Podcasts about intelligence operations

  • 67PODCASTS
  • 81EPISODES
  • 42mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • May 28, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about intelligence operations

Latest podcast episodes about intelligence operations

Be BOLD Branding
Protection With A Purpose

Be BOLD Branding

Play Episode Listen Later May 28, 2025 25:38


World security is at the forefront of the news almost every day, whether it's protecting our nation's top leaders and celebrities or safeguarding assets in a natural disaster. Knowing we are secure affects our freedom, peace of mind, economic stability, personal safety, and more. In this episode, we're spotlighting the story and star behind SYOTUS Technology. Trei McMullen is a military veteran trained and educated in Intelligence Operations, Counterintelligence, Counterterrorism, Emergency Management & Homeland Security. He's also the Founder & CEO of SYOTUS, created to support and employ military veterans, first responders and their spouses. Join us and learn how his military experience impacted his personal brand and how he serves his community today.   Episode Highlights: 02:21 Trei McMullen's Military Background 06:27 Transition to Civilian Life and Founding SYOTUS 08:43 Challenges and Successes in Business 19:52 Philosophy and Personal Mantra 23:35 How to Connect with Trei McMullen Show Links: Trei McMullen's LinkedIn Trei McMullen's Instagram https://syotosllc.com/

The Manila Times Podcasts
NEWS: Lacson to PNP: Heighten intelligence operations | April 27, 2025

The Manila Times Podcasts

Play Episode Listen Later Apr 26, 2025 1:13


NEWS: Lacson to PNP: Heighten intelligence operations | April 27, 2025Visit our website at https://www.manilatimes.netFollow us:Facebook - https://tmt.ph/facebookInstagram - https://tmt.ph/instagramTwitter - https://tmt.ph/twitterDailyMotion - https://tmt.ph/dailymotionSubscribe to our Digital Edition - https://tmt.ph/digitalSign up to our newsletters: https://tmt.ph/newslettersCheck out our Podcasts:Spotify - https://tmt.ph/spotifyApple Podcasts - https://tmt.ph/applepodcastsAmazon Music - https://tmt.ph/amazonmusicDeezer: https://tmt.ph/deezerStitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimesVisit our website at https://www.manilatimes.netFollow us:Facebook - https://tmt.ph/facebookInstagram - https://tmt.ph/instagramTwitter - https://tmt.ph/twitterDailyMotion - https://tmt.ph/dailymotionSubscribe to our Digital Edition - https://tmt.ph/digitalSign up to our newsletters: https://tmt.ph/newslettersCheck out our Podcasts:Spotify - https://tmt.ph/spotifyApple Podcasts - https://tmt.ph/applepodcastsAmazon Music - https://tmt.ph/amazonmusicDeezer: https://tmt.ph/deezerStitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes Hosted on Acast. See acast.com/privacy for more information.

Everyday Espionage Podcast
The SECRET Message In Moby Dick's Final Chapter | Day 11

Everyday Espionage Podcast

Play Episode Listen Later Apr 15, 2025 26:24


Find your Spy Superpower: https://yt.everydayspy.com/4j4CPAZ I just finished reading Moby Dick, by Herman Melville, and I'm shocked by how much the ending of this book moved me. SPOILER ALERT: I share the ending of Moby Dick in detail as I deliver my analysis of the lessons, insights, and relevancy shared in the final chapters. In many ways, finishing this book is the completion of a 30-year journey for me, and I'm overwhelmed with humility and gratitude as I share these thoughts on a book that for so long has been impacting the world.

Grey Dynamics
Ahmed Hassan on Grey Dynamics Media Side, Intelligence Operations and Training

Grey Dynamics

Play Episode Listen Later Apr 11, 2025 29:05


Welcome back to the Grey Dynamics podcast. This week, we are doing another editor's note with some current insights about the company. During this episode, I will be discussing how Grey Dynamics deals with -sometimes opposite- worlds of operational contracts and media publications. Furthermore, I will also provide some recommendations from the intelligence professionals looking to enter intelligence and security company management.Find Ahmed HassanLinkedInGrey Dynamics PodcastRelated LinksGrey Dynamics Intelligence Capability Development and TrainingGrey Dynamics Operational SupportGrey Dynamics Open Source Intelligence ServicesGrey Dynamics Case Studies Grey Dynamics StoryAdvance Your Intelligence Career Today!We are the first fully online intelligence school helping professionals to achieve their long term goals. Our school with tons of new material is currently under construction and will be out there very soon. Meanwhile, you can sign up and be the first to know when we launch, plus get exclusive tips and offers.Get access to exclusive Grey Dynamics ReportsWith security clearance, you can take a crucial role in our intelligence community. As a cleared member, you get access to Secret & Top Secret grade publications. If you are a Top Secret holder, you also get access to our community area, where you can interact with other members and with our analysts! Subscribe today!The Grey Dynamics Podcast is available on all major platforms!YouTubeSpotifyApple PodcastGoogle PodcastAmazon Podcast Hosted on Acast. See acast.com/privacy for more information.

SpyCast
Taiwan: China's Testing Ground for Intelligence Operations

SpyCast

Play Episode Listen Later Apr 8, 2025 32:11


It's no secret that China has recently stepped up political and military pressure on the democratically governed island of Taiwan. But then, there are the Chinese Communist Party's covert efforts: Recruiting from the inside, gathering intelligence, and exerting influence. Executive Director of the Global Taiwan Institute Russell Hsiao breaks down Beijing Shadow Games in Taiwan. If you liked this episode, check out these links: SpyCast | “Making Sense of China, Taiwan, & America” – Pacific Intelligence with Bonny Lin Understanding Chinese Espionage Through 900 Cases | SpyCast Join Valerie aboard the Spies at Sea cruise August 30 - September 8, 2025! On this 10-day voyage across the Mediterranean, you'll explore beautiful sights and ancient cities while immersing yourself in the world of espionage with exclusive seminars. Learn more here: https://www.spiesliesnukes.com/spies-at-seas-2025  Subscribe to Sasha's Substack, HUMINT, to get more intelligence stories: https://sashaingber.substack.com/ And if you have feedback or want to hear about a particular topic, you can reach us by E-mail at SpyCast@Spymuseum.org.  This show is brought to you from Goat Rodeo, Airwave, and the International Spy Museum in Washington, DC.

Everyday Espionage Podcast
THIS is The MOST Powerful Lesson I Learned at CIA | Day 7

Everyday Espionage Podcast

Play Episode Listen Later Apr 1, 2025 11:43


Find your Spy Superpower: https://yt.everydayspy.com/4ffYFzN There is a powerful lesson CIA taught me that transformed my life, career, and even my business today. That lesson was understanding the difference between motivation and manipulation. Today, I want to give that lesson to you.

Everyday Espionage Podcast
How I Used CIA Training to Face My WORST Parenting Nightmare! | Day 6

Everyday Espionage Podcast

Play Episode Listen Later Mar 27, 2025 12:56


Find your Spy Superpower: https://yt.everydayspy.com/4kWjrHE We all have to do hard things sometimes. Whether we choose them or they are required of us, difficult times are always ahead. As a parent and business owner, nothing has equipped me better for dealing with difficulty than one simple lesson I learned at CIA. This is that lesson…

Uncommon Sense with Ginny Robinson
The Newly Released JFK Files & What the CIA Wanted Redacted

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 19, 2025 41:31


The long-awaited JFK files have finally been released, and one of the most revealing details isn't what's in them—but what the CIA wanted to keep hidden. Among the redactions in the report, one stands out: “The Israeli Intelligence Service.” Why was this information deemed too sensitive for public eyes, even after all these years? In this episode, I break down my initial reaction to the files, what this redaction could mean, and how it fits into the bigger picture of JFK's assassination, and American politics in general.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmIkS3X8ivoZzZosZdSRJueTZ&gclid=Cj0KCQjw1um-BhDtARIsABjU5x6X9JVI5Dihvk6wiS1l5Ra9sToZWRHjj-F0vy3owqCssQ1Bpb0eGaQaAsF1EALw_wcB

Uncommon Sense with Ginny Robinson
WHERE IS THE D*MN EPSTEIN LIST?

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Feb 28, 2025 47:46


Pam Bondi said she had it. Then she said it was coming out at 8 AM. Then… nothing. Now, she's in hiding, refusing to address why the long-awaited Epstein list is still being kept from the public. But she's not the only one responsible for this sham. The new FBI Director, Kash Patel, and even Donald Trump are complicit in this failure to deliver the truth.And let's talk about those so-called “Conservative” influencers who turned the Bondi binders into a circus act. Handing out redacted files full of nothing but black ink wasn't a win—it was a total disgrace. They gamified children's trauma, treating the horrific abuse of minors as a political spectacle instead of demanding real justice. Rather than doubling down on their wrongness, they need to admit they got played.So, WHERE OH WHERE  is the Epstein list? Why are we STILL waiting? And who's actually protecting the predators? We're getting into all of it—no spin, no excuses, just Uncommon Sense.--https://noblegoldinvestments.com/

MOPs & MOEs
From Overweight to Special Operations with SGM Jaime Espinoza

MOPs & MOEs

Play Episode Listen Later Dec 1, 2024 74:22


This episode continues a theme of bringing on guest's who crossed paths with Alex in the Army and helped shape his perspective on human performance. SGM Jaime Espinoza's career started with troubles involving weight gain, mental health, alcohol abuse, and more. But thanks to help from several people along the way (some human performance professionals, but also just fellow soldiers) he managed to overcome those hurdles and excel professionally. He joined us to talk about how, and how lessons he learned in the process can help improve outcomes for people experiencing the same challenges. Sergeant Major Jaime Espinoza is a native of Azusa, CA. Upon enlisting in the Army in August 2006, he attended basic training at Fort Leonard Wood, Missouri, followed by advanced individual training at Fort Huachuca, Arizona. After completing advanced individual training, he was awarded the MOS 35F Intelligence Analyst. His assignments, in ascending order, were with HHC 2-6 IN, 2 BDE, 1st AD, Baumholder, GE; Bravo Company, 304th MI, Fort Huachuca, AZ; HHD, 525th MP BN, Guantanamo Bay, CU; HHC, 4 BDE, 1st CAV DIV, Fort Hood; HHT, 1-9 CAV, 1st CAV DIV, Fort Cavazos; HHC, 4th BDE, 1st CAV DIV, Fort Hood; HHC, 3rd BDE, 4th ID Attached to Foundry Fort Carson, CO; Delta MI Company, 299th BEB, 4th ID, Fort Carson, CO; HHD, 1ST IO CMD Land, Fort Belvoir; United States Special Operations Command (USASOC). He has deployed in support of Operation Enduring Freedom(OEF) and Operation Iraqi Freedom (OIF). He served in a variety of leadership and technical positions, including Junior Analyst, Targeting Analyst, S2 NCO, ASAS-L Master Analyst, Special Security Representative, Detainee Mail Analyst, S2 NCOIC, Senior Intelligence Sergeant, Platoon Sergeant, First Sergeant, Operations NCO, Observer Controller and Trainer, Foundry Instructor, Operations Sergeant Major. SGM Espinoza's military education includes the Joint Special Operations Forces Senior Enlisted Academy (Class 74). Other schools include the Small UAV Course, Army Basic Instructor Course, Foreign Disclosure Officer Course, Military Police Pre-Service Course, Army Space Cadre Basic Course, Master Fitness Trainer Course, Critical Thinking Course, Integrated Data Sources and Enhanced Analytics Course, Information Operations Capabilities, Application and Planning Course, Army Operations Security Program Manager / Officer Certification Level II Course, Anti-Terrorism Officer Basic Course Airborne Course and SERE course. He holds an Associate of Arts degree in Applied Sciences in Intelligence Operations from Cochise College, a Bachelor of Arts in History with a concentration in Military History from Southern New Hampshire University, and a Master of Arts in International Relations from New England College. SGM Espinoza's awards and decorations are the Meritorious Service Medal (2nd Award), Army Commendation Medal (7th Award), Army Achievement Medal (6th Award), Army Good Conduct Medal (6th Award), National Defense Service Medal, Afghanistan Campaign Medal (1 Campaign Star), Iraqi Campaign Medal (2 Campaign Stars), Global War on Terrorism Expeditionary Medal, Global War on Terrorism Service Medal,Humanitarian Service Medal, Military Outstanding Volunteer Service Medal (2nd Award), Noncommissioned Officer Professional Development Ribbon (5th Award), Army Service Ribbon, Overseas Service Ribbon (3rd Award), NATO Medal, Luxembourg's International March of Diekirch Medal, Presidential Unit Citation (2 nd Award), Meritorious Unit Citation (3rd Award), Army Superior Unit Award. He has earned the Parachutist Badge, Army Basic Space Badge, Canadian Jump wings, Italian Parachutist Badge, German Bronze Parachutist, Polish Parachutist Jump wings and Netherlands Parachutist Jump wings, Norwegian Foot March Badge, Driver's badge with wheel and track clasps. SGM Espinoza is a recipient of the Military Intelligence Corps Association Knowlton Award.

Order of Man
ROBIN DREEKE | Forging Unbreakable Alliances

Order of Man

Play Episode Listen Later Nov 5, 2024 67:50


We all know how crucial it is to build alliances in our lives and, yet, most men aren't real deliberate and intentional about how they do it. Think about it, most of your connections are a product of default proximity, not rational design – your neighbor, your brother, the guy that works down the hall from you, etc. So, how do you form and nurture these strategic relationships. Robin Dreeke joins me today to share his knowledge as a former FBI behavioral analysist, and spy recruiter. We discuss the power of non-judgmental curiosity, the 4 keys of effective communication, how to analyze a person's behaviors and motives quickly, including an analysis of the positive and negative characteristics of both Kamala Harris and Donald Trump, how to strategize trust with others, and why some men can read people well while others can't. SHOW HIGHLIGHTS (00:00) Episode Intro (03:40) The Power of Human Connection   (16:06) Building Balanced Reciprocal Relationships   (22:15) Navigating Controversial Conversations With Empathy   (30:33) Assessing Emotional vs Pragmatic Conversations   (38:09) Assessing Personalities Beyond Script and Media   (43:57) Assessing People Through Ground Truth   (53:26) Strategizing Trust in Intelligence Operations   (01:04:45) Promoting "Unbreakable Alliances" With Robin Dreeke Battle Planners: Pick yours up today! Order Ryan's new book, The Masculinity Manifesto. For more information on the Iron Council brotherhood. Want maximum health, wealth, relationships, and abundance in your life? Sign up for our free course, 30 Days to Battle Ready

Security Forum Podcasts
S30 Ep4: BONUS: Brian Lord - AI, Mis- and Disinformation in Election Fraud and Education

Security Forum Podcasts

Play Episode Listen Later Oct 29, 2024 23:07


This is the second of a two-part conversation between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. Today, Steve and Brian discuss the proliferation of mis- and disinformation online, the potential security threats posed by AI, and the need for educating children in cyber awareness from a young age. Key Takeaways: 1. The private sector serves as a skilled and necessary support to the public sector, working to counter mis- and disinformation campaigns, including those involving AI. 2. AI's increasing ability to create fabricated  images poses a particular threat to youth and other vulnerable users. Tune in to hear more about: 1. Brian gives his assessment of cybersecurity threats during election years. (16:04) 2. Exploitation of vulnerable users remains a major concern in the digital space, requiring awareness, innovative countermeasures, and regulation. (31:0) Standout Quotes: 1. “I think when we look at AI, we need to recognize it is a potentially long term larger threat to our institutions, our critical mass and infrastructure, and we need to put in countermeasures to be able to do that. But we also need to recognize that the most immediate impact on that is around what we call high harms, if you like. And I think that was one of the reasons the UK — over a torturously long period of time — introduced the The Online Harms Bill to be able to counter some of those issues. So we need to get AI in perspective. It is a threat. Of course it is a threat. But I see then when one looks at AI applied in the cybersecurity test, you know, automatic intelligence developing hacking techniques, bear in mind, AI is available to both sides. It's not just available to the attackers, it's available to the defenders. So what we are simply going to do is see that same kind of thing that we have in the more human-based countering the cybersecurity threat in an AI space.” -Brian Lord 2. “The problem we have now — now, one can counter that by the education of children, keeping them aware, and so on and so forth— the problem you have now is the ability, because of the availability of imagery online and AI's ability to create imagery, one can create an entirely fabricated image of a vulnerable target and say, this is you. Even though it isn't … when you're looking at the most vulnerable in our society, that's a very, very difficult thing to counter, because it doesn't matter whether it's real to whoever sees it, or the fear from the most vulnerable people, people who see it, they will believe that it is real. And we've seen that.” -Brian Lord Mentioned in this episode: • ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.

