<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/feed.xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:fireside="https://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>feed02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 11 Feb 2026 14:22:36 -0600</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>OSINT with ShadowDragon &amp; Digital Tools For Modern Investigations</title>
    <link>https://podcast.shadowdragon.io</link>
    <atom:link href="https://feeds.fireside.fm/shadowdragon/rss" rel="self" type="application/rss+xml"/>
    <pubDate>Thu, 06 Nov 2025 11:05:03 -0500</pubDate>
    <description>This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.
</description>
    <language>en-us</language>
    <copyright>© 2026 ShadowDragon, LLC</copyright>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A cyber security podcast series (Q&amp;A) </itunes:subtitle>
    <itunes:author>Daniel Clemens from ShadowDragon, LLC</itunes:author>
    <itunes:summary>This podcast covers a variety of cyber security topics, with a focus on candor, and zero b.s. Topics may include OSINT, PAI, Tailored Monitoring, Investigations, Offensive Disciplines, AI/ML, Object Recognition, Forensics, Historical Industry Lore, All things considered in Cyber.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c94d80a4-45a7-44df-b108-8b5d810b42ac/cover.jpg?v=10"/>
    <itunes:explicit>false</itunes:explicit>
    <itunes:owner>
      <itunes:name>Daniel Clemens from ShadowDragon, LLC</itunes:name>
      <itunes:email>dc@shadowdragon.io</itunes:email>
    </itunes:owner>
    <podcast:locked email="dc@shadowdragon.io">yes</podcast:locked>
<itunes:category text="Technology"/>
<itunes:category text="Business">
  <itunes:category text="Entrepreneurship"/>
</itunes:category>
    <item>
      <title>S04 E05: Melisa Stivaletti, the Queen of OSINT, on Elevating OSINT with AI, Private-Public Synergy, and More</title>
      <link>https://podcast.shadowdragon.io/eyes-everywhere-melisa-stivaletti-the-queen-of-osint-on-elevating-osint-with-ai-private-public-synergy-and-more</link>
      <guid isPermaLink="false">33f65181-89d7-49b4-91dd-3c236df7630c</guid>
      <pubDate>Tue, 27 May 2025 12:00:00 -0400</pubDate>
      <author>dc@shadowdragon.io (Daniel Clemens from ShadowDragon, LLC)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/c94d80a4-45a7-44df-b108-8b5d810b42ac/33f65181-89d7-49b4-91dd-3c236df7630c.mp3" length="43659316" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:author>Daniel Clemens from ShadowDragon, LLC</itunes:author>
      <itunes:subtitle>Host Nico "Dutch OSINT Guy" Dekens, co-host David Cook, and guest Melisa Stivaletti trace Melisa’s path from discovering OSINT during the Arab Spring in Afghanistan to championing its formalization across the U.S. intelligence community. They explore why private-public collaboration, adequate funding, and disciplined tradecraft are critical as public data volumes explode and generative-AI tools reshape collection and analysis. Melisa closes by dispelling the myth that OSINT is “cheap or easy,” arguing that it now rivals other intelligence disciplines in complexity, cost, and strategic value.</itunes:subtitle>
      <itunes:duration>30:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/c/c94d80a4-45a7-44df-b108-8b5d810b42ac/episodes/3/33f65181-89d7-49b4-91dd-3c236df7630c/cover.jpg?v=1"/>
      <description>
        <![CDATA[<ul>
<li><p><strong>Guest introduction &amp; background</strong></p>

<ul>
<li>Melisa describes how the 2010–11 Arab Spring revealed the power of social-media data while she was a Department of the Army civilian in Afghanistan.</li>
<li>Since then she has worked across academia, federal agencies, and the private sector to professionalize open-source intelligence, currently serving as OSINT Director at Guidehouse and chair of AFCEA’s Emerging Professionals in the Intelligence Community (EPIC) committee.</li>
</ul></li>
<li><p><strong>Why OSINT matters now</strong></p>

<ul>
<li>Every modern investigation—military, law-enforcement, or corporate—relies on publicly available information (PAI); skipping it “short-changes” the mission.</li>
<li>Recent unclassified U.S. DoD, ODNI, and Army OSINT strategies publicly signal a whole-of-government commitment and an invitation for industry partnership.</li>
<li>Congress has underscored this shift with the first House Subcommittee dedicated to open-source intelligence.</li>
</ul></li>
<li><p><strong>Public-private synergy &amp; funding gaps</strong></p>

<ul>
<li>Dual-use commercial tools and venture-backed research and development give the U.S. an edge, but the Intelligence Community still allocates <strong>less than 1% of its budget</strong> to OSINT despite the discipline providing <strong>roughly 30% of material in the President’s Daily Brief</strong>.</li>
<li>Cloud storage, advanced data sets, and continuous tool development make OSINT “cheap relative to satellites” but far from free; chronic underfunding risks hollowing out capabilities.</li>
</ul></li>
<li><p><strong>Generative AI opportunities &amp; cautions</strong></p>

<ul>
<li>Large language models accelerate sense-making (summarization, triage, translation) amid an ever-expanding data ocean.</li>
<li>Analysts must demand rigorous sourcing and bias evaluation—“every AI-generated sentence needs a footnote”—and should favor secure, controlled models over public chatbots.</li>
<li>The real value lies in “a collector who knows how to use AI,” not in AI replacing human tradecraft.</li>
</ul></li>
<li><p><strong>Operational vs. strategic OSINT</strong></p>

