<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>The OPSEC Podcast</title>
		<link>https://shows.acast.com/the-opsec-podcast</link>
		<atom:link href="https://feeds.acast.com/public/shows/68871c0a2a38d6f5cb5925b7" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Grey Dynamics</copyright>
		<itunes:keywords>OPSEC,Privacy,Cybersecurity,Operational Security,Digital Privacy</itunes:keywords>
		<itunes:author>Grey Dynamics</itunes:author>
		<itunes:subtitle>Welcome to The OPSEC Podcast - where operational security meets everyday life.</itunes:subtitle>
		<itunes:summary><![CDATA[<p>Welcome to The OPSEC Podcast - where operational security meets everyday life.</p><br><p>I'm your host, Allen P. - former Navy aircrew, defense contractor, and cybersecurity professional with over 15 years of international intelligence operations experience. From the back of military aircraft to Intelligence Community-contracted programs, from Cyber Command to corporate security - I've seen what's possible when privacy and security break down.</p><br><p>But here's the thing: nobody's coming to save you. The companies won't fix this for you. The government won't protect your privacy. Your security is your responsibility.</p><br><p>Every two weeks, we'll dive deep into the world of operational security - not just as a professional practice, but as a way of life. We'll cover signature reduction, security operations, privacy strategies, and the OPSEC mindset that can protect you whether you're an intelligence professional, a corporate analyst, or someone who simply values their privacy and security.</p><br><p>From digital tools and daily carry items to situational awareness and travel security - this is practical, actionable intelligence you can use today. Because in a world where your data is currency and your privacy is under constant attack, the best defense is being your own first line of security.</p><br><p><em>Strong body, strong mind. Be the leader of your tribe. Welcome to The OPSEC Podcast.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[<p>Welcome to The OPSEC Podcast - where operational security meets everyday life.</p><br><p>I'm your host, Allen P. - former Navy aircrew, defense contractor, and cybersecurity professional with over 15 years of international intelligence operations experience. From the back of military aircraft to Intelligence Community-contracted programs, from Cyber Command to corporate security - I've seen what's possible when privacy and security break down.</p><br><p>But here's the thing: nobody's coming to save you. The companies won't fix this for you. The government won't protect your privacy. Your security is your responsibility.</p><br><p>Every two weeks, we'll dive deep into the world of operational security - not just as a professional practice, but as a way of life. We'll cover signature reduction, security operations, privacy strategies, and the OPSEC mindset that can protect you whether you're an intelligence professional, a corporate analyst, or someone who simply values their privacy and security.</p><br><p>From digital tools and daily carry items to situational awareness and travel security - this is practical, actionable intelligence you can use today. Because in a world where your data is currency and your privacy is under constant attack, the best defense is being your own first line of security.</p><br><p><em>Strong body, strong mind. Be the leader of your tribe. Welcome to The OPSEC Podcast.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Grey Dynamics</itunes:name>
			<itunes:email>info+68871c0a2a38d6f5cb5925b7@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
		<acast:showUrl>the-opsec-podcast</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmU13c0otUap75NIyVufnZVBoBcFwz3Y0zGA/pFjpP70+3oZt3+5O3uX8mfQZWzV35Kby8OfdHfDJlQAYxij1gc0J63rxgoMm4loq58gBzd9i]]></acast:settings>
        <acast:network id="605c639977610458c09817f4" slug="grey-dynamics"><![CDATA[Grey Dynamics]]></acast:network>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/cover/1753683036450-132b6448-9f07-48e3-9520-d40d9dc229e0.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/cover/1753683036450-132b6448-9f07-48e3-9520-d40d9dc229e0.jpeg</url>
				<link>https://shows.acast.com/the-opsec-podcast</link>
				<title>The OPSEC Podcast</title>
			</image>
		<item>
			<title>COVERT Protocol Action #6: Audit Your Children Social Media Accounts</title>
			<itunes:title>COVERT Protocol Action #6: Audit Your Children Social Media Accounts</itunes:title>
			<pubDate>Mon, 30 Mar 2026 15:40:00 GMT</pubDate>
			<itunes:duration>35:35</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/69ca780de44b28321e3d4480/media.mp3" length="273355652" type="audio/mpeg"/>
			<guid isPermaLink="false">69ca780de44b28321e3d4480</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://opsecpodcast.com/about.html</link>
			<acast:episodeId>69ca780de44b28321e3d4480</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>covert-protocol-action-6-audit-your-children-social-media-ac</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdyrlvvgIYZOshB/YXy4dHhfxmlOMw9xYpmqo4D4184u8AeBc0Trvqh9rmHCBOHeZgX79ytChDtJ7lPODAdwWsJr4n5vhc8tE1wtUJH6dkpt4HLGO7VAexUizJTFPvyXWfTq0gXYL/tteiCx8Ojgs6XjXjdrFbRGvLl+1cdVaR9csZmn/XqLEKEa+4pQJizwllKx04jZGMw1gN0GLNfNdJaPGxPdIfUIkNEUkZCIopj6ODSPVF6WmGJZdfgLOBvQh3AsHwaTIjlVQtKglMkY7gAZZP0wmeON7EMUXhDv9kmlLXiz7SwUNhjZPYs/ftOMMrwfTC8F3JJ0VUtAUkn8wKQ]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>16</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1774876526517-90ba2b14-1f64-4006-8601-104af137896a.jpeg"/>
			<description><![CDATA[<p>Throughout the latest episode, we have discussed operational security in professional settings. Today, we are bringing Gabriel Fanelli, director of training at Grey Dynamics and a former United States SIGINT operator with a Bronze Star commendation, to talk about something more than hardening your devices and obfuscating your networks:&nbsp;</p><br><p>Family Security</p><br><p>First of all, you are not your kids' best friends; you are their protector and last line of defence against all the threat actors lurking in the dark corners of the Internet. Having said that, here is what you will learn in the episode.</p><p><br></p><ol><li>The Types of Threats Present in Video Games and Online Forums</li><li>How To Explain Family Security Procedures to Your Spouse</li><li>How to Talk To Your Kids About Grooming and Extortion</li><li>Social Media Rules to Have Around the House</li><li>Maintaining Your Kid's Security While He Plays Online Games</li><li>Followers Vetting Processes and Second Device Auditing&nbsp;</li></ol><p><br></p><p>Your children and your family's security and privacy are your responsibility. They don't have the ability or capability to do it themselves, and you already know what's out there. Harden Up.&nbsp;</p><br><p>#Opsec #Security #Family #Home #Veteran</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Throughout the latest episode, we have discussed operational security in professional settings. Today, we are bringing Gabriel Fanelli, director of training at Grey Dynamics and a former United States SIGINT operator with a Bronze Star commendation, to talk about something more than hardening your devices and obfuscating your networks:&nbsp;</p><br><p>Family Security</p><br><p>First of all, you are not your kids' best friends; you are their protector and last line of defence against all the threat actors lurking in the dark corners of the Internet. Having said that, here is what you will learn in the episode.</p><p><br></p><ol><li>The Types of Threats Present in Video Games and Online Forums</li><li>How To Explain Family Security Procedures to Your Spouse</li><li>How to Talk To Your Kids About Grooming and Extortion</li><li>Social Media Rules to Have Around the House</li><li>Maintaining Your Kid's Security While He Plays Online Games</li><li>Followers Vetting Processes and Second Device Auditing&nbsp;</li></ol><p><br></p><p>Your children and your family's security and privacy are your responsibility. They don't have the ability or capability to do it themselves, and you already know what's out there. Harden Up.&nbsp;</p><br><p>#Opsec #Security #Family #Home #Veteran</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>COVERT Protocol Action #5: Audit Your Social Media Accounts</title>
			<itunes:title>COVERT Protocol Action #5: Audit Your Social Media Accounts</itunes:title>
			<pubDate>Mon, 09 Mar 2026 16:40:00 GMT</pubDate>
			<itunes:duration>7:58</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/69aeeb07db12e00bfdc20580/media.mp3" length="168702220" type="audio/mpeg"/>
			<guid isPermaLink="false">69aeeb07db12e00bfdc20580</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>69aeeb07db12e00bfdc20580</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>covert-protocol-action-5-audit-your-social-media-accounts</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcmcqxPnRMHcsTRMoJ6ij2yKfyMuiH+j/GcUUFCMmqOYS1wxPfMNhUXlWILkIdSLTut/OuUdwSNQVR/WyNcf390RqGHQg4czJzQMMUtKY0qppHFaUiP5W7RAXksFtlVVcfhHaswAL4NDZmFZGB/Wx97OyPzFbKT514N4XqmbGsuDr9/lTUjEZ9Tl+eVmC3bwxuIzST+OS7reSg9TJKjTDf9]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1773070906988-7b4f3eba-fde4-48f6-a8b1-c2db871b4e6a.jpeg"/>
