British signals intelligence agency
POPULARITY
Tony discusses a recent randsomware attack on an Australian construction firm where 17 GB of corporate data was allegedly taken; the US Justice Department has unsealed indictments against 12 individuals, so called "hackers for hire; and New Zealand has seen a dramatic 68% increase in sextortion cases in the first three months of the year, according to Netsafe. Tony Grasso is Principal Consultant at cybersecurity firm TitaniumDefence. He worked at GCHQ in the UK and is a former Intelligence Officer in New Zealand.
⚡️Like the Show? Click the [Repost] ↻ button so more people can hear it!
1. What are some recent major cryptocurrency hacks, and how were they carried out?High-profile crypto breaches include Bybit (~$1.5B), Ronin Network ($625M), and Poly Network ($611M). Attackers exploited vulnerabilities via social engineering (notably in the Bybit case), smart contract flaws, phishing, and targeted blockchain bridges. State-backed groups are increasingly active in this space.2. How is malware evolving to bypass traditional antivirus tools, and what languages are favored by attackers?Cybercriminals are turning to languages like Rust and Go to create or recompile malware, exploiting blind spots in antivirus tools that rely on static signature detection. These languages also offer cross-platform capabilities and security features that can be weaponized.3. What happened to computer scientist Xiaofeng Wang, and why is it significant?The FBI raided Wang's home—he's a well-known Indiana University expert in cryptography and privacy. Since the raid, he's gone missing, with his online presence scrubbed. The secrecy surrounding his disappearance, combined with his sensitive field of work and Chinese background, raises serious questions.4. Why is AI firm Anthropic sweeping its offices for hidden devices?To combat rising concerns about espionage and IP theft, Anthropic is conducting physical security sweeps. This move reflects heightened tensions in the competitive AI landscape and the growing risk of surveillance and corporate spying in the industry.5. What API security change is Cloudflare making, and why does it matter?Cloudflare is enforcing HTTPS-only access for its API domain by shutting down HTTP ports entirely. This ensures encrypted communication, protecting API tokens and user data, and sets a strong precedent for better internet-wide encryption standards.6. How did Madison Square Garden use surveillance tech to ban a fan, and what does it imply?MSG banned a fan for life after facial recognition identified him as the creator of a CEO-critical T-shirt. This incident underscores the growing use of surveillance in private venues and its implications for free expression and long-term personal tracking.7. What data exposure was found in several dating apps?Researchers found ~1.5M unprotected, sensitive photos—some explicit—exposed by five dating apps from M.A.D Mobile. Images included private messages and content believed to be deleted. This highlights the dangers of poor data hygiene and storage practices.8. What security failure occurred at the UK's GCHQ involving an intern?A GCHQ intern copied top-secret data from a secure system to his personal phone, then transferred it to a home hard drive. This breach reveals critical weaknesses in internal controls, particularly around device security and data exfiltration prevent
This one's a shorter one today folks. Easter Bingo had GCHQ all behind so we started late and finished early. Onto Alty! Hosted on Acast. See acast.com/privacy for more information.
EP 236 For the Biggest Crypto Hacks it turns out “HODL” doesn't protect you from miscreants with social engineering degrees.Hackers are now coding in Rust and Go, because multilingual malware is harder to catch.An esteemed University Computer Scientist simply disappears. (See if you can pick up on the clues.)Anthropic expands into AI workplace cleaning, but before you get too excited, they're only sweeping offices for now.Cloudflare slams the door making one well known transfer protocol vanish.Then, design one anti-CEO shirt and "boom" a lifetime ban from Madison Square Garden.Millions of spicy selfies spilled online, and now your privates may be public.And we finish with the burning question of who blew up national security... the intern or GCHQ?Let's go find some explanations.Find the full transcript to this podcast here.
The UK unveils the full scope of its upcoming Cyber Security and Resilience Bill. Apple warns of critical zero-day vulnerabilities under active exploitation. The InterLock ransomware group claims responsibility for a cyberattack on National Presto Industries. Microsoft flags a critical vulnerability in Canon printer drivers. Check Point Software confirms a data breach. The FTC warns 23andMe's bankruptcy trustees to uphold their privacy obligations. A Canadian hacker has been arrested and charged for allegedly breaching systems tied to the Texas Republican Party. A GCHQ intern pleads guilty to stealing top-secret data. On our Threat Vector segment, host David Moulton from Palo Alto Networks speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. The confabulous hallucinations of AI. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment Host David Moulton from Palo Alto Networks Threat Vector podcast asks “Is the Quantum Threat Closer Than You Think?” on the latest segment of Threat Vector. Quantum computing is advancing fast, and with it comes a major cybersecurity risk—the potential to break today's encryption standards. David speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. You can catch the full discussion here. Be sure to listen to new episodes of Threat Vector every Thursday on your favorite podcast app. Selected Reading UK threatens £100K-a-day fines under new cyber bill (The Register) Apple Warns of Three 0-Day Vulnerabilities Actively Exploited in Attacks (Cyber Security News) Ransomware Group Takes Credit for National Presto Industries Attack (SecurityWeek) Critical Vulnerability Found in Canon Printer Drivers (SecurityWeek) Check Point Acknowledges Data Breach, Claims Information is 'Old (Cyber Security News) FTC: 23andMe's Buyer Must Uphold Co.'s Data Privacy Pledge (BankInfo Security) Canadian hacker arrested for allegedly stealing data from Texas Republican Party (The Record) GCHQ intern took top secret spy tool home, now faces prison (The Register) A Peek Into How AI 'Thinks' - and Why It Hallucinates (GovInfo Security) Why Confabulation, Not Hallucination, Defines AI Errors (Integrative Psych) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
I'm Granger Forson and you can find me at www.bizsmart-gloucestershire.co.uk or on LinkedIn. On this episode, I talk with Steve Mason, the visionary behind Nova Blue Technologies, a remote-first cybersecurity company that grew from a solo startup during the lockdown to a 14-strong international team. Steve shares how a “kindness is the default” ethos permeates Nova Blue's culture, creating an atmosphere of trust, flexibility, and empowerment. Fueled by his GCHQ and defense industry background, Steve's focus on proactively configuring systems – rather than just alerting – sets Nova Blue's managed service apart. Their hiring principle of “attitude, aptitude, and appetite” has seen Nova Blue attract dynamic, passionate individuals who fit perfectly into the “Nova Legion.” With 70% of leads coming from channel partners, Steve reveals how they are diversifying lead generation and why they are committed to organic growth before eyeing a potential exit. You'll be inspired by the bold international aspirations (Canada, Middle East, Indonesia) that guide Nova Blue's expansion plans – and the “people-first” approach they'll keep at every stage. Tune in for insights on building a vibrant culture, scaling organically, and protecting SMEs worldwide. To ensure you don't miss any inspirational future episodes do subscribe to ScaleUp Radio wherever you like to listen to your podcasts. Also, you can nominate a guest for ScaleUp Radio if you know someone with an interesting ScaleUp story – you can find how in the show notes. So, let's now dive into the inspiring journey of kindness is the default, attitude-aptitude-appetite, and bootstrapped growth with Steve. Scaling up your business isn't