Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The OPSEC Podcast

Technology Education

Activity Overview

Episode publication activity over the past year

Episodes

COVERT Protocol Action #5: Audit Your Social Media Accounts

09 Mar 2026

Contributed by Lukas

Audit your social-media exposure, review all your public or private social-media accounts and online profiles; check what personal information (photos...

Covert Protocol #4: Harden your Communications and Services

23 Feb 2026

Contributed by Lukas

Strengthen the security and privacy of your digital communications (messaging, email, cloud data) so that only intended recipients can access them and...

Covert Protocol #3: Implement Multi-Factor Authentication whenever possible

09 Feb 2026

Contributed by Lukas

Implement multi-factor authentication (MFA) on every account, using the strongest method available with a graduated approach:1. Audit all important ac...

C.O.V.E.R.T Protocol Action #2: Audit and Secure Your Financial Accounts

26 Jan 2026

Contributed by Lukas

Your money is one of the most targeted assets you own, and one of the easiest to compromise if left unattended. Modern financial attacks start with re...

C.O.V.E.R.T Protocol Action #1: Implement a Password Manger

12 Jan 2026

Contributed by Lukas

Allen Pace presents the Covert Protocol, a structured methodology that will combine through different episodes the OPSEC Podcast principles with the C...

Walmart to WhatsApp: The Hidden Systems Mapping Your Behaviour

08 Dec 2025

Contributed by Lukas

For the past decade, people have underestimated the most powerful surveillance system ever built, not by intelligence agencies, but by corporations. E...

Faraday Shielding: The Counter-Surveillance Tool For Family Holidays and Everyday Carry

17 Nov 2025

Contributed by Lukas

For more than a decade, intelligence agencies, data brokers, and criminal syndicates have quietly relied on the same vulnerability: your wireless sign...

Masked Payment Cards: Operational Tradecraft for Protecting Financial Footprints

03 Nov 2025

Contributed by Lukas

From an operational-security perspective, financial metadata is one of the most actionable intelligence vectors available to adversaries and fraudster...

How the CIA Owned an Encryption Company for 50 Years (And Why Your VPN Might Be Next)

20 Oct 2025

Contributed by Lukas

For 50 years, 130 governments trusted Crypto AG to protect their most secret communications. Every single message was being read by the CIA and German...

Your Android Phone Is Volunteering You for Mass Surveillance: The Graphene OS OPSEC Fix

06 Oct 2025

Contributed by Lukas

Courts can’t agree if geofence warrants are constitutional – but law enforcement is using them anyway. Your phone is volunteering you for mass sur...

From Ukraine War Zones to Your Pocket: Why Signature Reduction Could Save Your Life

22 Sep 2025

Contributed by Lukas

Russian soldiers are dying because stolen Ukrainian iPhones are broadcasting their every move. Your phone is doing the same thing to you right now.In ...

The OPSEC Alias Playbook: Why Your Real Identity Should Never Touch the Internet

08 Sep 2025

Contributed by Lukas

Every time you use your real name online, you’re volunteering to be tracked, profiled, and monetized. You never agreed to this system, but you’re ...

$12.5 Billion Stolen in 2024: The 5-Layer OPSEC Strategy That Could Save Your Bank Account

25 Aug 2025

Contributed by Lukas

In 2024, Americans lost $12.5 billion to financial fraud – a staggering 25% increase from the previous year. Your bank account structure is making y...

How Soldiers’ Workout Data Exposed CIA Black Sites (Your OPSEC Wake-Up Call)

11 Aug 2025

Contributed by Lukas

In 2018, a fitness app accidentally exposed secret CIA black sites, military bases, and soldier patrol routes to enemy forces worldwide. Strava’s “...

OPSEC 101: The True Cost of Digital Carelessness

28 Jul 2025

Contributed by Lukas

Meet Alex – a regular guy who lost everything because of one social media post and zero OPSEC.While Alex slept peacefully, a hacker drained his bank...