UnIntelligence

UnIntelligence - The Corporate Counterintelligence Podcast, where we discuss the emerging field of counterintelligence in the corporate environment. As lifetime counterintelligence professionals, this podcast will give us an opportunity to give back to a field that has given us so much. We, along with our guests, will share our experiences, lessons learned, and best practices on how you can build your own corporate counterintelligence program. Enjoy!

Listen on:

  • Apple Podcasts
  • Podbean App
  • Spotify

Episodes

UnIntelligence - Episode 1

Monday Feb 19, 2024

Monday Feb 19, 2024

Our first episode of UnIntelligence!  In this podcast, we discuss the who's, why's, and what's.  I'm sure you can figure out the where's and how's on your own as you're listening.  Enjoy!  And please provide feedback!
 
Song Credits: - Intro: © 2024 Stephen Nathaniel Holder, all rights reserved. Used with permission.
- Outro: © 2023 The Frickashinas, all rights reserved. Used with permission.

UnIntelligence - Ep2

Saturday Mar 02, 2024

Saturday Mar 02, 2024

In this episode, Dave Holder and Ryan Rambo discuss:- The history and relationship between counterintelligence and insider threat/risk/trust programs.
- The Adversarial Intelligence Collection Cycle, and why we should develop corporate security programs with it in mind.
- The Counterintelligence Lens
- And a few other topics...
As always, we look forward to your feedback.  Thanks for listening.
 
 

Thursday Mar 14, 2024

In our third episode, Dave and I are honored to welcome our first guests, Shawnee Delaney and James Lawler.  Shawnee and Jim are superstars in the intelligence, counterintelligence, and insider threat fields.  We hope you enjoy hearing their stories and the approaches they use to protect our most valuable resource.

UnIntelligence - Ep4

Friday Mar 29, 2024

Friday Mar 29, 2024

Episode 4 of #UnIntelligence - The Corporate Counterintelligence Podcast is now live on PodBean, YouTube, and Spotify! In this episode, Dave Holder and I dive deep into the Corporate Counterintelligence program.Check out some key moments below and let us know your thoughts in the comments!- Should the Insider Risk program fall under the Corporate CI Program? (3:00)- Physical Security and Cybersecurity crossover; CI investigative process (13:00)- CI Support to threat and vulnerability assessments (28:00)- Data Protection, InfoSec, Information System Continuous Monitoring (38:00)- Who are the threat actors CI should be focusing on? (58:00)- The Lawyer's Perspective (1:13:00)

UnIntelligence - Episode 5

Thursday Apr 11, 2024

Thursday Apr 11, 2024

In this episode, Dave Holder and Ryan Rambo welcome our special guest, Peter J. Lapp, to the podcast.  Pete is a retired FBI Special Agent who is highly experienced in counterintelligence, espionage, economic espionage, and trade secret theft.  He is also the author of the book "Queen of Cuba", his firsthand account of the espionage investigation into Ana Belen Montes, the disgraced Defense Intelligence Agency employee who spied for Cuban Intelligence Services.  In this episode, Pete shares his experiences as an FBI Special Agent, and his thoughts on Government vs. Corporate Counterintelligence, Economic vs. Government Espionage, and much more.  We hope you enjoy, and we look forward to your feedback.
Song Credits:
- Intro: © 2024 Stephen Nathaniel Holder, all rights reserved. Used with permission.
- Outro: © 2023 The Frickashinas, all rights reserved. Used with permission.

