldwide. (It's a tradition for me to join Ilya for a podcast session around the end of the year. )

    In our last conversation (Episode #1), one of the most downloaded episodes I've ever published, we discussed Ilya's career path and his projects to support aspiring practitioners. Today, we touched on a range of topics from how to improve the security industry,  recognition for practitioners, crypto risk management, and so much more.

    I hope you enjoy this wonderful conversation to wrap up 2023 and kick off 2024.

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    Security Leadership: Integrity, Serving, and Honoring, with Jim McConnell

    Security Leadership: Integrity, Serving, and Honoring, with Jim McConnell

    #028 - In this next episode, I was joined by Jim McConnell. You'll recognize his name if you follow topics on LinkedIn, such as supply chain security, infosec, physical security, and many more. Jim brings tremendous experience to us from his 30+ years of leading and supporting broad security initiatives in the telecom space. He also contributes to the Technical Committee and Working group of the Board of Executive Protection Professionals, developing the first-ever ANSI EP standard. (Thank you for your support, Jim!)

    What I love about Jim is his commitment to learning and educating the communities around him, of course online but also in his community, where he helps faith-based organizations, military and law enforcement transitioning to private security, and so much more.

    I hope you enjoy this conversation where we touch on every topic, from why you need a resume bucket list to what skills make a security director successful, how security interviewing skills can help you in your career, and so much more!

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    Medicine & Security: Standards, Curriculums, and Oversight with George DeBusk, MD

    Medicine & Security: Standards, Curriculums, and Oversight with George DeBusk, MD

    #027 - In this next episode, I was honored to be joined by M. George DeBusk, MD, MSc, FACS, FCCP. He's a trauma surgeon and critical care physician specialized in trauma and emergency surgery. What makes him a fantastic resource for security practitioners like us is that he's made a career out of educating, training, and providing medical oversight for security providers, first responders, law enforcement, and even special operations groups.

    Dr. DeBusk holds dual certification from the American Board of Surgery in General Surgery and Surgical Critical Care and specializes in Trauma Surgery and Intensive Care Medicine. “Doc” completed a General Surgery residency at Harvard Medical School’s, Beth Israel Deaconess Medical Center and completed a Post-Doctoral Fellowship at MIT during his residency. He is a Fellow of the American College of Surgeons (ACS) and College of Chest Physicians. He is an elected member of the American Association for the Surgery of Trauma and has held the position of State Vice Chair of the ACS Committee on Trauma in the States of Massachusetts and New Hampshire. Dr. DeBusk also holds full medical licensure to practice in multiple U.S. states and abroad where he provides concierge medical care for private clients worldwide. 

    Topics that we focused on included: what type of medical training curriculum is most appropriate for security or executive protection professionals, how we can evaluate training providers, what the advantages are of having a physician like him supporting your team, and what deliverables you can expect to get from a medical director. And so much more!

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    On Healthcare & Emergency Management with Nick Allen

    On Healthcare & Emergency Management with Nick Allen

    #025 - In this next episode, I was joined by the great Nickolas L. Allen, MPH, CPH, once again. As you may recall, Nick joined me on Episode 10 last year. This time he's back to share his experience moving from the Intel Analyst side and on to Emergency Management. What I found most educational about chatting with Nick, was hearing his thoughts on niche areas of emergency management that the average security practitioner needs to consider in their day-to-day work protecting people and property.

    And who better to learn from than Nick, who has broad security experience and a master's in Public Health, Biosecurity, and Disaster Preparedness!

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    Let's Talk About Texas Night and Principles for Your Security Career with Chuck Andrews

    Let's Talk About Texas Night and Principles for Your Security Career with Chuck Andrews

    #026 - In this next episode, I was joined by the man who needs no introduction (but he'll get one anyway) Chuck Andrews, MSME, CPP. He's a leader in the security industry, with over 40 years of law enforcement and corporate security experience. He leads many giant projects, including The Friends of Chuck, Texas Night, and many others.

    Chuck’s earned his master's in Security Executive Management from the University of Houston and holds the CPP, CFE, and many other certifications and accolades. Topics that we focused on include what's in store for those attending Texas Night, Chuck's philosophy about working in the security industry, and much more.

    --
    TX Night before GSX 2023
    Date:
    Sunday, Sep 10, 2023
    Time: 6:00 PM -10:00 PM CDT
    Location: Gilley's Dallas - 1135 Botham Jean Boulevard, Dallas, TX 75215
    Entry: FREE to GSX attendees! Must be registered to attend. Entry ONLY by QR Code on your phone/printed ticket!!!

