
NeedleStack
The OSINT podcast
Authentic8
Show overview
NeedleStack has been publishing since 2022, and across the 4 years since has built a catalogue of 103 episodes, alongside 1 trailer or bonus episode. That works out to roughly 50 hours of audio in total. Releases follow a fortnightly cadence, with the show now in its 30th season.
Episodes typically run twenty to thirty-five minutes — most land between 20 min and 38 min — though episode length varies meaningfully from one episode to the next. None of the episodes are flagged explicit by the publisher. It is catalogued as a EN-language Technology show.
The show is actively publishing — the most recent episode landed 2 months ago, with 6 episodes already out so far this year. The busiest year was 2022, with 35 episodes published. Published by Authentic8.
From the publisher
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
Latest Episodes
View all 103 episodes
Ep 102Alligator in the Boat
Integrating security into our daily lives can feel overwhelming. From password management to encryption, it’s easy to feel frustrated. Robert Vamosi and AJ Nash share our experiences navigating security in our personal and professional lives. They discuss practical strategies like how to choose your seat in a restaurant for safety and the importance of encryption. Remember, security isn’t just a job; it’s a lifestyle. Finding the right balance is key, and it’s okay to have slip-ups along the way.

Ep 101Navigating the Ransomware Negotiation
In this episode, hosts Robert Vamosi and AJ Nash engage with cybersecurity expert John DiMaggio to explore the complexities of ransomware negotiation. They discuss the process of responding to ransomware attacks, the stakeholders involved, and the legal and ethical considerations that companies face when deciding whether to pay a ransom. The conversation delves into the tactics used by ransomware groups, the importance of understanding target selection, and the role of insurance in these scenarios. Additionally, they highlight the need for standards in negotiation practices and preventative measures that organizations can take to mitigate risks. The episode concludes with a discussion on the future of ransomware negotiation and the importance of having knowledgeable advisors in the field.

Ep 100Best Practices For Open-Source Investigations
In this special 100th episode of Needlestack, hosts Robert Vamosi and AJ Nash celebrate the milestone with former NeedleStack host, Matt Ashburn, discussing the evolution and importance of OSINT. They dive into best practices, the risks of normalized habits, and the significance of isolation in investigations. The conversation highlights the behavioral attributes that can identify investigators, the challenges of new generations in the field, and the need for accountability and reputation in intelligence work. They also explore the role of technology, the importance of first-hand access, and the balance between timeliness and accuracy in intelligence reporting.

Ep 99Exploring the Dark Web: Myths and Realities
NeedleStack hosts, AJ Nash and Robert Vamosi engage with Roman Sannikov a seasoned expert in cyber threat intelligence, to explore the complexities of the dark web. The conversation delves into the myths surrounding the dark web, the community dynamics within cybercrime, and the professionalization of criminal enterprises. Roman shares insights on how trust and reputation are managed in these underground communities, the barriers to entry for new members, and the human element that often gets overlooked in discussions about cybercriminals.

Ep 98Navigating China's Strategic Landscape
In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with John Costello, a director at WireScreen, to discuss the complexities of China's strategic competition with the United States. The conversation covers China's technological advancements, the implications of its five-year plans, challenges in intelligence gathering, and the dynamics of military-civil fusion. The discussion also touches on the importance of due diligence for businesses engaging with Chinese companies and the role of Chinese students in U.S. education.

Ep 97Is Mass Surveillance Helping or Hindering Intelligence?
In this episode, the hosts discuss the implications of surveillance technology and AI on intelligence, journalism, and civil liberties. They explore the dual nature of surveillance as both a tool for security and a potential threat to privacy. The conversation delves into the challenges posed by misinformation, the importance of expertise in navigating these issues, and the ethical considerations surrounding the use of surveillance technology. The episode concludes with reflections on the future of journalism and the role of AI in shaping public perception and trust.

Ep 96Mastering the Art of Disappearing Online
In this episode of Needlestack, hosts AJ Nash and Robert Vamosi delve into the complexities of disappearing online, drawing insights from their experiences and the book 'The Art of Invisibility' by Kevin Mitnick. They discuss practical steps for maintaining anonymity, the role of technology in obfuscation, and the challenges of creating and sustaining multiple identities. The conversation also touches on the impact of AI on privacy and the importance of understanding personal risks in a digital world. Through engaging anecdotes and expert insights, the hosts provide a comprehensive overview of the art of invisibility in today's interconnected society.

Ep 95The Rise of Citizen OSINT, and What to Do About It
In this episode, hosts Robert Vamosi and AJ Nash engage with Neil Ysart, a seasoned expert in cyber investigations and open source intelligence (OSINT). They discuss the Coalition of Cyber Investigators, its role in promoting OSINT, and the importance of establishing standards in the field. The conversation delves into the challenges and risks associated with OSINT, emphasizing the need for ethical practices and the potential dangers of unregulated citizen intelligence efforts. The episode concludes with a call to action for listeners to advocate for the development of global standards in OSINT.

Ep 94What is Cyber HUMINT?
In this episode, Michael DeBolt joins Robert Vamosi and AJ Nash to dive into the world of Cyber HUMINT — the application of traditional human intelligence (HUMINT) tradecraft in cyberspace. They discuss how investigators use digital personas (sometimes called “sock puppets”) to infiltrate online threat actor communities, collect intelligence, and even engage adversaries safely. Michael explains how credibility, language, slang, and cultural nuance are essential to blending in, while AJ highlights the risks of untrained amateurs attempting such operations. They explore the art, ethics, and operational security challenges of conducting human intelligence in the digital realm.

