The OPSEC Podcast
Episodes
COVERT Protocol Action #5: Audit Your Social Media Accounts
09 Mar 2026
Contributed by Lukas
Audit your social-media exposure, review all your public or private social-media accounts and online profiles; check what personal information (photos...
Covert Protocol #4: Harden your Communications and Services
23 Feb 2026
Contributed by Lukas
Strengthen the security and privacy of your digital communications (messaging, email, cloud data) so that only intended recipients can access them and...
Covert Protocol #3: Implement Multi-Factor Authentication whenever possible
09 Feb 2026
Contributed by Lukas
Implement multi-factor authentication (MFA) on every account, using the strongest method available with a graduated approach:1. Audit all important ac...
C.O.V.E.R.T Protocol Action #2: Audit and Secure Your Financial Accounts
26 Jan 2026
Contributed by Lukas
Your money is one of the most targeted assets you own, and one of the easiest to compromise if left unattended. Modern financial attacks start with re...
C.O.V.E.R.T Protocol Action #1: Implement a Password Manger
12 Jan 2026
Contributed by Lukas
Allen Pace presents the Covert Protocol, a structured methodology that will combine through different episodes the OPSEC Podcast principles with the C...
Walmart to WhatsApp: The Hidden Systems Mapping Your Behaviour
08 Dec 2025
Contributed by Lukas
For the past decade, people have underestimated the most powerful surveillance system ever built, not by intelligence agencies, but by corporations. E...
Faraday Shielding: The Counter-Surveillance Tool For Family Holidays and Everyday Carry
17 Nov 2025
Contributed by Lukas
For more than a decade, intelligence agencies, data brokers, and criminal syndicates have quietly relied on the same vulnerability: your wireless sign...
Masked Payment Cards: Operational Tradecraft for Protecting Financial Footprints
03 Nov 2025
Contributed by Lukas
From an operational-security perspective, financial metadata is one of the most actionable intelligence vectors available to adversaries and fraudster...
How the CIA Owned an Encryption Company for 50 Years (And Why Your VPN Might Be Next)
20 Oct 2025
Contributed by Lukas
For 50 years, 130 governments trusted Crypto AG to protect their most secret communications. Every single message was being read by the CIA and German...
Your Android Phone Is Volunteering You for Mass Surveillance: The Graphene OS OPSEC Fix
06 Oct 2025
Contributed by Lukas
Courts can’t agree if geofence warrants are constitutional – but law enforcement is using them anyway. Your phone is volunteering you for mass sur...
From Ukraine War Zones to Your Pocket: Why Signature Reduction Could Save Your Life
22 Sep 2025
Contributed by Lukas
Russian soldiers are dying because stolen Ukrainian iPhones are broadcasting their every move. Your phone is doing the same thing to you right now.In ...
The OPSEC Alias Playbook: Why Your Real Identity Should Never Touch the Internet
08 Sep 2025
Contributed by Lukas
Every time you use your real name online, you’re volunteering to be tracked, profiled, and monetized. You never agreed to this system, but you’re ...
$12.5 Billion Stolen in 2024: The 5-Layer OPSEC Strategy That Could Save Your Bank Account
25 Aug 2025
Contributed by Lukas
In 2024, Americans lost $12.5 billion to financial fraud – a staggering 25% increase from the previous year. Your bank account structure is making y...
How Soldiers’ Workout Data Exposed CIA Black Sites (Your OPSEC Wake-Up Call)
11 Aug 2025
Contributed by Lukas
In 2018, a fitness app accidentally exposed secret CIA black sites, military bases, and soldier patrol routes to enemy forces worldwide. Strava’s “...
OPSEC 101: The True Cost of Digital Carelessness
28 Jul 2025
Contributed by Lukas
Meet Alex – a regular guy who lost everything because of one social media post and zero OPSEC.While Alex slept peacefully, a hacker drained his bank...