Security Forum Podcasts
S30 Ep4: BONUS: Brian Lord - AI, Mis- and Disinformation in Election Fraud and Education

Security Forum Podcasts

Play Episode Listen Later Oct 29, 2024 23:07


This is the second of a two-part conversation between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. Today, Steve and Brian discuss the proliferation of mis- and disinformation online, the potential security threats posed by AI, and the need for educating children in cyber awareness from a young age. Key Takeaways: 1. The private sector serves as a skilled and necessary support to the public sector, working to counter mis- and disinformation campaigns, including those involving AI. 2. AI's increasing ability to create fabricated  images poses a particular threat to youth and other vulnerable users. Tune in to hear more about: 1. Brian gives his assessment of cybersecurity threats during election years. (16:04) 2. Exploitation of vulnerable users remains a major concern in the digital space, requiring awareness, innovative countermeasures, and regulation. (31:0) Standout Quotes: 1. “I think when we look at AI, we need to recognize it is a potentially long term larger threat to our institutions, our critical mass and infrastructure, and we need to put in countermeasures to be able to do that. But we also need to recognize that the most immediate impact on that is around what we call high harms, if you like. And I think that was one of the reasons the UK — over a torturously long period of time — introduced the The Online Harms Bill to be able to counter some of those issues. So we need to get AI in perspective. It is a threat. Of course it is a threat. But I see then when one looks at AI applied in the cybersecurity test, you know, automatic intelligence developing hacking techniques, bear in mind, AI is available to both sides. It's not just available to the attackers, it's available to the defenders. So what we are simply going to do is see that same kind of thing that we have in the more human-based countering the cybersecurity threat in an AI space.” -Brian Lord 2. “The problem we have now — now, one can counter that by the education of children, keeping them aware, and so on and so forth— the problem you have now is the ability, because of the availability of imagery online and AI's ability to create imagery, one can create an entirely fabricated image of a vulnerable target and say, this is you. Even though it isn't … when you're looking at the most vulnerable in our society, that's a very, very difficult thing to counter, because it doesn't matter whether it's real to whoever sees it, or the fear from the most vulnerable people, people who see it, they will believe that it is real. And we've seen that.” -Brian Lord Mentioned in this episode: • ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.

Peter Boyles Show Podcast
The Peter Boyles Show 9.28.24 - Hr 2

Peter Boyles Show Podcast

Play Episode Listen Later Sep 28, 2024 47:58


Peter is joined In-Studio by Author and Podcaster Chris Shelton on the subjects of Diddy and Epstein, Intelligence Operations, and Scientology. Chris is the Author of "Scientology: From A to Xenu".  Chris Shelton dives into his Life in the Church of Scientology, What He has learned, Why he left, and so much more!  Check out his Podcast at: https://www.speakingofcults.com/ or wherever you download podcasts!    Info on tomorrow's MC 1 Honor Run Event: https://www.mc1foundation.com/events.html See omnystudio.com/listener for privacy information.

CNN News Briefing
3 PM ET: New GA school shooting details, Russia's intelligence operations, “Karate Kid” star dies & more

CNN News Briefing

Play Episode Listen Later Sep 13, 2024 5:58


We start with the campaign stops Kamala Harris and Donald Trump are making today in the final stretch of the 2024 race. More details are emerging about the deadly shooting at a Georgia high school last week. We're learning more about Russian state media's key role in its intelligence and influence operations around the world. Justin Timberlake pleaded guilty to a lesser charge of driving while impaired for an incident earlier this year. And, “Karate Kid” actor Chad McQueen has died at age 63. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Cognitive Crucible
#199 Ellen McCarthy on Trust in Media and Information

The Cognitive Crucible

Play Episode Listen Later Sep 10, 2024 49:27


The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Ellen McCarthy discusses how to conceptualize and develop standards and measurements on information quality, how to align AI with accurate and reliable information, and how challenges and potential of leveraging AI can support information quality. Also, be sure to check out and register for the upcoming 28 October symposium co-sponsored by TIM and IPA: Beyond the Noise - Elevating Information Quality in a Generative AI Era. Recording Date: 5 Sept 2024 Research Question: Ellen McCarthy suggests an interested student examine macroeconomic indicators or drivers of information consumption. Resources: Cognitive Crucible Podcast Episodes Mentioned #119 Katherine Carman on Truth Decay Ellen McCarthy Bio October 28, 2024 Symposium Gallup: U.S. Confidence in Institutions Mostly Flat, but Police Up Gallup: Confidence in Institutions DOJ: Two RT Employees Indicted for Covertly Funding and Directing U.S. Company that Published Thousands of Videos in Furtherance of Russian Interests Information Sharing and Analysis Centers Alfred North Whitehead quote: “Civilization advances by extending the number of important operations which we can perform without thinking of them.” Link to full show notes and resources Guest Bio: The Honorable Ellen McCarthy is a national security professional with extensive experience in government and the private sector. She has held several high-level positions in the U.S. intelligence community and has worked on a wide range of national security issues. Ellen served as the Assistant Secretary of State for Intelligence and Research from 2018 to 2020. In this role, she oversaw the State Department's intelligence analysis and provided support to senior policymakers on foreign policy matters. Before that, she was the President of Noblis NSP, a national security-focused science and technology company. She also served as the President of the Intelligence and National Security Alliance (INSA), a non-profit organization focused on addressing intelligence and national security priorities. Prior to her time in the private sector, McCarthy held various leadership positions in the intelligence community, including serving as the Chief Operating Officer of the National Geospatial-Intelligence Agency and the Director of Intelligence Operations at the U.S. Coast Guard. She was also lead for Human Capital and Security for the Under Secretary of Defense for Intelligence and started her career as an all source intelligence analyst within the Office of Naval Intelligence and the Atlantic Intelligence Command. She is a wife, mother, daughter and friend. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.

The Ontic Protective Intelligence Podcast
The Intersection of History and Ethics in Intelligence Operations

The Ontic Protective Intelligence Podcast

Play Episode Listen Later Sep 4, 2024 27:14


In this episode, Fred Burton speaks with Dr. Louis Sage-Passant, Global Head of Intelligence at Novo Nordisk, about his new book, Beyond States and Spies. Louis shares insights from his career in military intelligence, private sector intelligence, and his extensive research into the history and ethics of intelligence operations. Tune in to discover how private sector intelligence has evolved and the surprising historical precedents that challenge conventional views.Tune in to hear them discuss:The evolution and significance of private sector intelligence.Key historical milestones in intelligence, including the role of Lloyd's of London.The importance of transparency and cooperation in modern intelligence operations.Relevant resources:Preorder Beyond States and Spies hereHave a question for our hosts? Or want to be on the podcast? Email us at podcast@ontic.co.

Order of Man
Own Your Shit | DAVE FIELDING

Order of Man

Play Episode Listen Later Jun 4, 2024 68:14


If you're like me, when you were a young boy, you had dreams of growing up to be an American hero and/or a spy like James Bond. But what does that actually mean in real life and, what does it take? My guest today is a man who has done just that. His name is Dave Fielding, Green Beret turned American Spy. And, today, he shares some of his insight into the world of US intelligence including what we can do to protect ourselves and maintain our rights. We talk about how arrogance hurts you but also how it might be able to help, how the common citizen deciphers between false and accurate information, the importance of owning your shit, the power of asking yourself, “why” in all things, and how self-awareness leads to a fulfilled life.   Show Highlights (00:00) - Episode Intro (00:40) - Embracing Growth Through Seeking Help (03:49) - Personal Growth in Intelligence Operations (20:07) - Concerns About National Security (25:18) - Building Trust in Three Letter Agencies (33:26) - Assassination Involvement and Counterterrorism Strategy (46:49) - Unpacking Emotional Healing and Growth (60:13) - Redemption and Improvement Through Darkness   Battle Planners:  Pick yours up today! Order Ryan's new book, The Masculinity Manifesto. For more information on the Iron Council brotherhood. Want maximum health, wealth, relationships, and abundance in your life? Sign up for our free course, 30 Days to Battle Ready

Security Forum Podcasts
S25 Ep4: Brian Lord - AI, Mis-and Disinformation in Election Fraud and Education

Security Forum Podcasts

Play Episode Listen Later Apr 23, 2024 23:07


This is the second of a two-part conversation between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. Today, Steve and Brian discuss the proliferation of mis- and disinformation online, the potential security threats posed by AI, and the need for educating children in cyber awareness from a young age. Key Takeaways: 1. The private sector serves as a skilled and necessary support to the public sector, working to counter mis- and disinformation campaigns, including those involving AI. 2. AI's increasing ability to create fabricated  images poses a particular threat to youth and other vulnerable users. Tune in to hear more about: 1. Brian gives his assessment of cybersecurity threats during election years. (16:04) 2. Exploitation of vulnerable users remains a major concern in the digital space, requiring awareness, innovative countermeasures, and regulation. (31:0) Standout Quotes: 1. “I think when we look at AI, we need to recognize it is a potentially long term larger threat to our institutions, our critical mass and infrastructure, and we need to put in countermeasures to be able to do that. But we also need to recognize that the most immediate impact on that is around what we call high harms, if you like. And I think that was one of the reasons the UK — over a torturously long period of time — introduced the The Online Harms Bill to be able to counter some of those issues. So we need to get AI in perspective. It is a threat. Of course it is a threat. But I see then when one looks at AI applied in the cybersecurity test, you know, automatic intelligence developing hacking techniques, bear in mind, AI is available to both sides. It's not just available to the attackers, it's available to the defenders. So what we are simply going to do is see that same kind of thing that we have in the more human-based countering the cybersecurity threat in an AI space.” -Brian Lord 2. “The problem we have now — now, one can counter that by the education of children, keeping them aware, and so on and so forth— the problem you have now is the ability, because of the availability of imagery online and AI's ability to create imagery, one can create an entirely fabricated image of a vulnerable target and say, this is you. Even though it isn't … when you're looking at the most vulnerable in our society, that's a very, very difficult thing to counter, because it doesn't matter whether it's real to whoever sees it, or the fear from the most vulnerable people, people who see it, they will believe that it is real. And we've seen that.” -Brian Lord Mentioned in this episode: • ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.

Security Forum Podcasts
S25 Ep4: Brian Lord - AI, Mis-and Disinformation in Election Fraud and Education

Security Forum Podcasts

Play Episode Listen Later Apr 23, 2024 23:07


This is the second of a two-part conversation between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. Today, Steve and Brian discuss the proliferation of mis- and disinformation online, the potential security threats posed by AI, and the need for educating children in cyber awareness from a young age. Key Takeaways: 1. The private sector serves as a skilled and necessary support to the public sector, working to counter mis- and disinformation campaigns, including those involving AI. 2. AI's increasing ability to create fabricated  images poses a particular threat to youth and other vulnerable users. Tune in to hear more about: 1. Brian gives his assessment of cybersecurity threats during election years. (16:04) 2. Exploitation of vulnerable users remains a major concern in the digital space, requiring awareness, innovative countermeasures, and regulation. (31:0) Standout Quotes: 1. “I think when we look at AI, we need to recognize it is a potentially long term larger threat to our institutions, our critical mass and infrastructure, and we need to put in countermeasures to be able to do that. But we also need to recognize that the most immediate impact on that is around what we call high harms, if you like. And I think that was one of the reasons the UK — over a torturously long period of time — introduced the The Online Harms Bill to be able to counter some of those issues. So we need to get AI in perspective. It is a threat. Of course it is a threat. But I see then when one looks at AI applied in the cybersecurity test, you know, automatic intelligence developing hacking techniques, bear in mind, AI is available to both sides. It's not just available to the attackers, it's available to the defenders. So what we are simply going to do is see that same kind of thing that we have in the more human-based countering the cybersecurity threat in an AI space.” -Brian Lord 2. “The problem we have now — now, one can counter that by the education of children, keeping them aware, and so on and so forth— the problem you have now is the ability, because of the availability of imagery online and AI's ability to create imagery, one can create an entirely fabricated image of a vulnerable target and say, this is you. Even though it isn't … when you're looking at the most vulnerable in our society, that's a very, very difficult thing to counter, because it doesn't matter whether it's real to whoever sees it, or the fear from the most vulnerable people, people who see it, they will believe that it is real. And we've seen that.” -Brian Lord Mentioned in this episode: • ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.

