POPULARITY
Categories
The world is building data centers, identity rails, and AI policy stacks at a speed that makes 2026 feel closer than it is. In this conversation, Rajesh Natarajan, Global Chief Technology Officer at Gorilla Technology Group, explains what it takes to engineer platforms that remain reliable, secure, and sovereign-ready for decades, especially when infrastructure must operate outside the safety net of constant cloud connectivity. Raj talks about quantum-safe networking as a current risk, not a future headline. Adversaries are capturing encrypted traffic today, betting on decrypting it later, and retrofitting quantum-safe architecture into national platforms mid-lifecycle is an expensive mistake waiting to happen. He also highlights the regional nature of AI infrastructure, Southeast Asia prioritizing sovereignty, speed, and efficiency, Europe leaning on regulation and telemetry, and the U.S. betting on raw cluster scale and throughput. Sustainability at Gorilla isn't a marketing headline, it's an engineering requirement. If a system can't prove its environmental impact using telemetry like workload-level PUE, it isn't labeled sustainable internally. Gorilla applies the same rigor to IoT insight per unit of energy, device lifecycles, and edge-level intelligence placement, minimizing data centralization without operational justification. This episode offers marketers, founders, and technology leaders a rare chance to understand what national-scale resilience looks like when platform alignment breaks first, not technology. Remembering that decisions must be reversible, explicit, and measurable is the foundation of how Gorilla is designing systems that can evolve without forcing rushed compromises when uncertainty becomes reality. Useful links: Connect with Dr Rajesh Natarajan Gorilla website Tech Talks Daily is Sponsored by Denodo
Don't Quill the Messenger : Revealing the Truth of Shakespeare Authorship
Steven was welcomed to a class of law students at Appalachian University by Dr. Garrett Jackson, who is teaching a full semester on the Shakespeare authorship mystery. After learning about various candidates for authorship, the students tossed some of their unanswered questions at Steven in an invigorating exchange. Support the show by picking up official Don't Quill the Messenger merchandise at www.dontquillthepodcast.com and becoming a Patron at http://www.patreon.com/dontquillthemessenger Made possible by Patrons: Clare Jaget, Courtney L, David Neufer, Deduce, Earl Showerman, Edward Henke, Ellen Swanson, Frank Lawler, Garrett Jackson, Heidi, James Warren, Jen Swan, John Creider, John Eddings, Jon Foss, Kara Elizabeth Martin, Michael Hannigan, Neal Riesterer, Patricia Carrelli, quizzi, Richard Wood, Sandi Boney, Sheila Kethley, Stephen Hopkins, Teacher Mallory, Tim Norman, Tim Price, Vanessa Lops, Yvonne Don't Quill the Messenger is a part of the Dragon Wagon Radio independent podcast network. For more great podcasts visit www.dragonwagonradio.com
Q-Day — when quantum computers crack all encryption — is coming. Quantum eMotion COO John Young breaks down the pros and cons of what's to come.Full show notes and resources can be found here: jordanharbinger.com/1261What We Discuss with John Young:Q-Day is the looming moment when quantum computers become powerful enough to break current encryption — rendering bank accounts, medical records, government secrets, and critical infrastructure vulnerable not through hacking, but through raw computational power that can solve in minutes what would take today's computers longer than human civilization has existed."Harvest now, decrypt later" is already happening. Adversaries are collecting encrypted data today, storing it like a time capsule, waiting for quantum computers to mature so they can unlock secrets that were meant to stay buried forever — meaning today's sensitive communications could become tomorrow's exposed vulnerabilities.Quantum computers aren't just faster classical computers — they operate on fundamentally different physics — using qubits that can exist in multiple states simultaneously, allowing them to explore countless possibilities at once rather than checking solutions one by one, which is what makes them so dangerous to current encryption methods.The transition to quantum-safe encryption is a massive, slow-moving crisis. Large institutions with decades of layered encryption systems face years of retrofitting, while startups can build quantum-resistant from day one, creating a dangerous gap where critical infrastructure remains exposed during the changeover.The same technology threatening our digital security also promises extraordinary breakthroughs. Quantum computing could deliver miracle drugs, better batteries, climate solutions, and new materials, so the path forward isn't fear but preparation: organizations should begin transitioning to quantum-resistant algorithms now while the benefits still outweigh the risks.And much more...And if you're still game to support us, please leave a review here — even one sentence helps! Sign up for Six-Minute Networking — our free networking and relationship development mini course — at jordanharbinger.com/course!Subscribe to our once-a-week Wee Bit Wiser newsletter today and start filling your Wednesdays with wisdom!Do you even Reddit, bro? Join us at r/JordanHarbinger!This Episode Is Brought To You By Our Fine Sponsors: Function Health: $100 credit: functionhealth.com/jordan, code JORDAN100HelloFresh: Get $80 off your first order at hellofresh.com/jhs80MasterClass: Get 15% off a yearly membershipAirbnb: Turn your house into a host: airbnb.com/hostHomes.com: Find your home: homes.comSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
8. The Forever War: Jihadist Patience vs. American Cycles. Bill Roggio argues the US has failed to defeat jihadist ideology or funding, allowing groups like Al-Qaeda to persist in Afghanistan and Africa. He warns that adversaries view American withdrawals as proof of untrustworthiness, exploiting the US tendency to fight short-term wars against enemies planning for decades. 1910 PESHAWAR