<ul>
<li>Tactical users (SOF, JSOC) need rapid, geotagged, mission-ready insights; strategic analysts focus on long-term trends, indications &amp; warnings, and partner sharing.</li>
<li>Both require advanced skills—data science, cyber forensics, provenance verification—not just “having an internet connection.”</li>
</ul></li>
<li><p><strong>Professionalization &amp; future skills</strong></p>

<ul>
<li>Formal tradecraft standards, dedicated career paths, and prompt-engineering expertise are emerging to match HUMINT, SIGINT, and GEOINT.</li>
<li>Melisa urges the next generation of intel professionals to embrace OSINT’s complexity, continuous learning curve, and growing strategic impact.</li>
</ul></li>
<li><p><strong>Persistent misconceptions debunked</strong></p>

<ul>
<li>Myth #1: OSINT is “free.” Reality: tooling, storage, and talent are expensive and scaling.</li>
<li>Myth #2: OSINT is inferior to classified sources. Reality: it often provides the first, fastest, and sometimes only vantage point—and stands on equal analytic rigor.</li>
</ul></li>
</ul><p>Special Guest: Melisa Stivaletti .</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<ul>
<li><p><strong>Guest introduction &amp; background</strong></p>

<ul>
<li>Melisa describes how the 2010–11 Arab Spring revealed the power of social-media data while she was a Department of the Army civilian in Afghanistan.</li>
<li>Since then she has worked across academia, federal agencies, and the private sector to professionalize open-source intelligence, currently serving as OSINT Director at Guidehouse and chair of AFCEA’s Emerging Professionals in the Intelligence Community (EPIC) committee.</li>
</ul></li>
<li><p><strong>Why OSINT matters now</strong></p>

<ul>
<li>Every modern investigation—military, law-enforcement, or corporate—relies on publicly available information (PAI); skipping it “short-changes” the mission.</li>
<li>Recent unclassified U.S. DoD, ODNI, and Army OSINT strategies publicly signal a whole-of-government commitment and an invitation for industry partnership.</li>
<li>Congress has underscored this shift with the first House Subcommittee dedicated to open-source intelligence.</li>
</ul></li>
<li><p><strong>Public-private synergy &amp; funding gaps</strong></p>

<ul>
<li>Dual-use commercial tools and venture-backed research and development give the U.S. an edge, but the Intelligence Community still allocates <strong>less than 1% of its budget</strong> to OSINT despite the discipline providing <strong>roughly 30% of material in the President’s Daily Brief</strong>.</li>
<li>Cloud storage, advanced data sets, and continuous tool development make OSINT “cheap relative to satellites” but far from free; chronic underfunding risks hollowing out capabilities.</li>
</ul></li>
<li><p><strong>Generative AI opportunities &amp; cautions</strong></p>

<ul>
<li>Large language models accelerate sense-making (summarization, triage, translation) amid an ever-expanding data ocean.</li>
<li>Analysts must demand rigorous sourcing and bias evaluation—“every AI-generated sentence needs a footnote”—and should favor secure, controlled models over public chatbots.</li>
<li>The real value lies in “a collector who knows how to use AI,” not in AI replacing human tradecraft.</li>
</ul></li>
<li><p><strong>Operational vs. strategic OSINT</strong></p>

<ul>
<li>Tactical users (SOF, JSOC) need rapid, geotagged, mission-ready insights; strategic analysts focus on long-term trends, indications &amp; warnings, and partner sharing.</li>
<li>Both require advanced skills—data science, cyber forensics, provenance verification—not just “having an internet connection.”</li>
</ul></li>
<li><p><strong>Professionalization &amp; future skills</strong></p>

<ul>
<li>Formal tradecraft standards, dedicated career paths, and prompt-engineering expertise are emerging to match HUMINT, SIGINT, and GEOINT.</li>
<li>Melisa urges the next generation of intel professionals to embrace OSINT’s complexity, continuous learning curve, and growing strategic impact.</li>
</ul></li>
<li><p><strong>Persistent misconceptions debunked</strong></p>

<ul>
<li>Myth #1: OSINT is “free.” Reality: tooling, storage, and talent are expensive and scaling.</li>
<li>Myth #2: OSINT is inferior to classified sources. Reality: it often provides the first, fastest, and sometimes only vantage point—and stands on equal analytic rigor.</li>
</ul></li>
</ul><p>Special Guest: Melisa Stivaletti .</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<ul>
<li><p><strong>Guest introduction &amp; background</strong></p>

<ul>
<li>Melisa describes how the 2010–11 Arab Spring revealed the power of social-media data while she was a Department of the Army civilian in Afghanistan.</li>
<li>Since then she has worked across academia, federal agencies, and the private sector to professionalize open-source intelligence, currently serving as OSINT Director at Guidehouse and chair of AFCEA’s Emerging Professionals in the Intelligence Community (EPIC) committee.</li>
</ul></li>
<li><p><strong>Why OSINT matters now</strong></p>

<ul>
<li>Every modern investigation—military, law-enforcement, or corporate—relies on publicly available information (PAI); skipping it “short-changes” the mission.</li>
<li>Recent unclassified U.S. DoD, ODNI, and Army OSINT strategies publicly signal a whole-of-government commitment and an invitation for industry partnership.</li>
<li>Congress has underscored this shift with the first House Subcommittee dedicated to open-source intelligence.</li>
</ul></li>
<li><p><strong>Public-private synergy &amp; funding gaps</strong></p>

<ul>
<li>Dual-use commercial tools and venture-backed research and development give the U.S. an edge, but the Intelligence Community still allocates <strong>less than 1% of its budget</strong> to OSINT despite the discipline providing <strong>roughly 30% of material in the President’s Daily Brief</strong>.</li>
<li>Cloud storage, advanced data sets, and continuous tool development make OSINT “cheap relative to satellites” but far from free; chronic underfunding risks hollowing out capabilities.</li>
</ul></li>
<li><p><strong>Generative AI opportunities &amp; cautions</strong></p>