Security Forum Podcasts
S25 Ep3: Brian Lord - Lost in Regulation: Bridging the cyber security gap for SMEs

Security Forum Podcasts

Play Episode Listen Later Apr 16, 2024 16:30


This episode is the first of two conversations between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. He brings his knowledge of both the public and private sector to bear in this wide-ranging conversation. Steve and Brian touch on the challenges small-midsize enterprises face in implementing cyber defenses, what effective cooperation between government and the private sector looks like, and  the role insurance may play in cybersecurity. Key Takeaways: 1.  A widespread, societal approach involving both the public and private sectors is essential in order to address the increasingly complex risk landscape of cyber attacks. 2. At the public or governmental levels, there is an increasing need to bring affordable cyber security services to small and mid-sized businesses, because failing to do so puts those businesses and major supply chains at risk. 3. The private sector serves as a skilled and necessary support to the public sector, working to counter mis- and disinformation campaigns, including those involving AI. Tune in to hear more about: 1. The National Cybersecurity Organization is part of GCHQ, serving to set regulatory standards and safeguards, communicate novel threats, and uphold national security measures in the digital space. (5:42) 2. Steve and Brian discuss existing challenges of small organizations lacking knowledge and expertise to meet cybersecurity regulations, leading to high costs for external advice and testing. (7:40) Standout Quotes: 1. “...If you buy an external expertise — because you have to do, because either you haven't got the demand to employ your own, or if you did the cost of employment would be very hard — the cost of buying an external advisor becomes very high. And I think the only way that can be addressed without compromising the standards is of course, to make more people develop more skills and more knowledge. And that, in a challenging way, is a long, long term problem. That is the biggest problem we have in the UK at the moment. And actually, in a lot of countries. The cost of implementing cybersecurity can quite often outweigh, as it may be seen within a smaller business context, the benefit.” -Brian Lord 2. “I think there probably needs to be a lot more tangible support, I think, for the small to medium enterprises. But that can only come out of collaboration with the cybersecurity industry and with government about, how do you make sure that some of the fees around that are capped?” -Brian Lord Mentioned in this episode: ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.

Security Forum Podcasts
S25 Ep3: Brian Lord - Lost in Regulation: Bridging the cyber security gap for SMEs

Security Forum Podcasts

Play Episode Listen Later Apr 16, 2024 16:30


This episode is the first of two conversations between Steve and Brian Lord, who is currently the Chief Executive Officer of Protection Group International. Prior to joining PGI, Brian served as the Deputy Director of a UK Government Agency governing the organization's Cyber and Intelligence Operations. He brings his knowledge of both the public and private sector to bear in this wide-ranging conversation. Steve and Brian touch on the challenges small-midsize enterprises face in implementing cyber defenses, what effective cooperation between government and the private sector looks like, and  the role insurance may play in cybersecurity. Key Takeaways: 1.  A widespread, societal approach involving both the public and private sectors is essential in order to address the increasingly complex risk landscape of cyber attacks. 2. At the public or governmental levels, there is an increasing need to bring affordable cyber security services to small and mid-sized businesses, because failing to do so puts those businesses and major supply chains at risk. 3. The private sector serves as a skilled and necessary support to the public sector, working to counter mis- and disinformation campaigns, including those involving AI. Tune in to hear more about: 1. The National Cybersecurity Organization is part of GCHQ, serving to set regulatory standards and safeguards, communicate novel threats, and uphold national security measures in the digital space. (5:42) 2. Steve and Brian discuss existing challenges of small organizations lacking knowledge and expertise to meet cybersecurity regulations, leading to high costs for external advice and testing. (7:40) Standout Quotes: 1. “...If you buy an external expertise — because you have to do, because either you haven't got the demand to employ your own, or if you did the cost of employment would be very hard — the cost of buying an external advisor becomes very high. And I think the only way that can be addressed without compromising the standards is of course, to make more people develop more skills and more knowledge. And that, in a challenging way, is a long, long term problem. That is the biggest problem we have in the UK at the moment. And actually, in a lot of countries. The cost of implementing cybersecurity can quite often outweigh, as it may be seen within a smaller business context, the benefit.” -Brian Lord 2. “I think there probably needs to be a lot more tangible support, I think, for the small to medium enterprises. But that can only come out of collaboration with the cybersecurity industry and with government about, how do you make sure that some of the fees around that are capped?” -Brian Lord Mentioned in this episode: ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.

SpyCast
Australian National Day Special: “Intelligence Down Under with John Blaxland”

SpyCast

Play Episode Listen Later Jan 23, 2024 68:34


Summary John Blaxland (Twitter, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss intelligence in Australia and Oceania. John is a widely recognized as a leading expert in this area.  What You'll Learn Intelligence -Australia's Intelligence Community  -SIGINT in Australia during WWII  -Australia's relationship with South Asia -The Pine Gap facility  Reflections -The implications of geography -The power of collaboration And much, much more … Quotes of the Week “The shift from the analog to the digital world … The shift for digital espionage, digital footprint management. How do you hide in the noise? How do you cover your identity? How do you protect your identity? … The digital revolution has actually enabled states to exercise a lot more power, a lot more control, a lot more monitoring, a lot more surveillance, a lot more interference.” – John Blaxland. Resources  SURFACE SKIM *Spotlight Resource* -Revealing Secrets: An unofficial history of Australian Signals intelligence and the advent of cyber, C. Birgin & J. Blaxland (University of New South Wales Press, 2023) *SpyCasts* -SPY CHIEFS: Director-General of Security Mike Burgess - ASIO, Australia & America (2022) -Keeping Secrets/Disclosing Secrets with Spy Chief turned DG of Australia's National Archives David Fricker (2022) -Desperately, Madly in Love – Brett Peppler and the Australian IC (2021) *Beginner Resources* -East Timor Independence: a short history of a long and brutal struggle, Guardian Australia, YouTube (2019) [4 min. video] -Our Agencies, National Intelligence Community of Australia (n.d.) [Overview of each agency in the Australian IC] -What is signals intelligence?, BAE Systems (n.d.) [Short article] DEEPER DIVE Books -Spies & Sparrows: ASIO & the Cold War, P. Deery (Melbourne University Press, 2022) -Australia's First Spies: The Remarkable Story of Australia's Intelligence Operations, 1901-45, J. Fahey (Allen & Unwin, 2019) -The Official History of ASIO – 3 Volumes, D. Horner, J. Blaxland, R. Crawley (Allen & Unwin, 2014/2015/2016) Primary Sources  -United Nations Resolution 1272 (1999) -United Nations Resolution 1264 (1999)  -Five Power Defence Arrangements (1971)  -Agreement between the Government of the Commonwealth of Australia and the Government of the United States of America relating to the Establishment of a Joint Defence Space Research Facility (1966)  -6 Wireless Unit signal sighting of Allied shipping (1945)  -Role and effectiveness of Signals Intelligence in World War II (1945) -Four Rotor Enigma Machine, Collection of the International Spy Museum (1943-1944)  *Wildcard Resource* -Pine Gap  A TV show about the top-secret satellite surveillance base of the same name. If you've seen it, you know it all about Australian Intelligence. Just kidding. But it's a good watch! 

Heartland Newsfeed Podcast Network
ATF sets up firearms intelligence operations in Chicago; eyes on CA magazine ban

Heartland Newsfeed Podcast Network

Play Episode Listen Later Sep 28, 2023 6:02


Bishop shares a couple of updates on firearms with the ATF setting up an intelligence operations to track the use of firearms in crimes. Separately, he updates the status of California's magazine ban in the Nineth Circuit U.S. Court of Appeals with no update on the Illinois gun and magazine ban in the Seventh Circuit U.S. Court of Appeals. --- Support this podcast: https://podcasters.spotify.com/pod/show/bishoponair/support

Bishop On Air
ATF sets up firearms intelligence operations in Chicago; eyes on CA magazine ban

Bishop On Air

Play Episode Listen Later Sep 28, 2023 6:01


Bishop shares a couple of updates on firearms with the ATF setting up an intelligence operations to track the use of firearms in crimes. Separately, he updates the status of California's magazine ban in the Nineth Circuit U.S. Court of Appeals with no update on the Illinois gun and magazine ban in the Seventh Circuit U.S. Court of Appeals. --- Support this podcast: https://podcasters.spotify.com/pod/show/bishoponair/support

Profiles in Havok
Charlie Faint

Profiles in Havok

Play Episode Listen Later Sep 19, 2023 80:32


Charles Faint currently serves as the Chair for the Study of Special Operations and an assistant professor in the Defense and Strategic Studies program for the Modern War Institute at West Point. A retired military intelligence officer, he commissioned into the military intelligence branch of the US Army through the ROTC program at Mercer University and claims Alabama as his home state. After completing a branch detail to the infantry in the 101st Airborne Division, he subsequently served as an intelligence officer in a variety of units, including the 2nd Infantry Division, the 5th Special Forces Group, the 160th Special Operations Aviation Regiment, and the Joint Special Operations Command. His most recent operational assignment was at Fort Shafter, Hawaii, where he served as the Chief of Intelligence – Plans and Exercises and then Chief of Intelligence – Operations on the G2 staff of US Army Pacific.In addition to his role as MWI Deputy Director, he teaches the Comparative Defense Policy course. During a previous tour at West Point, he was the course director for MX400, the superintendent's capstone course on officership, for two years. He also instructed international relations, American politics, comparative politics, conflict and negotiation, and intelligence and national policy for three years in West Point's renowned Department of Social Sciences.He earned his doctorate in business administration through Temple University. He also holds five undergraduate and graduate degrees, the most recent of which is from Yale University. Educated in fields ranging from engineering to communication to international relations, his research interests include special operations, civil-military relations, and small business entrepreneurship.Over the course of his career, Lt. Col. Faint earned the Defense Meritorious Service Medal, the Bronze Star Medal (4 awards), the Meritorious Service Medal (six awards), the Combat Action Badge, and the pathfinder, airborne, and air assault badges. He has earned seven combat stripes for his service in Iraq and Afghanistan and also served in Egypt, Korea, and the Philippines.Early in his career, he served a six-month peacekeeping tour with the Multinational Force and Observers in Sinai, Egypt, an experience that began a career-long interest in the region. That interest prompted his involvement in the Peace and Dialogue Leadership Initiative (PDLI), a joint Yale/West Point endeavor that selects high-performing students from both schools for a yearlong fellowship that includes two weeks on the ground in Israel and Palestine. Faint was a cofounder of PDLI and served as its security advisor, accompanying the group to the Levant for each of the first five years of the PDLI's existence.Published in a number of blogs and professional journals, his most significant publication is coauthorship of the book Violence of Action: The Untold Stories of the 75th Ranger Regiment in the War on Terror. He was also the editor-in-chief of West Point's Journal of Social Sciences and Humanities, is the owner of the military-themed blog The Havok Journal, and is the executive director of The Second Mission Foundation, a 501(c)(3) nonprofit.

The Phantom Files
The Gateway Project

The Phantom Files

Play Episode Play 50 sec Highlight Listen Later Aug 13, 2023 13:06 Transcription Available


We delve deep into the clandestine world of the Central Intelligence Agency's top-secret Gateway Project. Step into the shadows as we explore the mind-bending experiments that took place behind closed doors. Join us as we uncover the truth behind the government's quest to harness the untapped power of the human mind. From remote viewing to astral projection, we examine the controversial techniques employed by the CIA to unlock the secrets of psychic phenomena. Prepare to be captivated and astonished as we peel back the layers of this enigmatic project and expose the mysteries that lie within the realm of the mind. Are we on the cusp of unlocking extraordinary human abilities, or is it all a sinister web of deception? Tune in to this riveting episode as we separate fact from fiction and shine a light on the CIA's Gateway Project.If you've enjoyed this episode, consider sharing it with a friend or leaving a review and share your feedback and suggestions. Your reviews not only help me improve, but they also play a vital role in reaching more curious minds like yours.---Follow me on Twitter and keep the conversation alive. @Phantom_FileThanks for Listening!

AMERICA OUT LOUD PODCAST NETWORK
Ping Pong Diplomacy Is an Essential Tool in CCP's Intelligence Operations

AMERICA OUT LOUD PODCAST NETWORK

Play Episode Listen Later Aug 4, 2023 57:00


Dr. Li-Meng Yan w/ The Voice of Dr. Yan – It is a historic misjudgment for the U.S. that the CCP would embrace democracy, freedom, and human rights the way it happens in the free world. Because since its inception, the CCP has been a clandestine and illegal organization based on anti-human ideology and violence. During the pandemic, Americans gradually realized the true colors of the CCP...

A Little More Conversation with Ben O’Hara-Byrne
David Johnston rules out public inquiry into China's interference in Canadian politics

A Little More Conversation with Ben O’Hara-Byrne

Play Episode Listen Later May 24, 2023 96:59


David Johnston rules out public inquiry into China's interference in Canadian politics, is it the right decision? Guest: Christian Leuprecht, professor at the Royal Military College and Queen's University, senior fellow at the Macdonald Laurier Institute Former Conservative MP allegedly targeted by Beijing on David Johnston's recommendations Guest: Kenny Chiu, former Conservative MP Why a public inquiry into allegations of foreign interference would have been tough to carry out Guest: Ed Ratushny, emeritus professor of law, University of Ottawa and author of and author of The Conduct of Public Inquiries: Law, Policy, and Practice How broken is the flow of intelligence and information in Ottawa? Guest: Artur Wilczynski, a retired Assistant Deputy Minister and Director General of Intelligence Operations from the Communications Security Establishment; and former Ambassador and Director General of Security and Intelligence at Global Affairs Canada Ukraine latest after Zelenskiyy's visit to the G7 Guest: Michael Bociurkiw, Global affairs analyst. Sr. Fellow - Atlantic Council author of Digital Pandemic Sorry seems to be the hardest word, why it shouldn't be Guest: Marjorie Ingall, co-author of Sorry, Sorry, Sorry: The Case for Good Apologies An ode to cabbage becomes a cookbook sensation  Guest: Ann Thurlow, author, My PEI Cabbage Cookbook

Communism Exposed:East and West
CCP Intelligence Operations in the US

Communism Exposed:East and West

Play Episode Listen Later May 14, 2023 7:04


CCP Intelligence Operations in the US

Communism Exposed:East & West(PDF)
CCP Intelligence Operations in the US

Communism Exposed:East & West(PDF)

Play Episode Listen Later May 14, 2023 7:04


CCP Intelligence Operations in the US

Talking Threat Intelligence
OSINT on Telegram, TikTok, and Chanboards

Talking Threat Intelligence

Play Episode Listen Later May 9, 2023 56:49


Alt-tech social networks have exploded in popularity in recent years. And thanks to lax content moderation rules, these communities have become havens for criminal groups and other bad actors. This creates new challenges for security teams. On the one hand, many professionals may not even be aware of some of the new channels where people conjugate online. So as a result, organizations gathering open-source intelligence online could overlook serious threats to their operations. On the other hand, alt-tech social networks present new opportunities to discover and investigate threat intelligence. This is especially true in forums and communities with relaxed content moderation guidelines. So where should investigators and security practitioners get started? In a recent webinar, our very own Director of Strategy and Partnerships Neil Spencer hosted a panel to explore how to collect intelligence, investigate threats, and mitigate security risks facing your organization using new alt-tech social networks. In particular, the group decided to focus on some of the largest and fastest-growing of these communities, namely Telegram, Chan Boards, and TikTok. He was joined by Head of Intelligence at Securitas SIU, Mike Evans; Assistant Deputy Director, Intelligence Operations at Secure Community Network, Nathan Otto; and the Director of Research and Analytics at 2430 Group, Lindsay Wright. Learn more: * 5 Tips for Conducting OSINT on Alt-Tech Social Networks Never miss an episode by subscribing to the show on Spotify, Apple Podcasts, or wherever you listen to episodes.