    Register here:
    https://www.eventbrite.com/e/texas-night-at-gsx-2023-tickets-663358572347?aff=FriendsOfChuck

    --

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    S02 E04: Breaking Down Systems, Breach Data Dumps, A.I., OSINF vs OSINT, and Tech Job Interviews

    S02 E04: Breaking Down Systems, Breach Data Dumps, A.I., OSINF vs OSINT, and Tech Job Interviews
    About this Episode Hosts: Daniel Clemens, ShadowDragon CEO Elliott Anderson, ShadowDragon CTO Nico Dekens, ShadowDragon Director of Intelligence and Innovation Collection (aka Dutch_OSINTguy) This time around the guys get together and talk about breaking down systems, especially as it relates to online data. You might be surprised to discover how social media algorithms are self-radicalizing people, computer experts are not what they used to be, and artificial intelligence could be headed down a destructive path. They visit the past with a look at what open source intelligence was like ten years ago and glimpse what the future might look like with artificial intelligence and Apple Vision Pro goggles. It is all here as three old school open source intelligence investigators once again look at the world through the perspective of analytical intelligence. Reasons we are seeing a recent increase in hacker and breach data activity, likely due to: • School summer break gives kids more free time • Ukraine war personnel returning to computers from battle lines • Hacker message boards feuding and hacking each other Here is what we are seeing when we interview computer job candidates: • Many claim to be an “expert of experts” without the underlying basic knowledge • These days people rarely build computers from parts – Apple security may be part of that • Programmers throw around the term API and then cannot explain an API Nico gives us a glimpse of the evolution of his OSINT work: • Used to manually log into various accounts to make them look active daily • Over time the rise of hundreds of viable platforms required scaling account activity • Now finds that AI and ML results are outdated, biased, or untrue and does not use them for OSINT The guys discuss modern day pros and cons of OSINT data collection: • Elliott finds people trust their niche communities and reveal more in those platforms • Content is moving from text to photos, moving images, and multiple languages, creating challenges • Analysts need to understand various AI programming languages and methodologies to vet the assumptions that produced the results • OSINT data collection processed through artificial intelligence is being questioned and invalidated in courts Social media continues to influence society in unchecked ways: • Social media algorithms have become quicker and more comprehensive in showing content that feeds your interests • People are essentially becoming self-radicalized online through constant reinforcement of their beliefs • Terrorist groups are getting better at planting seeds pushed by algorithms The potential for chaos and societal disruption is increasing: • Overloading systems and organizations are old concepts being applied in new ways through technology • Immigration policies need to address feelings of displacement, accelerated by slow processes and online radicalization • The creation of fake AI-generated content has the potential to push unstable people into violent action The guys continue the in-depth discussion, further exploring challenges and scenarios brought on by technology, especially that crossing into the world of OSINT. This podcast is available in video and audio versions at your favorite podcast outlet, popular video platforms, and the ShadowDragon website. Subscribe to the podcast to stay up to date on the latest. Thank you for listening.

    A Look Back at the Executive Security Operations Conference with Ronald J.

    A Look Back at the Executive Security Operations Conference with Ronald J.

    #024 - In this next episode, I recorded a joint podcast with Ronald J., founder of the Global Security & Protection Group (GSPG) podcast.

    We focused this session on sharing our recent experience at the inaugural Executive Security Operations Conference in Kansas City — hosted by the Board of Executive Protection Professionals. We discussed highlights from conference presentations, key ideas we walked away from the event with, and much more.

    ---

    Learn more about the GSPG Podcast:
    https://gspgpodcast.podbean.com/

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    An Expert's Perspective on Workplace Violence Prevention with Hector Alvarez MSPsy, CTM

    An Expert's Perspective on Workplace Violence Prevention with Hector Alvarez MSPsy, CTM

    #023 - In this next episode I was honored to be joined by Hector Alvarez MSPsy, CTM. He's a leader in workplace violence prevention who has extensive experience supporting clients across industries when it comes to behavioral threat assessment, workplace training, and more. Currently, he's the President of Alvarez Associates LLC where he helps clients with these challenges. Plus, he's a Reserve Police Officer with Folsom Police Department in northern California.