			<description><![CDATA[<p>Audit your social-media exposure, review all your public or private social-media accounts and online profiles; check what personal information (photos, posts, bio data, connections) is visible; then remove, reduce, or restrict exposure of anything risky or unnecessary.</p><br><p><br></p><p>Steps to audit your social media exposure:</p><br><p><br></p><p>1. Make a full list of every social-media profile or public/social online account you’ve ever created (active or dormant). Include mainstream platforms and smaller/less-used ones.</p><br><p>2. Visit each account and carefully examine what can be seen publicly: profile pictures, bio information (name, location, birthdate, contact info), past posts, comments, photos, tags, friend lists.</p><br><p>3. Adjust privacy and visibility settings on each account so that only trusted contacts (friends/followers) can see sensitive content. Delete, lock down or hide: personal details, contact info, location data, old posts.</p><br><p>4. Remove or deactivate any accounts you no longer use, or that you don’t want publicly visible. Dormant accounts may still leak personal data.</p><br><p>5. Scan for “people-search” or public-record sites listing you (or old usernames/email) check what information about you is exposed outside social media.</p><br><p>6. Periodically repeat the audit (every 3–6 months) privacy settings and platform defaults can change; content from connections (tags, shares) or old posts may re-expose you.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Audit your social-media exposure, review all your public or private social-media accounts and online profiles; check what personal information (photos, posts, bio data, connections) is visible; then remove, reduce, or restrict exposure of anything risky or unnecessary.</p><br><p><br></p><p>Steps to audit your social media exposure:</p><br><p><br></p><p>1. Make a full list of every social-media profile or public/social online account you’ve ever created (active or dormant). Include mainstream platforms and smaller/less-used ones.</p><br><p>2. Visit each account and carefully examine what can be seen publicly: profile pictures, bio information (name, location, birthdate, contact info), past posts, comments, photos, tags, friend lists.</p><br><p>3. Adjust privacy and visibility settings on each account so that only trusted contacts (friends/followers) can see sensitive content. Delete, lock down or hide: personal details, contact info, location data, old posts.</p><br><p>4. Remove or deactivate any accounts you no longer use, or that you don’t want publicly visible. Dormant accounts may still leak personal data.</p><br><p>5. Scan for “people-search” or public-record sites listing you (or old usernames/email) check what information about you is exposed outside social media.</p><br><p>6. Periodically repeat the audit (every 3–6 months) privacy settings and platform defaults can change; content from connections (tags, shares) or old posts may re-expose you.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>COVERT Protocol Action #4: Harden your Communications and Services</title>
			<itunes:title>COVERT Protocol Action #4: Harden your Communications and Services</itunes:title>
			<pubDate>Mon, 23 Feb 2026 16:40:00 GMT</pubDate>
			<itunes:duration>7:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/699c16f21b49b62ccc823353/media.mp3" length="158505450" type="audio/mpeg"/>
			<guid isPermaLink="false">699c16f21b49b62ccc823353</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>699c16f21b49b62ccc823353</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>covert-protocol-4-harden-your-communications-and-services</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdXHega/3IH031N9n+fU01JPV9tlh7yjPuqBPLrd3TaqeIkIzbGCfgOVVyy5qZ+kcz+PKbXiY0CERSoEy78EHOSrf8tua5FGxHsihHHF6H2ybHqfwptcTc5BMQCYaf3EeSMXhkLHo2qCWDn0MyyFdTyD0N76Vw/SM5p0rdNMay4gbwnmGMyVYtD/fpHfsTPFBtQfktyc5GKXhzalRac85YF]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1771836836917-dbc56a62-1ed7-4753-8519-4d9fd3968802.jpeg"/>
			<description><![CDATA[<p>Strengthen the security and privacy of your digital communications (messaging, email, cloud data) so that only intended recipients can access them and so that third parties cannot intercept or read your messages or files (including service providers, attackers, and passive observers). This means switching to encrypted channels, reducing unwanted exposure, tightening service settings, and avoiding insecure or legacy protocols. End-to-end encryption ensures message content stays private from the sender to the recipient, and platform hardening reduces the overall attack surface by disabling unnecessary or insecure features.</p><br><p><br></p><p>Steps to Harden Your Communications and Services:</p><p><br></p><ol><li>Switch to encrypted messaging platforms: Replace default SMS/text or unencrypted chat apps with services that provide end-to-end encryption (E2EE) so that only you and the recipient can read your messages.</li><li>Use secure email services: Choose email providers with strong encryption by default (like Proton Mail or Tuta), and enable encryption features (PGP/automated E2EE) where possible to protect email contents in transit and at rest.</li><li>Encrypt files before cloud storage: Use cloud services or tools that perform client-side encryption (zero-knowledge encryption) so data is encrypted before it leaves your device, and the provider can’t read it.</li></ol><p><br></p><p>Recommended Tools:</p><p><br></p><ol><li>Encrypted Messengers: apps like Signal, Wire, or Threema that use end-to-end encryption to protect messaging and calls from third-party access.</li><li>Encrypted Email: providers like Proton Mail, Tuta, or Hushmail that support encryption of email content and attachments.</li><li>Encrypted Cloud Storage: services that offer client-side encryption (e.g., Proton Drive, Sync.com, or tools that integrate local encryption before upload) to ensure your stored data remains private even from the cloud provider.</li></ol><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Strengthen the security and privacy of your digital communications (messaging, email, cloud data) so that only intended recipients can access them and so that third parties cannot intercept or read your messages or files (including service providers, attackers, and passive observers). This means switching to encrypted channels, reducing unwanted exposure, tightening service settings, and avoiding insecure or legacy protocols. End-to-end encryption ensures message content stays private from the sender to the recipient, and platform hardening reduces the overall attack surface by disabling unnecessary or insecure features.</p><br><p><br></p><p>Steps to Harden Your Communications and Services:</p><p><br></p><ol><li>Switch to encrypted messaging platforms: Replace default SMS/text or unencrypted chat apps with services that provide end-to-end encryption (E2EE) so that only you and the recipient can read your messages.</li><li>Use secure email services: Choose email providers with strong encryption by default (like Proton Mail or Tuta), and enable encryption features (PGP/automated E2EE) where possible to protect email contents in transit and at rest.</li><li>Encrypt files before cloud storage: Use cloud services or tools that perform client-side encryption (zero-knowledge encryption) so data is encrypted before it leaves your device, and the provider can’t read it.</li></ol><p><br></p><p>Recommended Tools:</p><p><br></p><ol><li>Encrypted Messengers: apps like Signal, Wire, or Threema that use end-to-end encryption to protect messaging and calls from third-party access.</li><li>Encrypted Email: providers like Proton Mail, Tuta, or Hushmail that support encryption of email content and attachments.</li><li>Encrypted Cloud Storage: services that offer client-side encryption (e.g., Proton Drive, Sync.com, or tools that integrate local encryption before upload) to ensure your stored data remains private even from the cloud provider.</li></ol><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>COVERT Protocol Action #3: Implement Multi-Factor Authentication whenever possible</title>
			<itunes:title>COVERT Protocol Action #3: Implement Multi-Factor Authentication whenever possible</itunes:title>
			<pubDate>Mon, 09 Feb 2026 16:30:00 GMT</pubDate>
			<itunes:duration>6:24</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/698a031ad2345f67c3fb5e0f/media.mp3" length="135586622" type="audio/mpeg"/>
			<guid isPermaLink="false">698a031ad2345f67c3fb5e0f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>698a031ad2345f67c3fb5e0f</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>covert-protocol-3-implement-multi-factor-authentication-when</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdOwNdxWQbm6ez/jpo03hRDFxrNpGy0MGhbKJxpPRs57C/U7ouU9wqB8gH1lGAe7LkDDz1mSmvyGORgp6ReXGzaWTPzKcoMVnLq0U5oN1Nmr/FxRXDH/JfsoX+J9eYFTwdY9HTVhL8VBxX9Z/uAZL14hfwXUupdzosocVCg4k3Fn84gHmd+831LCidTKRonF3BYuaQHicFR44bvaLYlgGiE]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1770652342224-d54137b5-d0aa-49dd-8d96-daf7be22990e.jpeg"/>
			<description><![CDATA[<p>Implement multi-factor authentication (MFA) on every account, using the strongest method available with a graduated approach:</p><br><p>1. Audit all important accounts (email, banking, cloud storage, social media, password manager) to check whether MFA is supported.</p><p>2. For each account, go to the security or login settings and enable MFA. Choose the strongest method the service supports.</p><p>3. If using an authenticator app or hardware key, save backup/recovery codes securely (in case you lose your phone or key).</p><p>4. For accounts using SMS/email 2FA consider upgrading to a stronger method when available, especially for sensitive accounts.</p><p>5. Test the MFA setup by logging out and logging back in to confirm that the second factor works as expected.</p><br><p>Recommended Tools</p><br><p>Authy: a widely used authenticator app that generates time-based codes for TOTP-based MFA.</p><p>Proton Authenticator: privacy-focused app for generating MFA codes offline.</p><p>YubiKey: a hardware security key providing FIDO2/WebAuthn authentication for the strongest protection.</p><br><p>More At: </p><br><p>https://opsecpodcast.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Implement multi-factor authentication (MFA) on every account, using the strongest method available with a graduated approach:</p><br><p>1. Audit all important accounts (email, banking, cloud storage, social media, password manager) to check whether MFA is supported.</p><p>2. For each account, go to the security or login settings and enable MFA. Choose the strongest method the service supports.</p><p>3. If using an authenticator app or hardware key, save backup/recovery codes securely (in case you lose your phone or key).</p><p>4. For accounts using SMS/email 2FA consider upgrading to a stronger method when available, especially for sensitive accounts.</p><p>5. Test the MFA setup by logging out and logging back in to confirm that the second factor works as expected.</p><br><p>Recommended Tools</p><br><p>Authy: a widely used authenticator app that generates time-based codes for TOTP-based MFA.</p><p>Proton Authenticator: privacy-focused app for generating MFA codes offline.</p><p>YubiKey: a hardware security key providing FIDO2/WebAuthn authentication for the strongest protection.</p><br><p>More At: </p><br><p>https://opsecpodcast.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>COVERT  Protocol Action #2: Audit and Secure Your Financial Accounts</title>