easy, and can be a little daunting. Let ScaleUp Radio make it a little easier for you. With guests who have been where you are now, and can offer their thoughts and advice on several aspects of business. ScaleUp Radio is the business podcast you've been waiting for. If you would like to be a guest on ScaleUp Radio, please click here: https://bizsmarts.co.uk/scaleupradio/kevin You can get in touch with Granger here: grangerf@biz-smart.co.uk Book a call with Granger - 30 minutes value add conversation for Business owners with Staff.https://api.goexela.com/widget/bookings/catchupgrangerugx7zl Kevin's Latest Book Is Available! Drawing on BizSmart's own research and experiences of working with hundreds of owner-managers, Kevin Brent explores the key reasons why most organisations do not scale and how the challenges change as they reach different milestones on the ScaleUp Journey. He then details a practical step by step guide to successfully navigate between the milestones in the form of ESUS - a proven system for entrepreneurs to scale up. More on the Book HERE - https://www.esusgroup.co.uk/ Steve can be found here: steve@nova-blue.net Resources: Start With Why By Simon Sinek - https://uk.bookshop.org/p/books/start-with-why-how-great-leaders-inspire-everyone-to-take-action-simon-sinek/239994?ean=9780241958223 The Infinite Game by Simon Sinek - https://uk.bookshop.org/p/books/the-infinite-game-simon-sinek/185827?ean=9780241385630 The Rest Is Politics podcast - https://www.globalplayer.com/podcasts/42KuSr/ Diary of a CEO - https://stevenbartlett.com/doac/ Microsoft Teams - https://www.microsoft.com/en-gb/microsoft-teams/group-chat-software Stirling Bank app - https://www.starlingbank.com/download/
The White House is urging federal agencies not to lay off cybersecurity teams. Google doesn't deny receiving a secret legal order from the UK government. Microsoft researchers identify a simple method to bypass AI safety guardrails. Scammers are impersonating the Clop ransomware gang. Cisco issues security advisories for multiple IOS XR vulnerabilities. CISA warns of multiple ICS security issues. A LockBit ransomware developer has been extradited to the U.S. GCHQ's former director calls for stronger cybersecurity collaboration. Rick Howard and Kim Jones pass the mic for the CISO Perspectives podcast. Sniffing out Stingrays. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we have Dave speaking with Rick Howard, a friend of the show, and Kim Jones, a veteran CISO, educator, and expert in the field, as Rick passes the mic to Kim for a brand new season of CISO Perspectives, formerly CSO Perspectives. Selected Reading White House instructs agencies to avoid firing cybersecurity staff, email says (Reuters) Elon Musk Made Visit to U.S. Spy Agency (Wall Street Journal) Google refuses to deny it received encryption order from UK government (The Record) New Context Compliance Exploit Jailbreaks Major AI Models (GB Hackers) Fraudsters Impersonate Clop Ransomware to Extort Businesses (Infosecurity Magazine) Cisco Warns of IOS XR Software Vulnerability Let Attackers Trigger DoS condition (Cyber Security News) CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities & Exploits (Cyber Security News) LockBit Ransomware Developer Extradited to US (SecurityWeek) Cyber Industry Falls Short on Collaboration, Says Former GCHQ Director (Infosecurity Magazine) Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying (Electronic Frontier Foundation) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Have you ever wondered about COBRA? Not the snake or the yoga pose — but Cabinet Office Briefing Room A, the place at the heart of Whitehall where a highly sensitive, critical government committee meets when a crisis hits the U.K. This week, host Patrick Baker takes you inside these mysterious meetings to find out how those in charge take crucial decisions — often on matters of life and death. One of the original architects of COBRA, David Omand, who went on to become director of spy agency GCHQ, explains how the Munich Olympics hostage crisis triggered alarm in the U.K. and highlighted the need to build COBRA. Lucy Fisher from the Financial Times explains how to access the secret bunker under the Ministry of Defense that would be home to its duplicate in case of nuclear attack. Tony Blair's former Cabinet Secretary Richard Wilson describes how he convened what was a very busy COBRA on 9/11, a day that exposed the U.K.'s own vulnerabilities and led to rapid changes to the UK's guidebook for handling terror attacks. In an age of heightened tensions, Susan Scholefield, a former COBRA director, recalls how drills and exercises became more common and how it was her job to make sure the Pope was safe, monitoring his state visit from the U.K.'s version of the Situation Room. Former Defence Secretary Michael Fallon describes being in COBRA in response to multiple atrocities on U.K. soil in 2017, and recalls how ministers scrambled to work out whether more attacks were on the way. Fallon also reveals the person he wouldn't trust to chair a COBRA meeting (or anything, really). Katie Perrior, ex-No 10 comms chief under Theresa May, remembers rushing into COBRA after the Westminster Bridge attack amid fears that offices in Parliament might be unsafe. With the arrival of the pandemic, a crisis of a wholly different order, emergency planner Lucy Easthope sets out some of COBRA's pitfalls. Easthope, who co-founded the After Disaster Network at Durham University, believes too much emphasis is put on state-of-the-art nerve centers rather than simple honesty, in the midst of crises for which ministers are generally not very well prepared. Learn more about your ad choices. Visit megaphone.fm/adchoices
Alex Thomson is an independent journalist and regular contributor to UK Column, where he presents under the "Eastern Approaches" platform. Educated at Rugby School and Cambridge, he began his career with a Christian mission in the former Soviet Union before serving as an officer at GCHQ during his twenties. James visited Alex at home with his father, also named Alex, to discuss biblical studies, language, and reality itself. https://www.ukcolumn.org/writer/alex-thomson-eastern-approaches ↓ Monetary Metals is providing a true alternative to saving and earning in dollars by making it possible to save AND EARN in gold and silver. Monetary Metals has been paying interest on gold and silver for over 8 years. Right now, accredited investors can earn 12% annual interest on silver, paid in silver in their latest silver bond offering. For example, if you have 1,000 ounces of silver in the deal, you receive 120 ounces of silver interest paid to your account in the first year. Go to the link in the description or head to https://monetary-metals.com/delingpole/ to learn more about how to participate and start earning a return on honest money again with Monetary Metals. ↓ ↓ How environmentalists are killing the planet, destroying the economy and stealing your children's future. In Watermelons, an updated edition of his ground-breaking 2011 book, James tells the shocking true story of how a handful of political activists, green campaigners, voodoo scientists and psychopathic billionaires teamed up to invent a fake crisis called ‘global warming'. This updated edition includes two new chapters which, like a geo-engineered flood, pour cold water on some of the original's sunny optimism and provide new insights into the diabolical nature of the climate alarmists' sinister master plan. Purchase Watermelons (2024) by James Delingpole here: https://jamesdelingpole.co.uk/Shop/Products/Watermelons-2024.html ↓ ↓ ↓ Buy James a Coffee at: https://www.buymeacoffee.com/jamesdelingpole The official website of James Delingpole: https://jamesdelingpole.co.uk x
This week, we're digging into The B1M's recent video "Inside Europe's $1BN Abandoned Mega-Build". Together, we talk about Fred's experiences of going inside one of Europe's biggest abandoned buildings, the one of a kind ICC Berlin.Later in the episode, we cover:GCHQ share rare construction images with The B1M = https://www.instagram.com/p/DF94xiCM8kE/?img_index=1We end the show with emails from Manu and Jason Methfessel.Get in touch! Podcast@TheB1M.comwww.TheB1M.com Hosted on Acast. See acast.com/privacy for more information.
