Podcast

The Daly Threat Report

Cybersecurity podcast produced by Bastille that analyzes real-world security incidents and threat cases to provide actionable insights for security professionals


Daly Threat Report: Bastille Produced Podcast

Episodes

Michael Schena - "A Pocket Full of Secrets"

🎙️ The Daly Threat Report: "A Pocket Full of Secrets"\ What happens when wireless policy fails, and the threat is already inside the perimeter? In this five-minute micro-brief, Bastille’s Joe Daly breaks down the Michael Schena espionage case—a real-world example of insider threat tradecraft that evaded technical security for nearly three years. Joined by Shawnee Delaney (CEO, Vaillance Group and former U.S. intelligence officer), Joe explores how Schena allegedly used a personal smartphone to photograph and exfiltrate classified documents from inside a secure facility—undetected. They discuss the evolving techniques of foreign intelligence services, the limitations of current wireless security postures, and the urgent need for real-time detection tools in SCIFs, defense sites, and R&D environments. 🔍 Topics covered: How Schena was recruited and operated using classic espionage methods The staggering lack of wireless intrusion detection in secure environments Critical takeaways for insider threat programs and physical airspace security 📍 Learn more at ⁠Bastille.net/thedalythreatreport⁠ and connect with Shawnee Delaney at VaillanceGroup.com. Listen now—and ask yourself: Would your technical controls catch an unauthorized phone in your secure facility?

8m Play

Stuttgart Spy Ring

🎙️ The Daly Threat Report: "Stuttgart Spy Ring" What if your parking lot became a battlefield in the RF spectrum? In this five-minute tactical intelligence brief, Joe Daly (Bastille) and Shawnee Delaney (Vaillance Group) dissect a Russian-directed surveillance operation conducted outside Stuttgart Army Airfield. This episode explores how a modified civilian vehicle became a mobile SIGINT (signals intelligence) collection platform—used to harvest wireless identifiers from Ukrainian soldiers training on missile systems. These identifiers were allegedly used to track and target those individuals after they returned to Ukraine. 🔍 Topics covered: The use of IMSI catchers, Wi-Fi Pineapples, and multi-protocol surveillance Why traditional network security can't detect RF-based collection operations The real-world risks of protocol correlation attacks in secure facilities 📡 This case isn't about firewalls—it’s about invisible RF threats bypassing every conventional control. Key question for security leaders: If a foreign adversary set up a mobile SIGINT platform outside your perimeter today, would your current security stack detect it? 📍 For technical breakdowns, case studies, and detection tools, visit ⁠Bastille.net/thedalythreatreport⁠. Subscribe, share, and rethink what your perimeter really means.

8m Play

The Nearest Neighbor Attack

🎙️ The Daly Threat Report:"The Nearest Neighbor Attack" Your network is secure—but is your neighbor's? In this episode, Joe Daly (Bastille) and Shawnee Delaney (Vaillance Group) break down the "Nearest Neighbor Attack," where Russian APT28 actors bypassed hardened defenses by exploiting wireless proximity and compromising nearby businesses. Using dual-homed systems, guest Wi-Fi weaknesses, and wireless bridging, these attackers moved laterally—without ever touching a firewall. This operation showcases the future of persistent access: lateral RF-based infiltration, invisible to traditional network monitoring tools. 🔍 Topics covered: How Fancy Bear exploited neighboring infrastructure using dual-homed wireless devices Why firewalls and MFA are powerless against RF propagation and protocol pivots Actionable steps for monitoring and securing your wireless airspace 🌐 This episode is a wake-up call: Your threat perimeter now includes every RF-capable device within radio range—whether you own it or not. 📍 Visit ⁠Bastille.net/thedalythreat⁠ for technical analysis, detection frameworks, and more insights into defending against advanced persistent threats. Subscribe, share, and expand your threat model—because the attack vector just moved across the street.

9m Play

About

The Daly Threat Report podcast with Joe Daly is a cybersecurity podcast produced by Bastille that analyzes real-world security incidents and threat cases to provide actionable insights for security professionals. Hosted by Joe Daly from Bastille, the show examines current espionage cases, insider threats, and security breaches to reveal critical vulnerabilities in organizational security postures.

Each episode features expert guests and focuses on translating complex security incidents into practical defensive strategies, with particular emphasis on wireless security threats, SCIF protection, and insider threat detection. The podcast serves as an educational resource for security leaders managing classified environments, defense contractors, and organizations dealing with sophisticated threat actors.

Listen & Subscribe

Host & Speakers

Joe Daly

Joe Daly, Senior Director of Customer at Bastille

Joe Daly is the host of The Daly Threat Report, a podcast exploring real-world wireless threats, espionage cases, and RF vulnerabilities. With deep experience helping government and enterprise clients secure their airspace, Jo translates complex security challenges into actionable insights for protecting sensitive environments from rogue devices and wireless-enabled attacks.

Shawnee Delaney, CEO of Vaillance Group

Shawnee Delaney, CEO of Vaillance Group

Shawnee Delaney is the founder and CEO of Vaillance Group and a globally recognized expert in human risk management, insider threat, and security investigations. As a decorated former Clandestine Services Officer with nearly a decade at the Defense Intelligence Agency (DIA), she conducted human intelligence (HUMINT) operations worldwide, including four combat zone tours in Iraq and Afghanistan, ultimately serving as both Detachment Chief and Supervisory Branch Chief.

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.