Liubov Velychko is a Ukrainian investigative journalist with over 15 years of experience uncovering corruption, crime, and human rights violations. She Specializes in exposing disinformation campaigns, and has conducted numerous investigations into Russian propaganda, revealing the networks behind its spread and dismantling the information operations orchestrated by Russian intelligence agencies.----------LINKS:https://www.linkedin.com/in/v-press/ https://www.rusi.org/people/velychkohttps://x.com/VelychkoLiubovhttps://www.occrp.org/en/people/lyubov-velychkohttps://mind.ua/en/author/1158-liubov-velychko----------Silicon Curtain is a part of the Christmas Tree Trucks 2025 campaign - an ambitious fundraiser led by a group of our wonderful team of information warriors raising 110,000 EUR for the Ukrainian army. https://car4ukraine.com/campaigns/christmas-tree-trucks-2025-silicon-curtainThe Goal of the Campaign for the Silicon Curtain community:- 1 armoured battle-ready pickupWe are sourcing all vehicles around 2010-2017 or newer, mainly Toyota Hilux or Mitsubishi L200, with low mileage and fully serviced. These are some of the greatest and the most reliable pickups possible to be on the frontline in Ukraine. Who will receive the vehicles?https://car4ukraine.com/campaigns/christmas-tree-trucks-2025-silicon-curtain- The 38th Marine Brigade, who alone held Krynki for 124 days, receiving the Military Cross of Honour.- The 1027th Anti-aircraft and artillery regiment. Honoured by NATO as Defender of the Year 2024 and recipient of the Military Cross of Honour.- 104th Separate Brigade, Infantry, who alone held Kherson for 100 days, establishing conditions for the liberation of the city.- 93rd Brigade "Kholodnyi Yar", Black Raven Unmanned Systems Battalion ----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.orgNGO “Herojam Slava”https://heroiamslava.org/kharpp - Reconstruction project supporting communities in Kharkiv and Przemyślhttps://kharpp.com/NOR DOG Animal Rescuehttps://www.nor-dog.org/home/----------
In November 2025, a major public-private sector collaboration took down three significant malware networks. Operation Endgame involved law enforcement agencies from six EU countries, Australia, Canada, the U.K., and the U.S., along with Europol and 30 private sector partners, including CrowdStrike. The dismantled infrastructure consisted of hundreds of thousands of infected computers containing several million stolen credentials. Operation Endgame was a critical disruption of adversary operations — but it wasn't the first. Law enforcement has for years sought to take down adversary infrastructure and often partners with private sector organizations like CrowdStrike to inform their operations. By disrupting the tools and processes threat actors rely on, these takedowns raise the cost for adversaries and make it harder for them to operate. As Adam and Cristian discuss in this episode, takedowns require careful planning and constant innovation. Adversaries are always finding new techniques and tools, and law enforcement must do the same. While disruption may slow them down, threat actors are often quick to pivot and find new ways to achieve their goals. In this episode, we examine how law enforcement takedowns disrupt adversary operations, how adversaries respond, where the private sector provides support, and what this all means for organizations facing modern threats.
Friday Bible Study (12/12/25) // Ezra 4 (ESV) // Adversaries Oppose the Rebuilding 4 Now when the adversaries of Judah and Benjamin heard that the returned exiles were building a temple to the Lord, the God of Israel, 2 they approached Zerubbabel and the heads of fathers' houses and said to them, “Let us build with you, for we worship your God as you do, and we have been sacrificing to him ever since the days of Esarhaddon king of Assyria who brought us here.” 3 But Zerubbabel, Jeshua, and the rest of the heads of fathers' houses in Israel said to them, “You have nothing to do with us in building a house to our God; but we alone will build to the Lord, the God of Israel, as King Cyrus the king of Persia has commanded us.”4 Then the people of the land discouraged the people of Judah and made them afraid to build 5 and bribed counselors against them to frustrate their purpose, all the days of Cyrus king of Persia, even until the reign of Darius king of Persia.6 And in the reign of Ahasuerus, in the beginning of his reign, they wrote an accusation against the inhabitants of Judah and Jerusalem.The Letter to King Artaxerxes7 In the days of Artaxerxes, Bishlam and Mithredath and Tabeel and the rest of their associates wrote to Artaxerxes king of Persia. The letter was written in Aramaic and translated.[a] 8 Rehum the commander and Shimshai the scribe wrote a letter against Jerusalem to Artaxerxes the king as follows: 9 Rehum the commander, Shimshai the scribe, and the rest of their associates, the judges, the governors, the officials, the Persians, the men of Erech, the Babylonians, the men of Susa, that is, the Elamites, 10 and the rest of the nations whom the great and noble Osnappar deported and settled in the cities of Samaria and in the rest of the province Beyond the River. 11 (This is a copy of the letter that they sent.) “To Artaxerxes the king: Your servants, the men of the province Beyond the River, send greeting. And now 12 be it known to the king that the Jews who came up from you to us have gone to Jerusalem. They are rebuilding that rebellious and wicked city. They are finishing the walls and repairing the foundations. 13 Now be it known to the king that if this city is rebuilt and the walls finished, they will not pay tribute, custom, or toll, and the royal revenue will be impaired. 14 Now because we eat the salt of the palace[b] and it is not fitting for us to witness the king's dishonor, therefore we send and inform the king, 15 in order that search may be made in the book of the records of your fathers. You will find in the book of the records and learn that this city is a rebellious city, hurtful to kings and provinces, and that sedition was stirred up in it from of old. That was why this city was laid waste. 16 We make known to the king that if this city is rebuilt and its walls finished, you will then have no possession in the province Beyond the River.”Website: https://mbchicago.org FOLLOW US Facebook: / mbc.chicago Instagram: / mbc.chicago TikTok: / mbc.chicago Podcasts: Listen on Apple, Spotify & others TO SUPPORT US Zelle to: info@mbchicago.org Website: https://mbchicago.org/give Venmo: https://venmo.com/mbchurch DAF Donations: https://every.org/mbc.chicago PayPal: https://paypal.com/donate/?hosted_but... #Ezra #DanielBatarseh #BibleStudy #mbchicago #mbcchicago #Bible #versebyverse #church #chicago #livechurch #churchlive #chicagochurch #chicagochurches #sermon #bibleexplained #bibleproject #bibleverse #bookbybook #oldtestament #explained