Are we living through a golden age of espionage drama? And what do spy stories tell us about the true nature of the secret world? EI's Alastair Benn is joined by David Omand, ex-head of GCHQ, the British government's world-renowned cyber agency, and author of How Spies Think, Pauline Blistène, an expert on intelligence affairs and spy fiction, and Senior Editor Paul Lay to discuss the enduring popularity and legacy of the spy in fiction. Engelsberg Ideas is funded by the Axel and Margaret Ax:son Johnson Foundation for Public Benefit. EI Talks... is hosted by Paul Lay and Alastair Benn, and produced by Caitlin Brown. The sound engineer is Gareth Jones. Image: Gary Oldman in the 2011 film version of Tinker Tailor Soldier Spy Year, based on the novel of John le Carré. Credit: Photo 12 / Alamy Stock Photo
Chinese technology is making headlines with the rise of DeepSeek, an AI chatbot that has surged to the top of US app downloads. Its development cost is reportedly lower than Western alternatives, and its open-source nature raises both innovation and security concerns. Shirin Ghaffary, AI reporter at Bloomberg, Ciaran Martin, former Head of Cybersecurity at GCHQ, and Kathrin Hille, FT Greater China correspondent, discuss the impact. The Excel World Championships bring spreadsheets into the realm of competitive gaming. Hosted in Las Vegas, the event sees contestants solving complex data challenges in front of a live audience. Robert McMillan, reporter at The Wall Street Journal, describes the atmosphere of the event and assesses whether Excel really has evolved from office tool to esport. Presenters: Ros Atkins and Katie Razzall Producer: Simon Richardson Assistant producer: Lucy Wai
From January 7, 2017: In an interview with The New York Times before his intelligence briefing on Russian efforts to interfere in the U.S. election on Friday, President-elect Donald Trump called the intelligence community's assessment of Russian interference a "political witch hunt." In that spirit, Benjamin Wittes brought Lawfare managing editor Susan Hennessey and former GCHQ information security specialist Matt Tait on the podcast to discuss evidence of Russian attempts to influence the presidential election and Trump's baffling response.A quick note: This podcast was recorded before the Office of the Director of National Intelligence released the intelligence community's report on Russian interference. Susan and Matt's firm belief that the hacking of Democratic Party information was carried out neither by a 14-year-old nor by a 400-pound person sitting on a bed, however, remains unshaken.Ben says he still suspects a 400-pound 14-year-old sitting on a bed—albeit a bed in Moscow at GRU headquarters.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
In the latest episode of Double Jeopardy, hosts Ken Macdonald KC and Tim Owen KC discuss the implications of the recent Chinese spy case involving Yang Tengbo and Prince Andrew. Looking at the role of the Special Immigration Appeals Commission, they consider the sensitive role of national security in immigration law, Britain's evolving view of business relationships with China, and MI5's safety first approach to foreign influence. Sticking with national security, they discuss the trial of the GCHQ analyst Katherine Gun, who was accused of leaking a classified document to the press. Ken explains what led him to drop the case against her, and the role of the security services in that decision. Finally, they look at Elon Musk's increasingly bizarre interventions into UK domestic politics, and consider Keir Starmer's response.
This week, we delve into the dark world of fake CAPTCHAs designed to hijack your computer. Plus, the AI safety clock is ticking down – is doomsday closer than we think? And to top it off, we uncover the sticky situation of Krispy Kreme facing a ransomware attack.All this and more is discussed in the latest jam-packed edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley of "The AI Fix" podcast.Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:CAPTCHAs from hell - Reddit.“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising - Guardio.AI Safety Clock Ticks Closer To ‘Midnight,' Signifying Rising Risk - Forbes.Krispy Kreme admits there's a hole in its security - The Register. Nutritional and Allergen Information - Krispy Kreme. &UDM=14.Does one line fix Google? - Tedium.ElevenLabs.The GCHQ Christmas Challenge 2024 - GCHQ.Smashing Security merchandise (t-shirts, mugs, stickers and stuff)Sponsored by:1Password Extended Access Management – Secure every sign-in for every app on every device.BigID - Start protecting your sensitive data wherever it lives with BigID. Get a free demo to how your organization can reduce data risk and accelerate the adoption of generative AI.ThreatLocker - the Zero Trust endpoint protection platform that provides enterprise-level cybersecurity to organizations globally. Start your 30-day free trial today!SUPPORT THE SHOW:Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!FOLLOW US:Follow us on
The Women and Equalities Committee of MPs says “medical misogyny” is leaving women and girls in unnecessary pain for years due to a lack of awareness surrounding painful reproductive conditions. We spoke with The London Standard's Emma Loffhagen, who recently wrote about the rise in period tracking.The British Army has fired a laser weapon from an armoured vehicle for the first time in a successful test to destroy drones in mid-air.Plus, Google unveils Willow quantum computing chip.Also in this episode:Eagle has landed...can you detect clues to complete this year's GCHQ festive puzzle?Does the Met Office predict a white Christmas?£500,000 raised for five Ukraine rescue lions Hosted on Acast. See acast.com/privacy for more information.
