
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Est. Listeners
Based on iTunes & Spotify (publisher stats).
- Per-Episode Audience
Est. listeners per new episode within ~30 days
25,001 - 50,000 - Monthly Reach
Unique listeners across all episodes (30 days)
75,001 - 150,000 - Active Followers
Loyal subscribers who consistently listen
15,001 - 40,000
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
Recent episodes
Dead Drops, Brush Passes, and Spy Tradecraft That Still Works Today: The Psychology of Invisible Communication in a Hyper-Surveilled World
May 4, 2026
6m 06s
The Macau Ghost: Inside the Brass Monkey Files – Espionage, Asset Compromise, and Intelligence Tradecraft Breakdown
May 3, 2026
4m 25s
The Lazarus Proxy: Inside North Korea’s Global IT Heist
Apr 30, 2026
4m 02s
The Puppet Masters: Kermit Roosevelt and the Art of the Coup
Apr 28, 2026
4m 50s
The Lifecycle of a Spy Network — How Intelligence Operations Rise, Operate, and Collapse
Apr 26, 2026
10m 25s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Description | Length | ||||||
|---|---|---|---|---|---|---|---|---|---|
| 5/4/26 | Dead Drops, Brush Passes, and Spy Tradecraft That Still Works Today: The Psychology of Invisible Communication in a Hyper-Surveilled World | Analyze the enduring mechanics of classic espionage techniques—dead drops, brush passes, and related tradecraft—still employed by intelligence services despite pervasive digital surveillance. This episode breaks down operational principles, psychological advantages, and real-world applications, revealing how anonymity, misdirection, and human psychology enable secure communication when electronic methods carry unacceptable risk. Essential listening for intelligence professionals, students of security studies, psychologists of deception, business leaders concerned with operational security, and anyone navigating trust and privacy in an era of constant monitoring. | 6m 06s | ||||||
| 5/3/26 | The Macau Ghost: Inside the Brass Monkey Files – Espionage, Asset Compromise, and Intelligence Tradecraft Breakdown | we examine “The Macau Ghost” — a high-stakes espionage case involving asset recruitment, operational compromise, and counterintelligence tactics in Macau’s shadowy financial and intelligence landscape. This forensic intelligence analysis details the tradecraft, psychological operations, and security failures that led to the asset’s exposure and the network’s collapse. Essential listening for understanding modern espionage dynamics, handler-asset relationships, and the real-world challenges of running covert operations in high-risk environments. | 4m 25s | ||||||
| 4/30/26 | The Lazarus Proxy: Inside North Korea’s Global IT Heist | We go behind the firewall to expose a sophisticated North Korean espionage unit infiltrating Western companies through remote IT roles. Discover how elite state-sponsored hackers bypass security protocols to funnel millions back to a rogue regime’s weapons program. This episode uncovers the digital "Trojan Horse" currently threatening the global tech infrastructure. | 4m 02s | ||||||
| 4/28/26 | The Puppet Masters: Kermit Roosevelt and the Art of the Coup | How did a single CIA officer with a suitcase full of cash topple a democratically elected prime minister? This episode deconstructs the tradecraft used by Kermit Roosevelt Jr. to orchestrate the downfall of Mohammad Mosaddegh. We analyze the recruitment of local "influencers," the use of paid protesters, and the creation of "black" propaganda to flip the Iranian public. Discover how the CIA and MI6 turned a failing mission into a blueprint for regime change that would be studied by intelligence agencies for the next 70 years. | 4m 50s | ||||||
| 4/26/26 | The Lifecycle of a Spy Network — How Intelligence Operations Rise, Operate, and Collapse | A high-level intelligence and national security podcast analyzing the full lifecycle of spy networks, including recruitment, covert operations, counterintelligence, double agents, and systemic collapse. This episode explores CIA and FBI case studies, HUMINT tradecraft, information warfare, and modern digital espionage, revealing how intelligence systems are built, compromised, and rebuilt. Ideal for listeners interested in espionage strategy, global security, covert operations, psychological manipulation, and advanced intelligence analysis. | 10m 25s | ||||||