    He’s earned his master's in forensic psychology from Grand Canyon University and holds the Certified Threat Manager Certification from ATAP.  Some of the topics we covered that I think you'll find interesting include: Hector's path to developing his expertise, how his experience as a reserve Police Officer and his experience in grad school have made him better at serving his clients, and his advice for aspiring practitioners.

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes

    S02 E03: Silicon Valley Bank, Protests, Terrorists, Hacker Forums, Deep Fakes & Donald Trump

    S02 E03: Silicon Valley Bank, Protests, Terrorists, Hacker Forums, Deep Fakes & Donald Trump
    About this Episode Hosts: Daniel Clemens, ShadowDragon CEO Nico Dekens (aka Dutch_OSINTguy), ShadowDragon Director of Intelligence and Collection This time it’s a one-on-one conversation as Daniel and Nico cover the latest news in and outside the OSINT world. Their intel perspective on the news is fascinating, but the discussions between the headlines make this episode even more compelling. Listen in as the guys discuss the increasing importance of incident response, crisis management, and operational security, while throwing in advice on protesting, voting, personal security awareness, and more that will add clarity in an ever-changing digital world. Silicon Valley Bank • Learn what went wrong in 60 seconds • Keyword monitoring detected early what other banks were at risk (i.e., Credit Suisse) • Disruptors started pushing false messages about US and EU bank failures • Getting messages, true or false, out to one or two key influencers can topple a company quickly • OSINT data could help drive aggressive investment strategies Extinction Rebellion (XR) • Protest group was infiltrated by Dutch law enforcement • Group feels abused being investigated by the same technique used on terrorists • Amnesty International calls the working method of the police and judiciary "particularly problematic" • Police have an obligation to maintain public order and prevent civil unrest Update: Stabbing Incidents and Alerts in Europe • There have been more stabbing incidents and lone wolf attacks since we discussed the rising trend in a recent episode • U.S. defense employee was stabbed in the United Kingdom near her GCHQ office • Intel agencies issued alerts for increased risk to Vienna prayer houses from Islamic State jihadis • Brussels metro stations are on high alert; U.S. embassy issued an alert for stabbing threat Terrorist Threat Response • Islamic terrorists may go silent for a while, but they are playing a long game and will return • Include native foreign language and dialects for OSINT search queries • Individuals need to increase situational awareness and safety protocols Breached.vc Hacker Forum Owner Arrested • Young man arrested and labeled “kingpin” of hacker info sharing stie • Suspect Conor Brian Fitzpatrick of Peekskill, NY looks like every hacker kid of the last 25 years • Profile does not fit old school hardcore criminal type • Hacker surprisingly made basic mistakes with operational security (opsec) • Unless law enforcement has a replacement in place, the forum will re-emerge elsewhere Donald Trump Announced Pending Arrest • More social media responses are from the left than the right • Messages are so extreme there is an indication they may be generated by bots • People on the right are not responding or mobilizing as they did with January 6th events • The realistic deep fake photos have had a limited effectiveness Deep Fake Tools Are Getting Better • The quality of fakes is getting so good they are making into mainstream media • Nico likes tools from Open AI, Midjourney, and HuggingFace.co • With text to image get very specific with visual details, but also perspective, camera angle, lens, etc. • People are creating AI-generated text and visual content without proper attribution Join us again for more fun discussions about social media, open source intelligence, law enforcement, media manipulation, and the world at large. Look for upcoming guest appearances by other intelligence professionals. This podcast is available in video and audio versions at your favorite podcast outlet, popular video platforms, and the ShadowDragon website. Be sure to subscribe to the podcast. Thank you for listening.

    Artificial Intelligence and Machine Learning: The Double-Edged Swords in Fraud Wars | A Conversation with Cem Dilmegani | Redefining CyberSecurity Podcast With Sean Martin

    Artificial Intelligence and Machine Learning: The Double-Edged Swords in Fraud Wars | A Conversation with Cem Dilmegani | Redefining CyberSecurity Podcast With Sean Martin

    Guest: Cem Dilmegani, Principal Analyst at AIMultiple [@aimultiple]

    On LinkedIn | https://www.linkedin.com/in/cem-dilmegani/

    On Twitter | http://twitter.com/dilmegani

    ____________________________

    Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin
    ____________________________

    This Episode’s Sponsors

    Imperva | https://itspm.ag/imperva277117988

    Edgescan | https://itspm.ag/itspegweb

    ___________________________

    Episode Notes

    In this podcast episode, Cem Dilmegani and Sean Martin discuss the various types of fraud that exist and how machine learning can be utilized by both fraudsters and companies to outsmart each other.