"Kindness is never wasted—it expands into greatness." What happens when a broadcaster-turned-salesman discovers that giving is the fastest path to success? In this episode, I talk with Bob Burg, co-author of The Go-Giver, about kindness, influence, and building a life around service. This episode is sponsored by my new book BRANDJITSU, helping you find, shape, and share your story with the world. In This Episode In this episode, Michael Dargie speaks with Bob Burg, speaker, author, and co-creator of the international bestseller The Go-Giver. Known for its simple but powerful message—that shifting focus from getting to giving leads to success—The Go-Giver has sold over a million copies worldwide and become a staple in leadership, business, and personal development . Bob shares how he stumbled into sales after early stints in radio and television. With no formal training, he failed fast—until a desperate trip to a bookstore introduced him to the work of Tom Hopkins and Zig Ziglar. Devouring their books, he quickly learned that sales wasn't about talking people into something, but about providing real value. That discovery launched a lifelong pursuit of learning, leading him into the world of personal development classics like How to Win Friends and Influence People and Think and Grow Rich . The conversation spans from his childhood dream of playing third base for the Boston Red Sox to his career as a sought-after speaker, traveling the world to talk about influence, persuasion, and service. Bob explains why nobody buys because of your quota or goals—they buy because they believe they'll be better off. He also shares stories about life in Jupiter, Florida, with his rescue cat Buddy, his admiration for hockey legend Bobby Orr, and his simple joys like reading over coffee and bagels . Looking ahead, Bob is reworking his book Adversaries into Allies into a new edition called Genuine Influence: How to Master the Art of Persuasion, slated for release in 2026. His advice to "rebels in waiting" is grounded and practical: know your cause, find systems and mentors, take action, persist through the no's, and never mistake failure for finality . At its heart, this episode is about shifting perspective—success isn't about self-focus, it's about making every person and moment better off for having crossed your path. Quoteable Quotes "Nobody's going to buy from you because you have a quota. They buy because they believe they'll be better off." — Bob Burg "Success is really an inside job. It starts with what you put in your head and heart." — Bob Burg "The highest purpose of life is to make each moment better off because it passed by you." — Bob Burg "Kindness is never wasted—it expands into greatness." — Bob Burg "Our job in business is to be the Yoda. The customer is the Luke." — Michael Dargie Episode Highlights The Go-Giver | Why giving first creates success. From Radio to Sales | How failure led Bob to personal growth. Discovering Systems | Learning from Zig Ziglar and Tom Hopkins. Inside Job | Success begins with mindset and personal development. Jupiter Life | Bagels, coffee, and reading with his rescue cat, Buddy. Sports Memories | From dreaming of the Red Sox to admiring Bobby Orr. Travel & Speaking | 35 years of conferences and lessons from the stage. Genuine Influence | His next book on persuasion and people skills. Advice to Rebels | Know your cause, persist, and learn from failure. Links From Episode Bob Burg Official Website (https://burg.com) Get Your Copy of Michael's Book: "BrandJitsu™: Move Your Brand From 'Meh' To Memorable" Indigo | Barnes & Noble | MichaelDargie.com
Targeting Adversary Vulnerabilities and Future Fleet Architecture: Colleague Jerry Hendrix highlights the economic vulnerability of adversaries like China, who rely heavily on sea lanes for energy and resources, outlining a future fleet architecture targeting over 450 ships and emphasizing the critical role of unmanned surface vessels and an expanded logistics force to sustain global naval operations. 1940 IMPERIAL NAVY HQ
This DACCast episode interviews Dr. Mark Tehranipoor about the vital and complex field of hardware and microelectronics security. The discussion focuses on the challenges of supply chain trust and protecting integrated circuits from security vulnerabilities and malicious hardware Trojans.
Podcast: Exploited: The Cyber Truth Episode: The Asymmetric Advantage: How Cybersecurity Can Outpace AdversariesPub date: 2025-12-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin sits down with RunSafe Founder and CEO Joseph M. Saunders to explore why the future of cyber defense depends on disrupting attacker economics rather than racing to keep up with every new threat. Joe breaks down how organizations can gain an asymmetric advantage by reducing exploitability across entire classes of vulnerabilities, especially persistent memory safety flaws that continue to expose critical systems. He shares why adding lightweight, automated protections at build time is one of the fastest ways to shift the cost curve onto attackers without forcing massive code rewrites or slowing development teams down. Together, Paul and Joe discuss: Why attackers' resource advantage requires a new defensive mindsetThe power of “patchless” protection in embedded and OT environmentsWhy memory safety flaws persist and how to neutralize them at scaleThe risks of AI-generated code and how to prevent silent vulnerabilitiesHow Secure by Design practices improve resilience for critical infrastructure If you're responsible for securing embedded systems, OT assets, or long-lived devices where patch cycles are slow and risk is high, this episode offers a new mindset that gives defenders the upper hand.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
PREVIEW — Mary Kissel — Missing Clarity on the "Condominium of Adversaries" in National Security Strategy. Kissel criticizes the newly published national security strategy for insufficiently highlighting the existential threat posed by China and its expanding strategic alliance with Russia, Iran, and North Korea, creating a coordinated axis of rival powers. Kissel argues that the strategic document fails to adequately address China's systematic domestic infiltration of American infrastructure networks, university campuses, research institutions, and scientific communities, unlike the more explicit and detailed threat characterizations contained in previous national security strategy iterations. Kisselemphasizes that the document's relative ambiguity regarding the "condominium of adversaries" undermines clarity regarding the multi-vector threat environment confronting American strategic planners and military commanders. TAIPEI
Did Jesus command us to go along to get along — or is there more to the story we might be missing?
Do you feel more like adversaries than allies with your partner? Do you feel more like opponents than teammates? If you answered yes you're going to appreciate this episode as I discuss this pattern, what causes it, what it feels like, and how to fix it.
