POPULARITY
The Jodrell Bank observatory in Cheshire in the UK played a significant secret role during the Cold War. It was established in 1945 by Bernard Lovell, a radio astronomer at the university, to investigate cosmic rays after his work on radar in the Second World War. We hear some intriguing details of the site's Cold War roles including being Britain's first nuclear attack early warning station and its signals intelligence collaboration with GCHQ, the UK's Government Communications Headquarters. Even more surprisingly it's also revealed how Soviet Scientists also worked at the site and that the Soviets attempted to get Bernard Lovell to defect during a visit to the Soviet Union. I'm given a tour of the non-public areas by Tim O'Brien who is a Professor of Astrophysics. Do make sure you check out the extensive photos I took at https://coldwarconversations.com/episode327/ The fight to preserve Cold War history continues and via a simple monthly donation, you will give me the ammunition to continue to preserve Cold War history. You'll become part of our community, get ad-free episodes, and get a sought-after CWC coaster as a thank you and you'll bask in the warm glow of knowing you are helping to preserve Cold War history. Just go to https://coldwarconversations.com/donate/ If a monthly contribution is not your cup of tea, We also welcome one-off donations via the same link. Find the ideal gift for the Cold War enthusiast in your life! Just go to https://coldwarconversations.com/store/ Follow us on Twitter https://twitter.com/ColdWarPod Instagram https://www.instagram.com/coldwarconversations/ Facebook https://www.facebook.com/groups/coldwarpod/ Youtube https://youtube.com/@ColdWarConversations Love history? Check out Into History at this link https://intohistory.com/coldwarpod 0:00 Introduction to the podcast 1:00 Jodrell Bank Observatory's role in the Cold War and its establishment 10:08 The birth and evolution of radio astronomy 15:50 The construction and purpose of the world's biggest radio telescope 32:46 The telescope's role during the Cuban missile crisis and its implications 51:05 The mission of GCHQ at Jodrell Bank and intercepting signals from the Soviet Union 1:04:21 Touring the secret tunnel and discussing its potential uses 1:14:51 Recounting the Soviet Luna 15 mission during the American moon landing and the role of Jodrell Bank 1:29:18 Episode extras and thanking financial supporters Chapters powered by PodcastAI✨ Learn more about your ad choices. Visit podcastchoices.com/adchoices
As Congress barrels toward an election that could see at least one house change hands, efforts to squeeze big bills into law are mounting. The one with the best chance (and better than I expected) would drop $52 billion in cash and a boatload of tax breaks on the semiconductor industry. Michael Ellis points out that this is industrial policy without apology, and a throwback to the 1980s, when the government organized SEMATECH, a name derived from “Semiconductor Manufacturing Technology” to shore up U.S. chipmaking. Thanks to a bipartisan consensus on the need to fight a Chinese challenge, and a trimming of provisions that tried to hitch a ride on the bill, there now looks to be a clear path to enactment for this bill. And if there were doubt about how serious the Chinese challenge in chips will be, an under-covered story revealed that China's chipmaking champion, SMIC, has been making 7-nanometer chips for months without an announcement. That's a diameter that Intel and GlobalFoundries, the main U.S. producers, have yet to reach in commercial production. The national security implications are plain. If commercial products from China are cheap enough to sweep the market, even security-minded agencies will be forced to buy them, as it turns out the FBI and Department of Homeland Security have both been doing with Chinese drones. Nick Weaver points to his Lawfare piece showing just how cheaply the United States (and Ukraine) could be making drones. Responding to the growing political concern about Chinese products, TikTok's owner ByteDance, has increased its U.S. lobbying spending to more than $8 million a year, Christina Ayiotis tells us—about what Google spends on lobbying. In the same vein, Nick and Michael question why the government hasn't come up with the extra $3 billion to fund “rip and replace” for Chinese telecom gear. That effort will certainly get a boost from reports that Chinese telecom sales were offered on especially favorable terms to carriers who service America's nuclear missile locations. I offer an answer: The Obama administration actually paid these same rural carriers to install Chinese equipment as part of the 2009 stimulus law. I cannot help thinking that the rural carriers ought to bear some of the cost of their imprudent investments and not ask U.S. taxpayers to pay them both for installing