Podcasts about intelligence services

Government agency responsible for the collection and analysis of secret security or political information

  • 133PODCASTS
  • 199EPISODES
  • 41mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 28, 2025LATEST
intelligence services

POPULARITY

20172018201920202021202220232024


Best podcasts about intelligence services

Latest podcast episodes about intelligence services

Spybrary
A Spy at War: Charles Beaumont Reveals More About His New Spy Thriller

Spybrary

Play Episode Listen Later Mar 28, 2025 58:04


ExplicitNovels
Cáel Defeats The Illuminati: Part 1

ExplicitNovels

Play Episode Listen Later Mar 18, 2025


A Walk In the Park  & Aya's Finest Hour.Book 3 in 18 parts, By FinalStand. Listen to the ► Podcast at Explicit Novels.Professional, conscript, or volunteer, they all have run away from battle.A Note on terminology and the metaphor of Cael's WorldThe terms Weave of Fate and 'Weave ' are interchangeable. Weave expresses the intersection ~ the sieve that all the possible futures entered to create what we perceive as this 'now'. Fate is the keeper of the sieve. The Present is what is happening right now. It is that infinitesimal which we interpret as Reality.The Legend is what happens when the present is pulled back through the weave and becomes the past. It is called the Legend because, as the former presents fade into the past, they blur; each becomes less precise and more open to interpretations. (It is as if you were looking at one thing through a prism; as you shift your stance, what you see appears to change.) Within the Legend exist mystic creatures, divinities, demons, spirits, all the Paradises and Hells.The Endless Black Sands is the final resting place for all failed legends. It is the place where all is forgotten until even former realities break down into the Black Sands. That Alal found a way to cheat this doom and retrieved Shammuramat, was truly remarkable; even though Fate 'balanced accounts' with him by sending Ajax and his war band along that path as well.If you wonder how that was a balancing, consider this:The only people Alal cares for (in his own brutal fashion) are Shammy, now Sakura, and his only true offspring in 5,000 years, Cáel.Fate sent Ajax.With Ajax available to test Cáel, how could Alal resist the temptation to place one of the planet's greatest killer on a collision course with both of his loves in order to test Cáel?The Veil is a function of the Weave that protects sentient perception from perceiving the Weave and disguises the otherness of creatures of legend, unless they willingly allow themselves to be seen, which they usually do only so they can 'physically' interact with the Present. Some sentient minds, through horrific trauma such as the Augurs' self- poisonings, through the quirks of Fate via Holy Men, Mad Prophets and Doomsayers such as Temujin, or through the touch of legends such as Ishara, can sense the fluctuations in the Veil and the things behind it. Cáel, in truth, has been shaped by all three vehicles (Ishara, the Augurs and Temujin's legend.)Oblivion is what awaits Reality if the Weave ever fails beyond its ability to heal itself. This threat is what keeps the creatures of legend from constantly traversing the Weave. They have to weaken the Weave to do so or to use powers in Reality, the greater the distortion they create, the greater the weakening that occurs.End Note(Two days ago, with thirty days left)"That was fantastic, Lady Yum-Yum," I sighed."What did you just call me?" she panted softly. We were naked in one of our Task Force bedrooms that was actually used for sleeping, and now sex. I was still pressed against her reposed body, despite our recent exertions. She was on her stomach, arms stretched down her sides.She was sweaty and short of breath. She still had her wits about her and an awareness of our situation: victory sex, me still aroused and her fingernails scratching my thighs and buttocks. My equally sticky body was pressing down on her, even though I supported my weight with outstretched hands placed on either side of her shoulders."Lady Yum-Yum," I mumbled as I kissed the back of her head. "That was the first thing that sprang to mind when you introduced yourself." I could see her working that through her highly complex mind."When writing your memoirs, please remember to me refer to me that way," she began to flex her thighs and abdominal muscles, so that her ass was pumping against my hips."Only if this helps persuade you to give me a repeat performance.""I'll consider,," she purred, then paused to catch her breathe. "You are in phenomenal shape, young man. Do any of your other lady-loves have pet names?""Nope," I grunted as I withdrew.She had teased me with anal sex hints repeatedly, yet never delivered. She liked the game and the power she wielded. My body being on top of hers was only an illusion of a tactical advantage. She knew me pretty well already. I wasn't the kind of guy who would use physical strength to overwhelm her vulnerable position. This being so, a cerebral skirmish only excited her more.We waged a