			<itunes:title>COVERT  Protocol Action #2: Audit and Secure Your Financial Accounts</itunes:title>
			<pubDate>Mon, 26 Jan 2026 16:40:00 GMT</pubDate>
			<itunes:duration>5:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/69775dd649ef755216d4a8ef/media.mp3" length="137185226" type="audio/mpeg"/>
			<guid isPermaLink="false">69775dd649ef755216d4a8ef</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>69775dd649ef755216d4a8ef</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>covert-protocol-action-2-audit-and-secure-your-financial-acc</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCeJNuFFUXLcKbKDdNN8JuhU8r3PBtrtWbZVlSshEtaiw6eHQazvwpcp2vl/Quox1s23dSYjMczjTjZ58EeN4Bukr8DhUYYtMNhY4j7uk745/DBHFF48FoOe+KpS84Eu89sAaZrrZTl+MocnWYOBDuH4WXfd4IbP0/xX+Ksc3vTIQKKCFMG4FnEqEmyYC1ia6BCShTR7Uvi6zVkCkxSJsfFT]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1769430404629-5263c211-99cf-4418-8547-1c4ecaa16a64.jpeg"/>
			<description><![CDATA[<p>Your money is one of the most targeted assets you own, and one of the easiest to compromise if left unattended. </p><br><p>Modern financial attacks start with reused passwords, exposed debit cards, unsecured networks, and excessive data leakage.</p><br><p>In this episode of The OPSEC Podcast, we apply the full Covert Protocol framework — Control, Obfuscate, Verify, Encrypt, Reduce, Track — to financial security. </p><br><p>From eliminating debit card exposure and deploying masked credit cards, to removing banking apps from mobile devices and enforcing transaction alerts, this is about tightening control and reducing attack surface.</p><br><p>Audit every account. Limit access. Monitor relentlessly.</p><br><p>Your privacy (and your money) are your responsibility.</p><br><p>#OPSEC #CovertProtocol #FinancialSecurity #OperationalSecurity #PrivacyFirst #DigitalHygiene #ThreatReduction #CyberAwareness #PersonalSecurity #RiskManagement</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Your money is one of the most targeted assets you own, and one of the easiest to compromise if left unattended. </p><br><p>Modern financial attacks start with reused passwords, exposed debit cards, unsecured networks, and excessive data leakage.</p><br><p>In this episode of The OPSEC Podcast, we apply the full Covert Protocol framework — Control, Obfuscate, Verify, Encrypt, Reduce, Track — to financial security. </p><br><p>From eliminating debit card exposure and deploying masked credit cards, to removing banking apps from mobile devices and enforcing transaction alerts, this is about tightening control and reducing attack surface.</p><br><p>Audit every account. Limit access. Monitor relentlessly.</p><br><p>Your privacy (and your money) are your responsibility.</p><br><p>#OPSEC #CovertProtocol #FinancialSecurity #OperationalSecurity #PrivacyFirst #DigitalHygiene #ThreatReduction #CyberAwareness #PersonalSecurity #RiskManagement</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>COVERT Protocol Action #1: Implement a Password Manager</title>
			<itunes:title>COVERT Protocol Action #1: Implement a Password Manager</itunes:title>
			<pubDate>Mon, 12 Jan 2026 16:45:00 GMT</pubDate>
			<itunes:duration>9:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/696509f679fe7d55452914da/media.mp3" length="225697690" type="audio/mpeg"/>
			<guid isPermaLink="false">696509f679fe7d55452914da</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/about.html</link>
			<acast:episodeId>696509f679fe7d55452914da</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>covert-protocol-action-1-implement-a-password-manger</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCd7dH7MfTnMpU72m+AfMaebNkHZnYD8v7urNGPrJ/V92CL4/AtmobeLw4tcxauHjN5az584Dult6S5pqaNB7NPX7OAZ9okEmhyzMtebr8ZzG8ihuOYwxsg8ymLurtG/Af4o03wRO4bAE7LJ/X70RfsSfUJvDj4dmVH9cLDfj67INPZC8MOUMQDPl5HjE/h3wZ3kyk6rCzSiMdMYZanSvTRH]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1768229013159-9b052303-e423-4727-a48b-199f524f3306.jpeg"/>
			<description><![CDATA[<p>Allen Pace presents the Covert Protocol, a structured methodology that will combine through different episodes the OPSEC Podcast principles with the CIA Triad practices. By using these two frameworks in tandem, this process aims to equip everyday users (like you) with both the strategic mindset and the practical tools needed to increase security, reduce vulnerabilities, and enhance personal privacy in both the digital and physical realms.</p><br><p><br></p><p>Action 1#: Implement a Password Manager</p><br><p><br></p><p>Recommended tools:</p><br><p><br></p><p>1. Bitwarden: a popular, open-source password manager that supports syncing, autofill, passkeys, and</p><p>cross-device use.</p><p>2. Proton Pass: a privacy-focused password manager with encryption and strong privacy posture.</p><p>3. KeePassXC: an offline/local password manager that stores the vault on your device for maximum</p><p>control and minimal external dependencies.</p><br><p><br></p><p>Steps to implement:</p><br><p><br></p><p>1. Pick a password manager tool (see Recommended tools below) and install it on your primary</p><p>devices (computer, phone, tablet). Make sure it supports MFA for the vault itself for future</p><p>hardening.</p><p>2. Create a strong master password/passphrase - this should be long, complex, and unique</p><p>(don’t reuse it anywhere).</p><p>3. Begin adding your online account credentials to the vault. For each new account: generate a long</p><p>random password via the manager, then save it in the vault. For existing accounts: replace weak or</p><p>reused passwords with new vault-generated ones.</p><p>4. If using a cloud-based manager: set up syncing across devices so you have access on laptop, phone,</p><p>etc. If using an offline/local manager: make regular encrypted backups of the vault (e.g. to an</p><p>external drive or secure location).</p><p>5. From now on, use the vault’s auto-fill or copy/paste feature when logging in, rather than</p><p>memorizing or reusing passwords elsewhere.</p><br><p>#OPESCPodcast #CovertProtocol #CyberSec #Intelligence</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Allen Pace presents the Covert Protocol, a structured methodology that will combine through different episodes the OPSEC Podcast principles with the CIA Triad practices. By using these two frameworks in tandem, this process aims to equip everyday users (like you) with both the strategic mindset and the practical tools needed to increase security, reduce vulnerabilities, and enhance personal privacy in both the digital and physical realms.</p><br><p><br></p><p>Action 1#: Implement a Password Manager</p><br><p><br></p><p>Recommended tools:</p><br><p><br></p><p>1. Bitwarden: a popular, open-source password manager that supports syncing, autofill, passkeys, and</p><p>cross-device use.</p><p>2. Proton Pass: a privacy-focused password manager with encryption and strong privacy posture.</p><p>3. KeePassXC: an offline/local password manager that stores the vault on your device for maximum</p><p>control and minimal external dependencies.</p><br><p><br></p><p>Steps to implement:</p><br><p><br></p><p>1. Pick a password manager tool (see Recommended tools below) and install it on your primary</p><p>devices (computer, phone, tablet). Make sure it supports MFA for the vault itself for future</p><p>hardening.</p><p>2. Create a strong master password/passphrase - this should be long, complex, and unique</p><p>(don’t reuse it anywhere).</p><p>3. Begin adding your online account credentials to the vault. For each new account: generate a long</p><p>random password via the manager, then save it in the vault. For existing accounts: replace weak or</p><p>reused passwords with new vault-generated ones.</p><p>4. If using a cloud-based manager: set up syncing across devices so you have access on laptop, phone,</p><p>etc. If using an offline/local manager: make regular encrypted backups of the vault (e.g. to an</p><p>external drive or secure location).</p><p>5. From now on, use the vault’s auto-fill or copy/paste feature when logging in, rather than</p><p>memorizing or reusing passwords elsewhere.</p><br><p>#OPESCPodcast #CovertProtocol #CyberSec #Intelligence</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Walmart to WhatsApp: The Hidden Systems Mapping Your Behaviour</title>
			<itunes:title>Walmart to WhatsApp: The Hidden Systems Mapping Your Behaviour</itunes:title>
			<pubDate>Mon, 08 Dec 2025 16:40:00 GMT</pubDate>
			<itunes:duration>29:03</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/6936d4a719da0d3059ca3f9c/media.mp3" length="307497116" type="audio/mpeg"/>