‘Ghost in the Shell Roleplaying Game’, a collaboration between Mana Project Studio and Don't Panic Games, is based on the Production I.G. anime and Shirow Masamune manga. It is currently in the final days of its Kickstarter campaign, which has raised over $418,000, with a trade release planned for 2027. The game is set at the dawn of Section 9’s birth, specifically the Arise timeline of 2027, and utilizes a heavily modified version of the Forged in the Dark system. Its unique mechanics center around two core skill branches, Ghost (soul and mind/social and hacking) and Shell (physical prowess/gunplay and CQC), which are used for Wired Actions with six-sided dice rolls. ‘Twilight Sword RPG by 2LM’ is an adventure role-playing game being crowdfunded on BackerKit by Two Little Mice and publisher Free League. Heavily inspired by classic video games like The Legend of Zelda, Final Fantasy, and Ni No Kuni, the game is set in the world of Radia where heroes strive to bring back Hope against the scourge Vardas. The system, called Created at Twilight (CAT), is unique and d12-based, requiring players to roll under one of their eight abilities. It also incorporates a JRPG-style elemental system with a network of eight elements that interact, such as Fire beating Ice, and Thunder beating Water. The campaign has already surpassed $450,000 in its first day. ‘Daggerheart: Hope and Fear,’ the first major expansion for Critical Role's Daggerheart RPG, scheduled for release in Summer 2026. This expansion promises a substantial amount of new content, including four new classes: the Assassin, Brawler, Warlock, and Witch, each coming with two subclass options. It also provides an extensive GM's Toolkit with four new Campaign Frames, over 130 new Adversaries, and more than 100 new items. New mechanics include “transformations” like being cursed as a werewolf or vampire, and the expansion utilizes a new Dread Domain for Warlocks and Witches, alongside custom Fear tokens and a tracker for the GM. Also Black friday 2025 deals from Mantic, Exalted Funeral, DrivethruRPG and MyMiniFactory with links. #ghostintheshell #twilightsword #daggerheart #blackfriday Ghost in the Shell Quickstart: https://www.drivethrurpg.com/en/product/539123/ghost-in-the-shell-ttrpg-quickstart?affiliate_id=2081746 Twilight Sword – BackerKit https://www.backerkit.com/c/projects/two-little-mice/twilight-sword Mantic Black Friday: https://www.manticgames.com/black-friday-2025/ Noble Knights Black Friday Sale: https://www.nobleknight.com/affiliate/aw.asp?B=3&A=1312& Warmachine on MyMiniFactory: https://mmf.io/upturned Mantic Companion App: https://companion.manticgames.com/ Use our Referral code: MCTXEE Support us by Shopping at Miniature Market (afilliate link): https://miniature-market.sjv.io/K0yj7n Support Us by Shopping on DTRPG (afilliate link): https://www.drivethrurpg.com?affiliate_id=2081746 Matt’s DriveThruRPG Publications: https://www.drivethrurpg.com/browse.php?author=Matthew%20Robinson https://substack.com/@matthewrobinson3 Chris on social media: https://hyvemynd.itch.io/ Abusecartoons Weekly Cartoons: http://www.abusecartoons.com/ https://www.twitch.tv/abusecartoons Support Us on Patreon: https://www.patreon.com/upturnedtable Give us a tip on our livestream: https://streamlabs.com/upturnedtabletop/tip Donate or give us a tip on Paypal: https://www.paypal.com/ncp/payment/2754JZFW2QZU4 Intro song is “Chips” by KokoroNoMe https://kokoronome.bandcamp.com/
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Every federal agency prepares a backup strategy to protect data. This is a rigorous endeavor in which teams practice what to do in the event of a breach or system failure. However, nobody really has a plan for a temporary federal shutdown. Any political pundit worth his salt knows there will be another federal shutdown sometime in the future. It is reasonable to consider automation to see how it can be used to bridge services during a temporary shutdown. David Grundy is the Public Sector CTO for Tines. He has decades of experience in and outside the federal government. He highlights the challenges of human-centered workflows. For example, just because the staff is reduced does not mean attackers will take the day off. Adversaries work 365 days a year and are immune to political infighting. Based on David Grundy's experience, an agency should start with visibility to know which workflows exist. From there, document processing can be detailed, enabling scaling. During the interview, Grundy shares his experience in a federal agency that had to make digital transitions while complying with federal regulations. He is optimistic that operational resilience can be achieved through initiative-taking by all federal agencies.
4/8 Autocrats Versus Democrats: China, Russia, America, and the New Global Disorder. Michael McFaul analyzes the Cold War, noting that the Cuban Missile Crisis taught the need for crisis management mechanisms with adversaries. He argues that the US was too complacent, first when engaging China after Tiananmen Square without stressing values, and later when failing to invest politically and economically to consolidate democracy in post-Soviet Russia. Guest: Michael McFaul. 1918
1/8. Autocrats Versus Democrats: China, Russia, America, and the New Global Disorder. Michael McFaul analyzes the Cold War, noting that the Cuban Missile Crisis taught the need for crisis management mechanisms with adversaries. He argues that the US was too complacent, first when engaging China after Tiananmen Square without stressing values, and later when failing to invest politically and economically to consolidate democracy in post-Soviet Russia. Guest: Michael McFaul 1812.
2/8 Autocrats Versus Democrats: China, Russia, America, and the New Global Disorder. Michael McFaul analyzes the Cold War, noting that the Cuban Missile Crisis taught the need for crisis management mechanisms with adversaries. He argues that the US was too complacent, first when engaging China after Tiananmen Square without stressing values, and later when failing to invest politically and economically to consolidate democracy in post-Soviet Russia. Guest: Michael McFaul. 1917
3/8 Autocrats Versus Democrats: China, Russia, America, and the New Global Disorder. Michael McFaul analyzes the Cold War, noting that the Cuban Missile Crisis taught the need for crisis management mechanisms with adversaries. He argues that the US was too complacent, first when engaging China after Tiananmen Square without stressing values, and later when failing to invest politically and economically to consolidate democracy in post-Soviet Russia. Guest: Michael McFaul. 1916
AP correspondent Ed Donahue reports on the meeting between President Trump and the soon-to-be mayor of New York.
November 14, 2025 Hos. 10:1-11:12; Ps. 126:1-3; Prov. 27:17; Jude 1:1-19
Last week, Google's threat intelligence group warned that artificial intelligence (AI) is making malware attacks more dangerous. [Malware is malicious software—programmes designed to disrupt, damage or gain unauthorised access to computer systems—usually delivered via phishing emails, compromised websites or infected downloads]“Adversaries are no longer leveraging artificial intelligence (AI) just for productivity gains, they are deploying novel AI-enabled malware in active operations,” Google said in a 5000-word blog.Are malware programmes using Large Language Models (LLMs) to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, as Google warns? Or it this yet another case of tech firms selling solutions to a problem they have created themselves?Listen to the latest episode of Unseen Money from New Money Review, featuring co-hosts Timur Yunusov and Paul Amery, to hear more about the effect of AI malware.In the podcast, we cover:Google's warning about the rise of AI malware – reality or hype? (2' 35”)Why LLMs were originally protected from harmful behaviour (4' 10”)How criminals learned to develop LLMs without guardrails (4' 55”)Model context protocols (MCPs) and AI agents as offensive tools (5' 30”)Malicious payloads and web application firewalls (7' 35”)Tricking LLMs by exploiting the wide range of input variables (8' 30”)The state of the art for fraudsters when using LLMs (10' 10”)Timur used AI to learn how to drain funds from a stolen phone (11' 05”)How worried is Timur about the rise of AI malware? (14' 20”)AI has dramatically reduced the cost and increased the speed of producing malware (15')AI, teenage suicides and protecting users (16' 50”)AI for good: using AI to combat AI malware (19')How a Russian bank used AI chatbots to divert fraudsters (19' 40”)Data poisoning—manipulating the training data for AI models (22' 10”)Techniques for tricking LLMs (23')Only state actors can manipulate AI models at scale (25' 40”)The use of SMS blasters by fraudsters is exploding! (27')
Nathan and Michaela share how a simple morning ritual and a second chair became the unlikely catalyst that's reshaping their marriage. By choosing curiosity over being right and speaking fears early instead of silently spiraling, they built a daily rhythm of connection that is rebuilding trust and intimacy. This episode unpacks the small, intentional choices any couple can use to move from seeing each other as adversaries to truly advocating for one another.Please let us know in the comments what you're taking away from this episode
The National Security Hour with Major Fred Galvin – Fred Galvin exposes how foreign and domestic actors wage a coordinated soft power war to divide Americans and weaken trust in institutions. From Beijing to Tehran to Moscow, adversaries use media, education, and digital propaganda to reshape beliefs, erode unity, and weaponize culture — all to undermine America from within...