and ripping out the same gear. In news not tied to China, Nick tells us about the House Energy and Commerce Committee's serious progress on a compromise federal data privacy bill. It is still a doomed bill, given resistance from Dems and GOP in the Senate. I argue that that's a good thing, given the effort to impose “disparate impact” quotas for race, color, religion, national origin, sex, and disability on every algorithm that processes even a little personal data. This is a transformative social engineering project that just one section (208) of the “privacy” bill will impose without any serious debate. Christina grades Russian information warfare based on its latest exploit: hacking a Ukrainian radio broadcaster to spread fake news about Ukrainian President Volodymyr Zelenskyy's health. As a hack, it gets a passing grade, but as a believable bit of information warfare, it is a bust. Tina, Michael and I evaluate YouTube's new policy on removing “misinformation” related to abortion, and the risk that this policy, like so many Silicon Valley speech suppression schemes, will start out sounding plausible and end in political correctness. Nick and I celebrate the Department of Justice's increasing success in sometimes seizing cryptocurrency from hackers and ransomware gangs. It may just be Darwin at work, but it's nice to see. Nick offers the recommended long read of the week—Brian Krebs's takedown of the VPN malware supplier, 911. And in updates and quick hits: That Twitter worker arrested for spying on behalf of Saudi Arabia is going to trial. the United Kingdom's Government Communications Headquarters's cryptoskeptics have returned to ask how we can square end-to-end encryption with child safety. I think the answer is “Not well.” The General Data Protection Regulation has consequences: Turns out that schoolkids in Denmark won't be able to use Chromebooks or Google Workspace. And Nick takes a moment to dunk on the Three Arrows founders, whose cryptocurrency company went under in the bust and who are now giving interviews from an undisclosed location. *An obscure Rhode Island tribute to the Industrial Trust Building that was known to a generation of children as the ‘Dusty Old Trust” building until a new generation christened it the “Superman Building.”
As Congress barrels toward an election that could see at least one house change hands, efforts to squeeze big bills into law are mounting. The one with the best chance (and better than I expected) would drop $52 billion in cash and a boatload of tax breaks on the semiconductor industry. Michael Ellis points out that this is industrial policy without apology, and a throwback to the 1980s, when the government organized SEMATECH, a name derived from “Semiconductor Manufacturing Technology” to shore up U.S. chipmaking. Thanks to a bipartisan consensus on the need to fight a Chinese challenge, and a trimming of provisions that tried to hitch a ride on the bill, there now looks to be a clear path to enactment for this bill. And if there were doubt about how serious the Chinese challenge in chips will be, an under-covered story revealed that China's chipmaking champion, SMIC, has been making 7-nanometer chips for months without an announcement. That's a diameter that Intel and GlobalFoundries, the main U.S. producers, have yet to reach in commercial production. The national security implications are plain. If commercial products from China are cheap enough to sweep the market, even security-minded agencies will be forced to buy them, as it turns out the FBI and Department of Homeland Security have both been doing with Chinese drones. Nick Weaver points to his Lawfare piece showing just how cheaply the United States (and Ukraine) could be making drones. Responding to the growing political concern about Chinese products, TikTok's owner ByteDance, has increased its U.S. lobbying spending to more than $8 million a year, Christina Ayiotis tells us—about what Google spends on lobbying. In the same vein, Nick and Michael question why the government hasn't come up with the extra $3 billion to fund “rip and replace” for Chinese telecom gear. That effort will certainly get a boost from reports that Chinese telecom sales were offered on especially favorable terms to carriers who service America's nuclear missile locations. I offer an answer: The Obama administration actually paid these same rural carriers to install Chinese equipment as part of the 2009 stimulus law. I cannot help thinking that the rural carriers ought to bear some of the cost of their imprudent investments and not ask U.S. taxpayers to pay them both for installing and ripping out the same gear. In news not tied to China, Nick tells us about the House Energy and Commerce Committee's serious progress on a compromise federal data privacy bill. It is still a doomed bill, given resistance from Dems and GOP in the Senate. I