ITSPmagazine | Technology. Cybersecurity. Society
The Five Most Dangerous New Attack Techniques | Demystifying The Top Emerging Cyber Threats | ITSPmagazine Event Coverage: RSAC 2023 San Francisco, USA | A Conversation with SANS Instructors Katie Nickels and Johannes Ullrich

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 14, 2023 25:48


Guests: Katie Nickels, Certified Instructor and Director of Intelligence Operations at SANS Institute [@sansforensics] and Red Canary [@redcanary]On LinkedIn | https://www.linkedin.com/in/katie-nickels/On Twitter | https://twitter.com/likethecoinsOn Mastodon | https://infosec.exchange/@likethecoinsJohannes Ullrich, Dean of Research at SANS Technology Institute [@sansforensics]On LinkedIn | https://www.linkedin.com/in/johannesullrich/On Twitter | https://twitter.com/sans_iscOn Mastodon | https://infosec.exchange/@jullrich____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this new RSA Conference Coverage podcast episode with ITSPmagazine, cybersecurity experts and SANS instructors, Katie Nickels and Johannes Ullrich, delve into the "Five Most Dangerous New Attack Techniques" panel, a discussion they've been part of for the past few years. They shed light on how they identify these top techniques by examining their increasing prevalence and potential impact. Joined by an outstanding panel of experts, including Heather Mahalik, a mobile technology specialist, and Steve Sims, an offensive security guru, they offer unique insights from different sides of the industry while also highlighting the importance of practical, hands-on advice and defense strategies against these threats.The panel emphasizes the importance of practical, hands-on advice and defense strategies to combat these emerging threats. Furthermore, Johannes shares valuable information about the Internet Storm Center's role in monitoring attacks and disseminating knowledge within the cybersecurity community.Tune in to this must-listen episode for a sneak peek of the latest attack techniques, evolving defense mechanisms, and the collaborative efforts of the cybersecurity community that will be presented during the panel so you can stay one step ahead of the attackers.Don't forget to share and subscribe to ITSPmagazine's RSA Conference Coverage to keep up with the latest trends in technology and cybersecurity.____________________________ResourcesSession | The Five Most Dangerous New Attack Techniques: https://www.rsaconference.com/USA/agenda/session/The%20Five%20Most%20Dangerous%20New%20Attack%20TechniquesInternet Storm Center Diaries: https://isc.sans.edu/Learn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?

Redefining CyberSecurity
The Five Most Dangerous New Attack Techniques | Demystifying The Top Emerging Cyber Threats | ITSPmagazine Event Coverage: RSAC 2023 San Francisco, USA | A Conversation with SANS Instructors Katie Nickels and Johannes Ullrich

Redefining CyberSecurity

Play Episode Listen Later Apr 14, 2023 25:48


Guests: Katie Nickels, Certified Instructor and Director of Intelligence Operations at SANS Institute [@sansforensics] and Red Canary [@redcanary]On LinkedIn | https://www.linkedin.com/in/katie-nickels/On Twitter | https://twitter.com/likethecoinsOn Mastodon | https://infosec.exchange/@likethecoinsJohannes Ullrich, Dean of Research at SANS Technology Institute [@sansforensics]On LinkedIn | https://www.linkedin.com/in/johannesullrich/On Twitter | https://twitter.com/sans_iscOn Mastodon | https://infosec.exchange/@jullrich____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this new RSA Conference Coverage podcast episode with ITSPmagazine, cybersecurity experts and SANS instructors, Katie Nickels and Johannes Ullrich, delve into the "Five Most Dangerous New Attack Techniques" panel, a discussion they've been part of for the past few years. They shed light on how they identify these top techniques by examining their increasing prevalence and potential impact. Joined by an outstanding panel of experts, including Heather Mahalik, a mobile technology specialist, and Steve Sims, an offensive security guru, they offer unique insights from different sides of the industry while also highlighting the importance of practical, hands-on advice and defense strategies against these threats.The panel emphasizes the importance of practical, hands-on advice and defense strategies to combat these emerging threats. Furthermore, Johannes shares valuable information about the Internet Storm Center's role in monitoring attacks and disseminating knowledge within the cybersecurity community.Tune in to this must-listen episode for a sneak peek of the latest attack techniques, evolving defense mechanisms, and the collaborative efforts of the cybersecurity community that will be presented during the panel so you can stay one step ahead of the attackers.Don't forget to share and subscribe to ITSPmagazine's RSA Conference Coverage to keep up with the latest trends in technology and cybersecurity.____________________________ResourcesSession | The Five Most Dangerous New Attack Techniques: https://www.rsaconference.com/USA/agenda/session/The%20Five%20Most%20Dangerous%20New%20Attack%20TechniquesInternet Storm Center Diaries: https://isc.sans.edu/Learn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?

New Books Network
Andrew Long, "Secrets of the Cold War: Espionage and Intelligence Operations from Both Sides of the Iron Curtain" (Pen and Sword History, 2022)

New Books Network

Play Episode Listen Later Apr 11, 2023 89:16


The Cold War was a major geopolitical contest between the United States and the Soviet Union over predominance over the entire world. Unlike the previous two world wars, the two superpowers could not afford to go directly to war with one another due to the reality of nuclear weapons. As a result, the covert work of spies and secret agents proved to be the main battlefield where the two superpowers would contest each other. Not surprisingly, this period also witnessed the rise of enduring staples of spy fiction - most famously Ian Fleming's fictional spy character James Bond. However, as the common saying goes, the truth is often more fascinating than fiction. Many of the true stories of covert operations and spies are covered in Andrew Long's Secrets of the Cold War: Espionage and Intelligence Operations - From Both Sides of the Iron Curtain (Pen and Sword History, 2022). Andrew Long is a British military history researcher and author. His fascination with the Cold War began with a trip to West Berlin in 1986, traveling through Checkpoint Charlie to visit the East. Andrew's writing comes from a desire to make sense of an extremely complex period in modern history, weaving together inter-relating stories involving politics, ideologies, personalities, technological advances, and geography. There is still much to be told on this fascinating subject. After a successful career in marketing, Andrew relocated to Cornwall and took up writing full time. Stephen Satkiewicz is an independent scholar whose research areas are related to Civilizational Analysis, Social Complexity, Big History, Historical Sociology, military history, War studies, International Relations, Geopolitics, as well as Russian and East European history. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network

New Books in History
Andrew Long, "Secrets of the Cold War: Espionage and Intelligence Operations from Both Sides of the Iron Curtain" (Pen and Sword History, 2022)

New Books in History

Play Episode Listen Later Apr 11, 2023 89:16


The Cold War was a major geopolitical contest between the United States and the Soviet Union over predominance over the entire world. Unlike the previous two world wars, the two superpowers could not afford to go directly to war with one another due to the reality of nuclear weapons. As a result, the covert work of spies and secret agents proved to be the main battlefield where the two superpowers would contest each other. Not surprisingly, this period also witnessed the rise of enduring staples of spy fiction - most famously Ian Fleming's fictional spy character James Bond. However, as the common saying goes, the truth is often more fascinating than fiction. Many of the true stories of covert operations and spies are covered in Andrew Long's Secrets of the Cold War: Espionage and Intelligence Operations - From Both Sides of the Iron Curtain (Pen and Sword History, 2022). Andrew Long is a British military history researcher and author. His fascination with the Cold War began with a trip to West Berlin in 1986, traveling through Checkpoint Charlie to visit the East. Andrew's writing comes from a desire to make sense of an extremely complex period in modern history, weaving together inter-relating stories involving politics, ideologies, personalities, technological advances, and geography. There is still much to be told on this fascinating subject. After a successful career in marketing, Andrew relocated to Cornwall and took up writing full time. Stephen Satkiewicz is an independent scholar whose research areas are related to Civilizational Analysis, Social Complexity, Big History, Historical Sociology, military history, War studies, International Relations, Geopolitics, as well as Russian and East European history. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/history

New Books in Military History
Andrew Long, "Secrets of the Cold War: Espionage and Intelligence Operations from Both Sides of the Iron Curtain" (Pen and Sword History, 2022)

New Books in Military History

Play Episode Listen Later Apr 11, 2023 89:16


The Cold War was a major geopolitical contest between the United States and the Soviet Union over predominance over the entire world. Unlike the previous two world wars, the two superpowers could not afford to go directly to war with one another due to the reality of nuclear weapons. As a result, the covert work of spies and secret agents proved to be the main battlefield where the two superpowers would contest each other. Not surprisingly, this period also witnessed the rise of enduring staples of spy fiction - most famously Ian Fleming's fictional spy character James Bond. However, as the common saying goes, the truth is often more fascinating than fiction. Many of the true stories of covert operations and spies are covered in Andrew Long's Secrets of the Cold War: Espionage and Intelligence Operations - From Both Sides of the Iron Curtain (Pen and Sword History, 2022). Andrew Long is a British military history researcher and author. His fascination with the Cold War began with a trip to West Berlin in 1986, traveling through Checkpoint Charlie to visit the East. Andrew's writing comes from a desire to make sense of an extremely complex period in modern history, weaving together inter-relating stories involving politics, ideologies, personalities, technological advances, and geography. There is still much to be told on this fascinating subject. After a successful career in marketing, Andrew relocated to Cornwall and took up writing full time. Stephen Satkiewicz is an independent scholar whose research areas are related to Civilizational Analysis, Social Complexity, Big History, Historical Sociology, military history, War studies, International Relations, Geopolitics, as well as Russian and East European history. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/military-history

New Books in Russian and Eurasian Studies
Andrew Long, "Secrets of the Cold War: Espionage and Intelligence Operations from Both Sides of the Iron Curtain" (Pen and Sword History, 2022)

New Books in Russian and Eurasian Studies

Play Episode Listen Later Apr 11, 2023 89:16


The Cold War was a major geopolitical contest between the United States and the Soviet Union over predominance over the entire world. Unlike the previous two world wars, the two superpowers could not afford to go directly to war with one another due to the reality of nuclear weapons. As a result, the covert work of spies and secret agents proved to be the main battlefield where the two superpowers would contest each other. Not surprisingly, this period also witnessed the rise of enduring staples of spy fiction - most famously Ian Fleming's fictional spy character James Bond. However, as the common saying goes, the truth is often more fascinating than fiction. Many of the true stories of covert operations and spies are covered in Andrew Long's Secrets of the Cold War: Espionage and Intelligence Operations - From Both Sides of the Iron Curtain (Pen and Sword History, 2022). Andrew Long is a British military history researcher and author. His fascination with the Cold War began with a trip to West Berlin in 1986, traveling through Checkpoint Charlie to visit the East. Andrew's writing comes from a desire to make sense of an extremely complex period in modern history, weaving together inter-relating stories involving politics, ideologies, personalities, technological advances, and geography. There is still much to be told on this fascinating subject. After a successful career in marketing, Andrew relocated to Cornwall and took up writing full time. Stephen Satkiewicz is an independent scholar whose research areas are related to Civilizational Analysis, Social Complexity, Big History, Historical Sociology, military history, War studies, International Relations, Geopolitics, as well as Russian and East European history. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/russian-studies

New Books in American Studies
Andrew Long, "Secrets of the Cold War: Espionage and Intelligence Operations from Both Sides of the Iron Curtain" (Pen and Sword History, 2022)

New Books in American Studies

Play Episode Listen Later Apr 11, 2023 89:16


The Cold War was a major geopolitical contest between the United States and the Soviet Union over predominance over the entire world. Unlike the previous two world wars, the two superpowers could not afford to go directly to war with one another due to the reality of nuclear weapons. As a result, the covert work of spies and secret agents proved to be the main battlefield where the two superpowers would contest each other. Not surprisingly, this period also witnessed the rise of enduring staples of spy fiction - most famously Ian Fleming's fictional spy character James Bond. However, as the common saying goes, the truth is often more fascinating than fiction. Many of the true stories of covert operations and spies are covered in Andrew Long's Secrets of the Cold War: Espionage and Intelligence Operations - From Both Sides of the Iron Curtain (Pen and Sword History, 2022). Andrew Long is a British military history researcher and author. His fascination with the Cold War began with a trip to West Berlin in 1986, traveling through Checkpoint Charlie to visit the East. Andrew's writing comes from a desire to make sense of an extremely complex period in modern history, weaving together inter-relating stories involving politics, ideologies, personalities, technological advances, and geography. There is still much to be told on this fascinating subject. After a successful career in marketing, Andrew relocated to Cornwall and took up writing full time. Stephen Satkiewicz is an independent scholar whose research areas are related to Civilizational Analysis, Social Complexity, Big History, Historical Sociology, military history, War studies, International Relations, Geopolitics, as well as Russian and East European history. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/american-studies

New Books in National Security
Andrew Long, "Secrets of the Cold War: Espionage and Intelligence Operations from Both Sides of the Iron Curtain" (Pen and Sword History, 2022)

New Books in National Security

Play Episode Listen Later Apr 11, 2023 89:16


The Cold War was a major geopolitical contest between the United States and the Soviet Union over predominance over the entire world. Unlike the previous two world wars, the two superpowers could not afford to go directly to war with one another due to the reality of nuclear weapons. As a result, the covert work of spies and secret agents proved to be the main battlefield where the two superpowers would contest each other. Not surprisingly, this period also witnessed the rise of enduring staples of spy fiction - most famously Ian Fleming's fictional spy character James Bond. However, as the common saying goes, the truth is often more fascinating than fiction. Many of the true stories of covert operations and spies are covered in Andrew Long's Secrets of the Cold War: Espionage and Intelligence Operations - From Both Sides of the Iron Curtain (Pen and Sword History, 2022). Andrew Long is a British military history researcher and author. His fascination with the Cold War began with a trip to West Berlin in 1986, traveling through Checkpoint Charlie to visit the East. Andrew's writing comes from a desire to make sense of an extremely complex period in modern history, weaving together inter-relating stories involving politics, ideologies, personalities, technological advances, and geography. There is still much to be told on this fascinating subject. After a successful career in marketing, Andrew relocated to Cornwall and took up writing full time. Stephen Satkiewicz is an independent scholar whose research areas are related to Civilizational Analysis, Social Complexity, Big History, Historical Sociology, military history, War studies, International Relations, Geopolitics, as well as Russian and East European history. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

The Judge Jeanine Tunnel to Towers Foundation Sunday Morning Show

Colonel David Hunt has over 29 years of military experience, including extensive operational experience in Special Operations, Counter Terrorism and Intelligence Operations. Most recently, Colonel Hunt served as Tactical Advisor in Bosnia where he facilitated all national intelligence matters for the Commander in Chief, as well as coordinating a $350,000,000 national security program for the National Security Agency and the Central Intelligence Agency in 1997. Learn more about your ad choices. Visit megaphone.fm/adchoices

The John Batchelor Show
#Peru: #Cuba: Cuban Intelligence operations and Lima's turmoil. Mary Anastasia O'Grady, WSJOpinion