The National Security Hour with Major Fred Galvin – Fred Galvin exposes how foreign and domestic actors wage a coordinated soft power war to divide Americans and weaken trust in institutions. From Beijing to Tehran to Moscow, adversaries use media, education, and digital propaganda to reshape beliefs, erode unity, and weaponize culture — all to undermine America from within...
Zane demonstrates deploying honeyfiles via Velociraptor and discuss deception techniques for early detection of compromise. Learn how decoy files can serve as tripwires for infostealers and adversaries in your environment. Watch on YouTube for better visuals.Join the Defender Fridays community, live every Friday, to discuss the dynamic world of information security in a collaborative space with seasoned professionals.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastruture for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Why does every significant opportunity seem to come with fierce opposition? Pastor Dorrell confronts this universal tension through Paul's ministry in Ephesus, where a "great door and effectual" opened alongside "many adversaries." The sermon argues that in God's economy, meaningful work—whether in marriage, parenting, ministry, or character development—always demands sacrifice and perseverance. Paul's refusal to abandon his post despite hardship models a crucial principle: the best things in life are guarded by the greatest challenges, yet they yield eternal glory. Listeners are challenged to identify the "great doors" God has placed before them and commit to staying the course despite inevitable adversaries.Eastland is a Place to BelongEastland Baptist Church is located in Tulsa, Oklahoma. We are a welcoming and close-knit family community that loves to care for each other through the Church. We strongly believe in loving and supporting each other and our neighbors. Our members don't just attend our Church; they feel a strong sense of belonging.Join Us Find service times and our location at https://www.eastlandbaptist.org/join. Connect with UsWebsite: https://www.eastlandbaptist.orgFacebook: https://www.facebook.com/eastlandbaptisttulsaInstagram: https://www.instagram.com/eastlandbaptistTo support the ministry of Eastland Baptist Church, tap here: https://www.eastlandbaptist.org/give.
In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Russia, China and North Korea are using ChatGPT to influence you — here's how. A new report from OpenAI found foreign adversaries are increasingly using artificial intelligence to power hacking and influencing operations. The report found they were using OpenAI's popular tool ChatGPT. The report showed those adversaries include Russia, China and North Korea. “AI-enabled attacks are becoming more capable and harder to detect,” Daryl Lim, affiliate at the Center for Socially Responsible Artificial Intelligence at Penn State University, told Straight Arrow News. “Adversaries can personalize attacks, evade filters and iterate faster than before.”• The Case for AI Loss of Control Response Planning and an Outline to Get Started• Can Humans Devise Practical Safeguards That Are Reliable Against an Artificial Superintelligent Agent?The true cost of cyber attacks - and the business weak spots that allow them to happen. What makes companies like Jaguar Land Rover and Marks & Spencer particularly vulnerable is the way in which their supply chains work.• UK NCSC: UK experiencing four 'nationally significant' cyber attacks every week• Cyber attack contingency plans should be put on paper, firms told• Policyholder Plot Twist: Cyber Insurer Sues Policyholder's Cyber Pros• The Ransomware Pricing Paradox: An Empirical Study of the Six Stages of Ransomware Negotiations. PDF• Paying off cyber criminals no guarantee stolen data won't be published – studySevere Weather: Hurricane Season continues18 Oct: No Kings nationwide protestsQuick Hits:• Peace in Israel and Gaza?• Sen. Peters tries another approach to extend expired cyber threat information-sharing law & Peters & Rounds Introduce Bipartisan Bill to Restore Critical Cybersecurity Protections• Yet another shutdown and its impact on cybersecurity professionals• Experts: Shutdown Strains Healthcare Cyber Defenses• Is the government shutdown impacting info sharing for healthcare cyber threats? • ICYMI! Gate 15 Weekly Security Sprint EP 130. The Evangelist has returned! Cybersecurity Awareness Month and more! • Poland says cyberattacks on critical infrastructure rising, blames Russia• Anatomy of a Hacktivist Attack: Russian-Aligned Group Targets OT/ICS• Critical networks face unprecedented threat as DDoS attacks are getting shorter and more intense• Belgian PM reported to be among targets of ‘jihad-inspired' drone plot• Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
Need for Pentagon Leadership in Fortifying US Infrastructure Against Adversaries Guest Name: Henry SokolskiSummary: Russia is allegedly already waging hybrid war against the EU via cable cutting and cyber assaults, which is expected to reach the US. The US is unprepared organizationally. The Pentagon (Secretary of Defense) should lead hardening and proliferation efforts for targets like the electric grid and nuclear plants, but they are currently resistant to doing so publicly.
Need for Pentagon Leadership in Fortifying US Infrastructure Against Adversaries Guest Name: Henry SokolskiSummary: Russia is allegedly already waging hybrid war against the EU via cable cutting and cyber assaults, which is expected to reach the US. The US is unprepared organizationally. The Pentagon (Secretary of Defense) should lead hardening and proliferation efforts for targets like the electric grid and nuclear plants, but they are currently resistant to doing so publicly. 1960
Patrycja Bazylczyk defines the Golden Dome as a reorientation of US missile defense policy to counter next-generation threats from near-peer adversaries, Russia and China. The defense, which involves a space component (HBTSS), supports the nuclear triad by strengthening deterrence through both denial and punishment. She notes that critics argue the program is unaffordable (estimated $175 billion) and destabilizing, but stresses the need for sustained, bipartisan funding to build the necessary architecture. 1958
Patrycja Bazylczyk defines the Golden Dome as a reorientation of US missile defense policy to counter next-generation threats from near-peer adversaries, Russia and China. The defense, which involves a space component (HBTSS), supports the nuclear triad by strengthening deterrence through both denial and punishment. She notes that critics argue the program is unaffordable (estimated $175 billion) and destabilizing, but stresses the need for sustained, bipartisan funding to build the necessary architecture. 1958
In this episode, Vance Crowe shares a keynote delivered at the inaugural Flinchbaugh Forum for Agricultural Policy in Manhattan, Kansas, honoring Dr. Barry Flinchbaugh's legacy of courageous, civil discourse. Vance unpacks the concept of “worthy adversaries,” explaining how respect and even resentment can guide individuals toward those who sharpen their ideas, and offers practical tools for productive disagreement: steelmanning, providing “click” moments of fascination, asking “how” instead of “why,” saying “tell me more,” and diagramming arguments to debate ideas shoulder-to-shoulder rather than person-to-person. Vance also explores how the Overton window shifts what's thinkable and why humility and openness to change are essential for changing minds.To test these principles, Vance presents a Peter Thiel–style paradox: Washington is correct that America needs more farmers, but mistaken in believing that printing money and transfer payments will secure that future. The argument is made that relentless monetary expansion inflates land and input costs faster than farm returns, and a provocative case is presented that Bitcoin—due to its digital scarcity—may siphon the monetary premium out of farmland over time. Vance challenges listeners to find their own worthy adversaries, articulate their own Peter Thiel paradox, and engage in courageous, curiosity-driven dialogue to keep politics rooted in conversation rather than coercion.