<ul>
<li>Large language models accelerate sense-making (summarization, triage, translation) amid an ever-expanding data ocean.</li>
<li>Analysts must demand rigorous sourcing and bias evaluation—“every AI-generated sentence needs a footnote”—and should favor secure, controlled models over public chatbots.</li>
<li>The real value lies in “a collector who knows how to use AI,” not in AI replacing human tradecraft.</li>
</ul></li>
<li><p><strong>Operational vs. strategic OSINT</strong></p>

<ul>
<li>Tactical users (SOF, JSOC) need rapid, geotagged, mission-ready insights; strategic analysts focus on long-term trends, indications &amp; warnings, and partner sharing.</li>
<li>Both require advanced skills—data science, cyber forensics, provenance verification—not just “having an internet connection.”</li>
</ul></li>
<li><p><strong>Professionalization &amp; future skills</strong></p>

<ul>
<li>Formal tradecraft standards, dedicated career paths, and prompt-engineering expertise are emerging to match HUMINT, SIGINT, and GEOINT.</li>
<li>Melisa urges the next generation of intel professionals to embrace OSINT’s complexity, continuous learning curve, and growing strategic impact.</li>
</ul></li>
<li><p><strong>Persistent misconceptions debunked</strong></p>

<ul>
<li>Myth #1: OSINT is “free.” Reality: tooling, storage, and talent are expensive and scaling.</li>
<li>Myth #2: OSINT is inferior to classified sources. Reality: it often provides the first, fastest, and sometimes only vantage point—and stands on equal analytic rigor.</li>
</ul></li>
</ul><p>Special Guest: Melisa Stivaletti .</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/oDuMC9IS+KZEMYN5G</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/oDuMC9IS+KZEMYN5G" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">David Cook</podcast:person>
      <podcast:person email="" href="http://dutchosintguy.com" role="host">Nico "Dutch Osint Guy" Dekens</podcast:person>
      <podcast:person email="" href="" role="guest">Melisa Stivaletti </podcast:person>
    </item>
    <item>
      <title>S04 E04: Operationalizing Publicly Available Information</title>
      <link>https://podcast.shadowdragon.io/operationalizing-publicly-available-information-with-doug-livermore</link>
      <guid isPermaLink="false">96a9108f-4293-4cb3-a2d3-e4f0d2a11521</guid>
      <pubDate>Thu, 01 May 2025 23:00:00 -0400</pubDate>
      <author>dc@shadowdragon.io (Daniel Clemens from ShadowDragon, LLC)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/c94d80a4-45a7-44df-b108-8b5d810b42ac/96a9108f-4293-4cb3-a2d3-e4f0d2a11521.mp3" length="62688582" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:author>Daniel Clemens from ShadowDragon, LLC</itunes:author>
      <itunes:subtitle>Special-operations veteran Doug Livermore explains how publicly available information and commercial OSINT tools have become mission-critical—blurring the traditional line between intelligence and operations. From targeting terrorists to evacuating Afghan allies and countering Russian aggression, he shows why agile public-private partnerships now outpace official channels on today’s digital battlefield.</itunes:subtitle>
      <itunes:duration>43:09</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/c/c94d80a4-45a7-44df-b108-8b5d810b42ac/episodes/9/96a9108f-4293-4cb3-a2d3-e4f0d2a11521/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Former Green Beret and national-security advocate Doug Livermore joins the ShadowDragon team to unpack how publicly available information (PAI) and commercial open-source intelligence (OSINT) are transforming modern conflict—and why agile private-sector partners now shape outcomes as much as governments do.</p>

<p>Key points &amp; take-aways</p>

<ul>
<li><p>Breaking the “intel vs. ops” firewall</p>

<pre><code>* U.S. commanders once distrusted anything that didn’t come from classified HUMINT or SIGINT; today, PAI often drives the find-fix-finish cycle faster than traditional sources.
</code></pre></li>
<li><p>Field lessons from five theaters</p>

<pre><code>* Iraq, Afghanistan, Mali, the DRC, and the Central African Republic showed that PAI is frequently the only data commanders can legally share with immature or non-NATO partner forces.

* Cheap commercial tools—Google Maps, social media scraping, Internet-of-Things exhaust—now reveal patterns of life, financial flows, and physical locations in minutes.
</code></pre></li>
<li><p>Cultural turning points</p>

<pre><code>* The Arab Spring (2010) and ISIS propaganda boom (2014-15) proved that open networks can topple regimes and expose targets.

* Russia’s 2022 invasion of Ukraine and the Israel-Hamas war brought OSINT to prime time, with private analysts mapping tank battalions and documenting war crimes in real time.
</code></pre></li>
<li><p>Afghanistan 2021: Private networks move faster than states</p>

<pre><code>* Livermore’s nonprofits No One Left Behind and SOAA used PAI, commercial satellites, and encrypted chat to steer evacuees past Taliban checkpoints when official channels bogged down.

* U.S. intelligence officers quietly pulled data from these civilian ops centers—a preview of future public-private crisis response.
</code></pre></li>
<li><p>Information warfare &amp; influence ops</p>

<pre><code>* Open digital terrain lets both democracies and adversaries micro-target audiences, erode civil trust, or rally global support; mastering sentiment analysis is now a core skill for operators.
</code></pre></li>
<li><p>Policy &amp; the road ahead</p>

<pre><code>* Expect formalized private-public frameworks that let nonprofits and tech firms plug straight into combatant-command fusion cells.