The John Batchelor Show

Play Episode Listen Later Feb 3, 2023 10:10


Photo: No known restrictions on publication. @Batchelorshow #Peru: #Cuba: Cuban Intelligence operations and Lima's turmoil. Mary Anastasia O'Grady, WSJOpinion https://www.barrons.com/articles/biden-win-china-chip-war-stocks-51675082487

Talk Radio Europe
Andrew Long – Secrets of the Cold War: Espionage and Intelligence Operations – From Both Sides of the Iron Curtain…with TRE's Ger Sweeney

Talk Radio Europe

Play Episode Listen Later Dec 23, 2022 22:22


Andrew Long - Secrets of the Cold War: Espionage and Intelligence Operations - From Both Sides of the Iron Curtain...with TRE's Ger Sweeney

The Institute of World Politics
Modern Intelligence Operations Across Multi-Domain Environments

The Institute of World Politics

Play Episode Listen Later Oct 31, 2022 52:24


This lecture was recorded live on October 24, 2022 at The Institute of World Politics in Washington, D.C.. About the Lecture This lecture will discuss how intelligence capabilities and operations have evolved to enable our national government leaders and military forces to seamlessly counter and/or defeat a near-peer adversary capable of contesting the U.S. in all domains [air, land, maritime, space, and cyberspace] in both competition and armed conflict. This evolution has changed the way tactical, operational, and strategic intelligence capabilities support both national strategy and military operations. It also requires simultaneous, integrated, and synchronized intelligence operational planning and execution, at the speed and scale needed to avoid surprises, gain the advantage, and satisfy all types of intelligence consumers in near-real-time. Today's intelligence community has adapted our ability to seamlessly analyze, fuse, and share what was once domain-centric information into a single ecosystem that supports the national leadership and military commanders across all domains and all levels of competition/war. About the Speaker Col. Stephen Iwicki has served in the U.S. Intelligence community in both a military and industry capacity for the last 35 years. He began his intelligence career when he was commissioned as an Army Intelligence Officer in 1985 after an ROTC Scholarship for his undergraduate studies. Over the next 20 years, he served in positions of increasing responsibility with extensive experience in managing every facet of the intelligence process from raw intelligence collection and processing to strategic-level analysis supporting White House Cabinet members. He is experienced in employing both foreign and domestic intelligence capabilities in support of national security. IWP Admissions https://www.iwp.edu/admissions/ Support IWP https://interland3.donorperfect.net/weblink/WebLink.aspx?name=E231090&id=3

InSecurity
Chris Humphreys: Forest Gump Ain't Got Shit on This Guy

InSecurity

Play Episode Listen Later May 26, 2022 73:54


    “I'm like a dog chasing cars, I wouldn't know what to do if I caught one, you know, I just do…things.” -- The Joker, The Dark Knight, 2008, Jonathon and Christopher Nolan   Matt Stephenson welcomes Chris Humphreys to pm73media. How does a nice boy from Metro Washington DC start playing pro football (or soccer for you heathens) in England, then move on to multiple other international squads before landing in the United States Army as a linguist with a focus on security? After that... how does he become a leading expert for state and national cybersecurity initiatives? And just how many Pulp Fiction references can they make in a single show? Dig it...   About Chris Humphreys Chris Humphreys (@CBHumphreys) is the Founder and CEO of The Anfield Group Inc. which provides cybersecurity, regulatory, and technological strategic advisement to all Critical Infrastructure sectors. He is an internationally recognized thought leader and evangelist in the industry verticals of Cybersecurity, Critical Infrastructure Protection, Intelligence Operations, Data Privacy and Regulatory Compliance. With over 20 years of experience, Chris has written National-Level policy on cybersecurity and Critical Infrastructure Protection as well as served as the first Cyber Regulator for Electric Utilities within the Texas Region and across North America. Chris has provided testimony for both the Senate and House of Rep on Data Privacy regulation and as a Legislative Advisor for Cybersecurity and Data Privacy Regulation.   About Matt Stephenson My name is Matt Stephenson (@packmatt73) and I have hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. pm73media is my first solo endeavor. On this platform and others to come, I will continue to expand upon the tradition we started with the Insecurity podcast as I seek out the leading minds in the tech industry and beyond. I am always looking for fun people who may break things every now and again. In 20 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Whether in person, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of technology and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy. Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...   If you tuned in to any of my previous podcasts, there's great news…! pm73media is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!  

C Suite
Out of the Dox

C Suite

Play Episode Listen Later Mar 31, 2022 24:16


One of the most notable things about the internet is the double edged sword of anonymity. The internet allows many people the opportunity to explore interests or express their creativity anonymously, without having their actions tied to their true identity, yet it can also mean that bad actors can do serious harm to others without being tied to their wrongdoing. “Doxing” occurs when someone is “outed” online by having their true identity, often even including personal information like their phone number or home address shared publicly online. On this episode, we learn why cybercriminals might do this and how we can protect ourselves and our privacy while still reaping all the benefits of what the online world has to offer. We hear from John Boursheid, the co-founder of Removaly, an online data removal service he founded after his own experience with doxing. We also hear from Thomas, an avid member of the online gaming community who shares his own experiences with doxing, and Steve whose Customer Protection and Intelligence Operations team at TD works to protect TD customers and affiliates from online threats.

History Extra podcast
Spies in show business

History Extra podcast

Play Episode Listen Later Feb 21, 2022 34:49


Professor Christopher Andrew talks to Elinor Evans about his book Stars and Spies, co-written with Julius Green. He reveals the many historical links between spying and the entertainment industry that for centuries have helped intelligence operatives to hide in plain sight. (Ad) Christopher Andrew and Julius Green are the authors of Stars and Spies: The Story of Intelligence Operations and the Entertainment Industry (Bodley Head, 2021). Buy it now from Waterstones: https://go.skimresources.com?id=71026X1535947&xcust=historyextra-social-histboty&xs=1&url=https%3A%2F%2Fwww.waterstones.com%2Fbook%2Fstars-and-spies%2Fchristopher-andrew%2Fjulius-green%2F9781847925282 See acast.com/privacy for privacy and opt-out information.

The Geopolitical Pivot
African Sahel Terrorism Blurring Successful Military Intelligence Operations

The Geopolitical Pivot

Play Episode Listen Later Dec 3, 2021 16:34


Military Operations are not the sole answers to addressing Sahelian extremism

Gray Man: Hiding in plain sight
How Intelligence Operations Work in Everyday Life

Gray Man: Hiding in plain sight

Play Episode Listen Later Nov 12, 2021 28:11


Intelligence operations fall into two primary categories. How do they work? How can you use them in everyday life? Understand the differences in large scale operations and regular conversation. #grayman #podcast #Espionage In this episode: How to use the operations cycle in everyday life Send me an audio question: https://anchor.fm/grayman/message Intel Training: https://inteltrainingeducation.locals.com/ Facebook: https://www.facebook.com/graymanconcepts/ Twitter: https://twitter.com/GraymanConcepts MeWe: https://mewe.com/group/5f86120b3497c437e977aa59 Email: iamshammer@protonmail.com My Gear EV RE-20 https://amzn.to/2UqtpH6 Roadcaster Pro https://amzn.to/2QQtIbY Rode PSA1 Boom Arm https://amzn.to/3bBtPAx Speakers https://amzn.to/2PNzOfM Headphones https://amzn.to/2PQZibS Stream Deck https://amzn.to/3cgcv49 Check Out The Disagreeable Thoughts & Philosophies of DMR Publications https://anchor.fm/david-m-robertson Also dmrpublications.com Earn up to $500 when you get a new Capital One credit card https://capital.one/3sxepXq Support this podcast with a small monthly donation to help sustain future episodes @your link --- Send in a voice message: https://anchor.fm/grayman/message Support this podcast: https://anchor.fm/grayman/support

National Security This Week
Human Intelligence Operations (July 28th 2021)

National Security This Week

Play Episode Listen Later Nov 6, 2021 43:18


Host Jon Olson talks with retired CIA case officer David Sauer about Human Intelligence (HUMINT) operations. This episode originally aired on July 28th 2021.

National Security This Week
Intelligence Operations with Carmen Amato (Aug. 4th 2021)

National Security This Week

Play Episode Listen Later Nov 6, 2021 46:20


Host Jon Olson talks with noted crime thriller author and former CIA intelligence officer Carmen Amato about intelligence operations, the Western hemisphere, and her crime thriller novels. This episode originally aired on August 4th 2021.

The FourBlock Podcast
Strategic Threat Intelligence: Insights From a 32-Year Veteran and Intelligence Operations Expert

The FourBlock Podcast

Play Episode Listen Later Oct 11, 2021 32:55


This week on The FourBlock Podcast, we welcome FourBlock Atlanta alumnus turned coach Jose Fernandez, who now serves as the head of Strategic Threat Intelligence at Truist. A strategic threat intelligence and military veteran recognized as an expert practitioner in all aspects of intelligence operations, Jose served in the United States Army and the Georgia National Guard for a total of 32 years before retiring from service in 2018. In this episode, Jose joins co-host and FourBlock Founder Mike Abrams to talk about his time in service, his military-to-civilian transition, and his impressive career in cybersecurity. Jose provides in-depth insights about the cybersecurity industry, illuminates what some of his day-to-day responsibilities include in his role with Truist, and shares what he enjoys most about his current role and his career in cybersecurity. Jose also provides expert insights and advice for service men and women who are looking to begin a career in the growing cybersecurity industry after transitioning out of the military. Jose joined the U.S. Army in 1985 straight out of high school. He enlisted in the Infantry, went to Airborne School, and was then assigned to the 8th Infantry Division in Germany from 1985 to 1987. After his two-year tour, he joined the U.S. Army Central Command as a reservist. He was assigned to 3rd Army Headquarters G-3 as an Operations NCO, deploying to Saudi Arabia in support of Desert Storm / Desert Shield. After returning, Jose completed his bachelor's degree in Kinesiology and Exercise Science from Georgia State University. In 1996, he transitioned to the Army National Guard, where he was commissioned as a Military Intelligence Officer. Jose was also a firefighter in the Marietta Fire Department from 1998-2002. In 2002, Jose was brought into the Active Guard Reserve in the Georgia National Guard. His first assignment was the Aide-De-Camp for the Commanding General. In 2005-2006 he deployed to Iraq, where he served with the 205th Military Intelligence Brigade. As a Captain, he was responsible for over 70 tactical human intelligence teams spread out over Iraq, working with multiple units. Jose retired after serving for 32 years. He currently leads strategic threat intelligence for the cyber threat intelligence team at Truist. His team provides strategic level awareness of the cyber threat landscape to make informed strategic decisions to effectively and efficiently run a security function. Jose holds an M.S. in organizational leadership from Argosy University. Jose is an alumnus of FourBlock's Fall 2018 Veteran Career Readiness Program in Atlanta and now mentors other FourBlock veterans as the head Career Skills Coach for the Atlanta cohort.   ABOUT US Welcome to the FourBlock Podcast, a show that examines veteran career transition and the military-civilian divide in the workplace. General Charles Krulak coined the term "Three Block War" to describe the nature of 21st-century military service defined by peace-keeping, humanitarian aid, and full combat. But what happens next? Veterans are often unprepared to return home and begin new careers. We call this the Fourth Block.  FourBlock is a national non-profit that has supported thousands of transitioning service members across the nation in beginning new and meaningful careers.  Mike Abrams (@fourblock) is an Afghanistan veteran, founder of FourBlock, and author of two military transition books. He represents the military transition perspective. Lindsey Pollak (@lindsaypollak) is a career and workplace expert and New York Times bestselling author of three career advice books. Lindsey represents the civilian perspective of this issue.  Veterans, explore new industries and make the right connections. Find a career that fits your calling. Join us at fourblock.org/ Sponsor our program or host a class to equip more of our veterans at fourblock.org/donate. Follow FourBlock on Social Media  LinkedIn Facebook Instagram Twitter Podcast episodes are produced and edited by the Columbia University Center for Veteran Transition and Integration.  

Gray Man: Hiding in plain sight
Espionage Worldwide

Gray Man: Hiding in plain sight

Play Episode Listen Later Aug 26, 2021 28:55


Intelligence Operations, Terrorist Actions, and Espionage activities. In this episode: Africa, Pakistan, the Middle East, and around the world Send me an audio question: https://anchor.fm/grayman/message Intel Training: https://inteltrainingeducation.locals.com/ Facebook: https://www.facebook.com/graymanconcepts/ Twitter: https://twitter.com/GraymanConcepts MeWe: https://mewe.com/group/5f86120b3497c437e977aa59 Email: iamshammer@protonmail.com My Gear EV RE-20 https://amzn.to/2UqtpH6 Roadcaster Pro https://amzn.to/2QQtIbY Rode PSA1 Boom Arm https://amzn.to/3bBtPAx Check Out The Disagreeable Thoughts & Philosophies of DMR Publications https://anchor.fm/david-m-robertson Also dmrpublications.com Get up to 100,000 bonus points are your new Chase Sapphire card https://www.referyourchasecard.com/6b/Q0TQYRL68B Support this podcast with a small monthly donation to help sustain future episodes @your link --- Send in a voice message: https://anchor.fm/grayman/message Support this podcast: https://anchor.fm/grayman/support

The KYMN Radio Podcast
National Security This Week with Carmen Amato, 8-4-21 (Intelligence Operations)

The KYMN Radio Podcast

Play Episode Listen Later Aug 5, 2021 46:20


Host Jon Olson talks with noted crime thriller author and former CIA intelligence officer Carmen Amato about intelligence operations, the Western hemisphere, and her crime thriller novels. National Security This Week airs Wednesdays at 9am. Find more great programs like this one at https://kymnradio.netand subscribe to The KYMN Radio Podcast for a mix of Northfield news, high school sports, and great music. Connect: Subscribe to The KYMN Radio Podcast Here Find the latest Northfield Area News Here Follow us on Facebook & Twitter Listen live on 95.1 FM, 1080 AM or online here

1080 KYMN Radio - Northfield Minnesota
National Security This Week with David Sauer, 7-28-21 (Human Intelligence Operations)

1080 KYMN Radio - Northfield Minnesota

Play Episode Listen Later Jul 28, 2021


Host Jon Olson talks with retired CIA case officer David Sauer about Human Intelligence (HUMINT) operations.

CSO Perspectives (public)
Cybersecurity first principles: Intelligence operations.

CSO Perspectives (public)

Play Episode Listen Later Jul 5, 2021 24:49


This is the seventh show in a planned series that discusses the development of a general purpose cybersecurity strategy for all network defender practitioners - be they from the commercial sector, government enterprise, or academic institutions - using the concept of first principles. First principles Zero trust Intrusion kill chains Resilience DevSecOps Risk assessment We are building a strategy wall, brick by brick, for a cyber security infosec program based on first principles. The foundation of that wall is the ultimate and atomic first principle: Reduce the probability of material impact to my organization due to a cyber event. That's it. Nothing else matters. This simple statement is the pillar, on which we can build an entire infosec program. This next building block will start the second course of the wall because it directly supports all of the other strategic bricks we have already laid. This brick is called cyber threat intelligence operations.