			<guid isPermaLink="false">6936d4a719da0d3059ca3f9c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>6936d4a719da0d3059ca3f9c</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>walmart-to-whatsapp-the-hidden-systems-mapping-your-behaviou</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCeUj2y7OPhlkMVtOj/ATFxThwhn7KoyliA/AZfzFEEI0TChogKKG9ArDKbbltlqgPU7ZhleRW8aKbO+xqgfAw6F9Uyy/E5un4tFPQ2kSX8Xb4varMAfcZt41oAX6LV02F1OzxmU0ZaNsxIfe9j45aNGwykAJJvR9T3VtidWTGwlwrNErl1Vb36ALEw8jq7SOeOAaEwEDHuFYhZwHoE2qdVQTGhQ6kX+WeaVeQ1wwWBWbmaBzfL2cXW7dMxV+QZ1ZqzN6X8DC4ULxRRXvA9BmF7+mYmz2AmKEimitaHuZMDcSoxna8Tyr+peRmClN+rrNmesrfb0YtMQZ2fdrrXD1S2U]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1765200878415-262f1399-0940-4a48-883e-579285806331.jpeg"/>
			<description><![CDATA[<p>For the past decade, people have underestimated the most powerful surveillance system ever built, not by intelligence agencies, but by corporations. Every movement you make, every store you walk into, every website you open, every conversation near your phone, it’s all collected, correlated, sold, and fed back into behavioural models more invasive than anything that Langley or the Kremlin could ever have dreamed of.</p><br><p>Your phone doesn’t just listen. It watches how you walk. It measures how you move. Not only that, but it predicts your emotional state, loneliness cycles, purchasing intent, and even what you’ll search next, before you search it.</p><br><p>And you’re paying for the privilege.</p><br><p>In this episode of <em>The OPSEC Podcast</em>, Allen and Ahmed break down how modern surveillance works when <em>everyone</em> (from convenience stores to dating apps to foreign intelligence services) is harvesting your data. Not by hacking you, but by exploiting the sensors you voluntarily carry.</p><br><p>You’ll discover:</p><p><br></p><ul><li>How retail stores use enhanced camera networks to track your movement, biometrics, and purchasing behaviour</li></ul><p><br></p><ul><li>Why your phone’s gyroscope, accelerometer, and Bluetooth signals can identify you even if everything else is turned off</li></ul><p><br></p><ul><li>How dating apps use motion-sensor analytics to determine when you're lonely, then target you.</li></ul><p><br></p><ul><li>Why are executives travelling to China with their personal phones are walking SIGINT targets.</li></ul><p><br></p><ul><li>The truth about burner phones, why 99% of people use them wrong, and how surveillance teams detect them instantly.</li></ul><p><br></p><ul><li>Why Europe is sleepwalking into a surveillance state through digital ID, KYC expansion, and anti-encryption laws.</li></ul><p><br></p><ul><li>The hidden danger of bringing compromised devices back into your home network after international travel</li></ul><p><br></p><ul><li>How modern ads appear seconds after conversations,&nbsp; and why it’s not a coincidence</li></ul><p><br></p><p>Privacy isn’t dying, it’s being optimised out of existence.</p><br><p>Your devices broadcast more intel about you than most people will ever realise. And unless you actively shut down those signals, someone is always listening.</p><br><p>Your privacy is your responsibility. Do your due diligence, or accept the consequences.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>For the past decade, people have underestimated the most powerful surveillance system ever built, not by intelligence agencies, but by corporations. Every movement you make, every store you walk into, every website you open, every conversation near your phone, it’s all collected, correlated, sold, and fed back into behavioural models more invasive than anything that Langley or the Kremlin could ever have dreamed of.</p><br><p>Your phone doesn’t just listen. It watches how you walk. It measures how you move. Not only that, but it predicts your emotional state, loneliness cycles, purchasing intent, and even what you’ll search next, before you search it.</p><br><p>And you’re paying for the privilege.</p><br><p>In this episode of <em>The OPSEC Podcast</em>, Allen and Ahmed break down how modern surveillance works when <em>everyone</em> (from convenience stores to dating apps to foreign intelligence services) is harvesting your data. Not by hacking you, but by exploiting the sensors you voluntarily carry.</p><br><p>You’ll discover:</p><p><br></p><ul><li>How retail stores use enhanced camera networks to track your movement, biometrics, and purchasing behaviour</li></ul><p><br></p><ul><li>Why your phone’s gyroscope, accelerometer, and Bluetooth signals can identify you even if everything else is turned off</li></ul><p><br></p><ul><li>How dating apps use motion-sensor analytics to determine when you're lonely, then target you.</li></ul><p><br></p><ul><li>Why are executives travelling to China with their personal phones are walking SIGINT targets.</li></ul><p><br></p><ul><li>The truth about burner phones, why 99% of people use them wrong, and how surveillance teams detect them instantly.</li></ul><p><br></p><ul><li>Why Europe is sleepwalking into a surveillance state through digital ID, KYC expansion, and anti-encryption laws.</li></ul><p><br></p><ul><li>The hidden danger of bringing compromised devices back into your home network after international travel</li></ul><p><br></p><ul><li>How modern ads appear seconds after conversations,&nbsp; and why it’s not a coincidence</li></ul><p><br></p><p>Privacy isn’t dying, it’s being optimised out of existence.</p><br><p>Your devices broadcast more intel about you than most people will ever realise. And unless you actively shut down those signals, someone is always listening.</p><br><p>Your privacy is your responsibility. Do your due diligence, or accept the consequences.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Faraday Shielding: The Counter-Surveillance Tool For Family Holidays and Everyday Carry</title>
			<itunes:title>Faraday Shielding: The Counter-Surveillance Tool For Family Holidays and Everyday Carry</itunes:title>
			<pubDate>Mon, 17 Nov 2025 16:40:00 GMT</pubDate>
			<itunes:duration>23:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/691b32cb67ed28baecceaa53/media.mp3" length="252969322" type="audio/mpeg"/>
			<guid isPermaLink="false">691b32cb67ed28baecceaa53</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>691b32cb67ed28baecceaa53</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>faraday-shielding-the-counter-surveillance-tool-for-family-h</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdyOFztFVch54fikTvNQXzQB8/nMr+wJfkjQ4Hx2NL4DVxjXigrCNuu0GGT5CkfKPJMxzdpPFNnHr5JdFKBp09eOYz8KS99jkq3Fur/0cdqoFHB+D6p557NXFNi5iW4Dknw8GMbfYdWDTStm2BFUpO618ekCw5wb7sqMN1EmD11oiFCOyPfhW4WajT/UdRvOlD30bM4CMJOraXGyS7pZsELIXhqDwAzmSf0HDrFjpBQCGJ3SMJDJu1dNv+w9Qzp83fI6p0bv5Wg08qGQVqRHQV/AG72MzNkik/wOxGdALpf4gql+vp0Y2zDmzMFhYY3kiEVapbe/lB9oZQTCg96PB7m]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1763389815246-757d97b7-3f07-4e01-938f-dd9e39d58fff.jpeg"/>
			<description><![CDATA[<p>For more than a decade, intelligence agencies, data brokers, and criminal syndicates have quietly relied on the same vulnerability: your wireless signals. Your phone, your credit cards, your passport, your key fobs — they all broadcast data constantly, whether you realise it or not. And every signal can be intercepted, cloned, profiled, or used against you.</p><br><p>In this episode of <em>The OPSEC Podcast</em>, we break down a hard truth: <strong>modern tracking doesn’t require hacking — just proximity</strong>. Bluetooth skimmers, RFID harvesters, rogue NFC readers, silent ping collectors… they’re everywhere, especially during the holiday travel boom.</p><p>You’ll learn how Faraday sleeves, RFID-blocking wallets, and shielded travel kits shut down these attacks by cutting off the signals entirely. Not with software. Not with “anti-tracking apps.” But with the same electromagnetic isolation techniques used in classified facilities and intelligence operations since the 1940s.</p><br><p>In this episode, you’ll discover:</p><p><br></p><ul><li>How Bluetooth hijacking and RFID skimming actually work (and why tourists are the easiest targets)</li></ul><p><br></p><ul><li>Why your phone still broadcasts identifiers even when it’s “off”</li></ul><p><br></p><ul><li>The difference between consumer-grade Faraday products vs. intelligence-grade shielding</li></ul><p><br></p><ul><li>Why doubling-layer protection (sleeve + wallet, sleeve + bag) mirrors professional tradecraft</li></ul><p><br></p><ul><li>The silent rise of contactless credit card theft in crowded holiday shopping zones</li></ul><p><br></p><ul><li>Why a $10 RFID sleeve can stop a $500 attack before it begins</li></ul><p><br></p><ul><li>The truth about Faraday backpacks, travel organisers, and which brands actually hold up</li></ul><p><br></p><ul><li>How to integrate Faraday protection into daily OPSEC without looking like a tactical wannabe</li></ul><p><br></p><p>If intelligence agencies rely on signal isolation to protect classified hardware, identities, and operational assets, why shouldn’t you use the same principles to protect your phone, passport, and money?</p><br><p>Your devices broadcast more about you than you think.</p><br><p>Your security is your responsibility.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>For more than a decade, intelligence agencies, data brokers, and criminal syndicates have quietly relied on the same vulnerability: your wireless signals. Your phone, your credit cards, your passport, your key fobs — they all broadcast data constantly, whether you realise it or not. And every signal can be intercepted, cloned, profiled, or used against you.</p><br><p>In this episode of <em>The OPSEC Podcast</em>, we break down a hard truth: <strong>modern tracking doesn’t require hacking — just proximity</strong>. Bluetooth skimmers, RFID harvesters, rogue NFC readers, silent ping collectors… they’re everywhere, especially during the holiday travel boom.</p><p>You’ll learn how Faraday sleeves, RFID-blocking wallets, and shielded travel kits shut down these attacks by cutting off the signals entirely. Not with software. Not with “anti-tracking apps.” But with the same electromagnetic isolation techniques used in classified facilities and intelligence operations since the 1940s.</p><br><p>In this episode, you’ll discover:</p><p><br></p><ul><li>How Bluetooth hijacking and RFID skimming actually work (and why tourists are the easiest targets)</li></ul><p><br></p><ul><li>Why your phone still broadcasts identifiers even when it’s “off”</li></ul><p><br></p><ul><li>The difference between consumer-grade Faraday products vs. intelligence-grade shielding</li></ul><p><br></p><ul><li>Why doubling-layer protection (sleeve + wallet, sleeve + bag) mirrors professional tradecraft</li></ul><p><br></p><ul><li>The silent rise of contactless credit card theft in crowded holiday shopping zones</li></ul><p><br></p><ul><li>Why a $10 RFID sleeve can stop a $500 attack before it begins</li></ul><p><br></p><ul><li>The truth about Faraday backpacks, travel organisers, and which brands actually hold up</li></ul><p><br></p><ul><li>How to integrate Faraday protection into daily OPSEC without looking like a tactical wannabe</li></ul><p><br></p><p>If intelligence agencies rely on signal isolation to protect classified hardware, identities, and operational assets, why shouldn’t you use the same principles to protect your phone, passport, and money?</p><br><p>Your devices broadcast more about you than you think.</p><br><p>Your security is your responsibility.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Masked Payment Cards: Operational Tradecraft for Protecting Financial Footprints</title>