    The conversation delves into the world of fraud and its impact across various domains, from financial systems to advertising and even healthcare. The discussion highlights how fraudsters are using sophisticated techniques, such as machine learning and automation, to bypass rules-based systems and carry out illicit transactions or manipulate user behavior.

    The conversation shifts to the financial services industry, where Cem explains how illicit actors might use automation to transfer funds through smaller transactions to avoid detection or bypass sanctions. They also discuss the challenges faced by banks in identifying fraudulent transactions and the complexities involved when dealing with nation-state actors.

    Sean brings up the concept of open-source intelligence (OSINT) in the cybersecurity world and wonders if there's a similar database for fraud rules and vulnerabilities in the financial world. Cem explains that while OSINT might not be as powerful in the world of fraud, fraudsters can still find ways to exploit systems and bypass controls.

    Throughout the conversation, intriguing use cases are presented, such as ad fraud in the B2B tech industry, where competitors employ machine-generated clicks and utilize bots to drain marketing budgets, or the concept of "feature fraud," where malicious actors manipulate user feedback to drive companies in the wrong direction.

    The episode also delves into the challenges faced by the healthcare industry, including insurance fraud, where patients are overcharged for services or billed for therapies they never received. In the financial services realm, fraudsters resort to account takeovers, complex transaction models, and even shell entities to bypass security measures.

    The discussion also highlights the ever-evolving world of fraud, emphasizing the need for businesses and industries to leverage advanced technologies, like AI and machine learning, to stay ahead of the curve and protect themselves from these sophisticated threats. This episode is a must-listen for anyone interested in understanding the simple complexities of fraud and the countermeasures that can be employed to mitigate its impact.

    Tune in now and stay ahead of the curve!

    ____________________________

    Watch this and other videos on ITSPmagazine's YouTube Channel

    Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist

    📺 https://www.youtube.com/playlist?list=PLnYu0psdcllQZ9kSG7X7grrP_PsH3q3T3

    ITSPmagazine YouTube Channel
    📺 https://www.youtube.com/@itspmagazine

    Be sure to share and subscribe!

    ____________________________

    Resources

    Cloud Security Podcast: https://www.cloudsecuritypodcast.tv

    ____________________________

    To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:
    https://www.itspmagazine.com/redefining-cybersecurity-podcast

    Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Artificial Intelligence and Machine Learning: The Double-Edged Swords in Fraud Wars | A Conversation with Cem Dilmegani | Redefining CyberSecurity Podcast With Sean Martin

    Artificial Intelligence and Machine Learning: The Double-Edged Swords in Fraud Wars | A Conversation with Cem Dilmegani | Redefining CyberSecurity Podcast With Sean Martin

    Guest: Cem Dilmegani, Principal Analyst at AIMultiple [@aimultiple]

    On LinkedIn | https://www.linkedin.com/in/cem-dilmegani/

    On Twitter | http://twitter.com/dilmegani

    ____________________________

    Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin
    ____________________________

    This Episode’s Sponsors

    Imperva | https://itspm.ag/imperva277117988

    Edgescan | https://itspm.ag/itspegweb

    ___________________________

    Episode Notes

    In this podcast episode, Cem Dilmegani and Sean Martin discuss the various types of fraud that exist and how machine learning can be utilized by both fraudsters and companies to outsmart each other.

    The conversation delves into the world of fraud and its impact across various domains, from financial systems to advertising and even healthcare. The discussion highlights how fraudsters are using sophisticated techniques, such as machine learning and automation, to bypass rules-based systems and carry out illicit transactions or manipulate user behavior.

    The conversation shifts to the financial services industry, where Cem explains how illicit actors might use automation to transfer funds through smaller transactions to avoid detection or bypass sanctions. They also discuss the challenges faced by banks in identifying fraudulent transactions and the complexities involved when dealing with nation-state actors.

    Sean brings up the concept of open-source intelligence (OSINT) in the cybersecurity world and wonders if there's a similar database for fraud rules and vulnerabilities in the financial world. Cem explains that while OSINT might not be as powerful in the world of fraud, fraudsters can still find ways to exploit systems and bypass controls.

    Throughout the conversation, intriguing use cases are presented, such as ad fraud in the B2B tech industry, where competitors employ machine-generated clicks and utilize bots to drain marketing budgets, or the concept of "feature fraud," where malicious actors manipulate user feedback to drive companies in the wrong direction.