Ep 93Dealing with AI Slop in OSINT Investigations
In this episode, AJ Nash and Robert Vamosi discuss the challenges posed by misinformation and the rise of AI-generated content. They explore the evolution of journalism, the impact of social media on information consumption, and the importance of critical thinking and media literacy. The conversation also touches on the role of AI in content creation, the balance between technology and human oversight, and the potential positive aspects of AI technology. Ultimately, they emphasize the need for source verification and the ongoing struggle to navigate the post-truth era.

Ep 92What is GEOINT in OSINT?
In this episode of NeedleStack, hosts AJ Nash and Robert Vamosi engage with James Villenueve, a geospatial intelligence expert, to explore the world of GEOINT and its intersection with open source intelligence (OSINT). They discuss the importance of understanding geospatial data, the ethical implications of its use, and the challenges of protecting personal information in a data-rich environment. The conversation also highlights positive applications of geospatial intelligence, including environmental monitoring and humanitarian efforts, while addressing the risks associated with data misuse and the evolving role of AI in the field.

Ep 91Ransomware’s Collateral Damage
Jason Baker from the Guidepoint Research & Intelligence Team (GRIT) shares his background and provides insights into ransomware attribution, the challenges of defending against ransomware, and the implications of AI in ransomware operations.

Ep 90Identifying fraud in financial services
How can Intelligence benefit financial sectors? It can address challenges like sanctions, data privacy, and cryptocurrency. Teresa Walsh highlights the importance of collaboration, the role of AI in intelligence, and the necessity to professionalize intelligence roles in the private sector. The conversation also delves into building mature and unified intelligence programs, emphasizing the need for a Chief Intelligence Officer role in any organization.

Ep 89Adding Agentic AI to Analysis
Ultimately, GenAI has the potential to create jobs in areas like data science and cybersecurity, but only if it is integrated responsibly. However, the consensus today is that AI should remain a just tool for analysts, not a direct decision-maker, until reliability and trust in its outputs significantly improve.About Brian FullerBrian A. Fuller is Director of Operations for the Ridge College of Intelligence Studies and Applied Sciences at Mercyhurst University, a position he assumed in December 2019. As the Director of Operations, Fuller supports all operations related to the academic curriculum or Ridge College activities. This includes working as the Director for the Center of Intelligence Research, Analysis and Training (CIRAT) and Director of the Innovation Entente Lab (IEL). Previously, he served as a Senior Open Source Intelligence (OSINT) instructor for the Department of the Army’s OSINT Office, where he was charged with overseeing the Army’s OSINT training program for the Midwest and Rocky Mountain regions. He trained Army intelligence professionals at the strategic, tactical, and special operations levels. He managed the training curriculum, personnel, financial, and administrative affairs of the program while participating as a subject matter expert in the intelligence communities’ OSINT program and operational development working groups, ensuring the continued growth of the discipline and associated tradecraft and technologies.

Ep 88Hacker Summer Camp 2025
Robert and AJ went to Hacker Summer Camp. What’s that? It’s a week of conferences such as Black Hat USA, BSidesLV, the Dianna Initiative, Squadcom, and of course DEF CON. Find out what’s relevant for the intelligence community during this first week in August annual event.

Ep 87Intelligence tradecraft in the digital age
From street cop to OSINT expert, Nico Dekens aka “the Dutch OSINT Guy” shares his incredible journey and insights. Discover the evolution of OSINT and the challenges of integrating AI in intelligence collection and analysis.

Ep 86Using OSINT to protect celebrities and athletes
Sometimes, when a Hollywood actor stars in a blockbuster film or a hit TV show, or when an athlete wins the Super Bowl, their personal problems begin with scandalous photos, property theft, even death threats. That’s where OSINT can help them stay one step ahead.About Chad BrockwayChad Brockway, President of the Intelligence Operations Division at Edgeworth Security, is an industry expert in the fields of digital intelligence investigations and methodologies where he leverages his extensive background in intelligence, counterintelligence, counterterrorism, federal law enforcement and cyber operations to provide unique services and lectures to the professional and education industry. Chad has worked across multiple federal law enforcement and national security agencies both within the United States as well as in cooperation with foreign government and law enforcement partners. During his time with the Federal Bureau of Investigations, Chad served with the Special Technologies and Applications Section (STAS) where he oversaw multiple intelligence and cyber programs, personnel, and resources. Additionally, Chad served as the Deputy Watch Center Director for the Department of Defense Counterintelligence Field Activity (CIFA) agency and as a Military Police Officer in the Marine Corps where he was assigned to the Marine One Helicopter Squadron and the White House Liaison Office under the Clinton and Bush administrations.

Ep 85An OSINT investigator’s toolkit
There are OSINT tools that mirror or provide workarounds for hidden social media posts. Join us as we talk with an investigator who really knows his way around the internet, dark web, social platforms and more.

Ep 84AI as an insider threat
AJ and Robert explore the shadowy side of AI — how some users are becoming addicted, confiding in it like a personal therapist and then gaining confidence to take risky actions in their lives and at work. They discuss what this could mean for insider threats and the broader impact on security.

Ep 83Adventures in OSINT Red Teaming
Anna discusses her career trajectory from corporate security and financial crimes to becoming the CEO of Pine Risk Management. She shares her experiences in conducting complex risk assessments, fraud detection, and crisis communications, particularly highlighting her role at Meta where she led Silicon Valley's largest physical red team.