UnIntelligence - Ep6

Friday Apr 26, 2024

Friday Apr 26, 2024

In this episode, Dave and I discuss the Four Reporting Vectors (well...sources) available to Corporate Counterintelligence Professionals, and how to improve reporting from each.  The four vectors/sources we discuss are Employee Reporting, Cybersecurity Tools, Liaison, and OSINT.  We also discover AI has some additional categories, which we found interesting.  Listen along as Dave and I drop some knowledge, stories, and have some laughs as we dive even deeper into the Corporate Counterintelligence Program.Timestamps:5: - Topic Introduction
9: - Employee Reporting
43: - Cybersecurity Tooling
50: - Liaison
104: - OSINT
110: - AI Security Considerations and Thoughts on Other Sources
126: General Discussion on Reporting Vectors
140:  What's something about your job that may surprise others?As always, we look forward to your feedback!  We hope you enjoy the discussion.Song Credits:
- Intro: © 2024 Stephen Nathaniel Holder, all rights reserved. Used with permission.
- Outro: © 2023 The Frickashinas, all rights reserved. Used with permission.

Friday May 10, 2024

In this episode, Dave Holder and Ryan Rambo interview our special guest, Scott Silvestro!  
Scott is a Senior Manager, Counterintelligence and Insider Risk, at Tokyo Electron U.S. Holdings.  Below is Scott's biography.Scott Silvestro is a patriot who’s committed to enhancing the privatization of counterintelligence.As Senior Manager for the Insider Risk and Counterintelligence Program at Tokyo Electron U.S.Holdings, Scott oversees the program's effectiveness and integrity. The Insider Risk andCounterintelligence Program focuses on wellness as it pertains to proactive applications withininsider risk, particularly in countering nation-state, and economic espionage threats.
Prior to joining Tokyo Electron U.S. Holdings, Scott founded Vex Intel, a consultancy executingadvanced technical counterintelligence initiatives for a varied client base. Additionally, Scottworked as an Independent Consultant in an undisclosed program and as an Officer with theU.S. Secret Service, serving on the elite Counter Surveillance Division.
Scott co-chairs the Nation-State and Counterintelligence Special Interest Group within the OpenSource Insider Threat Information Sharing Working Group at Carnegie Mellon University'sSoftware Engineering Institute, where he also earned the CERT Insider Threat ProgramManager Certificate.
Scott holds a B.A. in Government and World Affairs from The University of Tampa. A constantadvocate for growth, he continually expands his expertise in insider risk, counterintelligence,and security disciplines.
Timestamps:3:  Guest Introduction
9:  Scott's Background
17:  Surveillance/Countersurveillance
25:  Protecting the Semiconductor Industry
35:  Trust in the CI Field
43:  Scott's Approach to the CI Program
57:  Listener Questions!
1:11 CI Support to Signature Reduction
1:22  Where is Scott's Program in the Corporate Structure
1:37  Parting Words of Wisdom

Wednesday May 29, 2024

In this episode, Dave Holder and I dive into some legal aspects of a Corporate Counterintelligence Program with our honored guest, Jeffrey Jones!  Jeff's bio is below and speaks for itself.  We hope you enjoy this great discussion!Timestamps:2: - Mark Dupont Story7: - Jeffrey Jones introduction and Background22: - Lawyer/Client Relationship (CI)48: - Harvard Fellowship and China Capstone Project1:03 - CT to CI/CE Transition (Yvette Hopkins shoutout)1:12 - "Hack Back" Approach and Cybersecurity Importance1:31 - Human Factors and why CI is special.1:48 - Jeff's final thoughts
Jeffrey Jones is a Colonel in the Army Reserve with more than 23 years of combined Active Duty and Army Reserve experience. Jeff began his military career in October 2000 when he enlisted in the United States Army as an interrogator (Arabic Language). As part of his military training, Jeff enrolled in the Defense Language Institute and completed the 64-week Basic Arabic Language course. After accepting a Direct Commission in the Army JAG Corps, he worked as an attorney at Walter Reed Army Medical Center before being assigned to the Department of Defense’s Office of Military Commissions. Jeff left Active Duty in June 2006 and joined the Army Reserve. As a reservist, he mobilized as a Prosecutor for the Office of Military Commissions; the Officer-in-Charge, Central Criminal Court for Iraq; the embedded Legal Advisor for an an Army online counterintelligence organization and as the Security Justice Advisor for the US Security Coordinator for Israel and the Palestinian Authority in Jerusalem, Israel. He is currently the Commander for the 10th Legal Operations Detachment - a component of the United States Army Reserve Legal Command.As a civilian, Jeff has nearly two decades of experience working as a legal advisor and prosecutor in support of several federal departments; including, Department of Defense (Defense Intelligence Agency, United States Army Intelligence and Security Command), Department of Justice (National Security Division) and the Department of Homeland Security. He was most recently a Special Counsel in the Global Trade and National Security practice area for Lowenstein Sandler LLP. He is currently a cybercrime enforcement attorney for the law firm Davis Wright Tremaine LLP.Jeff was a National Security Fellow at the Harvard Kennedy School of Government (HKS) in Cambridge, Massachusetts from 2019-2020. He earned a Juris Doctorate from the University of Maryland School of Law and a Bachelor of Arts Degree in Government and Politics from the University of Maryland at College Park. He is licensed to practice law in Maryland and the District of Columbia.