war that was based on intakes of breath, the shimmying of muscles and the trembling of fatigued flesh. The prize for me was the winning. Lady Fathom Worthington-Burke played tricky-clever, but I was better. And at times like this, she admitted it. She gave me what I wanted. I rolled her.Straight, face-to-face fucking. The Lady's pulsar gaze trapped my vision. She smiled, grudgingly at first, then more and more sensually as my glans returned to her g-spot that it had scouted out earlier. This was 'surrender by the Fathom method'. She gave me what I wanted, so I took what I wanted, and pleasured her at the same time."Mmm, you are a bad, bad boy," she lapsed into her trashy West-End Londoner accent. It was perfect and an erotic whiplash when added to her native, refined manner of speech. This wasn't a trick this time, it was a treat. It was a gift, reciprocated. The tactile sensation of her cervix becoming a soft, spongey chalice for my final penetrations was icing on an all-so-luscious cake.I tendered her a tribute worthy of my first love, Dr. Kimberly Geisler. It was strange to find a woman like her. Outside of Kimberly, I had found only one other woman who graciously offered her ultimate pleasure paean to the hundreds of lovers who had become before. That other woman, it still floored me, was Buffy Du, no, Buffy Ishara, First of my House."Oh!" and several heartbeats later, "Cáel!" several hissed series of breathes and then, "Goddess! You are better than good!"Two thoughts collided within me:A) I had never seen a more controlled orgasmic explosion in my life. I was going to have to tell Buffy about this, once we were safely in bed. If it was office talk, she'd punch me through a window and that would make Aya cry. I couldn't have that.B) Goddess? I thought she was Anglican. This needed further study. This treatment was really nice. I leaned in, kissed her. Lady Yum-Yum smiled. "Take me to the shower. Play time is over, Cáel," and she was back to all business."You are treating me like a fleshy vibrator," I pointed out."But you are a very finely-trained, fleshy vibrator, you wonderful boy," she stroked my cheek. "Shower! Now!" So, like a Good Boy, International Merchant of Death and Chosen Son of a Divine Amazon Goddess, I slid off her, then cradled her in my arms as I rose from our totally trashed mattress.I didn't smile when it was confirmed that I wasn't carrying her out of any romantic after-coitus gesture. She couldn't walk. Woot! It took a bit of effort to get us into the walk-in shower and to get the water just perfect, all while keeping her cradled. She helped out by keeping her arms tightly around my neck."Cheeky bastard," she whispered in my ear. "You are gloating." Then she nibbled on my earlobe for good measure."Damn right," I did gloat as I let her slide down to her feet. "You are pretty sweet for an Old Chick." She wasn't angry, oh no."If you were trying to get me to say, 'I'll get you next time," she licked, nipped and sucked on my nipple as if I was the one with the mammaries in this relationship, "it worked." Double-Woot! I was going to get that damn four-way! I did coax a vigorous shower-quickie out of my Lady. Afterward, she shifted herself so she could get under one of the steaming showerheads."Cáel, why didn't you use a condom," she mused. Gak!"You aren't on Birth Control?" I panicked. She laughed at me."No. I've never been a fan of hormones replacement. I like the way I am. Do you expect the women to do all the anti-pregnancy measures?""No," I gulped."Don't' be so worried," she laughed. "We had unprotected sex one time. The odds are astronomical that an 'oops' happened, right?" Yes, it was a single sexual encounter, but included three firings of the one-eyed hydra, sigh."You are asking a man who has five children on the way, Fathom," I cautioned her."Oh, I'll update my files and make an appointment to seen a local, reliable O B G Y N," she slipped back into her unflappable British resolve. "Get along. I need to get cleaned up," she cupped my scrotum, ", again. So scoot." I scooted.I had updated my condom supply despite the forbiddance Dot Ishara, my Matron Goddess, beamed to me from the Other Side. She could only complain so much. I'd upped my selection of fortune cookies and added a fresh raisin chocolate brownie for my next visit with her. I had to get over to the other side of the floor to get a fresh shirt, and boxers.Yum-Yum had ripped off my shirt (a little kinky) and boxers (a little painful). I wasn't going commando, so I decided to quick step it before something important happened that required me to yank yet another solution out of my sexually-fueled creative imagination.How Lady Yum-Yum and I ended up in bedThe Secret Societies' long awaited war had begun in Africa and in India. The Amazons couldn't effectively reinforce these two homeland regions. No, my people's edge came from my stupid stunts (e.g., the fight outside that club in Chicago), the judicious application of a few kind words and a whole lot of targeted killing on my part along with that of my Amazons.Those actions convinced the Booth-gan (aka the