argue that that's a good thing, given the effort to impose “disparate impact” quotas for race, color, religion, national origin, sex, and disability on every algorithm that processes even a little personal data. This is a transformative social engineering project that just one section (208) of the “privacy” bill will impose without any serious debate. Christina grades Russian information warfare based on its latest exploit: hacking a Ukrainian radio broadcaster to spread fake news about Ukrainian President Volodymyr Zelenskyy's health. As a hack, it gets a passing grade, but as a believable bit of information warfare, it is a bust. Tina, Michael and I evaluate YouTube's new policy on removing “misinformation” related to abortion, and the risk that this policy, like so many Silicon Valley speech suppression schemes, will start out sounding plausible and end in political correctness. Nick and I celebrate the Department of Justice's increasing success in sometimes seizing cryptocurrency from hackers and ransomware gangs. It may just be Darwin at work, but it's nice to see. Nick offers the recommended long read of the week—Brian Krebs's takedown of the VPN malware supplier, 911. And in updates and quick hits: That Twitter worker arrested for spying on behalf of Saudi Arabia is going to trial. the United Kingdom's Government Communications Headquarters's cryptoskeptics have returned to ask how we can square end-to-end encryption with child safety. I think the answer is “Not well.” The General Data Protection Regulation has consequences: Turns out that schoolkids in Denmark won't be able to use Chromebooks or Google Workspace. And Nick takes a moment to dunk on the Three Arrows founders, whose cryptocurrency company went under in the bust and who are now giving interviews from an undisclosed location. *An obscure Rhode Island tribute to the Industrial Trust Building that was known to a generation of children as the ‘Dusty Old Trust” building until a new generation christened it the “Superman Building.”
The Israel Defense Forces produced several excellent organizations, perhaps most notably the Air Force, Paratroopers, Armor and Special Force. Lately, in light of its much-lauded record, one unit of the Military Intelligence Corps has gained particular prominence: Unit 8200, Israel's National Security Agency (or Government Communications Headquarters) and Cyber Command. Please join host Amir Oren for an interview with Reserve Brigadier General Hanan Gefen, a former Commanding Officer of 8200, has a unique perspective on the professional and managerial challenges involved in running this secretive advanced technological unit – which operates between signals intelligence (SIGINT) and the cyber world, while cultivating young talents, many of whom go on to develop Israel's hi-tech industry. You are welcome to join our audience and watch all of our programs - free of charge! TV7 Israel News: https://www.tv7israelnews.com/vod/series/563/ Jerusalem Studio: https://www.tv7israelnews.com/vod/series/18738/ TV7 Israel News Editor's Note: https://www.tv7israelnews.com/vod/series/76269/ TV7 Israel: Watchmen Talk: https://www.tv7israelnews.com/vod/series/76256/ Jerusalem Prays: https://www.tv7israelnews.com/vod/series/135790/ TV7's Times Observer: https://www.tv7israelnews.com/vod/series/97531/ TV7's Middle East Review: https://www.tv7israelnews.com/vod/series/997755/ My Brother's Keeper: https://www.tv7israelnews.com/vod/series/53719/ This week in 60 seconds: https://www.tv7israelnews.com/vod/series/123456/ Those who wish can send prayer requests to TV7 Israel News in the following ways: Facebook Messenger: https://www.facebook.com/tv7israelnews Email: israelnews@tv7.fi Please be sure to mention your first name and country of residence. Any attached videos should not exceed 20 seconds in duration. #IsraelNews #tv7israelnews #newsupdates Rally behind our vision - https://www.tv7israelnews.com/donate/ To purchase TV7 Israel News merchandise: https://teespring.com/stores/tv7-israel-news-store Live view of Jerusalem - https://www.tv7israelnews.com/jerusalem-live-feed/ Visit our website - http://www.tv7israelnews.com/ Subscribe to our YouTube channel - https://www.youtube.com/tv7israelnews Like TV7 Israel News on Facebook – https://www.facebook.com/tv7israelnews Follow TV7 Israel News on Instagram - https://www.instagram.com/tv7israelnews/ Follow TV7 Israel News on Twitter - https://twitter.com/tv7israelnews
Intelligence is a British workplace comedy set in the UK's Government Communications Headquarters. Created by one of the show's stars Nick Mohammed, Intelligence is centered around this cyber security agency bringing in an American NSA agent (David Schwimmer) to join the team. Intelligence originally aired on Sky One in England and is a Peacock original in the US. Listen in as the S1E1 guys review its pilot episode, "Episode 1.1".