On this episode, Richard & Tyler go over the latest Adversaries from The Void v1.5!Links to Stuff & Things:https://www.daggerheart.com/downloads/https://www.daggerheart.com/thevoid/Welcome to True Strike, a podcast for tabletop nerds.Each Tuesday, listen in while two friends discuss their completely unwarranted opinions about all things tabletop. Topics vary each week from D&D and Daggerheart, to whatever TTRPG or board game they happen to be playing!Hosts: Richard Cullen/Tyler WortheySong by: WILDJOE1
In this episode of the PFC Podcast, discusses the evolving landscape of military medicine, particularly focusing on blood transfusion protocols in combat situations. They emphasize the need for optimizing blood management practices, adapting to dynamic conflict environments, and the potential benefits of implementing type-specific transfusions. The conversation highlights the importance of training medics to be independent thinkers and the necessity for systematic approaches in medical decision-making during deployments.TakeawaysWe see a need for optimizing our blood protocol.The conflict environment is becoming more dynamic.Medics need to stabilize patients for longer periods.Type-specific transfusions can increase available blood supply.Training medics to be independent thinkers is crucial.A systematic approach is needed for medical deployments.The benefits of type-specific transfusions may outweigh risks.More tools in the toolbox can enhance medical care.Understanding logistics is vital for blood management.Research is needed to compare transfusion methods.Chapters00:00 Introduction to the Podcast and Speakers01:56 The Need for Optimizing Blood Protocols03:47 Understanding the Evolving Conflict Environment07:48 Tools for Blood Component Management13:31 Implementing Type-Specific Transfusions17:05 Conclusions and Takeaway PointsFor CME credit for this presentation, go to: https://specialoperationsmedicine.org/For more content, go to www.prolongedfieldcare.orgConsider supporting us: patreon.com/ProlongedFieldCareCollective or www.lobocoffeeco.com/product-page/prolonged-field-care
CBS EYE ON THE WORLD WITH JOHN BATCHELOR SHOW SCHEDULE 1957 9-15-25 GOOD EVENING. THE SHOW BEGINS IN TROUBLED AMERICA... FIRST HOUR 9-915 HEADLINE: Global Allies Worry About US Division, Adversaries Exploit Weakness GUEST AND TITLE: Ambassador Husain Haqqani, Hudson Institute Director of Eurasia Project; Bill Roggio, Senior Fellow for the Foundation for Defense of Democracies SUMMARY: Ambassador Husain Haqqani states US allies are "very worried" by American internal division and extreme rhetoric, unlike past unity. Bill Roggio notes similar European issues, but the US now seems to lead in domestic disorder. Adversaries like China, Russia, and Islamist extremists exploit this polarization, using social media manipulation and citing Western decline. Both emphasize leaders must reduce aggressive rhetoric, promote bipartisan cooperation, and control social media to heal divisions, advocating for unity to counter external exploitation and domestic radicalization. 915-930 HEADLINE: Global Allies Worry About US Division, Adversaries Exploit Weakness GUEST AND TITLE: Ambassador Husain Haqqani, Hudson Institute Director of Eurasia Project; Bill Roggio, Senior Fellow for the Foundation for Defense of Democracies 930-945 HEADLINE: Political Crises Deepen in Brazil and Venezuela Amidst US Pressure GUEST AND TITLE: Alejandro Peña Esclusa, Venezuelan writer and thinker; Ernesto Araújo, former Foreign Minister of the Republic of Brazil SUMMARY: Ernesto Araújo discusses former Brazilian President Jair Bolsonaro's conviction for an alleged assassination plot, calling it a "show trial" despite a dissenting judge's opinion. He notes Bolsonaro's failed anti-system movement. Alejandro Peña Esclusa reports a US military buildup near Venezuela, fostering internal military discussions about turning in Maduro. Both believe their countries' fates are linked; Venezuela's liberation could expose a crime network, potentially delegitimizing Lula's regime and fostering broader Latin American freedom 945-1000 HEADLINE: Political Crises Deepen in Brazil and Venezuela Amidst US Pressure GUEST AND TITLE: Alejandro Peña Esclusa, Venezuelan writer and thinker; Ernesto Araújo, former Foreign Minister of the Republic of Brazil SUMMARY: Ernesto Araújo discusses former Brazilian President Jair Bolsonaro's conviction for an alleged assassination plot, calling it a "show trial" despite a dissenting judge's opinion. He notes Bolsonaro's failed anti-system movement. Alejandro Peña Esclusa reports a US military buildup near Venezuela, fostering internal military discussions about turning in Maduro. Both believe their countries' fates are linked; Venezuela's liberation could expose a crime network, potentially delegitimizing Lula's regime and fostering broader Latin American freedom SECOND HOUR 10-1015 HEADLINE: Houthis Remain Undeterred Despite Israeli Strikes and US Sanctions GUEST AND TITLE: Bridget Toomey, Foundation for Defense of Democracies Houthi Watcher; Bill Roggio, Senior Fellow for the Foundation for Defense of Democracies SUMMARY: Bridget Toomey reports Houthis continue daily drone and missile launches towards Israel, with Israeli Iron Dome defenses proving effective. Israel responded with strikes on Houthi military and media infrastructure in Sana'a, causing civilian casualties. US Treasury sanctioned 32 Houthi-affiliated individuals/entities for supporting Iranian-backed smuggling networks. Toomey confirms Iran absolutely provides weapons, mostly via ship routes, despite interdiction efforts. She notes Houthis are undeterred, fueled by past attacks, and will likely continue unless Iran is held accountable. Bill Roggio critiques a recent, unsuccessful Israeli strike in Doha. 1015-1030 HEADLINE: Houthis Remain Undeterred Despite Israeli Strikes and US Sanctions GUEST AND TITLE: Bridget Toomey, Foundation for Defense of Democracies Houthi Watcher; Bill Roggio, Senior Fellow for the Foundation for Defense of Democracies SUMMARY: Bridget Toomey reports Houthis continue daily drone and missile launches towards Israel, with Israeli Iron Dome defenses proving effective. Israel responded with strikes on Houthi military and media infrastructure in Sana'a, causing civilian casualties. US Treasury sanctioned 32 Houthi-affiliated individuals/entities for supporting Iranian-backed smuggling