Clifford Cocks is a British mathematician and cryptographer. While working at GCHQ, he invented public key encryption, and which predates the work of the RSA and Diffie-Hellman methods. He studied mathematics as an undergraduate at Kings College, Cambridge, and then joined the Communications-Electronics Security Group (CESG) at GCHQ in 1973. After his discovery of a usable public key encryption method, he went on to create one of the first Identity-Based Encryption methods and which is based on quadratic residues rather than bilinear pairings. In 2008, he was made a Companion of the Order of the Bath (CB). Then, in 2010, he and James Ellis and Malcolm Williamson were honoured by the IEEE for their part in the development of public key encryption. In 2015, he was elected as a Fellow of the Royal Society, and, in the same year, he received an honorary PhD from the University of Birmingham. Then, in 2021, Clifford was inducted into the Cryptologic Hall of Honour. Read more: https://medium.com/asecuritysite-when-bob-met-alice/so-who-invented-public-key-encryption-213ceef7759
2 hour journey through some of my favourite house track's at the moment, and sprinkled with the odd classic tune for good measure. ⚡️Like the Show? Click the [Repost] ↻ button so more people can hear it!
Three Buddy Problem - Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia's APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
Patrick and Matt infiltrate GCHQ and pressure their target while discovering someone else might not be who they seem. Gameplay begins at: 11:00 Recorded on 8/29/24 Join us on our Discord: https://discord.gg/tQGJVsrnNp Follow us on Blue Sky and X @BlackLodgeRPG The Design Mechanism: thedesignmechanism.com Intro Theme: Dances and Dames by Kevin MacLeod. In session music provided by Tabletop RPG Music: www.patreon.com/tabletoprpgmusic
Ed Vaizey interrogates the past, present and future of espionage, from moments that could have come from fiction to the reality of spying in the modern world. He speaks to former GCHQ director Sir David Omand and Lord Robin Renwick, former UK ambassador to the United States and author of 'The Intelligent Spy's Handbook'.Plus: Columnists Manveen Rana and Timandra Harkness discuss how to make companies take responsibility for Grenfell, Tony Blair's call for closer links to Europe, and kicking hereditary peers out of Parliament. Hosted on Acast. See acast.com/privacy for more information.
In this episode, Sam's guest is Steve Radcliffe. Steve is one of Europe's top leadership experts and author of the bestselling book, Leadership Plain and Simple. In the last 20 years, he has provided leadership guidance to over 50 chief executives and heads of the Civil Service, GCHQ and the NHS. He is most well-known for his powerful leadership development approach, Future – Engage – Deliver, that The Times describes as “the no-nonsense approach shaking up the world of leadership”. It has been the approach used in his and his team's work helping grow over half a million leaders at all levels of organisations in all sectors.
Gareth Williams était un mathématicien et analyste du GCHQ détaché auprès des services de renseignement secrets qui a été retrouvé mort dans son appartement, dans des circonstances suspectes à Pimlico, Londres, le 23 août 2010. Encore aujourd'hui le dossier est toujours irrésolu.Mes sources :https://www.bbc.com/news/uk-england-london-12059910https://www.reddit.com/r/UnresolvedMysteries/comments/gh8qv0/the_death_of_gareth_williams/https://en.wikipedia.org/wiki/Death_of_Gareth_Williamshttps://www.theguardian.com/uk-news/2024/feb/05/no-new-dna-evidence-gareth-williams-likely-died-alone-forensic-review-findsAttention, cette vidéo peut contenir des images ou des propos qui sont déconseillés aux plus jeunes.Chanson Intro : Danse of questionable tuning - Kevin MacLeod VidéoIntro par https://www.instagram.com/frenchyartist/♥Suis-moi sur les réseaux sociaux:INSTAGRAM: https://www.instagram.com/victoria.charlton/TWITTER : https://twitter.com/lacharltonFACEBOOK : https://www.facebook.com/victoriacharltonofficielTIKTOK : https://www.tiktok.com/@victoriacharltonnEMAIL : victoriacharltonpro@gmail.com♥Podcast Over n Out :APPLE PODCAST : https://podcasts.apple.com/us/podcast/over-n-out/id1545187858?uo=4SPOTIFY : https://open.spotify.com/show/6OgK35AojAk4emWYfq5sk8♥Podcast Post-Mortem :SPOTIFY : https://open.spotify.com/show/1m0Yx1jAOos8ewx5o2OgJAQUB RADIO : https://www.qub.ca/radio/balado/post-mortem-avec-victoria-charlton-saison-1-roxanne-luceLogiciel de montage : Final Cut ProMonteur : Sebastian MessingerCamera : Canon G7XTout commentaire incitant à la haine ou au manque de respect sera supprimé. Je veux que mon espace commentaire soit positif et amical :) Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James felt a shift in his career. As a company founder, he shares that he is very driven, very fast and also very caring. James offers advice to those looking to get into the industry recommending they chase what interests them rather than certifications. We thank James for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James felt a shift in his career. As a company founder, he shares that he is very driven, very fast and also very caring. James offers advice to those looking to get into the industry recommending they chase what interests them rather than certifications. We thank James for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
A Navy frigate commander and a British submarine captain on playing cat and mouse in a ‘little bubble of GCHQ'"When a torpedo starts coming straight at you, there's only one thing a submarine crew can do – snap into “full evasion” mode. Captain Ryan Ramsey issues swift orders. His crew responds immediately, twisting the Royal Navy's Trafalgar-class submarine to manoeuvre the boat beneath the waves in an effort to shake off the weapon bearing down fast on their position."In this exclusive conversation between The Telegraph's Associate Editor Dom Nicholl's and Captain Ryan Ramsey (retired) and Captain Tom Sharpe (retired) listen to how top naval commanders think about their work at sea, the issues, problems and rewards. Hosted on Acast. See acast.com/privacy for more information.
The world finds itself at a number of tipping points in 2024 - with wars in Gaza and Ukraine; tensions in the far east, elections in the US and the ongoing AI revolution. University of Oxford Professor Ciaran Martin, founding CEO of the National Cyber Security Centre at GCHQ joins Cormac.