“A podcast documentary about Cheltenham, the home of British spying, and the cracks of lying and deception that run through this seemingly perfect Cotswolds town.”The Town That Knew Too Much shines a light on the English town of Cheltenham and how the “pomp and ceremony” of this upper-middle-class town has been “subverted in the seedy world of espionage” since Government Communications Headquarters or “GC HQ” made its home there.Over seven episodes, Nick Hilton features various characters associated with Britain's spy and state intelligence history, including Alan Turing, Geoffrey Prime, Gareth Williams, and Edward Snowden.The story also includes an episode about Kit Williams, author and creator of the Masquerade book and treasure hunt – and the Wishing Fish Clock, which resides in Cheltenham.The second in Nick Hilton's “Town” series, The Town That Knew Too Much continues with a “light-hearted, whimsical, tangential” documentary tone that is informative and entertaining. Also much like the first series, The Town That Didn't Stare, The Town That Knew Too Much presents complex themes and issues related to technology, the Internet, society and self.In this episode of MetaPod, we talk to Nick Hilton about some of the overarching themes of The Town That Knew Too Much, such as privacy, data collection, the internet, Big Tech, the Snowden leaks and the state.We also discuss opinions on technology and privacy, from both the media and the public perspectives. Nick also tells us about the interactive elements that he built into the podcast. To conclude, Kevin asks Nick if he would ever like to be a spy. Obviously.
每日英語跟讀 Ep.K147: When Spies Hack Journalism界 For decades, leakers of confidential information to the press were a genus that included many species: the government worker infuriated by wrongdoing, the ideologue pushing a particular line, the politico out to savage an opponent. In recent years, technology has helped such leakers operate on a mass scale: Chelsea Manning and the WikiLeaks diplomatic cables, Edward Snowden and the stolen National Security Agency archive, and the still-anonymous source of the Panama Papers.But now this disparate cast has been joined by a very different sort of large-scale leaker, more stealthy and better funded: the intelligence services of nation states, which hack into troves of documents and then use a proxy to release them. What Russian intelligence did with shocking success to the Democrats in 2016 shows every promise of becoming a common tool of spycraft around the world. 數十年來,向新聞界揭露機密情報的洩密者,多為同一屬但涵蓋許多種的人物:被不法行為激怒的政府工作人員,推動特定路線的意識型態者,試圖攻擊對手的政治人物。近年來,科技成為這些洩密者採取大規模行動的助力:雀兒喜.曼寧和「維基解密」的外交電報,愛德華.史諾登和被竊的國家安全局檔案,以及「巴拿馬文件」和它仍是無名氏的消息來源。然而現在這個由各不相同的角色構成的卡司,又增加了另一種迥然不同的大規模洩密者,更隱密,銀彈也更足:他們是各國的情報部門。這些情報部門駭得大量文件資料,再利用代理人發布出去。俄羅斯情報部門2016年驚人成功地駭入美國民主黨這件事,顯示這種作法肯定會在未來成為通行全球的間諜活動工具。 In 2014, North Korea, angry about a movie, hacked Sony and aired thousands of internal emails. Since then, Russia has used the hack-leak method in countries across Europe. The United Arab Emirates and Qatar, Persian Gulf rivals, have accused each other of tit-for-tat hacks, leaks and online sabotage. Other spy services are suspected in additional disclosures, but spies are skilled at hiding their tracks.“It's clear that nation states are looking at these mass leaks and seeing how successful they are,” said Matt Tait, a cyber expert at the University of Texas who previously worked at Government Communications Headquarters, the British equivalent of the National Security Agency. 2014年,對某部電影怒不可遏的北韓,駭入索尼公司,並公布了數千封內部電子郵件。此後,俄羅斯在歐洲各國也採用了這種駭入─洩露方法。波斯灣的對立國家,阿拉伯聯合大公國和卡達互控對方肆行以牙還牙的駭客攻擊、洩密和網路破壞。其他情報單位也被懷疑是另一些洩密事件的主謀,只是這些間諜擅長隱藏他們的蹤跡。德州大學網路專家馬特.泰特說:「顯然,各國正在審視這些大規模洩密行動,且目睹它們是多麼成功。」泰特之前在英國等同於美國國家安全局的政府通信總部工作。 