* Civil-liberties safeguards must keep pace, distinguishing U.S. person data from foreign-adversary exploitation.
</code></pre></li>
</ul><p>Special Guest: Doug Livermore.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Former Green Beret and national-security advocate Doug Livermore joins the ShadowDragon team to unpack how publicly available information (PAI) and commercial open-source intelligence (OSINT) are transforming modern conflict—and why agile private-sector partners now shape outcomes as much as governments do.</p>

<p>Key points &amp; take-aways</p>

<ul>
<li><p>Breaking the “intel vs. ops” firewall</p>

<pre><code>* U.S. commanders once distrusted anything that didn’t come from classified HUMINT or SIGINT; today, PAI often drives the find-fix-finish cycle faster than traditional sources.
</code></pre></li>
<li><p>Field lessons from five theaters</p>

<pre><code>* Iraq, Afghanistan, Mali, the DRC, and the Central African Republic showed that PAI is frequently the only data commanders can legally share with immature or non-NATO partner forces.

* Cheap commercial tools—Google Maps, social media scraping, Internet-of-Things exhaust—now reveal patterns of life, financial flows, and physical locations in minutes.
</code></pre></li>
<li><p>Cultural turning points</p>

<pre><code>* The Arab Spring (2010) and ISIS propaganda boom (2014-15) proved that open networks can topple regimes and expose targets.

* Russia’s 2022 invasion of Ukraine and the Israel-Hamas war brought OSINT to prime time, with private analysts mapping tank battalions and documenting war crimes in real time.
</code></pre></li>
<li><p>Afghanistan 2021: Private networks move faster than states</p>

<pre><code>* Livermore’s nonprofits No One Left Behind and SOAA used PAI, commercial satellites, and encrypted chat to steer evacuees past Taliban checkpoints when official channels bogged down.

* U.S. intelligence officers quietly pulled data from these civilian ops centers—a preview of future public-private crisis response.
</code></pre></li>
<li><p>Information warfare &amp; influence ops</p>

<pre><code>* Open digital terrain lets both democracies and adversaries micro-target audiences, erode civil trust, or rally global support; mastering sentiment analysis is now a core skill for operators.
</code></pre></li>
<li><p>Policy &amp; the road ahead</p>

<pre><code>* Expect formalized private-public frameworks that let nonprofits and tech firms plug straight into combatant-command fusion cells.

* Civil-liberties safeguards must keep pace, distinguishing U.S. person data from foreign-adversary exploitation.
</code></pre></li>
</ul><p>Special Guest: Doug Livermore.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Former Green Beret and national-security advocate Doug Livermore joins the ShadowDragon team to unpack how publicly available information (PAI) and commercial open-source intelligence (OSINT) are transforming modern conflict—and why agile private-sector partners now shape outcomes as much as governments do.</p>

<p>Key points &amp; take-aways</p>

<ul>
<li><p>Breaking the “intel vs. ops” firewall</p>

<pre><code>* U.S. commanders once distrusted anything that didn’t come from classified HUMINT or SIGINT; today, PAI often drives the find-fix-finish cycle faster than traditional sources.
</code></pre></li>
<li><p>Field lessons from five theaters</p>

<pre><code>* Iraq, Afghanistan, Mali, the DRC, and the Central African Republic showed that PAI is frequently the only data commanders can legally share with immature or non-NATO partner forces.

* Cheap commercial tools—Google Maps, social media scraping, Internet-of-Things exhaust—now reveal patterns of life, financial flows, and physical locations in minutes.
</code></pre></li>
<li><p>Cultural turning points</p>

<pre><code>* The Arab Spring (2010) and ISIS propaganda boom (2014-15) proved that open networks can topple regimes and expose targets.

* Russia’s 2022 invasion of Ukraine and the Israel-Hamas war brought OSINT to prime time, with private analysts mapping tank battalions and documenting war crimes in real time.
</code></pre></li>
<li><p>Afghanistan 2021: Private networks move faster than states</p>

<pre><code>* Livermore’s nonprofits No One Left Behind and SOAA used PAI, commercial satellites, and encrypted chat to steer evacuees past Taliban checkpoints when official channels bogged down.

* U.S. intelligence officers quietly pulled data from these civilian ops centers—a preview of future public-private crisis response.
</code></pre></li>
<li><p>Information warfare &amp; influence ops</p>

<pre><code>* Open digital terrain lets both democracies and adversaries micro-target audiences, erode civil trust, or rally global support; mastering sentiment analysis is now a core skill for operators.
</code></pre></li>
<li><p>Policy &amp; the road ahead</p>

<pre><code>* Expect formalized private-public frameworks that let nonprofits and tech firms plug straight into combatant-command fusion cells.

