Podcast Summary: The Team House Ep. 398
From Army Intel in Iraq to CSO of Coinbase | Philip Martin
Host: Jack Murphy
Guest: Philip Martin
Published: February 21, 2026
Episode Overview
This episode features Philip Martin, Chief Security Officer at Coinbase and former Army Counterintelligence (CI) agent. The conversation traces Martin’s unique journey from Silicon Valley coder to veteran CI agent serving in Iraq, to heading security at some of the world’s most innovative tech companies. Jack Murphy and Martin discuss tradecraft in Iraq, how cyber and human intelligence overlap, security challenges in the private sector and crypto, and the real-world frontlines of anti-fraud and cybercrime affecting both individuals and international finance.
Key Discussion Points & Insights
1. Philip Martin’s Path to the Army & Counterintelligence
Timestamps: 02:22–05:51
- Origin Story: Started out as a self-taught coder and software engineer in Northern California; dropped out of college to join a startup.
- Turning Point: Burned out after the dot-com bust and spurred by the 9/11 attacks, Martin decided to follow his family’s long tradition of military service (02:59).
- Army Entry: Chose Army over other branches (with jokes about “edible crayons” and the Marines), opting for the National Guard and aiming to “do something that I might not ever get a chance to do again.”
- Why Counterintelligence: Wanted a people-focused role and to move away from computers, drawn to CI but found the reality more complex and both less and more technical than the recruitment pitch (05:51).
2. Training in Language and Tradecraft
Timestamps: 07:08–09:28
- Arabic Fluency: Completed a rigorous two-year pipeline, including a year and a half at DLI, ultimately achieving "3/3" fluency on the military proficiency scale—equivalent to a high school graduate in Arabic (07:10).
- "After my deployment to Iraq…I was a 3/3. The way they do these testing is like, there's one test that goes up to 3/3, and there's another one that goes … up to 5/5." — Philip Martin (07:17)
- CI Special Agent Course (CISAC): 22–28 weeks at Fort Huachuca learning Army basics and the “huge world of CI” (09:28), including investigations, technical surveillance, and tradecraft.
- Role as a Badge Credentialed Agent: Explained the nuances between CI agents with and without full federal law enforcement powers (10:13).
3. Deployment to Iraq: Human Intelligence & Counterinsurgency
Timestamps: 13:54–22:10
- Assignment: Deployed to FOB Kalsu on the Sunni-Shia divide, a high-conflict, tribally divided area (13:54).
- CI Jobs On-the-Ground: Focused on force protection, identifying local threats, and building relationships with Iraqi communities.
- “Rolling Up” the Mortar Cell:
- Martin described the serendipity and legwork of finding insurgent cells—being present and helpful in the community, gaining trust, and acting on tips.
- His team ultimately seized the insurgents' mortar cache and “overnight” stopped frequent indirect fire attacks on their base:
- "We hit their little munitions cache…took them home…after that the mortar attack stopped." — Philip Martin (21:31)
- Discussed complexities and missed opportunities (e.g., wanting to booby trap the cache or set an ambush, but constraints from leadership). (22:03)
4. The Realities of CI & HUMINT Work
Timestamps: 27:40–38:05
- CI vs. HUMINT: Described doing HUMINT out of necessity due to a shortage of designated intelligence collectors.
- "A lot of CI guys…ended up on tactical HUMINT teams doing this work." — Philip Martin (27:51)
- On-Base and Outside-the-Wire: Managing local national workers, vetting potential spies among contractors, and running case-by-case investigations—often having to sort through innocuous behavior versus genuine espionage (30:36, 31:36).
- Source Handling & Mission Pressure: Recalls moments where he had to refuse high-pressure requests from line commanders to compromise source safety for mission objectives.
- "I had to walk over there and tell them, like, we can't do this raid. My guy's not here…And the S2…backed me up. That is the opposite of how you run sources." (35:22)
- CI as Social Work: Emphasized the emotional intelligence and “social worker” aspects of managing sources and locals (38:11).
5. Adapting to Changing Battlefields & Reflections
Timestamps: 38:41–40:19
- Change in Iraq’s “battle rhythm,” cyclical violence, and recognizing the scale of their impact—focusing on “small wins” like stopping mortar attacks as tangible difference-makers, even if their strategic value is murkier in hindsight.
6. Transitioning to Civilian Security: Amazon, Palantir, Coinbase
Timestamps: 40:39–57:13
- From Guard to Amazon: Felt unfulfilled by Amazon’s mission, craving something “that scratched that itch.”
- Palantir: Recruited by a former Army colleague; thrilled by the real-world mission to “bring warfighter technology from Silicon Valley” to analysts (42:21). Praised Palantir for revolutionizing data visualization and analysis for intelligence, vs. old tools (43:02).
- CI Missions Abroad: Noted force protection and partnerships with local security services in Uganda, Jamaica—often more about relationship-building and prevention than direct action (44:22).
- Red Teaming and Security Culture: At Palantir, involved in aggressive red teaming, breaking into their own systems, and even physical security for executives to preempt activist or criminal targeting (54:08).
7. Leading Security at Coinbase
Timestamps: 57:13–62:53
- Joining Coinbase: Early days (2016), very small company, and excited because “rarely did I encounter even pieces of solutions” for security challenges in crypto (57:18).
- Unique Security Challenge: How to protect cryptographic private keys controlling billions of dollars, especially when traditional methods couldn’t simply be borrowed.
- "How do you protect private keys…that by themselves control access to hundreds of millions…now hundreds of billions of dollars?" — Philip Martin (59:04)
- What Coinbase Does: Explained as the crypto equivalent of Fidelity (brokerage), a bank, and an exchange—serving both retail and institutional clients, and providing secure custody for substantial crypto holdings (59:50).