What does this mean for journalism? The old rules say that if news organizations obtain material they deem both authentic and newsworthy, they should run it. But those conventions may set reporters up for spy agencies to manipulate what and when they publish, with an added danger: An archive of genuine material may be seeded with slick forgeries.This quandary is raised with emotional force by my colleague Amy Chozick in her new book about covering Hillary Clinton. She recounts reading a New York Times story about the Russian hack of the Democrats that said The Times and other outlets, by publishing stories based on the hacked material, became “a de facto instrument of Russian intelligence.” She felt terrible, she reports, because she thought she was guilty as charged.Others hurried to reassure Chozick that she and hundreds of other reporters who covered the leaked emails were simply doing their jobs. “The primary question a journalist must ask himself is whether or not the information is true and relevant,” wrote Jack Shafer, the media critic for Politico, “and certainly not whether it might make Moscow happy.” 這對新聞界而言意味著什麼?按照老規矩,新聞組織一旦取得他們認為具有真實性和新聞價值的材料,就認為應該公諸於世。但是這些慣例可能導致記者遭到間諜機構操縱他們所發布的內容以及時間,而且還有一項風險:真材實料的檔案可能暗藏巧妙的造假。我的同事艾咪.丘齊克在她談採訪希拉蕊.柯林頓的新書中,情緒激動地說明了這項窘境。她描述看過紐約時報與俄羅斯駭入民主黨相關的一篇報導,文章指出,紐時和其他媒體根據被駭資料做報導時,「實際上也成了俄羅斯情報單位的工具」。她報導說,她感覺糟透了,因為她自覺犯了這樣的錯。其他人急忙安慰丘齊克,她和數百位採訪外洩電子郵件新聞的記者,只是盡職而已。 Politico媒體評論家傑克.薛佛寫道:「記者必須問自己的首要問題是,這些資料是否屬實以及是否相關,絕不會是這樣做會不會讓莫斯科高與。」Source article: https://paper.udn.com/udnpaper/POH0067/327698/web/ 更多Podcast單元: 每日英語跟讀Podcast,就在http://www.15mins.today/daily-shadowing 精選詞彙 VOCAB Podcast,就在https://www.15mins.today/vocab 語音直播 15mins Live Podcast, 就在https://www.15mins.today/15mins-live-podcast 文法練習 In-TENSE Podcast,就在https://www.15mins.today/in-tense 用email訂閱就可以收到通勤學英語節目更新通知。 老師互動信箱: ask15mins@gmail.com 商業合作洽詢: 15minstoday@gmail.com
West Coast Cookbook & Speakeasy is Now Open! 8am-9am PT/ 11am-Noon ET for our especially special Daily Specials, Smothered Benedict Wednesdays!Starting off in the Bistro Cafe, the GOP had to vote down even discussing the Voting Rights Bill because it was “written in Hell by the Devil.”On the rest of the menu, deaths among Medicare patients in nursing homes soared by thirty-two percent last year, with two devastating spikes eight months apart; fifteen GOP governors urged the the immediate release of Census redistricting data, saying further delays would hurt their efforts to redraw congressional and legislative districts in their favor before the next election; and, the US government will review its own dark history of Native American boarding schools.After the break, we move to the Chef's Table where the New York Times reported that the Saudis who killed Washington Post journalist Jamal Khashoggi, received their paramilitary training in US; and, Britain's Government Communications Headquarters spy agency installed a giant multicolored artwork to celebrate codebreaker and mathematician Alan Turing.All that and more, on West Coast Cookbook & Speakeasy with Chef de Cuisine Justice Putnam.Bon Appétit!~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"To those of us who believe that all of life is sacred every crumb of bread and sip of wine is a Eucharist, a remembrance, a call to awareness of holiness right where we are. I want all of the holiness of the Eucharist to spill out beyond church walls, out of the hands of priests and into the regular streets and sidewalks, into the hands of regular, grubby people like you and me, onto our tables, in our kitchens and dining rooms and backyards.” -- Shauna Niequist "Bread and Wine: A Love Letter to Life Around the Table with Recipes"~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Show Notes & Links: https://www.dailykos.com/stories/2021/6/23/2036643/-West-Coast-Cookbook-amp-Speakeasy-Daily-Special-Smothered-Benedict-Wednesdays
