Season 4, Episode 17
👻

Honey Traps 2.0

From Cold War Playbook to Silicon Valley Bedrooms. Jack Rhysider digs into the technical tradecraft behind modern honey trap operations — the kill chain, the digital forensics of a fabricated identity, and why the most sophisticated attack vector isn't a zero-day. It's a girlfriend.
March 28, 2026 1 hr 22 min Guest: Mark Reynolds
0:00:00 / 1:22:05

Imagine this: you're a senior engineer at one of the biggest chip companies in the world. A woman approaches you at a conference afterparty. Six months later, you're engaged. Three years in, the FBI knocks on your door. And your wife is already on a plane to Shanghai.

Mark Reynolds walks Jack through the complete kill chain of a modern honey trap operation — mapped to the MITRE ATT&CK framework — from reconnaissance and legend construction through delivery, exploitation, persistence (marriage), and exfiltration (pillow talk). Then they go deep on the digital forensics of detecting a fabricated identity and the systemic failures that make these operations nearly invisible.

Chapters

Full Transcript

Sources & References

Supported by ExpressVPN — Protect your online privacy. expressvpn.com/darknet
← Previous
Security Clearance & Pillow Talk (Lex Fridman)