True Crime Reporter® Podcast

  • About
  • Crime Stories
  • Subscribe
  • News
  • Contact
You are here: Home / Shows / How To Read People To Protect Yourself From Crime Part 2

April 1, 2025 By Robert Riggs

How To Read People To Protect Yourself From Crime Part 2

Podcast: Play in new window | Download (Duration: 33:24 — 45.9MB)

In this episode, we continue our deep dive with retired FBI Special Agent Robin Dreeke—a man whose job wasn’t just catching spies but recruiting them.

Dreeke led the FBI’s elite Counterintelligence Behavioral Analysis Program, where he mastered the art of predicting human behavior. He turned foreign operatives into informants—not with force, but with trust. 

Now, he’s sharing the same tools that can help you avoid fraud, betrayal, and toxic relationships in everyday life.

In part one, we peeled back the curtain on his high-stakes career in counter espionage against Russian operatives in the United States. 

Now, in part two, Dreeke reveals how you can learn to think like an FBI behavioral analyst. How to see the red flags before they wave. How to spot manipulation before it wraps around your life. And how to use behavior patterns—what he calls “behavior arcs”—to make better decisions about who you can trust.

If you’ve ever been lied to, blindsided, or left asking how did I not see that coming?—this episode is for you.

Dreeke is the author of “Sizing People Up”, a book I recommend every listener study and underline. 

His short guide, “It’s Not All About Me”, offers a crash course in building rapport in any situation.

Let’s get into it—here’s part two of my conversation with Robin Dreeke.

GET YOUR EXCLUSIVE DISCOUNT PROMO CODES

41% Off Cozy Earth Sheets, Pajamas and More

20% Off Eric Javits Designer Hats Worn by True Crime TV Detectives

20% Off HyperNatural Men’s Polo Shirts

15% Off TONA Activewear Designer Gym Leggings

15% Off STAND+ Comfort Shoes For Extended Standing

10% Off AKILA Sunglasses and Eyewear



PLEASE SUPPORT MY WORK


Click here to purchase my “Texas Crime Stories” audiobook. It downloads into your podcast app.

Click here to purchase the Paperback & Kindle editions on Amazon.


Schedule me to speak at your social meeting or corporate event.

My presentation, “Evil Walks Among Us,” features stories about serial killers and notorious criminals and personal safety tips.


Step into the storied halls of the Texas Prison Museum and uncover the gripping tales of infamous inmates, daring escapes, and the history of justice in the Lone Star State.


Subscribe to Podcast

Apple PodcastsSpotifyAndroidPodcast IndexRSSMore Subscribe Options

Real Crime Lessons From Those Who Lived It

Search

Recent Blog Post

JigSaw and Jane Pursue Murder & Mayhem

By Robert Riggs Jane Howatt stopped mid-sip of her morning coffee. A newspaper headline jumped off the front page. The LAPD awarded its Distinguished Service Medal to 64 year 64-year-old homicide … Continue Reading

Recent Episodes

JigSaw & Jane 13 Years of Murder & Mayhem with Badge Number One

Carbon Monoxide Poisoned Two Children’s Brains After Their Landlord Ignored the Danger

Don’t Make It Easy for a Violent Predator to Choose You

Search

Copyright © 2025 True Crime Reporter

Sitemap · Privacy Policy · Terms & Conditions · Disclaimer · Cookies Policy

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Preferences
  • {title}
  • {title}
  • {title}