Saturday Jun 08, 2024

Join hosts Dave Holder and Ryan Rambo on UnIntelligence: The Corporate Counterintelligence Podcast as they dive into the enigmatic world of espionage with former KGB spy, Jack Barsky. In this episode, Jack shares his extraordinary journey from East Germany to the United States, where he lived undercover for decades.
Explore the nuances of corporate counterintelligence and the challenges of detecting espionage in modern organizations. Jack discusses his training, the psychological intricacies of living a double life, and how he navigated the complexities of corporate America to become a Chief Information Officer.
Don’t miss this unique opportunity to learn from one of the most intriguing figures in counterintelligence history. Tune in for an eye-opening discussion that blends history, cybersecurity, and human psychology.
Ep9 Timestamps:
3: Jack Barsky Intro and Background
16: Espionage Experience in Corporate America (Healthcare and IT)
21: Human Factors, Social Engineering, and American Culture
34: Changing world of espionage
41: Election Security Considerations
46: Seriousness of Espionage (James Lawler)
55: Espionage Tasks and Success?
101: Who are the Insider Threats and their indicators?
111: What’s next for Jack Barsky?
115: Jack departs, and we discuss what we just heard.
 

Monday Jun 24, 2024

Welcome to Episode 10 of the Corporate Counterintelligence Podcast, "Unintelligence". Join hosts Dave Holder and Ryan Rambo as they celebrate this milestone with special guests Jeremy Clark and Casey Richards, seasoned professionals in the counterintelligence field. They dive deep into the relatively unknown corporate function of counterintelligence, discussing insider risk management, workplace investigations, cyber defense, information security, and more.
In this episode, the conversation spans various topics including the importance of teamwork, the resilience required in counterintelligence operations, and the critical role of legal advisors and analysts. The guests also share their insights on the challenges and successes of their careers, emphasizing the importance of adaptability and continuous learning.
Listeners will find valuable takeaways on the intersection of counterintelligence practices between military and corporate environments, the impact of AI and machine learning on CI operations, and the significance of tailored training programs. With a blend of humor, technical breakdowns, and professional insights, this episode is a must-listen for anyone interested in the security and counterintelligence field.
Don't miss this engaging discussion that not only celebrates the journey of the podcast but also shines a light on the critical work done behind the scenes to protect corporate and national security interests.
Timestamps:3: Guest Intro:  Jeremy Clark and Casey Richards
10:  Defensive vs. Offensive CI
15: Critical thinking, intelligence, and #osint analysis (@Peter J. Lapp)
20:  Lee Dale & Unicorns
27:  Listener Question:  Bethany J. Redmond
47:  Assessment process
56:  Shawnee and Jim
1:00 Jeff Jones and Glenn Jones
1:09 Cybersecurity and AI with Listener Question: Shawn Michaud
1:24 Shoutout to Jesse Moore and Indago
1:25 Surveillance and Rapport
1:33 Mistakes?  Working through the challenges.
1:48 Listener Question:  Rachel Cunningham
2:04 Closing remarks

Copyright 2024 All rights reserved.

Podcast Powered By Podbean

Version: 20240731