			<itunes:title>Masked Payment Cards: Operational Tradecraft for Protecting Financial Footprints</itunes:title>
			<pubDate>Mon, 03 Nov 2025 17:00:36 GMT</pubDate>
			<itunes:duration>20:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/6908c2f1f2e788ef096b7559/media.mp3" length="220608362" type="audio/mpeg"/>
			<guid isPermaLink="false">6908c2f1f2e788ef096b7559</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>6908c2f1f2e788ef096b7559</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>masked-payment-cards-operational-tradecraft-for-protecting-f</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCff735Fyd1bSYnwwz5FsyzrzoKCxEm202Z0fNHnDVj2anEe0jqBvY7F+gH+w6txVS8H/xud2AFnSZ5XQe3hDOFtPBBuDGTiAMtVt/B/cjRIJj6VnklUIDpnl2xp6IpHaPpG/o4ggBop5G/duGyA9QiLPRMPrDxFXJwj3mG/6FBdwD/NSyBLfwktvTOK7DC5/MSclLocLQxp2ePBhUqq2Y8PvYCLQe8/0oCE0w0jJvjvLgIeOsxwhjIXgk+nEFWul7qmRw45p+xZ26XgRV/n4dt6ToyuDk8X5qTNFmtip4Jlj1ZGiKX6bRS9lD1uLuyhl1hn32qVvBUR3PEJurjWOQ5w]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1762181638583-acae47bc-7d3e-4495-be7e-6d9add402e52.jpeg"/>
			<description><![CDATA[<p>From an operational-security perspective, financial metadata is one of the most actionable intelligence vectors available to adversaries and fraudsters alike. In this episode of <em>The OPSEC Podcast</em>, host Alan Pace — speaking from field experience — delivers a concise intelligence-grade briefing on masked payment cards (e.g., Privacy.com) and how to incorporate them into a practical OPSEC posture for the holiday shopping surge.</p><br><p>What you’ll learn:</p><br><p> • The threat model: how e-commerce breaches, merchant telemetry, and secondary data linkages convert routine transactions into persistent identifiers.</p><p> • Capability assessment of masked card services: merchant-locking, single-use tokens, disposable virtual cards, and how each mitigates specific attack vectors.</p><p> • Operational procedures: safe account linking, rotation of credentials post-link, and handling of recurring payments to deny blindside billing.</p><p> • Regional tradecraft: practical alternatives when Privacy.com isn’t available (Revolut, IronVest, Moon/PayWithMoon) and the tradeoffs imposed by KYC/GDPR regimes.</p><p> • Rules of engagement: when a masked card improves your security posture — and when it merely shifts trust to another third party.</p><br><p>This episode reads like a field directive: adopt masked payment cards as a standard control for online purchases, instrument them with strict lifecycle management (create → limit → monitor → kill), and treat payment tokens as mission-critical assets.</p><br><p>Practical, repeatable, and defensive — because operational security begins at the point of payment.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>From an operational-security perspective, financial metadata is one of the most actionable intelligence vectors available to adversaries and fraudsters alike. In this episode of <em>The OPSEC Podcast</em>, host Alan Pace — speaking from field experience — delivers a concise intelligence-grade briefing on masked payment cards (e.g., Privacy.com) and how to incorporate them into a practical OPSEC posture for the holiday shopping surge.</p><br><p>What you’ll learn:</p><br><p> • The threat model: how e-commerce breaches, merchant telemetry, and secondary data linkages convert routine transactions into persistent identifiers.</p><p> • Capability assessment of masked card services: merchant-locking, single-use tokens, disposable virtual cards, and how each mitigates specific attack vectors.</p><p> • Operational procedures: safe account linking, rotation of credentials post-link, and handling of recurring payments to deny blindside billing.</p><p> • Regional tradecraft: practical alternatives when Privacy.com isn’t available (Revolut, IronVest, Moon/PayWithMoon) and the tradeoffs imposed by KYC/GDPR regimes.</p><p> • Rules of engagement: when a masked card improves your security posture — and when it merely shifts trust to another third party.</p><br><p>This episode reads like a field directive: adopt masked payment cards as a standard control for online purchases, instrument them with strict lifecycle management (create → limit → monitor → kill), and treat payment tokens as mission-critical assets.</p><br><p>Practical, repeatable, and defensive — because operational security begins at the point of payment.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>How the CIA Owned an Encryption Company for 50 Years (And Why Your VPN Might Be Next)</title>
			<itunes:title>How the CIA Owned an Encryption Company for 50 Years (And Why Your VPN Might Be Next)</itunes:title>
			<pubDate>Mon, 20 Oct 2025 16:10:25 GMT</pubDate>
			<itunes:duration>37:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/68f63b15888566c5b0dd66ed/media.mp3" length="400606298" type="audio/mpeg"/>
			<guid isPermaLink="false">68f63b15888566c5b0dd66ed</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://opsecpodcast.com/about.html</link>
			<acast:episodeId>68f63b15888566c5b0dd66ed</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>how-the-cia-owned-an-encryption-company-for-50-years-and-why</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCde13/AUHEMob6A6mZkZ1Lru/EJn8VCpZnWmtrIpjLj/1ACd05sAQwcE4yDhasaZU1qIQWey2aMoCpfAGeneSfanStWZXZsdtjyCYFywuoLkciwx1LunUPWV4k2MYBB/aKpLZwq/ibfGonNSKTb26QhLe/KFjbb0R0kKL3v19GvcFWVIhaGTKiIfUcpo7QY4lP5gjVcR5New+2aK0OTxgcQNbiypzzoDRagMAB3g9woE6qIuYnLE+wfKBrziXX//mjgPvlx8z7qiIHOPvE20MxAFpN8etf/rFrGLHz6Gv2ex3yGAaXfBlLbwdHC8z+jG5EgJn88LEPfogaivqvbq0fs]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1760967395001-9b3f22ab-9668-479f-bf82-886aa3d78636.jpeg"/>
			<description><![CDATA[<p><strong>For 50 years, 130 governments trusted Crypto AG to protect their most secret communications. Every single message was being read by the CIA and German intelligence. </strong>Operation Rubicon was the longest-running espionage operation in history. The CIA secretly bought a Swiss encryption company in 1970, installed backdoors in every device, and sold “secure” communications to governments worldwide. Nobody suspected a thing – until 2020.</p><br><p><strong>Now it’s happening again. But this time, they’re buying your VPN companies. </strong>Kape Technologies – an Israeli company founded by former adware criminals with ties to Unit 8200 (Israel’s NSA) – quietly bought ExpressVPN in 2021. They also own CyberGhost, PIA, and Zenmate. Plus all the VPN “review” sites that conveniently rank their products at the top.</p><br><p><strong>In this episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ul><li>Why Chinese VPNs like Turbo VPN are 51% owned by the Communist Party (and why they target American teenagers on TikTok)</li><li>How Russian VPNs like Kaspersky are legally required to give the FSB access to all your traffic</li><li>Why “free VPNs” turn your computer into a botnet zombie (the Hola VPN scandal)</li><li>What VPNs actually do vs. the anonymity BS they claim in their marketing</li><li>The only 3 VPN companies that pass the trust sniff test: ProtonVPN, Mullvad, and NordVPN</li></ul><p><br></p><p><strong>A VPN does not equal automatic privacy.</strong>&nbsp;It’s outsourcing trust from one party to another. If you take trust from your ISP and give it to a malicious actor, you’re worse off than having no VPN at all.</p><br><p><strong>Free VPNs make YOU the product.</strong>&nbsp;Israeli companies inject adware. Chinese companies feed data to the CCP. Russian companies hand everything to the FSB.</p><br><p><strong>Check who owns the VPN – not just where the servers are located.</strong>&nbsp;Because if the CIA launched a VPN service promising “guaranteed privacy,” they’d sell exactly zero subscriptions. So why trust companies with the same intelligence agency connections?</p><br><p><strong>Your privacy is your responsibility. Do your due diligence or accept the consequences.</strong>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>For 50 years, 130 governments trusted Crypto AG to protect their most secret communications. Every single message was being read by the CIA and German intelligence. </strong>Operation Rubicon was the longest-running espionage operation in history. The CIA secretly bought a Swiss encryption company in 1970, installed backdoors in every device, and sold “secure” communications to governments worldwide. Nobody suspected a thing – until 2020.