In this episode of Technology and Security, Dr Miah Hammond-Errey speaks with Sir David Omand. The interview is an exploration of the evolving landscape of intelligence, technology and security from the Cold War to the near real time intelligence in Russia's invasion of Ukraine. They discuss adaptation in intelligence from high frequency radio to generative AI and from state threats to myriad threat actors. They explore the interpretative nature of data and the necessity for analytical skill in understanding multiple possible explanations in both intelligence work and political decision-making. They discuss the importance of intelligence in supporting diplomatic efforts and informing policy decisions, the unique trust as well as generational and cultural depth of the Five Eyes alliance and the risks of politicising intelligence. Moving beyond the debate of comparative importance of specific collection mechanisms they discuss the real value of diversity of thought and experiences in analytical outcomes in intelligence work. They explore the need for security to be considered within the human rights framework, rather than as separate and potentially conflicting priorities. They cover why the resilience of information architectures is critical – and flows of information are akin to the principles of supply chain dependencies. They also discuss intelligence leadership during technological change, stressing motivation, mission and adaptability. Sir David Omand GCB is a RUSI Distinguished Fellow, KCL Visiting Professor; former UK Security and Intelligence Co-ordinator, Cabinet Office Resources mentioned in the recording: · Omand, D. (2010) Securing the state. New York, Columbia University Press.· Omand, D. (2020) How Spies Think: Ten Lessons in Intelligence, Penguin Books Limited. · Omand, D. (2024) How to Survive a Crisis, Lessons in Resilience and Avoiding Disaster, Penguin Books Limited. · Miah Hammond-Errey, 2024, Big Data, Emerging Technologies and Intelligence: National Security Disrupted, Routledge (20% discount code for book AFL04)· Miah Hammond-Errey, 9 Feb 2023, Secrecy, sovereignty and sharing: How data and emerging technologies are transforming intelligence, United States Studies Centre· Miah Hammond-Errey (2023) Big data, emerging technologies and the characteristics of ‘good intelligence', Journal of Intelligence and National Security· Cixin Liu (2008) Three Body Problem This podcast was recorded on the lands of the Gadigal people, and we pay our respects to their Elders past, present and emerging. We acknowledge their continuing connection to land, sea and community, and extend that respect to all Aboriginal and Torres Strait Islander people. Thanks to the talents of those involved. Music by Dr Paul Mac and production by Elliott Brennan. Transcript check against delivery Dr Miah Hammond-Errey: Sir David Omand has had to date two rather remarkable careers. He had an extensive leadership career in British security, intelligence and defence, holding senior positions, including as director of GCHQ. He served on the UK Joint Intelligence Committee and was the first security and intelligence coordinator in the Cabinet Office. Subsequently, he became a non-executive director, has been awarded honorary doctorates and holds esteemed academic posts as well as publishes prolifically. He is currently a visiting professor in the War Studies Department at the King's College London. His books are Securing the State Principled Spying The Ethics of Secret Intelligence with professor Mark Pythian, and How Spies Think. His forthcoming book is called How to Survive a Crisis. I'm so thrilled to have you join me on the Technology and Security podcast, David. Sir David Omand: I'm looking forward to this conversation. Dr Miah Hammond-Errey: We're coming to you today from the lands of the Gadigal people. We pay our respects to their elders, past, present and emerging both here and wherever you're listening. We acknowledge their continuing connection to land, seeing community, and extend that respect to all Aboriginal and Torres Strait Islander people. Dr Miah Hammond-Errey: [00:01:27] What are the biggest changes you've seen throughout your distinguished career in intelligence? Sir David Omand: Well, two stand out. Obviously. One is the changes in the nature of the threats that intelligence is there to support government decision making. And the other is obviously in the technology. I joined GCHQ in 1969. So it was in the Cold War. It seems a very, very long time ago. But of course there was no internet, there were no emails. The interception of communications was of high frequency transmissions and even high frequency Morse was was still very much in use. And all of that has changed beyond recognition. The fundamental purposes haven't changed. I think of intelligence as the reason human beings evolved. Intelligence was to make better decisions by reducing the ignorance of the person trying to make the decision. Dr Miah Hammond-Errey: [00:02:34] So you've outlined a pretty major change in the threat landscape and of course, in technology. how ready do you think intelligence agencies are for the challenges that we face now? But those coming down the line as well. Sir David Omand: I think if I took the Five Eyes we've done well so far, uh, to keep up with some of the big technological changes, there are still obviously adaptations we need to make and the nature of the threat with the reappearance, if you like, of perceptions of major state threats. Uh, uh, that takes some time to adjust to. We've in Europe, we have a major war going on, but with following the Russian invasion of Ukraine. But at the end of the Cold War, the British intelligence establishment, we ceased to maintain the number of Russian speakers and specialists in Russian weapons systems, Soviet weapons systems, which we used to have, and some of that has had to be rebuilt. So the intelligence world, it's always about adaptation, about trying to keep up. I think of it in terms of a dynamic interaction between demand and supply. You have demands for intelligence. And after 911, those demands were very different. They were about information on individuals, individual terrorists, for example. Where were they? Who were their associates, where were they traveling, what capabilities did they have? And those sort of demands for information coincided with a huge upheaval in supply, the ability of digital technology and the internet to supply answers t...
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: business.eset.com/twit vanta.com/SECURITYNOW 1bigthink.com lookout.com
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: business.eset.com/twit vanta.com/SECURITYNOW 1bigthink.com lookout.com
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: business.eset.com/twit vanta.com/SECURITYNOW 1bigthink.com lookout.com
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: business.eset.com/twit vanta.com/SECURITYNOW 1bigthink.com lookout.com
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: business.eset.com/twit vanta.com/SECURITYNOW 1bigthink.com lookout.com
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: business.eset.com/twit vanta.com/SECURITYNOW 1bigthink.com lookout.com
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: business.eset.com/twit vanta.com/SECURITYNOW 1bigthink.com lookout.com
GCHQ: No more default passwords for consumer IoT devices! What happened with Chrome and 3rd-party cookies? Race conditions and multi-threading GM "accidentally" enrolled millions into "OnStar Smart Driver +" program Steve recommends Ryk Brown's "Frontiers Saga" SpinRite update Passkeys: A Shattered Dream? Show Notes - https://www.grc.com/sn/SN-972-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: business.eset.com/twit vanta.com/SECURITYNOW 1bigthink.com lookout.com
This episode is the first of two conversations between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. He brings his knowledge of both the public and private sector to bear in this wide-ranging conversation. Steve and Brian touch on the challenges small-midsize enterprises face in implementing cyber defenses, what effective cooperation between government and the private sector looks like, and the role insurance may play in cybersecurity. Key Takeaways: 1. A widespread, societal approach involving both the public and private sectors is essential in order to address the increasingly complex risk landscape of cyber attacks. 2. At the public or governmental levels, there is an increasing need to bring affordable cyber security services to small and mid-sized businesses, because failing to do so puts those businesses and major supply chains at risk. 3. The private sector serves as a skilled and necessary support to the public sector, working to counter mis- and disinformation campaigns, including those involving AI. Tune in to hear more about: 1. The National Cybersecurity Organization is part of GCHQ, serving to set regulatory standards and safeguards, communicate novel threats, and uphold national security measures in the digital space. (5:42) 2. Steve and Brian discuss existing challenges of small organizations lacking knowledge and expertise to meet cybersecurity regulations, leading to high costs for external advice and testing. (7:40) Standout Quotes: 1. “...If you buy an external expertise — because you have to do, because either you haven't got the demand to employ your own, or if you did the cost of employment would be very hard — the cost of buying an external advisor becomes very high. And I think the only way that can be addressed without compromising the standards is of course, to make more people develop more skills and more knowledge. And that, in a challenging way, is a long, long term problem. That is the biggest problem we have in the UK at the moment. And actually, in a lot of countries. The cost of implementing cybersecurity can quite often outweigh, as it may be seen within a smaller business context, the benefit.” -Brian Lord 2. “I think there probably needs to be a lot more tangible support, I think, for the small to medium enterprises. But that can only come out of collaboration with the cybersecurity industry and with government about, how do you make sure that some of the fees around that are capped?” -Brian Lord Mentioned in this episode: ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.