Gareth Williams was a Welsh-born crypto-analyst who worked in London on secondment from the Government Communications Headquarters in Cheltenham. A week after he failed to show up for work at MI6, he was reported missing. Police discovered his body inside a locked sports bag in the bathroom of a government-leased apartment in Pimlico. Was this talented code-breaker’s death the work of international intelligence agencies – or perhaps something more personal? For pictures and more information, join us on Facebook (https://www.facebook.com/evidencelockerpodcast/) Want to become a Patron of the podcast? Visit our page at Patreon (https://www.patreon.com/evidencelocker) For a full list of resources and credits visit Evidence Locker Website (http://evidencelockerpodcast.com/2019/10/07/67-england-the-gareth-williams-affair) This week's sponsor: HelloFresh (http://www.hellofresh.co.uk) are offering our listeners £60 off 4 boxes. Promo code: EVIDENCE This True Crime Podcast was researched using open source or archive materials.
31 year-old Gareth Williams was, by all accounts, an incredibly private person who disliked office small talk and did his best to avoid social events. In 2001, Williams went to work for the British intelligence agency known as the Government Communications Headquarters, or GCHQ. Nine years later, Gareth Williams would become the focus of an extraordinary mystery. His intensely private life became very public when the government agent was found dead inside a padlocked duffle bag. Find more information about this episode: www.beyondbizarretruecrime.com Follow us: www.facebook.com/beyondbizarretruecrime/ twitter.com/BeyondBizarreTC Instagram @beyondbizarretc Contact us: beyondbizarretruecrime@gmail.com Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of The Codpast, Sean is invited to GCHQ (Government Communication Headquarters) to learn how dyslexic code breakers have helped keep the British isles safe for over a 100 years. The Government Communications Headquarters provides signals intelligence and information assurance to the government and armed forces of the UK.
Monday, August 23, 2010, officers from the central London police force visited the home of Gareth Williams at his top-floor flat on Alderney Street in Pimlico, London. Gareth had been working as a communications officer at the Government Communications Headquarters in Cheltenham. The cypher and codes expert was seconded to the secret intelligence service headquarters on the bank of the Thames around half a mile from his home.When Gareth didn’t turn up for work, his colleagues made attempts to track him down, however, when that failed the authorities were notified. Police arrived at Gareth’s home, and after receiving no response, they broke down the front door of his flat. They spotted a mobile phone and sim cards laid out on a tabletop.As they entered the bathroom, they noticed a large red North Face sports bag in the bath. They unzipped the padlocked bag, and Gareth’s decomposing body was found inside.But how did it get there? Did Gareth lock himself inside or had he been murdered and his body placed there?*** LISTENER CAUTION IS ADVISED AS THIS EPISODE CONTAINS ADULT THEMES AND DESCRIPTIONS THAT SOME LISTENERS MAY FIND DISTRESSING *** More information can be found on our website at http://theywalkamonguspodcast.com For early advert free access and other extras visit https://www.patreon.com/TheyWalkAmongUs MUSIC: Manifold Destiny by RedpointThese Little Hills by RedpointYour First Loose Tooth by RedpointQ-Met by RedpointEating And Growing by RedpointThe Love Not Given by RedpointSquare Leg by RedpointAn Opening by RedpointMiddlesex Beach by RedpointMusic can be purchased here: https://redpoint.bandcamp.com/All music sourced from http://freemusicarchive.org and used under an Attribution License - http://creativecommons.org/licenses/by/4.0/ YOU CAN FOLLOW US VIA OUR SOCIAL MEDIA PROFILES: Twitter - https://twitter.com/TWAU_Podcast Facebook - https://www.facebook.com/theywalkamonguspodcast/ Facebook Group - https://www.facebook.com/groups/1346814312074979/ Instagram - https://www.instagram.com/theywalkamonguspodcast/ Acast - https://www.acast.com/theywalkamongus See acast.com/privacy for privacy and opt-out information.