</p><br><p><strong>Now it’s happening again. But this time, they’re buying your VPN companies. </strong>Kape Technologies – an Israeli company founded by former adware criminals with ties to Unit 8200 (Israel’s NSA) – quietly bought ExpressVPN in 2021. They also own CyberGhost, PIA, and Zenmate. Plus all the VPN “review” sites that conveniently rank their products at the top.</p><br><p><strong>In this episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ul><li>Why Chinese VPNs like Turbo VPN are 51% owned by the Communist Party (and why they target American teenagers on TikTok)</li><li>How Russian VPNs like Kaspersky are legally required to give the FSB access to all your traffic</li><li>Why “free VPNs” turn your computer into a botnet zombie (the Hola VPN scandal)</li><li>What VPNs actually do vs. the anonymity BS they claim in their marketing</li><li>The only 3 VPN companies that pass the trust sniff test: ProtonVPN, Mullvad, and NordVPN</li></ul><p><br></p><p><strong>A VPN does not equal automatic privacy.</strong>&nbsp;It’s outsourcing trust from one party to another. If you take trust from your ISP and give it to a malicious actor, you’re worse off than having no VPN at all.</p><br><p><strong>Free VPNs make YOU the product.</strong>&nbsp;Israeli companies inject adware. Chinese companies feed data to the CCP. Russian companies hand everything to the FSB.</p><br><p><strong>Check who owns the VPN – not just where the servers are located.</strong>&nbsp;Because if the CIA launched a VPN service promising “guaranteed privacy,” they’d sell exactly zero subscriptions. So why trust companies with the same intelligence agency connections?</p><br><p><strong>Your privacy is your responsibility. Do your due diligence or accept the consequences.</strong>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Your Android Phone Is Volunteering You for Mass Surveillance: The Graphene OS OPSEC Fix</title>
			<itunes:title>Your Android Phone Is Volunteering You for Mass Surveillance: The Graphene OS OPSEC Fix</itunes:title>
			<pubDate>Mon, 06 Oct 2025 15:50:00 GMT</pubDate>
			<itunes:duration>38:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/68e3c6992298c9c49d21d91a/media.mp3" length="201596486" type="audio/mpeg"/>
			<guid isPermaLink="false">68e3c6992298c9c49d21d91a</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>68e3c6992298c9c49d21d91a</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>your-android-phone-is-volunteering-you-for-mass-surveillance</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fhqYdRqrvGtLVxH7dR094PAlGo+QWcWP//IyDUKX6PZhaP4yHDiqXF5UkmLgzE+2pynlBJyjzk8YtiPrt3QPFcE/AbeQayXt3BwM0VvGCTHRrQEJm51Tgwr6/U3qvaFx29BzIiq8rKR2UHZBDadm8X/59u12OuCXxnJLLC4wn2JmR7itBsMJTABTZUrKl/a7Lbc9/l0b9LitACE/dL4oRThqrJyyFBf1sZh/zQmAOcysR+uQQNxTPoQ/qjHdCHhEkZyzrmZT6u+++opc0ykgyVfbmllbd0ZQ0ra4/ZG71hHdpaDIa9GzxUomlQ0a+O8NFmJCxveHpNDU5SQMd3F1HXwA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1759757303552-ee342a1f-aa79-4e36-ab59-2872528f3755.jpeg"/>
			<description><![CDATA[<p>Courts can’t agree if geofence warrants are constitutional – but law enforcement is using them anyway. Your phone is volunteering you for mass surveillance operations right now.</p><br><p>In 2024, one court declared geofence warrants “categorically unconstitutional” mass surveillance. Another court said they’re perfectly legal. When the law can’t agree on what’s legal, you need to take matters into your own hands.</p><br><p>Google Play Services is spyware. It takes over your Android device, harvests all your data, and hands it to law enforcement in dragnet operations. The January 6th investigation proudly used geofencing to track everyone in the area – including innocent bystanders caught in the dragnet who had to defend themselves against crimes they didn’t commit.</p><br><p>In this episode of The OPSEC Podcast, you’ll discover:</p><br><p>•Why GrapheneOS is now 90-95% functional as a daily driver (the excuses are dead)</p><p>•How sandboxed Google Play Services gives you control without sacrificing functionality</p><p>•The Aurora Store’s tracker-counting feature that exposes which apps are spying on you</p><p>•Why airplane mode on stock Android doesn’t actually turn off your cell tower beacon</p><p>•The two-factor screen lock that stops you from checking texts while driving (inconvenience as a feature)</p><br><p>If you don’t volunteer the information, they have no right to use it. Stock Android and iOS are designed to make you volunteer everything – your location, your patterns, your entire digital life.</p><br><p>GrapheneOS gives you back control. The flashing process is now stupidly simple. The functionality is there. The only sacrifice is convenience – and convenience is a trap.</p><p>Take the leadership role with your family. Build devices for your parents like Alan did. Show them the small differences. Be their tech support. Your care for their privacy is leadership in action.</p><br><p>Remember: Your privacy is your responsibility. Your vulnerabilities are on you too.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Courts can’t agree if geofence warrants are constitutional – but law enforcement is using them anyway. Your phone is volunteering you for mass surveillance operations right now.</p><br><p>In 2024, one court declared geofence warrants “categorically unconstitutional” mass surveillance. Another court said they’re perfectly legal. When the law can’t agree on what’s legal, you need to take matters into your own hands.</p><br><p>Google Play Services is spyware. It takes over your Android device, harvests all your data, and hands it to law enforcement in dragnet operations. The January 6th investigation proudly used geofencing to track everyone in the area – including innocent bystanders caught in the dragnet who had to defend themselves against crimes they didn’t commit.</p><br><p>In this episode of The OPSEC Podcast, you’ll discover:</p><br><p>•Why GrapheneOS is now 90-95% functional as a daily driver (the excuses are dead)</p><p>•How sandboxed Google Play Services gives you control without sacrificing functionality</p><p>•The Aurora Store’s tracker-counting feature that exposes which apps are spying on you</p><p>•Why airplane mode on stock Android doesn’t actually turn off your cell tower beacon</p><p>•The two-factor screen lock that stops you from checking texts while driving (inconvenience as a feature)</p><br><p>If you don’t volunteer the information, they have no right to use it. Stock Android and iOS are designed to make you volunteer everything – your location, your patterns, your entire digital life.</p><br><p>GrapheneOS gives you back control. The flashing process is now stupidly simple. The functionality is there. The only sacrifice is convenience – and convenience is a trap.</p><p>Take the leadership role with your family. Build devices for your parents like Alan did. Show them the small differences. Be their tech support. Your care for their privacy is leadership in action.</p><br><p>Remember: Your privacy is your responsibility. Your vulnerabilities are on you too.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>From Ukraine War Zones to Your Pocket: Why Signature Reduction Could Save Your Life</title>
			<itunes:title>From Ukraine War Zones to Your Pocket: Why Signature Reduction Could Save Your Life</itunes:title>
			<pubDate>Mon, 22 Sep 2025 15:50:00 GMT</pubDate>
			<itunes:duration>27:31</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/68d13c63203f72ea574c0853/media.mp3" length="211362452" type="audio/mpeg"/>
			<guid isPermaLink="false">68d13c63203f72ea574c0853</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>68d13c63203f72ea574c0853</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>from-ukraine-war-zones-to-your-pocket-why-signature-reductio</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdz24EZ+6VQVOVqQ5kRol0mD/BwIWOnm+bDodkdQCdNfRqdNndLCJo3xNtXWGhPwgFjfJURBkG6JdqrVwfogGXcN0NLEzYLztfLZ/MztN/HwVO374I5xI+1CHOjBqt6l0E57brNs+u6sF2YyuwWWV0gT5pLkjM2Q36kTXbTHWcKrY7lCvTsMV/p9SREktScgRsAtErO0R+CnpORSNM44UFOupC0HKLvYphpcB7KoqIaZGlCQfu3ygilF453u+23tfsoJb2gz6oEUy8ZJ5ErUBcU67bsjRBqoXIGhDX0I2W7gdfbQH9rk++xSZobaHd/izLWi/sZ1fVYsYRj9AUSGhCM]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1758542803579-43026bb7-1b80-4a89-a307-3720d24f70f4.jpeg"/>
			<description><![CDATA[<p><strong>Russian soldiers are dying because stolen Ukrainian iPhones are broadcasting their every move. Your phone is doing the same thing to you right now.</strong></p><p>In the Russia-Ukraine conflict, troops are being hunted down through cell phone signatures. One Ukrainian soldier used Apple’s “Find My Device” to track Russian forces who stole his iPhone and earbuds. They thought they got free electronics – instead, they got a death sentence.</p><br><p><strong>Your daily life is no different.</strong>&nbsp;Every app, every search, every conversation near your phone creates a signature that’s being collected, analysed, and monetised.<strong>In this episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ul><li>Why the CIA calls your smartphone “the single best spying device ever invented”</li><li>The 10-step signature reduction (SIGRED) strategy used by offensive cyber operations</li><li>How your car’s “emergency service” is actually a location beacon you can’t control</li><li>Why those “coincidental” ads after private conversations aren’t coincidences at all</li><li>The metadata in your photos reveals everything about your life and location</li></ul><p><br></p><p><strong>You’re walking around with multiple tracking beacons in your pocket every single day.</strong>&nbsp;Your advertisement ID, GPS location, Wi-Fi connections, and app installations – they all create a signature that follows you everywhere.</p><br><p><strong>Convenience breeds weakness.</strong>&nbsp;Every easy login, every auto-connect, every smart device is another way for adversaries to track your patterns and predict your behaviour.