What The Politics?! (WTP)
Cyber Security – extremist groups, social media and personal privacy

What The Politics?! (WTP)

Play Episode Listen Later Feb 2, 2021 27:00


Cybersecurity expert Bryce Webster-Jacobsen joins the podcast. Webster-Jacobsen is the Director of Intelligence Operations at GroupSense, an information security company based out of Washington D.C.

SPOTLIGHT Radio Network
D/Sgt. Michael Teachout, Michigan State Police Intelligence Operations Division, Cyber Section

SPOTLIGHT Radio Network

Play Episode Listen Later Jan 26, 2021 30:23


Michigan's Big Show
D/Sgt. Michael Teachout, Michigan State Police Intelligence Operations Division, Cyber Section

Michigan's Big Show

Play Episode Listen Later Jan 26, 2021 30:23


Brief Before Impact
EPISODE#2 SOCIAL MEDIA INTELLIGENCE OPERATIONS

Brief Before Impact

Play Episode Listen Later Jan 12, 2021 16:52


Today we discuss how countries like China, Russia, and Iran attempt to manipulate and influence free and fair elections in the US.

Brief Before Impact
EPISODE#1 CHINESE INTELLIGENCE OPERATIONS

Brief Before Impact

Play Episode Listen Later Jan 11, 2021 16:21


Today we discuss the recent reporting of a Chinese intelligence operation which targeted American politicians

OODAcast
Episode 48: Ric Prado on Intelligence Operations and a Legendary Career in the CIA

OODAcast

Play Episode Listen Later Jan 5, 2021 47:53


Ric Prado has been described by CIA leadership as the closest thing to 007 that the United States has ever had. Ric's life is packed with more adventure and operations than your favorite spy novel series. Coming out of the shadows, this is Ric's first video interview and covers his career, operational decision-making lessons learned, why we need a next generation of CIA agents, and we even dive into some more obscure topics like CIA knife fighting and how he came to train the King of Jordan. Arriving in the United States as a Peter Pan refugee from Cuba, Prado dedicated himself in service to his county in many capacities that culminated professionally with a 24 year career in the Central Intelligence Agency (CIA). During his tenure at the CIA, Ric was involved with dozens of operations including spearheading the CIA's operational response to 9/11 as the Director of Operations within the CIA's Counterterrorism Center. For this response he worked with the National Security Council and FBI, as well as with elite U.S. military representatives from Delta Force and SEAL Team Six. Earlier in his Agency career his service included 36 months in Central America jungles as the first CIA officer living in the anti-Sandinista "Contra" camps and Subsequently running counter-terrorism/insurgency operations in Peru and in the Philippines. He has also held operations officer posts in six countries and was a plank-owner of the CIA's original bin Laden desk in 1996. Upon leaving public service, Ric worked at as an executive at a Private Military Contractor where he built a specialized operations team for a U.S. government customer and is currently the co-owner of Camp-X Training and continues his service training and supporting the "SPECOPS" Community as Subject Matter Expert (SME) at the SWCS' ASOT (Advanced Special Operations and Techniques) and ASOT Managers Course, Dragon Warrior, Emerald Warrior, among others. Additional Links: Ric's Bio CampX training

Cutting Through the Matrix with Alan Watt Podcast (.xml Format)
Nov. 15, 2020 "Cutting Through the Matrix" with Alan Watt (Blurb, i.e. Educational Talk): "All Hail The Elect, Self-Anointed, Self-Appointed" *Title and Dialogue Copyrighted Alan Watt - Nov. 15, 2020 (Exempting Music and Literary Quotes)

Cutting Through the Matrix with Alan Watt Podcast (.xml Format)

Play Episode Listen Later Nov 15, 2020 278:44


--{ "All Hail The Elect, Self-Anointed, Self-Appointed: See the World in Flux, Layered Realities, Spinning, The Rich Ones Celebrating, Placing Bets on Winning, A Warfare Campaign of Terror Waged Upon our Sanity, Achieving True Domination, Feeding Master's Vanity, We're the New-Clear Generation, Nothing to be Hidden, Full-Spectrum Dominance, Facts, Thoughts Forbidden, Out of Directed Chaos, Their New Order Will Arise, They'll Only Rule to Help, With Father of All Lies."© Alan Watt }-- Scripted Reality - News to Shape Your Mind - Police Uniforms, Black, Military Fatigues - Winston Churchill - Civil Servants, Politician, Propaganda, PR, Public Relations - Francis Bacon, Machiavelli - Documentary about Unabomber; Making Scientists into Stars - Man, Myth and Magic - Programmed by Fiction - Soviets, Beria, Behaviourism - Television, Coronation Street - Lifelong Education - The Visual Language - Roger Bacon, Franciscan Monk, Gunpowder, Cannon - The Club of Rome, The Great Reset, World Economic Forum, Agenda 21 - SAGE - A Wartime Scenario; Lockdown - You are the Enemy; Military Propaganda Used on Citizens - Populism, Nationalism - Please DONATE and ORDER at www.cuttingthroughthematrix.com - Greek Mythology; The Gods Play with Humans - Tower of Babel - Soros, Sustainability, Climate Change - Covid, BLM, Antifa, Riots, Looting, Burning Down Businesses, Shooting Folk for Wearing MAGA Hat, Lockdowns, Unemployment - Rationing, A Whole New Way of Existing; You're Living Through the Great Reset - Do You Really Think You'll Get Honest Elections? - Movies, The Hunger Games; The Tenth Victim (1965); Sci-Fi Fantasy Musical about Eugenics, Just Imagine (1930) - Put Off Your Guard by Comedies - CIA, Intelligence Agencies, Trained to Terrify the Populace - Population Control - Totalitarian Systems; The More You Grovel, the More They Despise You - Culture Industry; Music, Gender-Neutral Pronouns - Albert Pike, Never Start a Revolution Prematurely; It Takes Years to Prepare a Revolution, Intelligence Operations, Private Businesses, Social Networks, Internet, Psy-Ops - Cell Phones, Apps, Contact Tracing - Who Do You Complain To? - Documentary about Fallout from a Nuclear Strike; Bioethics - You are Ruled by Deception - Austerity - NY Bar Association Recommends Mandatory COVID-19 Vaccine - Australians Could be Forced into Treatment - Christmas Still at Risk, SAGE - NSW Senior Constable Alexander Cooney, Sought to 'raise the alarm that a global dictatorship is occurring' - 500 Medics and Academics Letter to Boris Johnson, Official Covid Data is "exaggerated" - UK, Boris Johnson to Meet Bill Gates to Plan National Vaccine Rollout - Real Socialism is for the Elite; George Bernard Shaw - Joe Biden Coronavirus Adviser Dr. Zeke Emanuel - Julian Huxley, UNESCO - German Doctors Letter to Chancellor Merkel, Put an End to the Covid “Fear Machine” - Movie, No Blade of Grass; Book, Make Room, Make Room (Became Movie, Soylent Green); The Message that There are Too Many of You - Smartphone App can Hear in Cough the Difference between Asthma or Croup - EU Mulls Ways for Police to Access Encrypted Apps - US and UK Intel Agencies Declare Cyber War on Independent Media - George Soros, Remarks Delivered at the World Economic Forum, Davos, Switzerland, January 23, 2020; Populism - Canadian Military to Use Propaganda to Influence Canadians - Justin Trudeau, Sustainable Development, Covid has Provided Opportunity for a Reset - CDC, NCHS, New ICD Code for Reporting Deaths, COVID-19 - UK, Firms Banned from Advertising Junk Foods - WEF, Own Nothing and Be Happy; Klaus Schwab - Wellness - Event 201 Pandemic Exercise - GCHQ Spies Launch Cyber Counter-Attack Against Anti-Vaccine Propaganda - Eliminating Free Speech - Glenn Greenwald, Deep State, Silicon Valley, Media - WHO Taps ‘Anti-Conspiracy' Crusader to Sway Public Opinion on COVID Vaccine, Cass Sunstein - SAGE and the UK Media - Facts don't Matter - Hold onto Your Sanity - Pavlov - You are All Important - Don't Be Terrified into Immobility - Don't Lose Hope - Christmas and the New Year, a Time of Reflection - Keep in Touch. *Title and Dialogue Copyrighted Alan Watt - Nov. 15, 2020 (Exempting Music and Literary Quotes)

Task Force 7 Cyber Security Radio
Ep. 154: Inside the World of Threat Intelligence Operations

Task Force 7 Cyber Security Radio

Play Episode Listen Later Oct 19, 2020 54:36


Most people understand the role that intelligence operations play in government organizations. For instance, most people have a general idea of what three letter agencies like the CIA and the NSA do for the United States. But why do Fortune 500 Companies need Threat Intelligence Operations? The Sr. Director of Cyber Intelligence Strategy for Anomali, Mr. A.J. Nash, appears on Episode #154 of TF7 Radio to explain what Threat Intelligence is, why Fortune 500 Companies need it to be successful, what are the common operational mistakes made by executives when building Threat Intelligence Teams, and where the Threat Intelligence Market is headed in 2021.

Task Force 7 Cyber Security Radio
Ep. 154: Inside the World of Threat Intelligence Operations

Task Force 7 Cyber Security Radio

Play Episode Listen Later Oct 19, 2020 54:36


Most people understand the role that intelligence operations play in government organizations. For instance, most people have a general idea of what three letter agencies like the CIA and the NSA do for the United States. But why do Fortune 500 Companies need Threat Intelligence Operations? The Sr. Director of Cyber Intelligence Strategy for Anomali, Mr. A.J. Nash, appears on Episode #154 of TF7 Radio to explain what Threat Intelligence is, why Fortune 500 Companies need it to be successful, what are the common operational mistakes made by executives when building Threat Intelligence Teams, and where the Threat Intelligence Market is headed in 2021.

Planet Vrilock Psionics and Magick
Pentacles Intelligence Operations

Planet Vrilock Psionics and Magick

Play Episode Listen Later Oct 13, 2020 13:25


Honorary Herr Doktor von Vrilock lectures on the best methods for working with magick pentacles of intelligence, power, and how to apply psionics!  For a limited time you may apply for a membership in the Psionic Brotherhood! Just $29.99/ month! Join the Psionic Brotherhood by training in the Vrilock Insiders Club!Together we will... KEEP THE MAGICK HIGH! Vrilock signing out!P.S. Patron the Vrilock Psionics Shop and try something new tonight!

The Chicago Civil War Round Table Monthly Meetings
Nov 2014 - Steve Towne on Detecting Deserters and Disloyalty: U.S. Army Intelligence Operations in the Midwest during the Civil War - Chicago Civil War Round Table Monthly Meeting

The Chicago Civil War Round Table Monthly Meetings

Play Episode Listen Later Sep 25, 2020 49:51


Date: November 10, 2014 Speaker: Steve Towne Topic: Detecting Deserters and Disloyalty: U.S. Army Intelligence Operations in the Midwest during the Civil War - Chicago Civil War Round Table Monthly Meeting

Wealthy Wellthy Wise
187 - Spy Secrets With Jason_Hanson

Wealthy Wellthy Wise

Play Episode Listen Later Sep 18, 2020 54:17


Have you ever wondered what it would be like to be a spy? I dreamed about being a spy growing up and have been fascinated by that world ever since.    How does that knowledge transfer over to the business world you might ask? It comes down to knowing your surroundings and doing your research.    The skills that you need to learn to be a spy will get you out of your comfort zone. They help teach you the subtle art of persuasion and deal-making. You learn how to take calculated risks, mitigate the fallout, and cut through everyday noise to focus intently.    Our guest today is Jason Hanson,  a former CIA operative turned business entrepreneur. He founded  Spy Escape & Evasion in 2010. Jason won a deal on ABC’s hit reality series, Shark Tank, and he’s a New York Times Best Selling Author with his book Spy Secrets That Can Save Your Life. He lives on“Spy Ranch,” a 320-acre facility where he teaches spy skills like Evasive Driving, Pistol, and Rifle Shooting, Intelligence Operations, Cyber Security, and more. Jason has a new book out called Survive Like a Spy.. Jason has been featured on The NBC Today Show, Dateline, Rachael Ray, Fox & Friends, Forbes, NPR, and The Huffington Post among others.   Here are some the intriguing topics we talk about: How to Build Rapport Benefits of Doing Deep Research The Art Of Persuasion The Entrepreneur Mindset Strategic Alliances Mental Triggers Playing The Long Game SADR Cycle (Spotting Accessing Developing Recruiting) Boundaries Cyber Security Enjoy This Episode With Jason Hanson!

The Institute of World Politics
Overlaps between Cyber, Information, and Intelligence Operations

The Institute of World Politics

Play Episode Listen Later Jun 18, 2020 47:46


This event is part of The Cyber Intelligence Initiative Series sponsored by The Institute of World Politics. About the lecture: A discussion of the challenges presented by the increasingly complex environment created when cyber, information, and intelligence operations overlap and collide. This presentation will explore case studies where the lines between various concepts become blurred, complicating the response and implications. Specifically, we will explore recent items of interest from the increasingly contentious relationship between the US, Russia, and China. How will leaders and managers operative effectively in this environment? What are the important aspects of decision-making in these situations? Why is it even important to get a handle on these dynamics? About the speaker: Jason Atwell is a Specialist Master and Manager with Deloitte's Government and Public Sector Cyber Risk Advisory practice and an intelligence officer in the US Army Reserve. Over the last few years, he has served as a senior advisor to the CIOs of the US House of Representatives, the Department of Health and Human Services, and the National Institutes of Health helping to navigate the increasingly complex cyber threat environment. During his career he has been a key member of military and civilian staffs conducting civil-military operations in Baghdad, solving complex geospatial problems for the DIA, and working to counter foreign intelligence and influence operations at the US Department of State. He has lectured on Russian information operations at the National Defense University, Iranian use of social media as an enabler at the Office of the Director of National Intelligence, and cyber threats to supply chains at the Joint Counterintelligence Training Center. His education includes a Master's degree in English Literature from American University and a fellowship in cyber leadership from Yale. He is also a graduate of both the US Army Intelligence School and John F. Kennedy Special Warfare Center and completed coursework at the National Intelligence University.