Tony Grasso is Principal Consultant at cybersecurity firm TitaniumDefence. He worked at GCHQ in the UK and is a former Intelligence Officer in New Zealand.
Earlier this week the UK government accused China of stealing 40 million UK registered voters' names and addresses. The breach occurred in 2021 and 2022, in which time GCHQ has ascertained that China state-affiliated actors also targeted several parliamentarians' emails - including former Conservative leader Iain Duncan Smith. So what could the Chinese government do with this data? How real is the threat of China to Western democracy? And what is our government doing to mitigate this risk?Anoosh Chakelian, Britain editor of the New Statesman, and Freddie Hayward, political correspondent, discuss the UK's China strategy in the run up to the election.Read: China's global coal machine won't be stopped so easily Hosted on Acast. See acast.com/privacy for more information.
Alex Thomson served in a Christian mission in the former Soviet Union and went on to spend the rest of his twenties as a GCHQ officer. Aged thirty, He moved to the Netherlands and has spent the last decade and a half as a translator, interpreter and a researcher of networked evil. / / / / / / Buy James a Coffee at: https://www.buymeacoffee.com/jamesdelingpole The official website of James Delingpole: https://jamesdelingpole.co.uk ♦♦♦♦♦ x
Don Jr and Matt Taibbi on "Generals", Spicer's Flynn clip, delta posts hit different now, Public Enemy #1 named as Arabella Advisors by President Trump, GCHQ document is a fake, MSNBC claims Trump's Georgia case is dead, Fani (FAWN-EE) Willis' father testifies, Biden heads to East Palestine finally after 379 days, Trump team posts video about it on day 377, CISA targets Judiciary on elections PRIOR to elections, and much much more...
The Jodrell Bank observatory in Cheshire in the UK played a significant secret role during the Cold War. It was established in 1945 by Bernard Lovell, a radio astronomer at the university, to investigate cosmic rays after his work on radar in the Second World War. We hear some intriguing details of the site's Cold War roles including being Britain's first nuclear attack early warning station and its signals intelligence collaboration with GCHQ, the UK's Government Communications Headquarters. Even more surprisingly it's also revealed how Soviet Scientists also worked at the site and that the Soviets attempted to get Bernard Lovell to defect during a visit to the Soviet Union. I'm given a tour of the non-public areas by Tim O'Brien who is a Professor of Astrophysics. Do make sure you check out the extensive photos I took at https://coldwarconversations.com/episode327/ The fight to preserve Cold War history continues and via a simple monthly donation, you will give me the ammunition to continue to preserve Cold War history. You'll become part of our community, get ad-free episodes, and get a sought-after CWC coaster as a thank you and you'll bask in the warm glow of knowing you are helping to preserve Cold War history. Just go to https://coldwarconversations.com/donate/ If a monthly contribution is not your cup of tea, We also welcome one-off donations via the same link. Find the ideal gift for the Cold War enthusiast in your life! Just go to https://coldwarconversations.com/store/ Follow us on Twitter https://twitter.com/ColdWarPod Instagram https://www.instagram.com/coldwarconversations/ Facebook https://www.facebook.com/groups/coldwarpod/ Youtube https://youtube.com/@ColdWarConversations Love history? Check out Into History at this link https://intohistory.com/coldwarpod 0:00 Introduction to the podcast 1:00 Jodrell Bank Observatory's role in the Cold War and its establishment 10:08 The birth and evolution of radio astronomy 15:50 The construction and purpose of the world's biggest radio telescope 32:46 The telescope's role during the Cuban missile crisis and its implications 51:05 The mission of GCHQ at Jodrell Bank and intercepting signals from the Soviet Union 1:04:21 Touring the secret tunnel and discussing its potential uses 1:14:51 Recounting the Soviet Luna 15 mission during the American moon landing and the role of Jodrell Bank 1:29:18 Episode extras and thanking financial supporters Chapters powered by PodcastAI✨ Learn more about your ad choices. Visit podcastchoices.com/adchoices
After learning what today's British Establishment was all about at Rugby School and Cambridge, Alex Thomson served in a Christian mission in the former Soviet Union and went on to spend the rest of his twenties as a GCHQ officer. He moved to the Netherlands aged thirty in 2009 and has spent the last decade and a half more quietly as a translator and interpreter and a researcher of networked evil. Since 2014, Alex has presented his emerging findings via the Eastern Approaches brand on UK Column News, where his specialisms are Europe, geopolitics, religious affairs and constitutional matters. He maintains the Eastern Approaches YouTube channel, mostly of careful readings of key documents indicating the scope of corruption of British and Western public life. He has two Telegram channels: Eastern Approaches and All the Eastern Approaches. Gwynne's Introduction to True Philosophy: When it comes to the news, who, if anyone, is telling us the truth? It seems that none of us can give a satisfactory answer. We have been lied to by the press and the media for so long that most of us down the rabbit hole reckon that the news, and just about everything else that surrounds us, is a lie. So what can we do? One solution is to buy Gwynne's Introduction to True Philosophy. This book will not only help you to think properly, teaching you to analyse and sift what is going on, helping you get to the reliable truth; but it also dissects numerous examples of subjects (like evolution) revealing fascinating truths that have been deliberately hidden. Gwynne's Introduction to True Philosophy is a real page turner at £18 including UK post. If life were normal, you'd be able to buy this book on Amazon, but no longer. AMAZON misleadingly say that this book is unavailable - this in spite of them being repeatedly told that copies are readily available at the publishers. Does not this censorship make such a book even more intriguing? So if you want a copy go to stedwardspress.co.uk and buy online direct from the publishers. That's Gwynnes introduction to True Philosophy at stedwardspress.co.uk ↓ ↓ ↓ If you need silver and gold bullion - and who wouldn't in these dark times? - then the place to go is The Pure Gold Company. Either they can deliver worldwide to your door - or store it for you in vaults in London and Zurich. You even use it for your pension. Cash out of gold whenever you like: liquidate within 24 hours. https://bit.ly/James-Delingpole-Gold / / / / / / Earn interest on Gold: https://monetary-metals.com/delingpole/ / / / / / / Buy James a Coffee at: https://www.buymeacoffee.com/jamesdelingpole Support James' Writing at: https://delingpole.substack.com Support James monthly at: https://locals.com/member/JamesDelingpole?community_id=7720
Technology correspondent Tony Grasso joins Kathryn to talk about who was likely behind the hacking of Sellafield, Europe's largest nuclear site. New Minister for the GCSB Judith Collins has spoken out about the Russian attacks detected by the UK National Cyber Security Centre. Ransomware as a service is bigger than ever and the number of scams are up - Tony talks about how they can be hiding in places that look legitimate. Tony Grasso is Principal Consultant at cybersecurity firm TitaniumDefence. He worked at GCHQ in the UK and is a former Intelligence Officer in New Zealand.