</p><br><p><strong>The same signature reduction tactics that keep special forces alive can keep you invisible online. </strong>Stop broadcasting your life to corporate surveillance networks. Your signature is your vulnerability – and reducing it is your responsibility.&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Russian soldiers are dying because stolen Ukrainian iPhones are broadcasting their every move. Your phone is doing the same thing to you right now.</strong></p><p>In the Russia-Ukraine conflict, troops are being hunted down through cell phone signatures. One Ukrainian soldier used Apple’s “Find My Device” to track Russian forces who stole his iPhone and earbuds. They thought they got free electronics – instead, they got a death sentence.</p><br><p><strong>Your daily life is no different.</strong>&nbsp;Every app, every search, every conversation near your phone creates a signature that’s being collected, analysed, and monetised.<strong>In this episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ul><li>Why the CIA calls your smartphone “the single best spying device ever invented”</li><li>The 10-step signature reduction (SIGRED) strategy used by offensive cyber operations</li><li>How your car’s “emergency service” is actually a location beacon you can’t control</li><li>Why those “coincidental” ads after private conversations aren’t coincidences at all</li><li>The metadata in your photos reveals everything about your life and location</li></ul><p><br></p><p><strong>You’re walking around with multiple tracking beacons in your pocket every single day.</strong>&nbsp;Your advertisement ID, GPS location, Wi-Fi connections, and app installations – they all create a signature that follows you everywhere.</p><br><p><strong>Convenience breeds weakness.</strong>&nbsp;Every easy login, every auto-connect, every smart device is another way for adversaries to track your patterns and predict your behaviour.</p><br><p><strong>The same signature reduction tactics that keep special forces alive can keep you invisible online. </strong>Stop broadcasting your life to corporate surveillance networks. Your signature is your vulnerability – and reducing it is your responsibility.&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The OPSEC Alias Playbook: Why Your Real Identity Should Never Touch the Internet</title>
			<itunes:title>The OPSEC Alias Playbook: Why Your Real Identity Should Never Touch the Internet</itunes:title>
			<pubDate>Mon, 08 Sep 2025 16:01:22 GMT</pubDate>
			<itunes:duration>24:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/68beaf7066b565a1a26b6125/media.mp3" length="189871186" type="audio/mpeg"/>
			<guid isPermaLink="false">68beaf7066b565a1a26b6125</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>68beaf7066b565a1a26b6125</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>the-opsec-alias-playbook-why-your-real-identity-should-never</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdFJveFG8lLgAt4WRYRammg+6yiAqm+sm/z+yGejrQzAcnCUY4+cyfG7xyjT91xdAVnQwbRgCJM7VZKPGCzD3DwcrmaWxPBwzrC82AyM3eX1pBEAQv4lDNvpERcBk3euEzs0WjUu3/6QefXqL7RT5rQXyiKAHU68rUirNLZHGvoVQJ2hDNLNU2RdTxiqLm1HP4+ysJ82xhQJWcxb7b/pODNyT1YNQP3g0/ElunIj0dgmIfRbtKbPkw7hxCrbTfIM3sJzAzKkV/Fmk8BCdzEo8a4ZCT1+5I++JFD7b7xR9Gynf00ljOWngVocWXpAZJlj/5A/vVrglhU+/1CyowDiZB6]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1757327140738-1c7e9efe-f9f6-4e02-9796-c12534a5a568.jpeg"/>
			<description><![CDATA[<p><strong>Every time you use your real name online, you’re volunteering to be tracked, profiled, and monetized. You never agreed to this system, but you’re trapped in it anyway.</strong></p><br><p>Companies have created fake rules that 99% of people would reject on a fundamental level: surrender all your personal data or you can’t use our services. But here’s the truth – unless there’s a legal requirement, they don’t need your real information.</p><br><p><strong>In this episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ol><li>How to build bulletproof online personas that can’t be traced back to you</li><li>The 3-4 alias categories that cover all your digital needs (and keep you organized)</li><li>Why VoIP numbers and masked credit cards are your new best friends</li><li>How data breaches become learning opportunities instead of disasters</li><li>The alias isolation techniques that prevent cross-contamination between identities</li></ol><p><br></p><p><strong>Your convenience is their profit. </strong>Every newsletter signup, fitness tracker, and social media account is feeding a massive surveillance machine designed to strip away your privacy.</p><br><p><strong>Companies monetize your data as the default standard – so make up your own rules. </strong>Use AI-generated profiles, government building addresses, and public holiday birthdays. Get creative, have fun, and watch corporate data collectors lose your trail completely.</p><br><p><strong>Remember: We never subscribed to this system where we default give all our data to these companies.</strong></p><br><p><em>It’s time to go against the grain. Your privacy is your responsibility – and your aliases are your armor.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Every time you use your real name online, you’re volunteering to be tracked, profiled, and monetized. You never agreed to this system, but you’re trapped in it anyway.</strong></p><br><p>Companies have created fake rules that 99% of people would reject on a fundamental level: surrender all your personal data or you can’t use our services. But here’s the truth – unless there’s a legal requirement, they don’t need your real information.</p><br><p><strong>In this episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ol><li>How to build bulletproof online personas that can’t be traced back to you</li><li>The 3-4 alias categories that cover all your digital needs (and keep you organized)</li><li>Why VoIP numbers and masked credit cards are your new best friends</li><li>How data breaches become learning opportunities instead of disasters</li><li>The alias isolation techniques that prevent cross-contamination between identities</li></ol><p><br></p><p><strong>Your convenience is their profit. </strong>Every newsletter signup, fitness tracker, and social media account is feeding a massive surveillance machine designed to strip away your privacy.</p><br><p><strong>Companies monetize your data as the default standard – so make up your own rules. </strong>Use AI-generated profiles, government building addresses, and public holiday birthdays. Get creative, have fun, and watch corporate data collectors lose your trail completely.</p><br><p><strong>Remember: We never subscribed to this system where we default give all our data to these companies.</strong></p><br><p><em>It’s time to go against the grain. Your privacy is your responsibility – and your aliases are your armor.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>$12.5 Billion Stolen in 2024: The 5-Layer OPSEC Strategy That Could Save Your Bank Account</title>
			<itunes:title>$12.5 Billion Stolen in 2024: The 5-Layer OPSEC Strategy That Could Save Your Bank Account</itunes:title>
			<pubDate>Mon, 25 Aug 2025 15:45:00 GMT</pubDate>
			<itunes:duration>41:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/68ac3ff0e2f63983a7996c05/media.mp3" length="439052786" type="audio/mpeg"/>
			<guid isPermaLink="false">68ac3ff0e2f63983a7996c05</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>68ac3ff0e2f63983a7996c05</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>125-billion-stolen-in-2024-the-5-layer-opsec-strategy-that-c</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdgNzJIpNJXnw506C5ycH1R6tLC1NL+PTunLgoCAI0yN0bY709yTb1HY+S2ppUuyYUdl7HYMs0aLkbtrnQsZErqzCAAXYWlFkFYO13VYBpec9/N0g5LWN4cmTP2mqbaEFDmuJL8R9gfzhHyIH9FEiQ37s+hAFYTOQokO2xmfIzWiC4F0f3xwr2/EXJLc1lL2j6n3Yf6i8dZHx05fy672FNX5zhaVE6nBLJ+73XR6Zj620dkSSeifB4EVgiKzU4NxWc97HkFkzg4HndiU9O2b+Flwfqt0zTv+MGOLebWTNEGTYH5Rb+xOi1VyOlEIRCI/gyuVJhtNqFYZY0LTr+KW8k8]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1756118836775-473da919-68a3-4c34-8a1f-e3598db678da.jpeg"/>
			<description><![CDATA[<p><strong>In 2024, Americans lost $12.5 billion to financial fraud – a staggering 25% increase from the previous year. Your bank account structure is making you a target.</strong></p><br><p>Most people make the same fatal mistake: they use one checking account for everything. Income flows in, bills flow out, debit cards get compromised, and criminals drain everything while you sleep.</p><br><p><strong>In this deep-dive episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ul><li>Why your “monolith” bank account is a single point of catastrophic failure</li><li>The 5-step OPSEC process applied specifically to your financial accounts</li><li>The “Onion Strategy” – a 5-layer financial structure that isolates and protects your money</li><li>How&nbsp;<a href="http://privacy.com/" rel="noopener noreferrer" target="_blank">Privacy.com</a>&nbsp;masked credit cards give you complete control over every purchase</li><li>Why debit cards should never touch the internet (and what to use instead)</li><li>The non-negotiable multi-factor authentication rules for anything touching money</li></ul><p><br></p><p><strong>Your current bank setup is probably wrong.</strong>&nbsp;One compromised account shouldn’t wipe out your entire financial life, but for most people, that’s exactly what happens.</p><br><p><strong>The criminals are getting smarter, the losses are getting bigger, and nobody’s coming to save you.</strong></p><br><p>Learn the same financial OPSEC strategies that protect intelligence professionals and high-value targets. Because in 2025, everyone with money&nbsp;<em>is</em>&nbsp;a high-value target.</p><br><p><strong>Stop being low-hanging fruit. Your financial survival depends on it.</strong></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>In 2024, Americans lost $12.5 billion to financial fraud – a staggering 25% increase from the previous year. Your bank account structure is making you a target.