I’ve spent more than 20 years inside the world of wireless security, electronic warfare, and counter-surveillance. In that time I’ve built and patented technologies used to protect national security, advised on cellular security standards, trained and briefed U.S. and allied military and intelligence agencies, and was recognized at RSA 2020 as Mobile Privacy Expert of the Year. My work has been featured in FastCompany, Cyber Defense Magazine, and even portrayed on screen in the Keanu Reeves film Siberia for its realism. I’ve co-authored an international bestseller on cybersecurity and am finishing a new book on surveillance and privacy that exposes how deep these systems really go.
This channel is where I bring that experience to you. The goal here is to explain the technologies shaping our lives in plain English so you can better understand your technology, and how it affects you.
Become a member: www.youtube.com/securityresearcher/join
Security Researcher
Something I don’t usually talk about:
Right at the start of the pandemic, in March 2020, I was flown first class out to San Francisco to receive two awards at RSA, one of the largest cybersecurity conferences in the world: Mobile Privacy Expert of the Year and Most Innovative Product.
The awards were related to technology I had developed and patented - technology evaluated by ODNI, WHCA and the folks in McLean, ultimately approved for use to protect the Presidential Daily Briefing tablet used during the Obama administration, and also featured in a Keanu Reeves film called Siberia.
So, while I was there, I saw this and figured it was worth sharing.
You are looking at the NSA booth during setup.
And yes, they had a charging station for your cell phone.
How thoughtful.
I wish I had stuck around to see how many people actually plugged their phones into it, but exploring the redwoods and wine country of Northern California was a lot more interesting than hanging around with 40,000 people from around the world at the start of a pandemic.
Shout out to Naomi Brockwell who just did a video on how to protect yourself from this kind of threat. You can find her video here: https://www.youtube.com/watch?v=nJP_i...
Naomi is good people.
Side note, since there seems to be some confusion. The technology I developed and patented has nothing to do with "juice jacking." As a matter of fact it has gone on to be adapted for use in drones, satellites and other national security assets. It has nothing to do with juice jacking.
1 week ago (edited) | [YT] | 21
View 6 replies
Security Researcher
🚨Something serious has changed behind the scenes.🚨
I’m not ready to say exactly what yet, but I can tell you this:
What’s in front of me now is bigger than just this channel, and bigger than me trying to do every part of the production stack myself.
So I’m looking for help.
Real help.
Editors.
Production people.
Media-minded operators.
And yes, that includes students and up-and-coming people who want a real shot.
But read this carefully before you respond.
I am not just looking for someone who can cut video.
I’m looking for people who can recognize what matters inside dense material, shape it clearly through editing and visual storytelling, and package it in a way that actually gives it a chance to reach people.
Because a lot of the material I work with is serious, thoughtful, and information-dense.
The problem is usually not that the ideas are weak.
The problem is that the meaning gets lost unless someone knows how to pull it forward.
So if you want in, understand the kind of instincts I’m looking for:
finding strong clip moments inside long-form material
recognizing the core point quickly
understanding what a general audience is likely to miss
improving clarity and momentum without flattening the idea
using pacing, captions, framing, structure, and visuals to make the point land
preserving the speaker’s meaning instead of turning everything into disposable slop
building smart packaging around the final asset
That last part matters too.
Because this is not just about editing.
It’s also about whether you can think through:
titles
alternate title angles
descriptions
tags / keywords
thumbnails
thumbnail text
platform fit
format fit
pinned comments / engagement prompts
overall upload packaging
In other words: can you take a strong idea, make it clearer, and present it in a way that gives it a real shot in the world?
And one more thing.
I’m not against AI tools.
Use them for transcription, captioning, cleanup, organization, rough exploration, whatever makes sense.
But let’s be clear: this is not a “run it through an automated clipping platform and send me whatever it spits out” situation.
You can use AI to support your workflow.
You cannot outsource your judgment.
What I’m actually looking for is editorial judgment.
The ability to hear a dense idea, understand what matters in it, figure out what a broader audience might miss, and then make it clearer without making it cheap, shallow, or misleading.
If that sounds like your lane, comment below or reach out.
And when you do, tell me what you actually do:
editing
clipping
long-form cleanup
short-form packaging
thumbnail work
upload strategy
production support
organization
whatever your real lane is
If you’ve got examples of your work, include them.
If you don’t have a deep portfolio yet, then tell me why you think you’re right for this and what kind of material you handle best.