Thuggee, but we no longer say that because it irritates them) and the Coils of the Serpent to toss in their lot with their local Amazons. They did the whole 'hostage exchange' thing as well. Two children from each side. That was a no-brainer on my part. All three concerned parties were willing to let their adults die if necessary. Their children were another matter.In Asia, the Seven Pillars had made only minimal progress. We now suspected the 7P had planned to roll over the three of the 9 Clans that were in their Sphere of Influence, the now 6 Ninja Families, the Black Lotus and the Booth-gan in rapid succession. A preemptive strike against both the Khanate and the Ninja were supposed to cripple those two factions.Against the Khanate, that had been a dismal failure. In Nippon, the Ninja were in dire straits and would be decades recovering from the original 7P blitz. But the combination of US black ops help and the infusion of Amazons and Okinawans had staved off extinction for the moment. Strategically, these failed actions were tying down 7P resources that the largest Secret Society had planned to move elsewhere.In China, the Black Lotus exhibited the same resilience and deceptiveness they'd shown in combating the Seven Pillars by themselves for the past 65 years. The chaos gripping the PRC was a blessing from the Ancestors, the four sacred spirits (lung/dragons, phoenix, unicorn and tortoise), and the nine entities (I now really had to know this stuff.) Word that a 'dragon' had appeared in the West had only heightened their desire to aid in our new alliance.Those factors meant a reprieve for India. As the 7 Pillars began ramping up their operations; increasing racial tensions, minor terrorist action and military and industrial sabotage; the Booth-gan and Amazon united resources and purpose. The Booth-gan would assassinate 7P operatives and pawns while the Amazons would hit 7P front companies and businesses based out of the People's Republic of China. (This activity also helped ratchet up India-PRC tensions and anti-PRC public sentiment in India.)In Africa, the Condotteiri had squandered precious hours reallocating resources before launching their assaults. Like everyone but the 7P, they had been caught flat-footed by the renewal of the Secret War. The Coils of the Serpent had never been overly antagonistic toward the Condos, since their interests rarely collided. The same went for the Coils and the Amazons.Two factors inspired a deep Amazon-Coil bond. They were both groups with deep African roots and a shared Central-Western African spirituality. Added to that was the growing power of the Coils of the Serpent in the past fifty years. Their main opponents had been the Illuminati who had a Eurocentric view. Pan-Africanism was in the Coil's best interest, but ran contrary to European economic interests.Long term, allying with the African Amazons was a good investment for the Coils. The 9 Clans relationships had already proved to be advantageous on multiple occasions in the past. The leaders of the Coils knew their power was rising with the fortunes of Sub-Saharan Africa. To them, the rise of the PRC and the Seven Pillars was a looming threat in the East.They had been handed a golden opportunity to deal with this enemy before the enemy was ready to deal with them. They had been 'gifted' with over 2000 highly-skilled, fanatical Amazon warriors as stealthy muscle to add to their own, more subtle arsenal. For the Amazons, it was access to continent wide clandestine intelligence network that could unmask their enemies' hiding places.The Condotteiri wiped out an Amazon freehold in Cameroon and a few Coils safe houses in Lagos, Nigeria. In the Republic of Mali, over 250 Condo mercenaries were slaughtered at a 'secret' installation and their armory was looted. Ebola kept breaking out in the West. The dominant regional powers, the Republic of the Congo and Nigeria, were tottering as a result of decades of economic mismanagement, civic, ethnic, tribal and religious strife, corruption and unreliable militaries.The scene was ripe for a secret conflict as well as public carnage. For the Joint International Khanate Interim Taskforce (JIKIT), this presented a dilemma. They were involved with a growing global struggle that went far beyond the Khanate and Central Asia. Their secret society allies strenuously objected to bringing any more 'outsider' people into the group.Handing over covert intelligence to other governmental agencies in the US and UK, then telling them they wouldn't divulge their sources went over like scuba diving with cement goulashes. Explaining to upper level bigwigs that they had a 'trust-based' team went nowhere. Those officials didn't care about a bunch of domestic/international criminals' sensibilities.They wanted names and faces. They wanted addresses, phone taps and bank account numbers. It would all be 'Secret', 'Top Secret', or 'Eyes Only'. It would all be vulnerable to all kinds of governmental subpoenas too. No threats were made from 'my' side. They'd killed more people than the Black Death and the lives of a few thousand