E.n.d.i.e. Fiya
Endie Fiya: LIVE with Authoress & Motivational Speaker ~ LaVonna D. Moore

E.n.d.i.e. Fiya

Play Episode Listen Later Jun 18, 2020 67:00


The Authoress, LaVonna D. Moore, MBA is a native of Newport News, VA. She served in the U.S. military for 21 years and is currently a Project Manager in Augusta, GA. She possesses numerous degrees to include an AAS in Intelligence Operations, a BA in Terrorism Studies, and a Master's in Business Administration (MBA). She plans to pursue her Doctoral degree in Education with aspirations of establishing her own STEM charter school in the state of Georgia. Ms. Moore excelled in the military by obtaining numerous senior level positions. Her dedication to people is evident in everything she does, as she is a devout mother of three, entrepreneur, authoress, combat veteran, and aspiring educator. Her accomplishments and accolades are many, specifically, she is a member of the National Society of Leadership and Success (Sigma Alpha Pi), she is also a member of various greek and fraternal organizations to include: Kappa Epsilon Psi, Military Sorortity, Inc., The Southwestern Buffalo Soldiers Association, Order of the Eastern Star, P.H.A, American Legion, and Veterans of Foreign Wars (VFW), all organizations that regularly uplift and inspire many through their numerous community service and outreach efforts. She has served as a senior mentor in the military and established Success Networking Teams (SNT)s within various organizations in an effort to inspire and mentor female Soldiers, resulting in her being awarded the Active Duty Servicewoman of the Year award from the State of Georgia, American Legion Chapter Unit 192. She has received some of the highest awards from the military to include the Bronze Star Medal and Knowlton Award for her dedication and contributions to the Military Intelligence Corps. Her passion, drive, and resilience is a living testimony that it is possible to #BreakThaCeiling Her vision is simple: Encourage Excellence, Inspire Change, and Shape the Future through Enlightenment.

How to Be Awesome at Your Job
450: Spy Secrets of Influence from Former CIA Officer Jason Hanson

How to Be Awesome at Your Job

Play Episode Listen Later Jun 12, 2019 42:09


Jason Hanson shares his intelligence operation secrets to “recruiting” people and convincing them to say yes.   You'll Learn: The CIA’s SADR cycle and how it applies to the workplace Why research and authenticity are integral to successful influence How to advocate for your case at work   About Jason: Jason is a former CIA officer. After leaving the CIA, Jason became the Founder and CEO of Spy Escape & Evasion (www.spyescape.com), a company that teaches men and women how to be safe using Spy Secrets that 99% of Americans will never know. In 2014, Jason won a deal on ABC’s hit Reality Series, Shark Tank and opened, “Spy Ranch,” a 320-acre facility to teach Evasive Driving, Pistol and Rifle Shooting, Intelligence Operations, Cyber Security and more. Jason regularly appears as a Keynote Speaker at corporate events, conferences and conventions worldwide. Jason has appeared on The NBC Today Show, Dateline, Rachael Ray, Fox & Friends, and more. Jason has been interviewed by Forbes, NPR and The Huffington Post among others.   View transcript, show notes, and links at http://AwesomeAtYourJob.com/ep450

The Lawfare Podcast
John Sipher on Mueller's Report on Russian Intelligence Operations

The Lawfare Podcast

Play Episode Listen Later May 11, 2019 49:58


The Mueller report is out, all 448 pages of it, and its first volume tells a detailed story of Russian involvement in the 2016 U.S. presidential election. The report recounts the Internet Research Agency’s trolling and disinformation campaign. It explains the GRU’s hacking and email dissemination operation. And it details 100 pages of interactions between Trump campaign affiliates and Russian nationals. To better understand whether and to what extent the public should understand those interactions as part of a deliberate Russian operation to make contact with the Trump campaign, earlier this week, Benjamin Wittes spoke to John Sipher, who ran Russia operations for the CIA in Moscow. They talked about how Sipher read the Mueller report, the respective roles of the CIA and the FBI in counterintelligence investigations and operations, and whether an investigation like Mueller’s really had a chance of understanding the full scope of Russia’s intentions and activities in the 2016 election.

Federal Drive with Tom Temin
Cyber threats ‘blurring' line between agencies' foreign, domestic intelligence operations

Federal Drive with Tom Temin

Play Episode Listen Later Sep 6, 2018 8:07


Several federal agencies responsible for securing the government's networks want to collaborate more. Cyber officials from the FBI, the Department of Homeland Security and the National Counterterrorism Center say partnerships, including with industry, can help them stay ahead of emerging cyber threats. Federal News Radio's Jory Heckman had more on Federal Drive with Tom Temin.

Risk Roundup
Electronic Warfare Preparedness

Risk Roundup

Play Episode Listen Later Mar 29, 2018 47:58


Prof. (Dr) Harry Nimon, a career STRATINT officer with years of experience in Intelligence Operations, author of over 30 published reports and textbooks, a consultant in warfare operations, counter-terrorism, and human-machine interaction for DoD, DIA, IOC, and various other organizations participates in Risk Roundup to discuss – Electronic Warfare Preparedness. Electronic Warfare Preparedness Today, there […] The post Electronic Warfare Preparedness appeared first on Risk Group.

CERIAS Security Seminar Podcast
Bob Cheripka, Advanced Testing Assessments in the Power & Utilities Industry

CERIAS Security Seminar Podcast

Play Episode Listen Later Sep 13, 2017 47:21


This first portion of the presentation will explore the emerging cyber threats facing the industrial control systems network environments with a focused look at the Power & Utility industry. It will then discuss the challenges faces advanced technical testing (i.e., Attack & Penetration Testing and Red Teaming) within this environment. The first section concludes with a discussion of current testing approaches and in the face of the above challenges, why testing remains an important capability in this space. The second portion of the presentation will present a proposed approach for performing Advanced Testing Services in this environment as well as discussing the legal and security implications of testing in this environment. About the speaker: Bob is a Senior Manager in Deloitte Advisory's Cyber Risk Services and has been with the firm for over six years, coming to us with over 13 years of experience in Computer Network Defense Operations and over 5 years of Intelligence Operations, while working for the United States Army. Bob's area of expertise is highly diversified and includes both technical and operational experience across the following areas:• Attack and Penetration Testing (Including Network, Application, Wireless, Social Engineering, Red Teaming, and Physical Security)• InformationSecurityandAssurancePlanning/Implementation• Security Maturity Assessments• Public Key Infrastructure Program Implementation• Cyber Watch Center Operations, Design, and Implementation• Log Management and Security Information Event Monitoring (SIEM) Implementation andManagement• Crisis Action Team Design, Planning, Implementation, and Execution• Cyber Threat Intelligence and Defense Program Development/Implementation.

Snack Break with Aroop
Paul Mauro - Intelligence at the NYPD

Snack Break with Aroop

Play Episode Listen Later Jun 25, 2017 17:11


Host Aroop Mukharji interviews Deputy Inspector Paul Mauro, Executive Officer of Intelligence Operations and Analysis at the NYPD, about intelligence collection in the age of encryption, local and federal intelligence coordination, and halwa.

Congressional Dish
CD141: Terrorist Gifts & The Ministry of Propaganda (2017 NDAA)