* Civil-liberties safeguards must keep pace, distinguishing U.S. person data from foreign-adversary exploitation.
</code></pre></li>
</ul><p>Special Guest: Doug Livermore.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/oDuMC9IS+d98uykio</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/oDuMC9IS+d98uykio" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">David Cook</podcast:person>
      <podcast:person email="" href="http://dutchosintguy.com" role="host">Nico "Dutch Osint Guy" Dekens</podcast:person>
      <podcast:person email="" href="" role="guest">Doug Livermore</podcast:person>
    </item>
    <item>
      <title>S04 E03 Part 2: Human Trafficking in Online Marketplaces (Part 2): Exposing the Threats &amp; Tools to Fight Back</title>
      <link>https://podcast.shadowdragon.io/human-trafficking-in-online-market-places-part-one-exposing-the-threats-tools-to-fight-back-part-two</link>
      <guid isPermaLink="false">23ceef23-e32e-4e96-933f-1e84e0827b3d</guid>
      <pubDate>Tue, 18 Feb 2025 15:15:00 -0500</pubDate>
      <author>dc@shadowdragon.io (Daniel Clemens from ShadowDragon, LLC)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/c94d80a4-45a7-44df-b108-8b5d810b42ac/23ceef23-e32e-4e96-933f-1e84e0827b3d.mp3" length="48634831" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:author>Daniel Clemens from ShadowDragon, LLC</itunes:author>
      <itunes:subtitle>David Cook, Matt Richardson, Elliot, and Daniel delve into OSINT's role in investigating child trafficking, offering practical tracking tips and safeguarding advice for parents.
This episode delves deeper into how investigators use open-source intelligence (OSINT) to uncover and disrupt human trafficking networks, with insights from experts at ShadowDragon and the Anti-Human Trafficking Intelligence Initiative (ATII). They explain how repeated text, images, and publicly available digital data provide critical leads, stressing the importance of ethical and transparent collection methods. Finally, the conversation offers practical tips for parents on preventing exploitation, including maintaining open dialogue, setting firm boundaries, and remembering the “stop, block, and talk” rule.</itunes:subtitle>
      <itunes:duration>33:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/c/c94d80a4-45a7-44df-b108-8b5d810b42ac/episodes/2/23ceef23-e32e-4e96-933f-1e84e0827b3d/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>In this episode of the Shadow Dragon podcast, Director of National Security <a href="https://www.linkedin.com/in/david-n-cook/" rel="nofollow">David Cook</a> hosts a conversation for National Human Trafficking Prevention Month. The panel features:</p>

<ul>
<li><a href="https://www.linkedin.com/in/mattwrichardson/" rel="nofollow">Matt Richardson</a>, Senior Advisor of Intelligence and Child Safety at the <a href="https://followmoneyfightslavery.org/" rel="nofollow">Anti-Human Trafficking Intelligence Initiative</a> (ATII) and Head of Intelligence at the <a href="https://theosintcentre.ca/" rel="nofollow">Canadian OSINT Center</a><br></li>
<li><a href="https://www.linkedin.com/in/clemensdaniel/" rel="nofollow">Daniel Clemens</a>, CEO and Founder of Shadow Dragon<br></li>
<li><a href="https://www.linkedin.com/in/lemmingrush/" rel="nofollow">Elliot Anderson</a>, CTO of Shadow Dragon<br></li>
</ul>

<p>This episode explores how open-source intelligence (OSINT) methods can unveil hidden threads of human trafficking by tracing repeated text, phone numbers, and images in online ads. Experts from both ShadowDragon and the Anti-Human Trafficking Intelligence Initiative (ATII) emphasize that ethical, transparent data collection is vital for legal admissibility. They also stress the significance of parental involvement—through open dialogue, clear device-use boundaries, and vigilance for red flags like unsolicited gifts or secrecy—in thwarting exploitation before it begins. Central to prevention is the “stop, block, and talk” framework, which empowers children to discontinue unsafe interactions, block perpetrators, and immediately seek help from a trusted adult. Ultimately, the episode underscores that deploying cutting-edge OSINT tools, coupled with engaged parenting and community collaboration, remains key to addressing the global crisis of human trafficking.</p>

<p>Key Takeaways</p>

<ul>
<li>OSINT in Trafficking Investigations: Repeated text, phone numbers, and images in online ads can offer critical leads on trafficking networks.</li>
<li>Ethical Data Collection: Transparent, legally compliant methods ensure that gathered evidence is admissible in court.
Parenting &amp; Prevention: Open communication, device-use boundaries, and awareness of red flags (like secretive behavior) are essential for child safety.</li>
<li>“Stop, Block, and Talk”: A straightforward guideline that urges children to halt disturbing interactions, block the user, and seek adult assistance.</li>
<li>Community Collaboration: Harnessing advanced OSINT tools alongside active parental and broader community engagement is crucial in the fight against human trafficking.</li>
</ul>

<p>Request to view ShadowDragon and CACI&#39;s DarkBlue Intelligence Suite Webinar on using OSINT to find indicators of human trafficking online: <a href="https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0" rel="nofollow">https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0</a></p><p>Special Guest: Matt Richardson.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Shadow Dragon podcast, Director of National Security <a href="https://www.linkedin.com/in/david-n-cook/" rel="nofollow">David Cook</a> hosts a conversation for National Human Trafficking Prevention Month. The panel features:</p>

<ul>
<li><a href="https://www.linkedin.com/in/mattwrichardson/" rel="nofollow">Matt Richardson</a>, Senior Advisor of Intelligence and Child Safety at the <a href="https://followmoneyfightslavery.org/" rel="nofollow">Anti-Human Trafficking Intelligence Initiative</a> (ATII) and Head of Intelligence at the <a href="https://theosintcentre.ca/" rel="nofollow">Canadian OSINT Center</a><br></li>
<li><a href="https://www.linkedin.com/in/clemensdaniel/" rel="nofollow">Daniel Clemens</a>, CEO and Founder of Shadow Dragon<br></li>
<li><a href="https://www.linkedin.com/in/lemmingrush/" rel="nofollow">Elliot Anderson</a>, CTO of Shadow Dragon<br></li>
</ul>