Today, every bar, restaurant, sidewalk, road and bridge anywhere in the world has become a terrorist target. Attacks are often conducted by lone wolves or small cells. This makes the acquisition and sharing of intelligence by government agencies an urgent priority. Yet nations must find a balance between surveillance and privacy. The panelists have faced these issues at the highest levels of their governments and will share their views.Dr. August Hanning, Former State Secretary, The Federal Interior Ministry, Federal Republic of GermanyMr. Robert Hannigan, Former Director, Government Communications Headquarters, United KingdomHon. Michael Mukasey, Of Counsel, Debevoise & Plimpton LLP and former United States Attorney GeneralHon. Nathan A. Sales, Ambassador-at-Large and Coordinator for Counterterrorism, United States Department of StateModerator: Prof. Jamil N. Jaffer, Adjunct Professor, NSI Founder, and Director, National Security Law & Policy Program, Antonin Scalia Law School, George Mason University
Today, every bar, restaurant, sidewalk, road and bridge anywhere in the world has become a terrorist target. Attacks are often conducted by lone wolves or small cells. This makes the acquisition and sharing of intelligence by government agencies an urgent priority. Yet nations must find a balance between surveillance and privacy. The panelists have faced these issues at the highest levels of their governments and will share their views.Dr. August Hanning, Former State Secretary, The Federal Interior Ministry, Federal Republic of GermanyMr. Robert Hannigan, Former Director, Government Communications Headquarters, United KingdomHon. Michael Mukasey, Of Counsel, Debevoise & Plimpton LLP and former United States Attorney GeneralHon. Nathan A. Sales, Ambassador-at-Large and Coordinator for Counterterrorism, United States Department of StateModerator: Prof. Jamil N. Jaffer, Adjunct Professor, NSI Founder, and Director, National Security Law & Policy Program, Antonin Scalia Law School, George Mason University
Phil and Stephen revisit ideas from recent shows. Should we keep kids off their electronic devices? Does VR make us more vulnerable or stronger when it comes to discerning the world around us? Let them play: kids glued to phones could save UK, ex-spy chief says LONDON (Reuters) - Parents who think they are being responsible by limiting their children's time online should think again: they could be putting their kids and Britain's security at a disadvantage, according to a former British spy chief. "If you appear to be spending your holiday unsuccessfully attempting to separate your children from Wi-Fi or their digital devices, do not despair," Robert Hannigan, a former director of the Government Communications Headquarters, wrote in the British newspaper The Telegraph. How VR Gaming Will Wake Us up to Our Fake Worlds Human civilization has always been a virtual reality. At the onset of culture, which was propagated through the proto-media of cave painting, the talking drum, music, fetish art making, oral tradition and the like, Homo sapiens began a march into cultural virtual realities, a march that would span the entirety of the human enterprise. We don’t often think of cultures as virtual realities, but there is no more apt descriptor for our widely diverse sociological organizations and interpretations than the metaphor of the “virtual reality.” Indeed, the virtual reality metaphor encompasses the complete human project. Interesting counterpoint to... Is This the Real Life? WT 336-645
Today’s headline, courtesy of The Telegraph, is that Government Communications Headquarters, or GCHQ, is on the lookout for social media savvy girls aged 13 to 15 to help tackle its image as “male, pale and stale”. The security and intelligence organisation has launched the competition as part of a plan to recruit more female spies, dubbed ‘Jane Bonds’, to its ranks.