- Revenue Model: Makes money on transaction fees; does not lend out or fractionally reserve customer crypto assets (61:40).
8. Crypto, Crime, and Transparency
Timestamps: 62:53–68:12
- Crime and Crypto: Acknowledged that crime occurs everywhere, but the transparency of blockchain makes tracking illicit transactions easier than traditional finance (65:54).
- "Those transactions, there's no way to hide…they're there on the blockchain for anyone to look at." — Philip Martin (65:54)
- Law Enforcement: Explained how the FBI can trace transactions, only needing subpoenas to link blockchain addresses to customer identities when required (67:09).
9. Crypto and Economic Freedom
Timestamps: 68:12–79:58
- Global Impact: Crypto as a tool for economic empowerment, especially for entrepreneurs and citizens in unstable or authoritarian regimes.
- Stablecoins and inflation: Cited Argentina as an example where citizens use USD-backed stablecoins to protect against rampant inflation.
- “You can effectively dollarize your own personal…trade and mitigate the risk of your country's central bank…” — Philip Martin (73:02)
- Geopolitics & Sanctions: Discussed the impact of sanctions on Russia/Ukraine and how crypto both challenges and reinforces dollar dominance (73:12).
- Crypto enables “re-dollarization from the other direction”—individuals escaping inflation via stablecoins, while governments try to shift away from the dollar.
10. The Real Work of Security in Tech
Timestamps: 79:58–89:06
- Role as Chief Security Officer: Manages a broad spectrum of risks—from physical security and bomb threats to high-tech anti-fraud and insider threats.
- "We deal with everything from bomb threats to our executives…all the way to people trying to break into Coinbase user accounts.” — Philip Martin (80:12)
- Anecdote—“The Tequila Bomb”: Recalls a security scare when a gift bottle with electronics (actually LED lights) was nearly detonated by the LAPD bomb squad due to its suspicious appearance on x-ray (81:48–83:57).
- Insider Threats: Discussed the complexity of monitoring and preventing employees from abusing access, especially with social engineering, outside offers, or organized crime:
- "We've had cases…of bad guys offering insiders…sums of money…in exchange for actions like sharing customer information." (84:14)
- Targeting by Crime and Intelligence: Most targeting comes from transnational organized crime rather than intelligence services seeking state secrets.
11. Fraud, Scams, and Human Trafficking in Cybercrime
Timestamps: 90:44–95:46
- Old Scams, New Tech: “There are no new scams. Right. It’s all old scams.” (90:44)
- Pig Butchering: Detailed the “pig butchering” romance/financial scam trend and how it exploits trust over longer periods.
- Scam Compounds/Human Trafficking: Many fraudsters are actually trafficking victims in scam camps in Southeast Asia, abusing both the perpetrators and their targets.
- Highlighted the work of Erin West and Operation Shamrock to expose, document, and pressure local governments to act (93:23).
12. Final Messages on Security and Crypto
Timestamps: 96:00–102:13
- Urgency of OpSec and Education: Advocated for widespread education, especially for those most vulnerable to scams (96:53–99:48).
- "Don't let the first time a potential victim hears about a scam…be from the scammer. Let it be from a friend." — Philip Martin (96:00)
- Getting Started in Crypto: Encouraged beginners to start small, stick to reputable assets, and learn from trusted sources.
- "Don't put anything into it unless you're prepared to set that money on fire to start." — Jack Murphy (101:12)
Notable Quotes & Moments
- On intelligence work:
"If intelligence is about you defining your view of your adversary, CI is about you defining your adversary's view of you…" — Philip Martin (09:53) - On source management:
"We can't do this raid. Like, my guy's not here. We can't ID the house…That's going to endanger my source, probably get him killed." — Philip Martin (35:22) - On “pig butchering” scam:
"The principle…is like, you fatten up the pig before you take it to slaughter. You spend…a lot more time building the relationship and convincing the victim that, that you are there for." (90:52) - On crypto’s challenge to state power:
"In a world where they don't have the ability to seize it, maybe it becomes a crime to possess…But the transactions could still happen and the commerce could still go on and it would insulate that population from the impact…" — Philip Martin (77:13) - On public transparency of blockchain:
"There’s no hiding them, deleting them, obfuscating them, getting rid of them. And that is an immense benefit to law enforcement...” (67:46)
Timestamps for Important Segments
| Time | Segment Description | |--------|---------------------------------------------| | 02:22 | Philip’s background and path to Army | | 09:28 | CI training and special agent certification | | 13:54 | First deployment to Iraq/FOB Kalsu | | 15:51 | Rolling up the base’s mortar cell | | 27:40 | CI work blurring into HUMINT | | 35:22 | Refusing to compromise source integrity | | 40:39 | Transition to civilian—Amazon and Palantir | | 57:13 | Joining Coinbase, security challenges | | 65:54 | Blockchain transparency and crime | | 68:12 | Economic freedom & global finance | | 73:12 | Russia sanctions & crypto geopolitics | | 80:12 | Day-to-day at Coinbase security | | 84:14 | The insider threat challenge | | 90:44 | Pig butchering, romance & scam trends | | 93:23 | Human trafficking & scam compounds | | 96:00 | Security education—reach your loved ones | | 100:10 | How to get started in crypto |
Conclusion
This episode walks listeners through the continuum of intelligence work across fields, the overlap of analog and digital security threats, and the complexities of leading security for a massive financial technology company. Martin offers practical lessons—not just on the importance of technical prowess, but ethical judgment, human relationships, and community education in the digital era. His experience underscores the stakes and the evolving nature of both national security and everyday fraud. The ultimate message: Stay vigilant, educate those around you, and treat security as everyone’s responsibility.
Find Philip Martin and his work at Coinbase.com.