<p>This episode explores how open-source intelligence (OSINT) methods can unveil hidden threads of human trafficking by tracing repeated text, phone numbers, and images in online ads. Experts from both ShadowDragon and the Anti-Human Trafficking Intelligence Initiative (ATII) emphasize that ethical, transparent data collection is vital for legal admissibility. They also stress the significance of parental involvement—through open dialogue, clear device-use boundaries, and vigilance for red flags like unsolicited gifts or secrecy—in thwarting exploitation before it begins. Central to prevention is the “stop, block, and talk” framework, which empowers children to discontinue unsafe interactions, block perpetrators, and immediately seek help from a trusted adult. Ultimately, the episode underscores that deploying cutting-edge OSINT tools, coupled with engaged parenting and community collaboration, remains key to addressing the global crisis of human trafficking.</p>

<p>Key Takeaways</p>

<ul>
<li>OSINT in Trafficking Investigations: Repeated text, phone numbers, and images in online ads can offer critical leads on trafficking networks.</li>
<li>Ethical Data Collection: Transparent, legally compliant methods ensure that gathered evidence is admissible in court.
Parenting &amp; Prevention: Open communication, device-use boundaries, and awareness of red flags (like secretive behavior) are essential for child safety.</li>
<li>“Stop, Block, and Talk”: A straightforward guideline that urges children to halt disturbing interactions, block the user, and seek adult assistance.</li>
<li>Community Collaboration: Harnessing advanced OSINT tools alongside active parental and broader community engagement is crucial in the fight against human trafficking.</li>
</ul>

<p>Request to view ShadowDragon and CACI&#39;s DarkBlue Intelligence Suite Webinar on using OSINT to find indicators of human trafficking online: <a href="https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0" rel="nofollow">https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0</a></p><p>Special Guest: Matt Richardson.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Shadow Dragon podcast, Director of National Security <a href="https://www.linkedin.com/in/david-n-cook/" rel="nofollow">David Cook</a> hosts a conversation for National Human Trafficking Prevention Month. The panel features:</p>

<ul>
<li><a href="https://www.linkedin.com/in/mattwrichardson/" rel="nofollow">Matt Richardson</a>, Senior Advisor of Intelligence and Child Safety at the <a href="https://followmoneyfightslavery.org/" rel="nofollow">Anti-Human Trafficking Intelligence Initiative</a> (ATII) and Head of Intelligence at the <a href="https://theosintcentre.ca/" rel="nofollow">Canadian OSINT Center</a><br></li>
<li><a href="https://www.linkedin.com/in/clemensdaniel/" rel="nofollow">Daniel Clemens</a>, CEO and Founder of Shadow Dragon<br></li>
<li><a href="https://www.linkedin.com/in/lemmingrush/" rel="nofollow">Elliot Anderson</a>, CTO of Shadow Dragon<br></li>
</ul>

<p>This episode explores how open-source intelligence (OSINT) methods can unveil hidden threads of human trafficking by tracing repeated text, phone numbers, and images in online ads. Experts from both ShadowDragon and the Anti-Human Trafficking Intelligence Initiative (ATII) emphasize that ethical, transparent data collection is vital for legal admissibility. They also stress the significance of parental involvement—through open dialogue, clear device-use boundaries, and vigilance for red flags like unsolicited gifts or secrecy—in thwarting exploitation before it begins. Central to prevention is the “stop, block, and talk” framework, which empowers children to discontinue unsafe interactions, block perpetrators, and immediately seek help from a trusted adult. Ultimately, the episode underscores that deploying cutting-edge OSINT tools, coupled with engaged parenting and community collaboration, remains key to addressing the global crisis of human trafficking.</p>

<p>Key Takeaways</p>

<ul>
<li>OSINT in Trafficking Investigations: Repeated text, phone numbers, and images in online ads can offer critical leads on trafficking networks.</li>
<li>Ethical Data Collection: Transparent, legally compliant methods ensure that gathered evidence is admissible in court.
Parenting &amp; Prevention: Open communication, device-use boundaries, and awareness of red flags (like secretive behavior) are essential for child safety.</li>
<li>“Stop, Block, and Talk”: A straightforward guideline that urges children to halt disturbing interactions, block the user, and seek adult assistance.</li>
<li>Community Collaboration: Harnessing advanced OSINT tools alongside active parental and broader community engagement is crucial in the fight against human trafficking.</li>
</ul>

<p>Request to view ShadowDragon and CACI&#39;s DarkBlue Intelligence Suite Webinar on using OSINT to find indicators of human trafficking online: <a href="https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0" rel="nofollow">https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0</a></p><p>Special Guest: Matt Richardson.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/oDuMC9IS+MtqC2AZe</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/oDuMC9IS+MtqC2AZe" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">David Cook</podcast:person>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">Elliott Anderson</podcast:person>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">Daniel Clemens</podcast:person>
      <podcast:person email="" href="" role="guest">Matt Richardson</podcast:person>
    </item>
    <item>
      <title>S04 E02 Part 1: Human Trafficking in Online Marketplaces (Part 1): Exposing the Threats &amp; Tools to Fight Back</title>
      <link>https://podcast.shadowdragon.io/human-trafficking-in-online-market-places-part-one-exposing-the-threats-tools-to-fight-back</link>
      <guid isPermaLink="false">af4f6e83-cea9-4281-80e4-db55326ce384</guid>
      <pubDate>Mon, 03 Feb 2025 11:15:00 -0500</pubDate>
      <author>dc@shadowdragon.io (Daniel Clemens from ShadowDragon, LLC)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/c94d80a4-45a7-44df-b108-8b5d810b42ac/af4f6e83-cea9-4281-80e4-db55326ce384.mp3" length="86418872" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:author>Daniel Clemens from ShadowDragon, LLC</itunes:author>
      <itunes:subtitle>In this episode of the Shadow Dragon podcast, host David Cook speaks with Matt Richardson from the Anti Human Trafficking Intelligence Initiative (ATII) alongside Shadow Dragon’s CEO and CTO. They examine how traffickers operate, the impact on victims, and the investigative tools used to track and disrupt these crimes. The discussion also highlights the emotional toll on investigators and the importance of ongoing community partnerships to protect vulnerable populations.</itunes:subtitle>
      <itunes:duration>59:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/c/c94d80a4-45a7-44df-b108-8b5d810b42ac/episodes/a/af4f6e83-cea9-4281-80e4-db55326ce384/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>In this episode of the Shadow Dragon podcast, Director of National Security <a href="https://www.linkedin.com/in/david-n-cook/" rel="nofollow">David Cook</a> hosts a conversation for National Human Trafficking Prevention Month. The panel features:</p>