    The episode also delves into the challenges faced by the healthcare industry, including insurance fraud, where patients are overcharged for services or billed for therapies they never received. In the financial services realm, fraudsters resort to account takeovers, complex transaction models, and even shell entities to bypass security measures.

    The discussion also highlights the ever-evolving world of fraud, emphasizing the need for businesses and industries to leverage advanced technologies, like AI and machine learning, to stay ahead of the curve and protect themselves from these sophisticated threats. This episode is a must-listen for anyone interested in understanding the simple complexities of fraud and the countermeasures that can be employed to mitigate its impact.

    Tune in now and stay ahead of the curve!

    ____________________________

    Watch this and other videos on ITSPmagazine's YouTube Channel

    Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist

    📺 https://www.youtube.com/playlist?list=PLnYu0psdcllQZ9kSG7X7grrP_PsH3q3T3

    ITSPmagazine YouTube Channel
    📺 https://www.youtube.com/@itspmagazine

    Be sure to share and subscribe!

    ____________________________

    Resources

    Cloud Security Podcast: https://www.cloudsecuritypodcast.tv

    ____________________________

    To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:
    https://www.itspmagazine.com/redefining-cybersecurity-podcast

    Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Renny Babiarz: Exposing China's Nuclear Testing - MBM#40

    Renny Babiarz: Exposing China's Nuclear Testing - MBM#40

    Renny Babiarz is a former Analyst at the NGA (National Geospatial-Intelligence Agency) and the VP of Analysis & Operations at AllSource Analysis, a company focused on providing geospatial Intelligence investigations. One of the angles of Renny's work is better understanding China's Nuclear testing using satellite imagery, Open Source Intelligence methods & location data.

    ---
    Episode Sponsor: OpenCage
    Use OpenCage for your geocoding needs with their API. 
    They have a generous Free trial you can sign up to!
    ---

    Support the podcast on Patreon

    About Renny:

    Shownotes

    Timestamps

    (00:00) Introduction 

    02:51) Conversation starts: Renny's Journey with the NGA 

    (12:45) AllSource's work 

    (15:55) Defining Open & Proprietary 

    (18:42) Deciding which Analysis to publish 

    (23:12) Researching China's Nuclear Program 

    (29:43) How Projects Get Started 

    (34:39) Starting from Known Areas of Interest 

    (37:50) Automating Change Detection 

    (42:20) The Importance of Communicating Nuance 

    (48:13) Misinformation vs Disinformation 

    (51:21) The Hard Execrcise of Social Media Communication 

    (55:21) Twitter 

    (57:08) Sources & 'Peer Review' 

    (01:03:19) Working with Outside Analysts 

    (01:10:03) Teaching Geospatial Intelligence 

    (01:13:09) Teaching Soft Skills & Communications 

    (01:18:33) Renny's book 

    (01:23:52) Importance of staying hands on 

    (01:27:59) Micromanaging 

    (01:30:23) Book and podcast recommendation 

    (01:35:32) Flipping the tables: Max's Book & Podcast recommendation

     

    - Support the podcast on Patreon
    - Website
    - My Twitter
    - Podcast Twitter
    - Read Previous Issues of the Newsletter
    - Edited by Peter Xiong. Find more of his work

    Involuntary Employment Separation / Termination Strategies with Sean A. Ahrens

    Involuntary Employment Separation / Termination Strategies with Sean A. Ahrens

    #021 - In this next episode I was honored to be joined by Sean A. Ahrens MA, CPP, CSC, BSCP, FSyl. He's a leader in physical security consulting who has tremendous experience supporting clients across all major industries, when it comes to workplace violence, security technology, CPTED, expert witness consulting, and much more. 

    He’s earned his master's in organizational security management from Webster University, and overall, he’s just a wealth of knowledge.

    Today’s podcast focuses on one topic in particular: involuntary separations in the workplace (also known as involuntary terminations).

    Sean worked with a team of his peers in threat assessment and HR to create an informative, peer reviewed,  25-page document to educate organizations and business leaders about how to approach the complexities of these events.

    --
    INVOLUNTARY EMPLOYMENT SEPARATION/TERMINATION STRATEGIES V2: https://www.ahrenssecurity.com/_files/ugd/9ec069_80cd94822f104b86a362af22e23e73e7.pdf

    -- Get the resources and show notes mentioned in this episode --

    https://thesecuritystudent.com/shownotes