Security Researcher
I’ve spent more than 20 years inside the world of wireless security, electronic warfare, and counter-surveillance. In that time I’ve built and patented technologies used to protect national security, advised on cellular security standards, trained and briefed U.S. and allied military and intelligence agencies, and was recognized at RSA 2020 as Mobile Privacy Expert of the Year. My work has been featured in FastCompany, Cyber Defense Magazine, and even portrayed on screen in the Keanu Reeves film Siberia for its realism. I’ve co-authored an international bestseller on cybersecurity and am finishing a new book on surveillance and privacy that exposes how deep these systems really go.
This channel is where I bring that experience to you. From cell phone tracking to insider threats, I explain the hidden technologies shaping our lives in plain English so you can understand how the surveillance state works, and how it affects you.
Be a member: www.youtube.com/securityresearcher/join
Мир вокруг вас сегодня был построен в 1960-х годах
Миф о телефоне без Google: почему он выделяет вас
10 Documented Ways Your Phone Spies on You
NPD Data Breach - They Have Your SSN
Insider Threat – CIA & DoD Perspective
Scammers Use Ai Voice Cloning: Don’t Be the Next Victim
What If You Can't Trust What You See?
The Apps Abusers Use To Track and Control Victims
Мошенничество с использованием искусственного интеллекта раскрыто: клонирование голоса и дипфейки
Where Did Ai Come From? Where Will It Take Us?
AI, Quantum, Robotics: The Coming Collision
The Secret Military History of the Internet
They’re Not Listening. It’s Worse.
Прекратите использовать QR-коды — простым языком за 2 минуты.
Working From Home? - How to Protect Your Data
Technology Law Expert - Robert Kost
'#Hacked2' with Cyber Security Expert and Author Albert Whale.
Silent SMS & OTA - Tracking Your Phone Without You Knowing
Juice Jacking: How Public Charging Ports Can Hack Your Phone & The Simple Solution
Creating Your Personal Security Plan: A Simple Guide to Staying Safe Online
Why Keyless Cars Are Easy to Steal - Key Fob Relay Attack Explained
Unlock Any Phone with the UFED Tool by Cellebrite – Apple and Android Devices
Cellphone Surveillance Explained - Stingray/IMSI Catchers
How Cell Networks Track Your Location with GPS-Like Accuracy 📱
Biometric Fingerprint Locks: What You Should Know About Privacy and Security
Top 3 Questions Answered: Top 3 Questions About Cell Phone Surveillance, Spying, Hacking & Tracking
The Safest Way to Store Your Passwords: Why a Physical "Little Black Book" Is Still Secure
Are You at Risk of Juice Jacking? How to Stay Safe at Public Charging Stations
How Home Cell Signal Boosters (Femtocells) Can Be Hacked: Protect Your Data
How to Protect Your Cell Phone from Tracking, Spying, Stalking, Hacking, and Eavesdropping