<ul>
<li><a href="https://www.linkedin.com/in/mattwrichardson/" rel="nofollow">Matt Richardson</a>, Senior Advisor of Intelligence and Child Safety at the <a href="https://followmoneyfightslavery.org/" rel="nofollow">Anti-Human Trafficking Intelligence Initiative</a> (ATII) and Head of Intelligence at the <a href="https://theosintcentre.ca/" rel="nofollow">Canadian OSINT Center</a><br></li>
<li><a href="https://www.linkedin.com/in/clemensdaniel/" rel="nofollow">Daniel Clemens</a>, CEO and Founder of Shadow Dragon<br></li>
<li><a href="https://www.linkedin.com/in/lemmingrush/" rel="nofollow">Elliot Anderson</a>, CTO of Shadow Dragon<br></li>
</ul>

<p>They discuss how human traffickers operate, the indicators that a child or adult may be at risk, and the ways online investigative tools—particularly open-source intelligence (OSINT) platforms—support law enforcement efforts. Matt shares the emotional toll of these cases and the importance of self-care for investigators, emphasizing that while the work can be harrowing, it is a privilege to help protect vulnerable individuals. The group also highlights the power of community partnerships, legal collaboration, and technology in preventing human trafficking and rescuing victims. This episode is part one of a three-part series focusing on human trafficking and online marketplaces, with a strong warning that some content may be disturbing to listeners.</p>

<p>Request to view ShadowDragon and CACI&#39;s DarkBlue Intelligence Suite Webinar on using OSINT to find indicators of human trafficking online: <a href="https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0" rel="nofollow">https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0</a></p><p>Special Guest: Matt Richardson.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Shadow Dragon podcast, Director of National Security <a href="https://www.linkedin.com/in/david-n-cook/" rel="nofollow">David Cook</a> hosts a conversation for National Human Trafficking Prevention Month. The panel features:</p>

<ul>
<li><a href="https://www.linkedin.com/in/mattwrichardson/" rel="nofollow">Matt Richardson</a>, Senior Advisor of Intelligence and Child Safety at the <a href="https://followmoneyfightslavery.org/" rel="nofollow">Anti-Human Trafficking Intelligence Initiative</a> (ATII) and Head of Intelligence at the <a href="https://theosintcentre.ca/" rel="nofollow">Canadian OSINT Center</a><br></li>
<li><a href="https://www.linkedin.com/in/clemensdaniel/" rel="nofollow">Daniel Clemens</a>, CEO and Founder of Shadow Dragon<br></li>
<li><a href="https://www.linkedin.com/in/lemmingrush/" rel="nofollow">Elliot Anderson</a>, CTO of Shadow Dragon<br></li>
</ul>

<p>They discuss how human traffickers operate, the indicators that a child or adult may be at risk, and the ways online investigative tools—particularly open-source intelligence (OSINT) platforms—support law enforcement efforts. Matt shares the emotional toll of these cases and the importance of self-care for investigators, emphasizing that while the work can be harrowing, it is a privilege to help protect vulnerable individuals. The group also highlights the power of community partnerships, legal collaboration, and technology in preventing human trafficking and rescuing victims. This episode is part one of a three-part series focusing on human trafficking and online marketplaces, with a strong warning that some content may be disturbing to listeners.</p>

<p>Request to view ShadowDragon and CACI&#39;s DarkBlue Intelligence Suite Webinar on using OSINT to find indicators of human trafficking online: <a href="https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0" rel="nofollow">https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0</a></p><p>Special Guest: Matt Richardson.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Shadow Dragon podcast, Director of National Security <a href="https://www.linkedin.com/in/david-n-cook/" rel="nofollow">David Cook</a> hosts a conversation for National Human Trafficking Prevention Month. The panel features:</p>

<ul>
<li><a href="https://www.linkedin.com/in/mattwrichardson/" rel="nofollow">Matt Richardson</a>, Senior Advisor of Intelligence and Child Safety at the <a href="https://followmoneyfightslavery.org/" rel="nofollow">Anti-Human Trafficking Intelligence Initiative</a> (ATII) and Head of Intelligence at the <a href="https://theosintcentre.ca/" rel="nofollow">Canadian OSINT Center</a><br></li>
<li><a href="https://www.linkedin.com/in/clemensdaniel/" rel="nofollow">Daniel Clemens</a>, CEO and Founder of Shadow Dragon<br></li>
<li><a href="https://www.linkedin.com/in/lemmingrush/" rel="nofollow">Elliot Anderson</a>, CTO of Shadow Dragon<br></li>
</ul>