| 4/24/26 | The Gareth Williams “Spy in the Bag” Mystery (2010): Unresolved Questions in the Death of an MI6 Codebreaker | In August 2010, the naked body of 31-year-old Gareth Williams, a gifted mathematician and cryptographic expert on secondment from GCHQ to MI6, was discovered padlocked inside a red North Face sports bag in the bathtub of his secure London flat. Despite extensive forensic investigation, an inquest ruled the death unnatural and likely criminally mediated, while subsequent police reviews concluded it was probably an accident, leaving core questions about third-party involvement and the precise circumstances unanswered. This case exemplifies enduring intelligence mysteries, sparking public interest in espionage tradecraft, forensic limitations, and the tension between official narratives and unresolved evidence in high-stakes national security contexts. | 6m 06s | ||||||
| 4/22/26 | Project Iceworm: The U.S. Army’s Secret Nuclear Missile Base Beneath the Greenland Ice Sheet | In this episode, we examine Project Iceworm, the U.S. Army’s secret Cold War plan from the 1950s and 1960s to construct a massive network of mobile nuclear missile launch sites beneath the Greenland ice sheet. Disguised as the scientific research station Camp Century, the project raised serious counterintelligence concerns with Denmark and long-term environmental risks due to buried nuclear wast | 4m 23s | ||||||
| 4/21/26 | The Rumrich Nazi Spy Case (1938): The FBI’s First Major International Espionage Investigation | In this episode, we examine the Rumrich Nazi Spy Case of 1938, the FBI’s first major international espionage investigation. Naturalized U.S. citizen Guenther Rumrich, a former Army deserter recruited by German intelligence, was arrested after impersonating the Secretary of State to obtain blank passports for Nazi agents. The case exposed a broader spy ring, led to four convictions, and established key precedents for U.S. counterintelligence on the eve of World War II. | 6m 07s | ||||||
| 4/19/26 | Spies, Lies, and Centrifuges: A CIA Case Officer’s Hunt for the World’s Most Dangerous Man | Retired CIA officer James Lawler discusses his pivotal role in dismantling the A.Q. Khan network, the global nuclear black market that once threatened international security. He provides a masterclass in human intelligence, detailing how his team successfully recruited assets to stop the proliferation of weapons of mass destruction. Lawler also introduces his novel, Living Lies, explaining how his real-world experience battling nuclear threats inspired his transition into espionage fiction. | 50m 45s | ||||||
| 4/17/26 | The Surveillance of the Drone Pipeline | No description provided. | 2m 27s | ||||||
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 4/16/26 | The Perception Gap: Counter-Surveillance Tactics in Urban Environments | No description provided. | 1m 54s | ||||||
| 4/13/26 | The Digital Trojan Horse: PROMIS and the Birth of Global Surveillance | No description provided. | 3m 34s | ||||||
| 4/6/26 | Triple agent codenamed CAT | No description provided. | 8m 50s | ||||||
| 3/1/26 | Russian spy pleads guilty in honey trap case | No description provided. | 1m 39s | ||||||
| 2/24/26 | THE UMBRELLA ASSASSIN | No description provided. | 7m 29s | ||||||
| 2/17/26 | France captures two Chinese national spies | Don’t forget to check out our new podcast logical lead off | 2m 45s | ||||||
| 12/16/25 | WE CHAT WITH FORMER CIA CASE OFFICER ON HIS TIME IN CAMBODIA AS A RECRUITER | No description provided. | 46m 43s | ||||||
| 12/11/25 | THE 4TH MAN- THE HUNT FOR A KGB SPY AT THE TOP OF THE CIA | No description provided. | 34m 29s | ||||||
| 12/1/25 | An update on espionage in the university | No description provided. | 2m 56s | ||||||
| 11/10/25 | AI and espionage | No description provided. | 3m 34s | ||||||
| 10/19/25 | Operation Neptune: The Cold War’s Forgotten Fake Treasure Hoax | No description provided. | 2m 15s | ||||||
| 9/28/25 | Operation Tamarisk: Espionage in the Trash | No description provided. | 1m 58s | ||||||
| 9/25/25 | North Korea’s Stolen Filmmaker: The Story of Shin Sang-ok and Choi Eun-hee | No description provided. | 1m 47s | ||||||
| 9/14/25 | Compromising Operation Valuable | No description provided. | 3m 03s | ||||||
| 9/7/25 | Kim Philby the double agent | No description provided. | 4m 36s | ||||||
Showing 25 of 374
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
4 placements across 4 markets.
Chart Positions
4 placements across 4 markets.