Because what I need now is not random enthusiasm.
I need people who can help turn serious material into serious output. If it's not you but you know someone... Pass this along to them.
🙏Thank you.
3 weeks ago | [YT] | 13
View 9 replies
Security Researcher
New opportunity for the right person… or persons.
This one’s going to be someone’s lane.
I’m helping connect qualified individuals with a legitimate organization that has been engaged to perform security testing against a biometrics-related technology platform.
To be clear:
I’m not the client.
I’m not the hiring organization.
I’m not executing the work.
I’m simply helping get this in front of people who actually have the skill set.
This is real red team / adversarial assessment work.
Relevant experience includes things like:
biometric system security (facial recognition, fingerprint, iris, etc.)
presentation attacks / spoofing / liveness bypass
adversarial testing and red teaming methodologies
identity verification systems and fraud resistance
attack surface analysis and system abuse cases
hardware / sensor-level exploitation
mobile or embedded system security
computer vision / ML model evasion (for biometric systems)
API and backend exploitation tied to identity systems
If you’ve actually worked in this space and want to be considered, send me:
a brief summary of your background
your specific areas of expertise
and the best way to reach you
Times are tight right now. A lot of good people are looking for real opportunities.
If this is your lane, step forward.
Serious inquiries only.
1 month ago | [YT] | 9
View 1 reply
Security Researcher
Final update on the cellular infrastructure research project.
The next phase is now moving forward.
For those who want to take part, the contact details for the research team are now posted on the member side of this channel.
I’ll leave that information up for one week.
After that, it comes down.
If you want to be considered, it’s on you to step forward and make contact.
This is tied to real-world cellular infrastructure and security research, and contributors may be assisting in data collection that feeds into active work.
For those who provide meaningful data, there is a strong possibility of formal acknowledgment as part of the research.
I’m not coordinating this.
I’m not managing this.
I’m simply connecting capable people to a real opportunity.
From here, it’s on you.
Also worth mentioning:
There is a separate opportunity coming soon related to red teaming work.
More on that shortly.
If you want access to what’s live now:
youtube.com/securityresearcher/join
1 month ago | [YT] | 7
View 1 reply
Security Researcher
I’m not going to post the full details of this project publicly.
If this moves forward, participation will be limited and coordinated through the member side.
This is being built alongside people working directly within telecommunications infrastructure.
Contributors won’t just be observing from the outside. They will be assisting in data collection that feeds into active research being done by industry professionals focused around cellular system behavior and security.
And for those who contribute at a meaningful level, that work may be formally recognized as part of the research.
That’s not something most people ever get access to.
That’s also why this isn’t being opened broadly.
If you want access to what’s actually happening, you know where to go.
youtube.com/securityresearcher/join
1 month ago | [YT] | 6
View 3 replies
Security Researcher
Most people use cellular infrastructure every day without thinking about how little we actually understand its real-world behavior.
This research is being developed by industry professionals who operate in and around that infrastructure - not from the outside looking in.
The goal is to better understand how these systems behave in the real world, and where improvements in security and structure may be needed.
If participation opens up, contributors will be part of that effort and those who provide meaningful data may be recognized in the resulting work.
If that means something to you, you already know where this is going.
The deeper discussion is happening on the member side.
youtube.com/securityresearcher/join
1 month ago | [YT] | 7
View 1 reply
Security Researcher
Anyone who has ever done a cellular drive test already knows:
static measurements only tell part of the story.
The real behavior shows up in motion.
Handoffs.
Transitions.
Coverage shifts.
Carrier differences.
Now imagine studying that systematically.
That’s where this is going.
This isn’t theoretical. This is coming out of real-world cellular infrastructure and security work.
If this opens up, contributors will be assisting in collecting data that may be used to improve how these systems are understood and secured.
Those who contribute usable data may be formally acknowledged as part of the research.
Since contact information of the responsible parties will be shared, the deeper discussion is happening on the member side of this channel.
youtube.com/securityresearcher/join
1 month ago | [YT] | 6
View 3 replies
Security Researcher
Quick reality check:
This cellular infrastructure research effort is already underway.
This isn’t an idea, or concept.
This is active work, in process.
What I’m deciding now is how many people from this community get pulled into the next phase.
Since contact information of the responsible parties will ultimately be shared, the deeper discussion is happening on the member side of this channel.
If you're interested in participating follow the link below.
youtube.com/securityresearcher/join
1 month ago | [YT] | 3
View 0 replies
Load more