November 2023 For our tenth anniversary episode, E141 “Security & Insecurity”, we discussed one of the most important factors in wartime codebreaking – secrecy. We looked at its effects on operations at Bletchley Park and the lives of those who worked there. We had so much to talk about on that occasion that we didn't have the chance to explore beyond the bounds of Bletchley Park. However, as signals intelligence travelled to the battlefronts where commanders made life-and-death decisions on a daily basis, security was a bigger problem than anywhere else. In this follow-up episode, Research Officer Dr Thomas Cheetham is again joined by a special guest, former GCHQ Departmental Historian Tony Comer, to discuss the problems of security in the field. We'll hear how the safe use of Ultra intelligence required good planning, flexibility and, most of all, trust. Many thanks to Owen Moogan & Dr Ben Thomson for voicing our archival documents. Image: ©Bletchley Park Trust 2023 #BPark, #Bletchleypark, #WW2, #Enigma, #GCHQ,
Tim served in the USAF and the NSA from 1975 to 1988 during some of the most tense periods of the Cold War. This included stints at the US Air Force Electronic Warfare Center at Kelly AFB, Texas, and RAF Chicksands, in the UK working on SIGINT collection of USSR/Warsaw Pact/Other targets. He also served as part of the Cryptologic Support Group, Strategic Air Command HQ, Offutt AFB, Nebraska providing SIGINT briefings to SAC leadership on worldwide events In 1983 he transferred to the NSA and later GCHQ, Cheltenham, Glos 1984-1988. We hear about how the first indications that something was amiss the morning Chernobyl reactor exploded in 1986, the day the cleaners answered the secure phone at SAC HQ, and how at GCHQ the US and British intelligence share information as part of the UKUSA Agreement. 0:00 Introduction and Tim's background in the US Air Force 5:12 Understanding electronic warfare and data gathering at Kelly Air Force Base 16:58 Posting at RAF Chicksands in Bedford, UK, and monitoring for changes in regular patterns 25:52 The Soviet invasion of Afghanistan and the Iranian hostage crisis 36:19 Able Archer alerts and other instances of signals intelligence at Strategic Air Command, Nebraska 44:16 Incident of the KAL007 Korean airliner and US Navy exercise incidents 57:08 Misinterpretation during a briefing on a recon flight of TU-95 bear bombers and gathering intel on the Soviet Union 1:01:18 Constant pressure to provide intel on Soviet leadership and missile alerts during Soviet drills 1:05:34 Transition from Air Force to NSA and role at the NSA 1:14:08 Tracking Chinese air defense and transition to GCHQ 1:22:08 U.S. stance during the Falkland conflict and witnessing the Chernobyl reactor explosion 1:30:59 Anecdote about NSA bureaucracy and language proficiency test 1:34:21 Closing and thanks to supporters Table of contents powered by PodcastAI✨ Extra episode info here https://coldwarconversations.com/episode310/ The fight to preserve Cold War history continues and via a simple monthly donation, you will give me the ammunition to continue to preserve Cold War history. You'll become part of our community, get ad-free episodes, and get a sought-after CWC coaster as a thank you and you'll bask in the warm glow of knowing you are helping to preserve Cold War history. Just go to https://coldwarconversations.com/donate/ If a monthly contribution is not your cup of tea, We also welcome one-off donations via the same link. Find the ideal gift for the Cold War enthusiast in your life! Just go to https://coldwarconversations.com/store/ Thanks to listener Phil Curme for introducing me to Tim. You can read his blog here walkingthebattlefields.com Follow us on Twitter https://twitter.com/ColdWarPod Facebook https://www.facebook.com/groups/coldwarpod/ Instagram https://www.instagram.com/coldwarconversations/ Youtube https://youtube.com/@ColdWarConversations Love history? Check out Into History at this link https://intohistory.com/coldwarpod Learn more about your ad choices. Visit megaphone.fm/adchoices
Dr. Calder Walton, assistant director of the Applied History Project and Intelligence Project at Harvard University's Belfer Center for Science and International Affairs, has become one of the world's most highly respected intelligence historians. His most recent book, Spies: The Epic Intelligence War Between East and West, describes the long history of Russian spying--placing it into the wider context of the hundred-year espionage war between the East and West. And this gives him a remarkable perspective on how Soviet and Russian operations against the West have been portrayed in movies and television.David Priess spoke with Calder about his path to researching and writing within the intelligence history subfield; the story of the Mitrokhin archive; the Cambridge Five; the Rosenbergs; Oleg Penkovsky; Aldrich Ames; Robert Hanssen; Russian disinformation campaigns in historical context; enduring popular myths about the master recruits of the KGB; and much more.Among the works mentioned in this episode:The article "How Oppenheimer's Atomic Bomb Secrets Were Really Stolen by Soviet Russia," Fortune (July 24, 2023), by Calder WaltonThe play Hamilton and book Alexander Hamilton by Ron ChernowThe book The Sword and the Shield by Christopher AndrewThe book The Mitrokhin Archive by Christopher Andrew and Vasili MitrokhinThe book Defend the Realm: The Authorized History of MI5 by Christopher AndrewThe book The Secret History of MI6 by Keith JefferyThe book Behind the Enigma: The Authorized History of GCHQ by John FerrisThe book Empire of Secrets by Calder WaltonThe book Spies -- digital expansion websiteThe book Spies, Lies, and Algorithms by Amy ZegartChatter is a production of Lawfare and Goat Rodeo. This episode was produced and edited by Cara Shillenn of Goat Rodeo. Podcast theme by David Priess, featuring music created using Groovepad.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: The SEC is targeting SolarWinds executives UK to make banks liable for fraud NSA issues advice on UEFI trojan Microsoft blocks 100+ dodgy drivers The US IC knew what Prihozhin was up to. But what FSB doing? Much, much more This week's show is brought to you by Netwrix. Martin Cannard, Netwrix's VP of Product Strategy, is this week's sponsor guest. He talks about why zero standing privilege is a worthy goal. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes SEC notifies SolarWinds CISO and CFO of possible action in cyber investigation | Cybersecurity Dive While Australian banks refuse most scam victims refunds, the UK is making them mandatory - ABC News New law could allow GCHQ to monitor UK internet logs in real-time to tackle fraud Federal incentives could help utilities overcome major cybersecurity hurdle: money | CyberScoop Major Japanese port suspends operation following ransomware attack Petro-Canada reports service restoration after suspected Suncor breach | Cybersecurity Dive Chinese state-backed hackers accidentally infected a European hospital with malware Hackers exploit gaping Windows loophole to give their malware kernel access | Ars Technica 336,000 servers remain unpatched against critical Fortigate vulnerability | Ars Technica CISA says latest VMware analytics bug being exploited MOVEit vulnerability snags almost 200 victims, more expected | Cybersecurity Dive Actively exploited vulnerability threatens hundreds of solar power stations | Ars Technica U.S. intelligence learned in mid-June Prigozhin was plotting uprising - The Washington Post Russian election-meddling ‘troll factory' reportedly shut down after Wagner revolt Russian telecom confirms hack after group backing Wagner boasted about an attack | CyberScoop Hackers claim to take down Russian satellite communications provider Russian railway site allegedly taken down by Ukrainian hackers Several US states investigating ‘SiegedSec' hacking campaign Hacking crew targeting states over transition bans claims cyberattack hitting global satellite systems | CyberScoop Hacktivists steal government files from Texas city Fort Worth | TechCrunch Belarusian hacktivists сlaim to breach country's leading state university British prosecutors say teen Lapsus$ member was behind hacks on Uber, Rockstar Silk Road's Second-in-Command, Variety Jones, Gets 20 Years in Prison | WIRED Russian cyber expert arrested in Kazakhstan, triggering a showdown between US and Moscow More than 6,500 arrested since French and Dutch police's EncroChat hack BreachForums seized by FBI three months after arrest of alleged admin BreachForums replacement emerges as robust forum for criminal hackers to trade their spoils | CyberScoop Genesis Market gang tries to sell platform after FBI disruption Hackers using TrueBot malware for phishing attacks in US, Canada, officials warn | Cybersecurity Dive CSI_BlackLotus_Mitigation_Guide.PDF Hacks targeting British exam boards raise fears of students cheating More than $125 million taken from crypto platform Multichain Twitter's chaotic weekend of outages and rate limits leaves more questions than answers Mastodon fixes critical “TootRoot” vulnerability allowing node hijacking | Ars Technica
On this week's show Patrick Gray and Adam Boileau discuss the week's security news. They cover: The SEC is targeting SolarWinds executives UK to make banks liable for fraud NSA issues advice on UEFI trojan Microsoft blocks 100+ dodgy drivers The US IC knew what Prihozhin was up to. But what FSB doing? Much, much more This week's show is brought to you by Netwrix. Martin Cannard, Netwrix's VP of Product Strategy, is this week's sponsor guest. He talks about why zero standing privilege is a worthy goal. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes SEC notifies SolarWinds CISO and CFO of possible action in cyber investigation | Cybersecurity Dive While Australian banks refuse most scam victims refunds, the UK is making them mandatory - ABC News New law could allow GCHQ to monitor UK internet logs in real-time to tackle fraud Federal incentives could help utilities overcome major cybersecurity hurdle: money | CyberScoop Major Japanese port suspends operation following ransomware attack Petro-Canada reports service restoration after suspected Suncor breach | Cybersecurity Dive Chinese state-backed hackers accidentally infected a European hospital with malware Hackers exploit gaping Windows loophole to give their malware kernel access | Ars Technica 336,000 servers remain unpatched against critical Fortigate vulnerability | Ars Technica CISA says latest VMware analytics bug being exploited MOVEit vulnerability snags almost 200 victims, more expected | Cybersecurity Dive Actively exploited vulnerability threatens hundreds of solar power stations | Ars Technica U.S. intelligence learned in mid-June Prigozhin was plotting uprising - The Washington Post Russian election-meddling ‘troll factory' reportedly shut down after Wagner revolt Russian telecom confirms hack after group backing Wagner boasted about an attack | CyberScoop Hackers claim to take down Russian satellite communications provider Russian railway site allegedly taken down by Ukrainian hackers Several US states investigating ‘SiegedSec' hacking campaign Hacking crew targeting states over transition bans claims cyberattack hitting global satellite systems | CyberScoop Hacktivists steal government files from Texas city Fort Worth | TechCrunch Belarusian hacktivists сlaim to breach country's leading state university British prosecutors say teen Lapsus$ member was behind hacks on Uber, Rockstar Silk Road's Second-in-Command, Variety Jones, Gets 20 Years in Prison | WIRED Russian cyber expert arrested in Kazakhstan, triggering a showdown between US and Moscow More than 6,500 arrested since French and Dutch police's EncroChat hack BreachForums seized by FBI three months after arrest of alleged admin BreachForums replacement emerges as robust forum for criminal hackers to trade their spoils | CyberScoop Genesis Market gang tries to sell platform after FBI disruption Hackers using TrueBot malware for phishing attacks in US, Canada, officials warn | Cybersecurity Dive CSI_BlackLotus_Mitigation_Guide.PDF Hacks targeting British exam boards raise fears of students cheating More than $125 million taken from crypto platform Multichain Twitter's chaotic weekend of outages and rate limits leaves more questions than answers Mastodon fixes critical “TootRoot” vulnerability allowing node hijacking | Ars Technica