<p>They discuss how human traffickers operate, the indicators that a child or adult may be at risk, and the ways online investigative tools—particularly open-source intelligence (OSINT) platforms—support law enforcement efforts. Matt shares the emotional toll of these cases and the importance of self-care for investigators, emphasizing that while the work can be harrowing, it is a privilege to help protect vulnerable individuals. The group also highlights the power of community partnerships, legal collaboration, and technology in preventing human trafficking and rescuing victims. This episode is part one of a three-part series focusing on human trafficking and online marketplaces, with a strong warning that some content may be disturbing to listeners.</p>

<p>Request to view ShadowDragon and CACI&#39;s DarkBlue Intelligence Suite Webinar on using OSINT to find indicators of human trafficking online: <a href="https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0" rel="nofollow">https://share.hsforms.com/1dcl3pCneSpOAeQpkQFI66g53lw0</a></p><p>Special Guest: Matt Richardson.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/oDuMC9IS+tMQUSfku</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/oDuMC9IS+tMQUSfku" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">David Cook</podcast:person>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">Elliott Anderson</podcast:person>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">Daniel Clemens</podcast:person>
      <podcast:person email="" href="" role="guest">Matt Richardson</podcast:person>
    </item>
    <item>
      <title>S04 E01 - OSINT in the Maritime Domain with Rae Baker</title>
      <link>https://podcast.shadowdragon.io/osint-in-the-maritime-domain-with-rae-baker</link>
      <guid isPermaLink="false">0255ab0e-02d7-4003-b152-37c22f55a340</guid>
      <pubDate>Mon, 27 Jan 2025 17:00:00 -0500</pubDate>
      <author>dc@shadowdragon.io (Daniel Clemens from ShadowDragon, LLC)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/c94d80a4-45a7-44df-b108-8b5d810b42ac/0255ab0e-02d7-4003-b152-37c22f55a340.mp3" length="67308740" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:author>Daniel Clemens from ShadowDragon, LLC</itunes:author>
      <itunes:subtitle>Rae Baker, a senior OSINT analyst specializing in maritime intelligence, discusses how open-source intelligence tools like AIS and satellite imagery can help detect suspicious shipping activity and sanctions evasion. Alongside host Nico "The Dutch OSINT Guy" Dekens and co-host David Cook, she explains how adversaries employ “shadow fleets,” spoof AIS signals, and use shell companies to obscure ownership. The episode highlights best practices for analysts, compliance teams, and insurers to mitigate risks through thorough due diligence, domain expertise, and AI-powered analysis.</itunes:subtitle>
      <itunes:duration>45:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/c/c94d80a4-45a7-44df-b108-8b5d810b42ac/episodes/0/0255ab0e-02d7-4003-b152-37c22f55a340/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>In this episode of the ShadowDragon Podcast, host Nico Dekens and co-host David Cook interview Rae Baker, a senior OSINT analyst and maritime specialist. They explore how open-source intelligence (OSINT) applies to the maritime domain, highlighting how tools like AIS (Automatic Identification System) data, satellite imagery, and social media can help track vessels and uncover suspicious activities such as sanctions evasion or illegal cargo transfers.</p>

<p>Rae explains the importance of historical context—knowing typical vessel routes and behaviors—to spot anomalies that may indicate illicit or sanctioned cargo, and also touches on how adversaries employ “shadow fleets,” spoof AIS signals, and hide ownership behind shell companies. The conversation concludes with advice for analysts, compliance teams, and insurers on mitigating risks, conducting thorough due diligence, and leveraging AI as a complement (not a substitute) to human expertise.</p><p>Special Guest: Rae Baker.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the ShadowDragon Podcast, host Nico Dekens and co-host David Cook interview Rae Baker, a senior OSINT analyst and maritime specialist. They explore how open-source intelligence (OSINT) applies to the maritime domain, highlighting how tools like AIS (Automatic Identification System) data, satellite imagery, and social media can help track vessels and uncover suspicious activities such as sanctions evasion or illegal cargo transfers.</p>

<p>Rae explains the importance of historical context—knowing typical vessel routes and behaviors—to spot anomalies that may indicate illicit or sanctioned cargo, and also touches on how adversaries employ “shadow fleets,” spoof AIS signals, and hide ownership behind shell companies. The conversation concludes with advice for analysts, compliance teams, and insurers on mitigating risks, conducting thorough due diligence, and leveraging AI as a complement (not a substitute) to human expertise.</p><p>Special Guest: Rae Baker.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>In this episode of the ShadowDragon Podcast, host Nico Dekens and co-host David Cook interview Rae Baker, a senior OSINT analyst and maritime specialist. They explore how open-source intelligence (OSINT) applies to the maritime domain, highlighting how tools like AIS (Automatic Identification System) data, satellite imagery, and social media can help track vessels and uncover suspicious activities such as sanctions evasion or illegal cargo transfers.</p>

<p>Rae explains the importance of historical context—knowing typical vessel routes and behaviors—to spot anomalies that may indicate illicit or sanctioned cargo, and also touches on how adversaries employ “shadow fleets,” spoof AIS signals, and hide ownership behind shell companies. The conversation concludes with advice for analysts, compliance teams, and insurers on mitigating risks, conducting thorough due diligence, and leveraging AI as a complement (not a substitute) to human expertise.</p><p>Special Guest: Rae Baker.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/oDuMC9IS+YuXJ228W</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/oDuMC9IS+YuXJ228W" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.shadowdragon.io" role="host">David Cook</podcast:person>
      <podcast:person email="" href="http://dutchosintguy.com" role="host">Nico "Dutch Osint Guy" Dekens</podcast:person>
      <podcast:person email="" href="https://www.raebaker.net/" role="guest">Rae Baker</podcast:person>
    </item>
  </channel>
</rss>