networks. Toomey confirms Iran absolutely provides weapons, mostly via ship routes, despite interdiction efforts. She notes Houthis are undeterred, fueled by past attacks, and will likely continue unless Iran is held accountable. Bill Roggio critiques a recent, unsuccessful Israeli strike in Doha. 1030-1045 HEADLINE: South Korea's President Accused of Aligning with CCP and North Korea GUEST AND TITLE: Morse Tan, former US Ambassador at Large for Global Criminal Justice; Gordon Chang, author and geopolitical analyst SUMMARY: Morse Tan and Gordon Chang discuss South Korean President Yoon Suk-yeol's policies, including a visa waiver for Chinese tourists, which Tan likens to CCP tactics. Tan claims Yoon aligns with the Chinese Communist Party and North Korea, dismantling counterintelligence and attending parades with Putin and Kim Jong-un. He reports Chinese nationals, pro-Yoon, illegally voted, and a third of South Korean police are reportedly CCP operatives. Yoon'sapproval is low, with most Koreans distrusting the CCP and prioritizing the US alliance. 1045-1100 HEADLINE: China's Advanced Weapon Systems and Global Asteroid Defense Ambitions GUEST AND TITLE: Rick Fisher, Senior Fellow, International Assessment and Strategy Center; Gordon Chang, author and geopolitical analyst SUMMARY: Rick Fisher discusses China's new DF-26D ballistic missile, capable of intercepting aircraft carriers up to 4,000 km, and other advanced unmanned weapon systems surpassing US capabilities. Gordon Chang questions US defense against these hypersonic threats. Fisher notes Russia's Energia space program faces financial distress due to the Ukraine war. China proposes an international asteroid defense, inviting global participation. Fisher warns this PLA-controlled initiative could be a front to develop anti-satellite capabilities and challenge the US in future conflicts. THIRD HOUR 1100-1115 HEADLINE: Ukraine Advances in Sumy, NATO Urged to Boost Russia Sanctions GUEST AND TITLE: John Hardie, Foundation for Defense of Democracies; Bill Roggio, Senior Fellow for the Foundation for Defense of DemocraciesSUMMARY: John Hardie discusses Ukrainian advances in the Sumy border area, noting Russia has redeployed better units to other regions like Donetsk, focusing on areas near Pokrovsk. He suggests Ukraine's counterattacks are part of an active defense, and their focus on Pokrovsk is strategically sound despite manpower shortages. Hardie highlights recent massive Russian drone barrages, including one into Poland, as a "wake-up call" for NATO to improve cost-effective air defenses. He advocates for stronger US secondary sanctions on Russian oil revenue and untying Ukraine's hands for long-range strikes. 1115-1130 HEADLINE: Ukraine Advances in Sumy, NATO Urged to Boost Russia Sanctions GUEST AND TITLE: John Hardie, Foundation for Defense of Democracies; Bill Roggio, Senior Fellow for the Foundation for Defense of Democracies130-1145 HEADLINE: MIT Professor Explains the Discovery of Ionic Liquid, Expanding Search for Extraterrestrial Life GUEST AND TITLE: Professor Sara Seager, Massachusetts Institute of Technology; David Livingston, Dr. Space of the Space Show SUMMARY: Professor Sara Seager discusses the accidental lab discovery of ionic liquids, a non-evaporating liquid salt potentially sustaining life on planets without water, expanding the traditional "habitable zone" concept. She envisions future missions like a Solar Gravitational Lens Telescope. For her lifetime, Professor Seager prioritizes privately funded "Morning Star missions" to Venus, beginning with Rocket Lab in 2026, to directly study its cloud particles for signs of life in this overlooked sister planet.1145-1200 HEADLINE: MIT Professor Explains the Discovery of Ionic Liquid, Expanding Search for Extraterrestrial Life GUEST AND TITLE: Professor Sara Seager, Massachusetts Institute of Technology; David Livingston, Dr. Space of the Space Show SUMMARY: Professor Sara Seager discusses the accidental lab discovery of ionic liquids, a non-evaporating liquid salt potentially sustaining life on planets without water, expanding the traditional "habitable zone" concept. She envisions future missions like a Solar Gravitational Lens Telescope. For her lifetime, Professor Seager prioritizes privately funded "Morning Star missions" to Venus, beginning with Rocket Lab in 2026, to directly study its cloud particles for signs of life in this overlooked sister planet FOURTH HOUR 12-1215 HEADLINE: US Diplomat Addresses Failed Doha Strike Amidst Iranian Defiance GUEST AND TITLE: Mary Kissel, Executive Vice President, Stephens Incorporated, former Senior Advisor for the Secretary of State SUMMARY: Mary Kissel discusses Secretary of State Marco Rubio's diplomatic shuttle after an unsuccessful Israeli airstrike in Doha targeting Hamas leadership. Despite the failure, she believes Israel's defense capabilities and past decapitation efforts were incredible, fostering public resolve against terrorism. Kissel notes Qatar's role as a money-laundering center and host of terror groups, despite its strategic importance to the US. She emphasizes that Iran, the world's largest state sponsor of terrorism, remains defiant regarding its nuclear and missile programs, posing an ongoing challenge for Israel and the US.1215-1230 Guest Names: Ahmad Sharawi and Bill Roggio Summary: Ahmad Sharawi and Bill Roggio discuss Al-Sharaa, the self-named president of Syria, who was appointed by militia leaders. His loyalist-drafted constitution grants him extensive powers, with key ministries held by former HTScommanders, and minority representatives serving as mere tokens. Formal Name: Ahmad Sharawi and Bill Roggio, Foundation for the Defense of Democracies 1230-1245 HEADLINE: Genocide Allegations Against Israel Debunked by Expert Analysis GUEST AND TITLE: Peter Berkowitz, Tad and Diane Taube Senior Fellow, Hoover Institution at Stanford University SUMMARY: Peter Berkowitz debunks genocide allegations against Israel, emphasizing the UN definition requires intent to destroy a group. He questions the credibility of the International Association of Genocide Scholars. Berkowitz highlights the absurdity, noting the Palestinian population tripled since the 1980s despite such claims. He attributes propaganda success to Hamas's use of human shields, shifting responsibility for civilian casualties. A comprehensive report systematically refutes claims of deliberate starvation, civilian targeting, and infrastructure bombing, demonstrating Israel's precautions.1245-100 AM HEADLINE: Genocide Allegations Against Israel Debunked by Expert Analysis GUEST AND TITLE: Peter Berkowitz, Tad and Diane Taube Senior Fellow, Hoover Institution at Stanford University SUMMARY: Peter Berkowitz debunks genocide allegations against Israel, emphasizing the UN definition require
