Discover
The Daly Threat Report with Joe Daly
7 Episodes
Reverse
Kevin Mallory - “The Micro-SD Spy”
In early 2017, Kevin Patrick Mallory—a former CIA undercover operative and DIA senior intelligence officer who once held a Top Secret clearance—was $230,000 in debt and falling months behind on his mortgage. Desperate for a lifeline, he answered a LinkedIn message from a Chinese intelligence officer posing as a think tank representative. This single exchange sparked a devastating betrayal that ultimately led to Mallory’s 20-year federal prison sentence for espionage.
In this episode, we sit down with a former case officer and espionage expert, and current CEO of Vaillance group Shawnee Delaney, to dissect the modern tradecraft that made Mallory's breach possible—and why it proves that standard facility security is no longer enough.
In this episode, we cover:
- The Human Element: How a floundering career and crushing debt made a highly vetted intelligence officer a ripe target for foreign recruitment.
- The Invisible Tradecraft: A deep dive into the Samsung Galaxy "covcom" device and how malicious insiders are weaponizing everyday, compact electronics to securely communicate with foreign adversaries.
- The Failure of Traditional Perimeters: Why standard visual checks, fences, and badge scanners are completely blind to hidden micro SD cards and powered-down smartphones.
- Securing the RF Environment: How Bastille’s advanced wireless airspace cyber security technology provides the mandatory layer of defense needed to detect unauthorized electronics inside restricted zones before classified data ever leaves the room.
Tune in to understand how the frontline of physical security has shifted, and why taking control of your facility's digital and radio frequency environment is the only way to catch the modern spy. To learn more visit bastille.net
In this episode of The Daily Threat podcast from NVIDIA GTC, host Joe Daley interviews cybersecurity veteran Paul Kalatayud about emerging wireless security challenges in AI data centers. Paul, a five-time Fortune 100 CISO with 26 years of experience, discusses how AI has evolved from a technical to a business conversation and the implications for physical security. The conversation covers three main wireless security threats: unintentional vulnerabilities from manufacturers adding smart features, intentional surveillance attempts, and adversarial attacks through compromised supply chains. Paul shares real-world examples, including a customer who unknowingly received RFID door locks with enabled Bluetooth capabilities they never requested. The discussion explores how AI data centers may face stricter compliance requirements similar to critical infrastructure, and Paul advises security practitioners to treat wireless security monitoring like traditional vulnerability scanning to understand their complete attack surface.
In this episode of The Daly Threat podcast, host Dr. Brett Walkenhorst interviews Scott Stapp, a retired Air Force general and former CTO at Northrop Grumman, about the security risks posed by smartphones on Navy ships. Stapp explains how adversaries can now use commercial satellite constellations like Starlink and advanced RF collection capabilities to geolocate military vessels through sailor's personal devices. He emphasizes that just one active smartphone can compromise the location of an entire aircraft carrier, even when the ship is attempting to hide during critical operations. The discussion covers the challenges of enforcing device policies among thousands of sailors, the importance of operational security (OPSEC) education, and practical solutions like Faraday bags and RF detection systems. Stapp stresses that military organizations must invest in self-detection capabilities to identify their own RF signatures before adversaries can exploit them, and highlights the need for faster adaptation to emerging technology threats in defense operations.
In this episode of the Daly Threat Podcast, host Joe Daly sits down with Dale “Woody” Wooden of Weathered Security to unpack one of the most misunderstood topics in secure-facility design: RF shielding. Despite its reputation—and its cost—shielding is rarely the airtight solution facility owners expect.
🎙️ The Daly Threat Report: "Stuttgart Spy Ring"
What if your parking lot became a battlefield in the RF spectrum? In
this five-minute tactical intelligence brief, Joe Daly (Bastille) and
Shawnee Delaney (Vaillance Group) dissect a Russian-directed
surveillance operation conducted outside Stuttgart Army Airfield. This
episode explores how a modified civilian vehicle became a mobile SIGINT
(signals intelligence) collection platform—used to harvest wireless
identifiers from Ukrainian soldiers training on missile systems. These
identifiers were allegedly used to track and target those individuals
after they returned to Ukraine.
🔍 Topics covered: The use of IMSI catchers, Wi-Fi Pineapples, and
multi-protocol surveillance Why traditional network security can't
detect RF-based collection operations The real-world risks of protocol
correlation attacks in secure facilities
📡 This case isn't about firewalls—it’s about invisible RF threats
bypassing every conventional control. Key question for security leaders:
If a foreign adversary set up a mobile SIGINT platform outside your
perimeter today, would your current security stack detect it? 📍 For
technical breakdowns, case studies, and detection tools, visit
Bastille.net/thedalythreatreport. Subscribe, share, and rethink what
your perimeter really means.
🎙️ The Daly Threat Report: "A Pocket Full of Secrets"\
What happens when wireless policy fails, and the threat is already inside the perimeter? In this five-minute micro-brief, Bastille’s Joe Daly breaks down the Michael Schena espionage case—a real-world example of insider threat tradecraft that evaded technical security for nearly three years. Joined by Shawnee Delaney (CEO, Vaillance Group and former U.S. intelligence officer), Joe explores how Schena allegedly used a personal smartphone to photograph and exfiltrate classified documents from inside a secure facility—undetected. They discuss the evolving techniques of foreign intelligence services, the limitations of current wireless security postures, and the urgent need for real-time detection tools in SCIFs, defense sites, and R&D environments.
🔍 Topics covered:
How Schena was recruited and operated using classic espionage methods
The staggering lack of wireless intrusion detection in secure environments
Critical takeaways for insider threat programs and physical airspace security
📍 Learn more at Bastille.net/thedalythreatreport and connect with Shawnee Delaney at VaillanceGroup.com.
Listen now—and ask yourself: Would your technical controls catch an unauthorized phone in your secure facility?
🎙️ The Daly Threat Report:"The Nearest Neighbor Attack"
Your network is secure—but is your neighbor's? In this episode, Joe Daly (Bastille) and Shawnee Delaney (Vaillance Group) break down the "Nearest Neighbor Attack," where Russian APT28 actors bypassed hardened defenses by exploiting wireless proximity and compromising nearby businesses.
Using dual-homed systems, guest Wi-Fi weaknesses, and wireless bridging, these attackers moved laterally—without ever touching a firewall. This operation showcases the future of persistent access: lateral RF-based infiltration, invisible to traditional network monitoring tools.
🔍 Topics covered:
How Fancy Bear exploited neighboring infrastructure using dual-homed wireless devices
Why firewalls and MFA are powerless against RF propagation and protocol pivots
Actionable steps for monitoring and securing your wireless airspace
🌐 This episode is a wake-up call: Your threat perimeter now includes every RF-capable device within radio range—whether you own it or not.
📍 Visit Bastille.net/thedalythreat for technical analysis, detection frameworks, and more insights into defending against advanced persistent threats.
Subscribe, share, and expand your threat model—because the attack vector just moved across the street.