</strong></p><br><p>Most people make the same fatal mistake: they use one checking account for everything. Income flows in, bills flow out, debit cards get compromised, and criminals drain everything while you sleep.</p><br><p><strong>In this deep-dive episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ul><li>Why your “monolith” bank account is a single point of catastrophic failure</li><li>The 5-step OPSEC process applied specifically to your financial accounts</li><li>The “Onion Strategy” – a 5-layer financial structure that isolates and protects your money</li><li>How&nbsp;<a href="http://privacy.com/" rel="noopener noreferrer" target="_blank">Privacy.com</a>&nbsp;masked credit cards give you complete control over every purchase</li><li>Why debit cards should never touch the internet (and what to use instead)</li><li>The non-negotiable multi-factor authentication rules for anything touching money</li></ul><p><br></p><p><strong>Your current bank setup is probably wrong.</strong>&nbsp;One compromised account shouldn’t wipe out your entire financial life, but for most people, that’s exactly what happens.</p><br><p><strong>The criminals are getting smarter, the losses are getting bigger, and nobody’s coming to save you.</strong></p><br><p>Learn the same financial OPSEC strategies that protect intelligence professionals and high-value targets. Because in 2025, everyone with money&nbsp;<em>is</em>&nbsp;a high-value target.</p><br><p><strong>Stop being low-hanging fruit. Your financial survival depends on it.</strong></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>How Soldiers’ Workout Data Exposed CIA Black Sites (Your OPSEC Wake-Up Call) </title>
			<itunes:title>How Soldiers’ Workout Data Exposed CIA Black Sites (Your OPSEC Wake-Up Call) </itunes:title>
			<pubDate>Mon, 11 Aug 2025 16:05:21 GMT</pubDate>
			<itunes:duration>17:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/689a14c12dbca7f6698cb293/media.mp3" length="400505056" type="audio/mpeg"/>
			<guid isPermaLink="false">689a14c12dbca7f6698cb293</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>689a14c12dbca7f6698cb293</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>how-soldiers-workout-data-exposed-cia-black-sites-opsec</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdvb1KIRL4g/QRpTt/DgBA0jfBFejbzas7uR8+7d12oVDbxRc9GsKIY8OK18Q8r1lbexwQf5EdBy4Q+SnbKnX4dyEVQV5FXs3Fwa3Yit2AULXwyPFv9DLLmycMUTPmO7SzfmGTNH56kCTOVhry67K+9YVht3SuxfuOEzTefN9ouNII8tfGDoVAn34qKSolmk6N0mUzJgrDM39uAGlg2y+FX4VE4KOjpvrQ1H/zewEEIzMKuX77ge73Icxq/CpV7mSgQzzM7tVDTIyHlS2xaIC3o]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1754928230509-35eb65a5-f6cc-43e1-ac81-8377c67f960e.jpeg"/>
			<description><![CDATA[<p><strong>In 2018, a fitness app accidentally exposed secret CIA black sites, military bases, and soldier patrol routes to enemy forces worldwide. </strong>Strava’s “harmless” heat map revealed 3 trillion GPS data points, lighting up covert locations in Afghanistan, Syria, and Africa like Christmas trees. Soldiers had unknowingly painted targets on their own backs, just by logging their daily runs. <strong>In this episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ul><li>How fitness trackers turned into enemy intelligence goldmines (the military scrambled to fix this OPSEC disaster)</li><li>The 5-step OPSEC process born from Vietnam War failures that could protect you today</li><li>Why your 5 AM run routine makes you vulnerable to stalkers, thieves, and worse</li><li>The “nobody’s coming to save you” reality of digital privacy (hint: it’s all on you)</li><li>Simple countermeasures that take 5 minutes but could save you thousands</li></ul><p><br></p><p><strong>Your smartphone is tracking your every move.</strong>&nbsp;Your fitness apps know when you’re home alone. Your daily routines are being sold to data brokers right now. The<strong> same OPSEC failures that exposed military secrets are happening in your pocket every day. </strong>Don’t let your morning workout become someone else’s intelligence operation. Your patterns are being watched – make sure you’re the one in control.</p><br><p><strong>Remember: Just because you’re paranoid doesn’t mean they’re not after you.</strong>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>In 2018, a fitness app accidentally exposed secret CIA black sites, military bases, and soldier patrol routes to enemy forces worldwide. </strong>Strava’s “harmless” heat map revealed 3 trillion GPS data points, lighting up covert locations in Afghanistan, Syria, and Africa like Christmas trees. Soldiers had unknowingly painted targets on their own backs, just by logging their daily runs. <strong>In this episode of The OPSEC Podcast, you’ll discover:</strong></p><p><br></p><ul><li>How fitness trackers turned into enemy intelligence goldmines (the military scrambled to fix this OPSEC disaster)</li><li>The 5-step OPSEC process born from Vietnam War failures that could protect you today</li><li>Why your 5 AM run routine makes you vulnerable to stalkers, thieves, and worse</li><li>The “nobody’s coming to save you” reality of digital privacy (hint: it’s all on you)</li><li>Simple countermeasures that take 5 minutes but could save you thousands</li></ul><p><br></p><p><strong>Your smartphone is tracking your every move.</strong>&nbsp;Your fitness apps know when you’re home alone. Your daily routines are being sold to data brokers right now. The<strong> same OPSEC failures that exposed military secrets are happening in your pocket every day. </strong>Don’t let your morning workout become someone else’s intelligence operation. Your patterns are being watched – make sure you’re the one in control.</p><br><p><strong>Remember: Just because you’re paranoid doesn’t mean they’re not after you.</strong>&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>OPSEC 101: The True Cost of Digital Carelessness</title>
			<itunes:title>OPSEC 101: The True Cost of Digital Carelessness</itunes:title>
			<pubDate>Mon, 28 Jul 2025 16:00:00 GMT</pubDate>
			<itunes:duration>17:15</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/68871c0a2a38d6f5cb5925b7/e/688780456ba6bf2e176654c8/media.mp3" length="397466320" type="audio/mpeg"/>
			<guid isPermaLink="false">688780456ba6bf2e176654c8</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://opsecpodcast.com/</link>
			<acast:episodeId>688780456ba6bf2e176654c8</acast:episodeId>
			<acast:showId>68871c0a2a38d6f5cb5925b7</acast:showId>
			<acast:episodeUrl>opsec-101-the-true-cost-of-digital-carelessness</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCfSUF/t/07ZQlexToe4RuZXaO1u+Vt/y2Osg4hNIasj+1DjRVULizAyksTyJz+p00FBxQT+Mr/dL0gpYS8ZaA5YSs1OuNKsV79A0e+uHBpYgDjmKlGoAwFCQcscs6OEpw/Zx56W5bvQQCe/R4lwGqk9oicB+Tg1HDmtH4mEOHMlyC8578TloJDDOs7hT2l+hPXTNbct10FNvxY0s+A6Dr+O5rrQw8PnbjBzIu7OO5DJ1Rd+wtj0Jeo6SSuu0Sqxz+yIpugbdoWyQAVdmna8rXDOcWNrmRMoUSzE+G1cVJyInA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/68871c0a2a38d6f5cb5925b7/1753710617476-615c5e4b-6367-47e5-8d26-c24d9a83f428.jpeg"/>
			<description><![CDATA[<p><strong>Meet Alex – a regular guy who lost everything because of one social media post and zero OPSEC.</strong></p><p>While Alex slept peacefully, a hacker drained his bank accounts, stole his identity, and destroyed his digital life. His crime? Posting a photo of his new iPhone at the Verizon store.</p><br><p><strong>In this inaugural episode of The OPSEC Podcast, you’ll discover:</strong></p><ul><li>The exact 20-minute process hackers use to destroy lives (Alex’s story will shock you)</li><li>The “3 P’s of Privacy” OPSEC framework that could have saved Alex thousands of dollars and months of agony</li><li>Why your smartphone is actually a “sensor suite designed to spy on you”</li><li>The 5-step OPSEC process intelligence professionals use to stay invisible</li><li>Simple OPSEC identity management techniques that make you a “ghost” to bad actors</li></ul><p><br></p><p><strong>Your privacy is under constant attack.</strong>&nbsp;Every app, every smart device, every social media post creates digital breadcrumbs that criminals follow straight to your bank account.</p><br><p><strong>The good news?</strong>&nbsp;The same OPSEC techniques that protect CIA operatives can protect you too. Don’t become the next Alex. Your digital life depends on it.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p><strong>Meet Alex – a regular guy who lost everything because of one social media post and zero OPSEC.</strong></p><p>While Alex slept peacefully, a hacker drained his bank accounts, stole his identity, and destroyed his digital life. His crime? Posting a photo of his new iPhone at the Verizon store.</p><br><p><strong>In this inaugural episode of The OPSEC Podcast, you’ll discover:</strong></p><ul><li>The exact 20-minute process hackers use to destroy lives (Alex’s story will shock you)</li><li>The “3 P’s of Privacy” OPSEC framework that could have saved Alex thousands of dollars and months of agony</li><li>Why your smartphone is actually a “sensor suite designed to spy on you”</li><li>The 5-step OPSEC process intelligence professionals use to stay invisible</li><li>Simple OPSEC identity management techniques that make you a “ghost” to bad actors</li></ul><p><br></p><p><strong>Your privacy is under constant attack.</strong>&nbsp;Every app, every smart device, every social media post creates digital breadcrumbs that criminals follow straight to your bank account.</p><br><p><strong>The good news?</strong>&nbsp;The same OPSEC techniques that protect CIA operatives can protect you too. Don’t become the next Alex. Your digital life depends on it.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<itunes:category text="Education">
			<itunes:category text="How To"/>
		</itunes:category>
		<itunes:category text="Education">
			<itunes:category text="Self-Improvement"/>
		</itunes:category>
    	<itunes:category text="Technology"/>
    </channel>
</rss>