Congressional Dish

Play Episode Listen Later Dec 25, 2016 106:50


The 2017 National Defense Authorization Act grants permission for next year's wars. In this episode, we look at how the new law, in partnership with a reckless Executive Order, will provide weapons to terrorists and legalize American wars fought with foreign humans. Also in this episode, learn about the new Ministry of Propaganda (the "Global Engagement Center") that the United States will open in July. Please support Congressional Dish: Click here to contribute with PayPal or Bitcoin; click the PayPal "Make it Monthly" checkbox to create a monthly subscription Click here to support Congressional Dish for each episode via Patreon Mail Contributions to: Congressional Dish 5753 Hwy 85 North #4576 Crestview, FL 32536 Thank you for supporting truly independent media! Bill Highlighted in This Episode National Defense Authorization Act for Fiscal Year 2017 Explanatory Statement Title III—Operation and Maintenance Subtitle B—Energy and Environment   Sec. 312. Waiver authority for alternative fuel procurement requirement. The Secretary of Defense can waive the requirement that Federal agencies only purchase alternative fuels if the greenhouse gas emissions are equal or lower to the conventional fuel typically used, as long as he notifies Congress. Sec. 316. Sense of Congress on funding decisions relating to climate change. “It is the sense of Congress that... "decisions relating to the funding of the Dept. of Defense … should prioritize the support and enhancement of the combat capabilities of the Dept" funds should be allocated among the programs of the Dept in the manner that best serves the national security interests of the US decisions relating to energy efficiency, energy use, and climate change should adhere to the principles described above Title VI—Compensation and Other Personnel Benefits Subtitle A—Pay and Allowances     Sec. 601. Fiscal year 2017 increase in military basic pay. Effective January 1, 2017, the rates of monthly basic pay for military members is 2.1 percent Sec. 604. Reports on a new single-salary pay system for members of the Armed Forces. Gives the Defense Dept one year to report to Congress on a new pay structure: A “single salary system,” which will take effect on January 1, 2018.   Subtitle E—Commissary and Nonappropriated Fund Instrumentality Benefits and Operations     Sec. 661. Protection and enhancement of access to and savings at commissaries and exchanges. They are going to test a "variable pricing program” which would price commissary goods “in response to market conditions and customer demand" Sec. 662. Acceptance of Military Star Card at commissaries.       Subtitle F—Other Matters     Sec. 671. Recovery of amounts owed to the United States by members of the uniformed services. Allows the Secretary of Defense is allowed to waive collections of overpayments to military service members if the collection starts over 10 years after the overpayment occurred. The Defense Department will conduct a review of the bonuses paid to California National Guard members from 2004 - 2015, determine how many bonuses were awarded improperly, and determine which ones will be granted a repayment waiver. Waivers will be denied only if the board can make an affirmative determination that the member “knew or reasonably should have known that the member was ineligible for the bonus pay”   Title VII—Health Care Provisions Subtitle A—Reform of TRICARE and military health system     Sec. 701. TRICARE Select and other TRICARE reform. Creates TRICARE Select: “Eligible beneficiaries will not have restrictions on the freedom of choice of the beneficiary with respect to health care providers.” Cost sharing table   Title VIII—Acquisition Policy, Acquisition Management, and Related Matters Subtitle F—Provisions Relating to Commercial Items     Sec. 874. Inapplicability of certain laws and regulations to the acquisition of commercial items and commercially available off-the-shelf items. Exempts the purchase of “commercial items” from a bunch of procurement laws Sec. 876. Preference for commercial services. Prohibits defense agencies from entering into contracts for services that are NOT commercial services, unless it’s determined in writing that there are no commercial services available. Subtitle G—Industrial Base Matters Sec. 881. Greater integration of the national technology and industrial base. Orders a written plan to be completed by the end of 2017 to” reduce the barriers to the seamless integration between the persons and organizations that comprise the national technology and industrial base" Entities to be “integrated” include government entities, universities, nonprofits, and private contractors (including weapons manufacturers) operating in the United States, Canada and (added) the UK, Northern Ireland, and Australia. Title IX—Department of Defense Organization and Management Subtitle B—Organization and Management of the Department of Defense Generally   Sec. 915. Repeal of requirements relating to efficiencies plan for the civilian personnel workforce and service contractor workforce of the Department of Defense. Repeals the requirement that the Secretary of Defense have policies and procedures to determine the most appropriate cost efficient mix of military, civilians, and contractor personnel to perform the mission of the Dept. of Defense.   Title X—General Provisions Subtitle B—Counterdrug Activities   Sec. 1011. Codification and modification of authority to provide support for counterdrug activities and activities to counter transnational organized crime of civilian law enforcement agencies. "The Secretary of Defense may provide support for the counter drug activities… of any department or agency of the Federal Government or of any State, local, tribal, or foreign law enforcement agency for…: "Training of law enforcement personnel of the Federal Government, of State, local, and tribal governments…" “Intelligence analysis services" “Aerial and ground reconnaissance” Sec. 1013. Extension of authority to support unified counterdrug and counterterrorism campaign in Colombia. Extended through 2019   Subtitle D—Counterterrorism   Sec. 1032. Prohibition on use of funds for transfer or release of individuals detained at United States Naval Station, Guantanamo Bay, Cub, to the United States.   Sec. 1033. Prohibition on use of funds to construct or modify facilities in the United States to house detainees transferred from United States Naval Station, Guantanamo Bay, Cuba.   Sec. 1034. Prohibition on use of funds for transfer or release to certain countries of individuals detained at United States Naval Station, Guantanamo Bay, Cuba. Specifically prohibits transferring anyone to Libya, Somalia, Syria, or Yemen. Sec. 1035. Prohibition on use of funds for realignment of forces at or closure of United States Naval Station, Guantanamo Bay, Cuba.     Subtitle G—Other Matters     Sec. 1090. Cost of Wars. Secretary of Defense needs to post the costs of each the Afghanistan, Iraq, and Syria wars onto a public website. No due date or web address.   Title XII—Matters relating to foreign nations Subtitle A—Assistance and training   Sec. 1201. One-year extension of logistical support for coalition forces supporting certain United States military operations.   Sec. 1202. Special Defense Acquisition Fund matters. Authorizes the amount of money appropriated to the fund to more than double, from $1.07 billion to $2.5 billion. $500 million must be to purchase precision guided munitions for partner and allied forces   Sec. 1203. Codification of authority for support of special operations to combat terrorism. The Defense Secretary is allowed to spend $100 million per year to “support foreign forces, irregular forces, groups, or individuals engaged in supporting or facilitating ongoing military operations by United States special operations forces to combat terrorism" The money will come from the money appropriated for operations and maintenance  Repeals a provision from the 2005 NDAA that provided $25 million a year for this purpose   Subtitle B—Matters relating to Afghanistan and Pakistan   Sec. 1218. Extension and modification of authority for reimbursement of certain coalition nations for support provided to United States military operations. The United States can use $1.1 billion to pay any country that helps our military operations in Afghanistan, Iraq, and Syria, and the United States can pay Pakistan for “activities meant to enhance the security situation in the Afghanistan-Pakistan border region and for counterterrorism"   Subtitle C—Matters relating to Syria, Iraq, and Iran   Sec. 1221. Modification and extension of authority to provide assistance to the vetted Syrian opposition. Extends the authority to “provide assistance to the vetted Syrian opposition” until December 31, 2018. Sec. 1224. Limitation on provision of man-portable air defense systems to the vetted Syrian opposition during fiscal year 2017. State Dept: “Countering the proliferation of Man-Portable Air Defense Systems is a top U.S. national security priority. In the hands of terrorists, criminals, or other non-state actors, MANPADS - also known as shoulder-fired anti-aircraft missiles - pose a serious threat to passenger air travel, the commercial aviation industry, and military aircraft around the world. The United States is working closely with numerous countries and international organizations to keep the skies safe for all." The 2015 NDAA authorized the transfer of “man-portable air defense system” or “MANPADs” to the “vetted Syrian opposition”. They are allowed to continue to do so after a 30-day waiting period if a report is submitted to Congress   Subtitle D—Matters relating to the Russian Federation     Sec. 1233. Extension and modification of authority on training for Eastern European national military forces in the course of multilateral exercises. Amends Section 1251 of the 2016 NDAA to extend the authority to pay to train “national security forces” in “multilateral exercises” through 2018. Adds the European Reassurance Initiative to the list of authorized activities, although it has been renamed the “European Deterrence Initiative” This training is allowed to go to NATO countries and “countries that are a signatory to the Partnership for Peace Framework Documents, but not a member of NATO” Sec. 1237. Extension and enhancement of Ukraine Security Assistance Initiative. Increases the amount allowed to be spent on “security assistance” to Ukraine by $50 million, up to $350 million A minimum of $50 million MUST be spent on “Lethal assistance” including anti-armor weapon systems, mortars, grenade launchers,  small arms, and ammunition This NDAA adds equipment and technical assistance for a border surveillance network for Ukraine to the list of authorized uses of funding $175 million will be withheld until the Secretary of State certifies that Ukraine has taken steps towards reforms including civilian control of their military and “potential opportunities for privatization in the defense industrial sector”   Subtitle E—Reform of Department of Defense Security Cooperation     Sec. 1241. Enactment of new chapter for defense security cooperation. Repeals the authorization from the 2012 NDAA that allowed civilian employees of the DoD to be “advisors” to foreign defense ministries Inserts a new chapter into law outlining procedures for training and equipping foreign militaries The training can be for the following purposes: Counterterrorism Counter weapons of mass destruction Counter-drug trafficking operations Repeals a law limited the support that can be provided to Columbia & Peru Counter organized crime Border security Intelligence “Operations or activities that contribute to an international coalition operation that is determined by the Secretary to be in the national interest of the United States” Repeals the law that authorizes programs only for counter-terrorism, support of on-going military operations, and border security. The Secretary of Defense and Secretary of State will develop and plan train and equip programs together Repeals the law saying that the Secretary of State will be responsible for coordinating development activities The Secretary of Defense is allowed to change the definition of “developing country” “from time to time” The Director of the Defense Security Cooperation Agency will be responsible for “all security cooperation programs" The train and equip programs are authorized to provide “defense articles”, training, “defense services”, supplies, and construction valued under $750,000 per project. The “support” programs are limited to five years unless a written justification for extending it is provided or if funding is shifted to another part of the government or another country. 2017 Funding: Will come from: The Operations and Maintenance account, the “defense-wide” section and “Defense Security Cooperation” section = $6.6 billion + $621 million = $7.2 billion Funds for “Drug Interdiction and Counter-Drug Activities, Defense-Wide” = $720 million Funds for “Operations and Maintenance, Defense-wide, for overseas contingency operations” and money for the “Defense Security Cooperation Agency” = $7.1 billion Money appropriated for the “Counter-ISIL fund" in Iraq and Syria can be spent in countries other than Iraq and Syria as long as Congress is told = $1.1 billion Funds for “Drug Interdiction and Counter-Drug Activities, Defense-Wide for overseas contingency operations” = $191 million + $24 million = $215 million Money made available in previous years = unknown Total = At least $16.3 billion   Subtitle H—Other matters     Sec. 1281. Enhancement of interagency support during contingency operations and transition periods. The Secretaries of Defense and State can enter an agreement to swap “support” to each other’s departments during and up to two years after any “contingency operation" “Support” = food, transportation, petroleum, oils, communication services, medical services, ammunition, base operations support, use of facilities, spare parts, and maintenance services. Sec. 1285. Limitation on availability of funds to implement the Arms Trade Treaty. Prohibits any funds being used to implement the Arms Trade Treaty, which is a 2013 UN treaty designed to regulate and limit the international weapons trade. We signed it in September. Sec. 1287. Global Engagement Center By mid-June 2017, the Department of State will create a Global Engagement Center Purpose: “To lead, synchronize, and coordinate efforts of the Federal Government to recognize, understand, expose, and counter foreign state and non-state propaganda and disinformation efforts aimed at undermining United States national security interests” Functions Track and evaluate stories abroad that threaten the interests of the US and the US allies and partner nations. Support the creation and distribution of “fact-based narratives” to counter propaganda and disinformation directed at the United States, our allies, and partner nations. Promote “fact-based narratives” to audiences outside the United States The head of the Global Engagement Center will be appointed by the President Any Federal Government employee may be assigned to the Global Engagement Center for a maximum of three years. The State Department can hire domestic and foreign contractors to work for the Global Engagement Center for a maximum of four years each, with a maximum of 50 employees The Global Engagement Center can pay (“provide grants”) to “civil society groups, media content providers, nongovernmental organizations, federally funded research and development centers, private companies, or academic institutions” to: Collect and store examples in print, online, and on social media of disinformation and propaganda directed at the US, its allies, and partners. To “counter efforts” to use information to influence the policies and stability of the United States, it’s allies and partner nations. The Global Engagement Center will end in December 2024 (8 years after enactment) Sec. 1288. Modification of United States International Broadcasting Act of 1994.   The Broadcasting Board of Governors is a global media agency tasked with “informing” other countries in a way that pursues US national interests (aka: our propaganda networks). BBG networks include: Voice of America Radio Free Europe/ Radio Liberty Office of Cuba Broadcasting Radio Free Asia Middle East Broadcasting Networks Changes made by NDAA The head of the Broadcasting Board of Governors will be a Chief Executive Officer, appointed by the President, instead of a Director who has been appointed by the Board. Extends immunity from civil liability to all board members at Radio Free Liberty/Radio Liberty, Radio Free Asia, the Middle East Broadcasting Networks, or “any organization that consolidates such entities” Sec. 1294. Extension and expansion of authority to support border security operations of certain foreign countries. The 2016 NDAA authorized $150 million per year for each Jordan and Lebanon for border security “support" This provision adds Egypt and Tunisia to the list of counties eligible for “support” funding The money is authorized until the end of 2019 Title LIV—Court-Martial Jurisdiction Detailed procedures for court martial cases Title LX—Punitive Articles A list of all the offenses eligible for a court martial Executive Order Executive Order: Presidential Determination and Waiver - Pursuant to Section 2249a of Title 10, United States Code, and Sections 40 and 40A of the Arms Export Control Act to Support U.S. Special Operations to Combat Terrorism in Syria, The White House Office of the Press Secretary, December 8, 2016 Sound Clip Sources Hearing: U.S. Strategy and Policy in the Middle East, Senate Armed Services Committee, January 20, 2016. - Available on C-SPAN Witness General Jack Keane Chairman, Institute for the Study of War Former Vice Chief of Staff of the Army during the key Bush years, 1999-2003. Board of Directors at General Dynamics Timestamps & Transcripts 27:30 General Jack Keane: Partnering for training and military education is essential to raise the level of operational competence. There is no substitute for an effective ground force supported by air power. Air power is an enabler; it is not a defeat mechanism. This is about alliance members providing the predominant military response. It’s not the United States military. The United States military would provide a certain level of support. Hearing: U.S. Policy and Russian Involvement in Syria, House Foreign Affairs Committee, November 4, 2015, Witness Anne W. Patterson Assistant Secretary Department of State->Near Eastern Affairs Ambassador to Columbia during Bush years Ran the drug war for Bush in 2005 Ambassador to Pakistan Bush/Obama Ambassador to Egypt right after the “uprising” Timestamps & Transcripts 16:40 Anne Patterson: We are pursuing four interlinked goals: (1) to defeat ISIS militarily in both Syria and Iraq, (2) to develop a political transition that gives Syria a future without Bashar al-Assad, (3) to ease the suffering of the Syrian people, and (4) to stabilize our allies as they cope with massive refugee outflows. 36:44 Anne Patterson: Patterson: The idea is to have a transitional government, to work on a time table for Assad’s departure—and let me be clear that that’s a critical element of this policy—and then to work on constitutional review, and, ultimately, an election in Syria. That’s the basic outlines of Secretary Kerry’s strategy. Rep. Karen Bass: So, at this point, if there were to be a transitional government, who do you see composing that? Anne Patterson: Well, a number of opposition figures and people already on the ground. It would be key—and this was in the communiqué—that Syria’s institutions—the military, intelligence, police, civil service—would remain intact, so you wouldn’t have a total collapse of state authority. The idea is just to remove Bashar Assad… Rep. Bass: Like that happened in Iraq? Patterson: …and his cronies from power. 1:30:50 Anne Patterson: The president and certainly the secretary has said many times that Assad’s departure is absolutely critical to any future in Syria. 1:32:45 Ileana Ros-Lehtinen: Those allies, do they see Assad’s removal from power as imperative to deal with this situation? Anne Patterson: Currently, our European allies, our Gulf allies, and Turkey do see that. They’re absolutely determined that he will not remain in power. 1:47:30 Anne Patterson: There’s broad consensus in the international community that these institutions in Syria would remain intact—the intelligence; the military; the police; the civil service; the ministerial structures, like health structures; and that the goal is to remove Bashar al-Assad and his closest advisors and have this political process that would lead to a new government. 1:56:10 Anne Patterson: Let me stress that that is our goal, to get Assad out. Press Conference: Arms Trade Treaty, US State Department, September 25, 2013 Transcript Secretary of State John Kerry: What this treaty does is simple: It helps lift other countries up to the highest standards. It requires other countries to create and enforce the kind of strict national export controls that the United States already has in place. Additional Reading Article: Rex Tillerson's Company Exxon, Has Billions at Stake Over Sanctions on Russia by Andrew Kramer and Clifford Krauss, New York Times, December 12, 2016. Article: Adding 200 more troops to Syria, U.S. deepens involvement by Robert Burns, Associated Press, December 10, 2016. Press Release: Senate Passes Major Portman-Murphy Counter-Propaganda Bill as Part of NDAA, Senator Rob Portman, December 8, 2016. See S. 3274: Countering Foreign Propaganda and Disinformation Act See H.R. 5181: Countering Foreign Propaganda and Disinformation Act Article: Pentagon buries evidence of $125 billion in bureaucratic waste by Craig Whitlock and Bob Woodward, The Washington Post, December 5, 2016. Article: Congress authorizes Trump to arm Syrian rebels with anti-aircraft missiles by Julian Pecquet, Al-Monitor, December 2, 2016. Article: U.S. arms export boom under Obama seen continuing with Trump by Mike Stone and patricia Zengerie, Reuters, November 9, 2016. Report: Armed Conflict in Syria: Overview and U.S. Response by Carla E. Humud, Christopher Blanchard, and Mary Beth Nikitin, Congressional Research Service, September 28, 2016. Article: How Many Guns Did the U.S. Lose Track of in Iraq and Afghanistan? Hundreds of Thousands. by C.J. Chivers, New York Times Magazine, August 24, 2016. Blog Post: Resurrecting the Special Defense Acquistition Fund (SDAF) and Why It Matters to You by Todd Dudley, LinkedIn, February 23, 2016. State Department Cable: "The best way to help Israel with Iran's growing nuclear capability is to help the people of Syria overthrow the regime of Bashar Assad", author unknown, November 30, 2015. Also available in the Wikileaks directory Report: The Defense Business Board's 2015 study on how the Pentagon could save $125 billion, January 22, 2015. Article: Syria intervention plan fueled by oil interests, not chemical weapon concern by Nafeez Ahmed, The Guardian, August 30, 2013. Article: U.S. Repeals Propaganda Ban, Spreads Government-Made News to Americans by John Hudson, The Cable, July 14, 2013. Bill provision: Section 1078: Dissemination abroad of information about the United States, National Defense Authorization Act for Fiscal Year 2013. Article: Iraq, Iran, Syria Sign $10 Billion Gas-Pipeline Dead by Hassan Hafidh and Beniot Faucon, The Wall Street Journal, July 25, 2011. Article: The Redirection: Is the Administration's new policy benefitting our enemies in the war on terrorism? by Seymour Hersh, The New Yorker, March 5, 2007. Webpage: Arms Trade Treaty, US Department of State Webpage: Federal Spending: Where Does the Money Go, National Priorities Project Document: S. 2943: The National Defense Authorization Act for Fiscal Year 2017 summary, House Armed Services Committee, December 2017. Music Presented in This Episode Intro & Exit: Tired of Being Lied To by David Ippolito (found on Music Alley by mevio) Cover Art Design by Only Child Imaginations

united states american director money canada president donald trump australia israel strategy voice training state americans new york times russia european ukraine management board cost ministry army united kingdom study recovery barack obama gifts institute north congress afghanistan environment turkey defense partnership middle east bitcoin iran policy wall street journal colombia washington post operations wars iraq guardian cuba columbia ambassadors air federal bush acceptance intelligence sense paypal sec secretary pakistan syria new yorker thousands reports nato border propaganda lebanon chief executive officer pentagon limitations administration promote maintenance northern ireland extension counter funds gulf terrorists orders syrian yemen cable reuters executive orders collect fiscal increases associated press state department federal government adds us department governors somalia libya prohibition assad wikileaks dod war on terror tunisia extended armed forces lethal preference enhancements ran eastern europeans entities aerial extends waiver sections bashar waivers special operations repeal guantanamo bay why it matters bob woodward us state department cub defense department press secretary modification white house office russian federation fiscal year hwy secretaries bashar al assad ndaa robert burns defense secretary national defense authorization act department of defense money go inserts dissemination allowances seymour hersh house foreign affairs committee house armed services committee senate armed services committee mike stone tricare bbg authorizes rob portman enactment prohibits congressional research service chivers congressional dish john hudson crestview radio free asia afghanistan pakistan music alley craig whitlock united states code california national guard codification al monitor intelligence operations 40a global engagement center andrew kramer arms trade treaty secretary kerry manpads broadcasting board arms export control act music presented cover art design counter isil david ippolito
Modern War Institute
Ep. 15 - "Intelligence Operations on the Modern Battlefield" with GEN (R) Michael Hayden

Modern War Institute

Play Episode Listen Later Nov 2, 2016


MWI talks to GEN (R) Michael Hayden, former NSA and CIA director, about the changes in the way we collect and use intelligence and how that will influence the modern battlefield.

App Guy:
TAGP451 Cole Smith : Find The Right People & Set Simple Goals

App Guy:

Play Episode Listen Later Apr 18, 2016 23:08


Cole Smith is the Co-Founder and CEO of Tresit Group LLC. Cole has earned his experience in the global fields of security, military and management. He enlisted into the U.S Army as a Human Intelligence Specialist and now serves as an Intelligence Officer in the Army National Guard. The remainder of his time was with Diplomatic Security Service as a Special Agent. There, he received various awards including a Superior Honor Award for his missions to Somalia. He was a member of a six-man team that responded to civil unrests during the Arab Spring in Tunis and Egypt. His education consists of a Master in Business Administration, Bachelor of Arts and Associate’s Degree in Intelligence Operations and Arabic.

The CyberWire
RSA Special: Threat Intelligence

The CyberWire

Play Episode Listen Later Mar 8, 2016 18:13


Threat intelligence - it's more than just attribution. In fact, unless you carry a gun and wear a badge, it's probably not much about attribution at all. Instead, it's about reducing risk. Special thanks to our guests who sat down for interviews at RSA: Ryan Trost, Cofounder and CTO at ThreatQuotient Eric Olson, VP of Intelligence Operations at LookingGlass Rick Howard, Chief Security Officer at Palo Alto Networks    

Leaders for the world's future - The Rhodes Trust
Intelligence Operations in 21st Century Democracies

Leaders for the world's future - The Rhodes Trust

Play Episode Listen Later Oct 16, 2013 41:11


Admiral (ret'd) Dennis Blair dicusses intelligence operations at the Rhodes Trust Scholarship 110th anniversary event.