HEADLINE: Global Allies Worry About US Division, Adversaries Exploit Weakness GUEST AND TITLE: Ambassador Husain Haqqani, Hudson Institute Director of Eurasia Project; Bill Roggio, Senior Fellow for the Foundation for Defense of Democracies SUMMARY: Ambassador Husain Haqqani states US allies are "very worried" by American internal division and extreme rhetoric, unlike past unity. Bill Roggio notes similar European issues, but the US now seems to lead in domestic disorder. Adversaries like China, Russia, and Islamist extremists exploit this polarization, using social media manipulation and citing Western decline. Both emphasize leaders must reduce aggressive rhetoric, promote bipartisan cooperation, and control social media to heal divisions, advocating for unity to counter external exploitation and domestic radicalization. 1957
HEADLINE: Global Allies Worry About US Division, Adversaries Exploit Weakness GUEST AND TITLE: Ambassador Husain Haqqani, Hudson Institute Director of Eurasia Project; Bill Roggio, Senior Fellow for the Foundation for Defense of Democracies SUMMARY: Ambassador Husain Haqqani states US allies are "very worried" by American internal division and extreme rhetoric, unlike past unity. Bill Roggio notes similar European issues, but the US now seems to lead in domestic disorder. Adversaries like China, Russia, and Islamist extremists exploit this polarization, using social media manipulation and citing Western decline. Both emphasize leaders must reduce aggressive rhetoric, promote bipartisan cooperation, and control social media to heal divisions, advocating for unity to counter external exploitation and domestic radicalization.
Stuart Carrera (Senior Consultant, Mandiant Consulting) joins host Luke McNamara to discuss how threat actors are increasingly targeting the VMware vSphere estate, and leveraging in this environment to conduct extortion and data theft. Stuart details why this has become an attractive target, and ways organizations can better engineer detections to respond to this activity. https://cloud.google.com/blog/topics/threat-intelligence/defending-vsphere-from-unc3944https://cloud.google.com/blog/topics/threat-intelligence/vsphere-active-directory-integration-risks
In this wide-ranging conversation, former CIA senior leader Sheetal Patel warns about the vulnerabilities the U.S. faces from evolving drone threats, drawing lessons from Ukraine's successful deep-strike operations against Russia. She highlights the lack of clear authorities, resources, and interagency coordination for defending against small drone swarms in America. Patel also stresses the crucial role of the private sector in rapidly advancing both drone and counter-drone technologies and underscores the growing counterintelligence risks U.S. companies face from foreign adversaries like China. The discussion extends to U.S.–India relations, where recent tariffs threaten to undermine years of strategic progress against Chinese influence.
The combined transcripts present a comprehensive narrative of a nation facing a multi-front "worldwide battle." The host, Tara, argues that the most significant threat is China, which she alleges is using a "hostage situation" with rare earth minerals to force U.S. concessions, including a massive increase in Chinese student visas. She claims this is part of a deliberate strategy to infiltrate the U.S. with spies and bioweapons. The monologue extends this conspiracy to the U.S. withdrawal from Afghanistan, which is framed as a betrayal to allow China access to the country's mineral wealth, a deal allegedly facilitated by the Biden family. The host also connects these geopolitical struggles to domestic issues, claiming that "Marxist" policies like cashless bail are designed to protect criminals and that "woke" corporate agendas are deliberately stripping American culture of its values. Citing the cases of Kilmar Abrego Garcia and a recent Cracker Barrel controversy, she argues that these issues are part of a coordinated effort to undermine the nation from within. The narrative concludes by portraying President Trump not as a weak leader but as a strategic figure fighting against this "worldwide system" on multiple fronts, from the economy and immigration to foreign policy.
Send us a textHow do you deal with people who do not like you, or want to be around you, or who do not treat you well? What about self-focused people who can't see past themselves to love others, including you? Today we look at an empathy progress scale to learn to see others properly, emotionally, like Jesus sees them. Then we examine the need to be okay with not being liked. The goal isn't to have people treat you better. The goal is for them to find their way in Christ to become better people. The funny thing is, when it is less about you and more about them, you get more joy out of life and have a greater promise of repaired relationships. Daily Bible Devotional (Volumes 1 and 2):Amazon - (paperback, hardcover, and Kindle)Sponsors: Spiritbuilding Publishers Website: www.spiritbuilding.comTyler Cain, Senior Loan Officer, Statewide MortgageWebsites: https://statewidemortgage.com/https://tylercain.floify.com/Phone: 813-380-8487
We can't eliminate rejection from our lives, but it doesn't have the power to keep us from God's best. In this sermon, Pastor Allen Jackson discusses rejection, its causes, and God's acceptance. Leaders like David, Moses, and our Lord Jesus all faced immense rejection in their lifetimes, and Pastor Allen speaks about how God helped each of them overcome. He also shares a few common causes of rejection: broken families, betrayal, and shame. While each of us will be touched by rejection in our lives, we don't have to live in its bondage. We can find freedom through our acceptance into God's Kingdom and His family.
#NewWorldReport: THE ADVERSARIES. Latin American Research Professor Evan Ellis, U.S. Army War College Strategic Studies Institute. @revanellis #NewWorldReportEllis 1962 MOSCOW