bureaucrats (and their families) in London and Washington D.C. didn't mean shit to them.Selena did offer to kidnap some family members to get the message across. Javiera put her hands over her ears and began singing 'la-la-la' as she stormed out of the room. Lady Fathom suggested that we arrange a private meeting with the UK Prime Minister and the US President. It took a few seconds for Mehmet and Javiera to realize she wasn't kidding.That was a nearly impossible task, which on this taskforce meant we had to give it a shot. Let's just say that the US Attorney General, Eric Holder and Chairman John Jay of the British Joint Intelligence Committee thought their respective representative had lost her God-damn mind. I went to the Khanate for help.Twenty-four hours later Azerbaijan, Turkey, Tajikistan, Armenia and Georgia (yes, two tiny Christian nations) joined the Khanate. The integration of the first two nations had been in the works since the formation of the Turkic Council in 2009. For me, Temujin upped the time table strictly for our benefit. Turkey and Azerbaijan became the two newest states within the Khanate.The third, Tajikistan was different and the shakiest addition. The unoccupied title of 'Khwarazm Shah' was created, suggesting the Iranian Tajiks had a special status inside the Khanate. 'Khwarazm' referenced the Khwarazmian dynasty that ruled the last of the great, Persian-led, Iranian Super-States and dated back to the 13th century AD. 'Shah' was Persian for King.The announced status of Armenia and Georgia was quite a bit different. They become 'Protectorates', i.e., semi-autonomous states within the Khanate who were 'vassal' states, responsible only to the Great Khan and his personal representative in the region (ah, that would be me.)So, the first three entries made sense, strong geographic, ethnic and/or religious ties, plus this was part of the Khanate's agenda anyway. But Armenia and Georgia? That was the doing of the other regional secret society, the Hashashin.The Caucasus Mountains were the backyard of the Hashashin. They knew who to blackmail, pinch and kill to make the 'take-over' possible. The main stumbling block was the long Khanate-Hashashin history: the Mongols had destroyed the historical stronghold of the Hashashin, Alamut, in 1256 CE. In a way, that disaster had transformed the sect, making it move away from their strict Nizārī Ismaili roots and into a more ethnically and religiously diverse group that was centered in the Caucasus region.Temujin made it clear to this group that he was making a deal under my auspices. Both Armenia and, Georgia (as well as the future Kurdistan, his plans for the creation of that last state were told to me under condition of secrecy) would be part of my palatinate principality (along with Hungary, if we ever got there). Riki Martin defined the terms for me: I was the voice of those three regions in the Khan's court.They wouldn't have to deal with Muslim Khanate officials. They would deal with me and 'my officials'. If the Khanate had a problem with my principality, they came to me to resolve the issue. That translated to me giving a nod to the existing regimes ruling in Armenia and Georgia (along with the infusion of a few Hashashin supporters.)Publically the future of those three political and ethnic entities would be confirmed later. The existing governments knew three things.1) I was that madman who had led the charge in Romania, clearly a man of bravery and humility. The odds were good that I was going to be a man they could rely on to adequately represent their interests with the government that currently mattered the most (aka The Khanate.)2) The Great Khan thought the world of me and in this nascent New World Order that meant way more than membership in NATO, or begging the United Nations to apply sanctions of dubious value.3) There would be a change of leadership by about 2040. Children of excellent ethnic parentage would succeed me in this ceremonial role in the region. These new princes and princesses would be the scions of the line of Nyilas and representatives of the various states (translation: I was going to be sexing it up with Georgian, Armenian and Kurdish members of the Hashashin).That would establish the three 'cadet' branches of House Ishara (Nyilas) (which I've listed because all three alphabets are so freaking beautiful) that could weave the Amazons, 9 Clans and the varying ethnic identities into a quilt that could stand together as a force in the Great Khan's inner circle. This new spate of aristocratic, 'Archer'-themed lineages would be:1.       Moisari, in Georgia.2.       Aġeġnajig, in Armenia.3.       Ram- alsham, in Kurdistan.This fiction made the key named entities happy. The combination of all these events applied another jolt to the heart of the global power structure (after all, Turkey was in NATO) and made the US and UK governments back off.By tidying up the world map, we'd brought our governmental chiefs to the chilling revelation that their sole conduit for insider information regarding the ongoing global calamity had reacted to their intransience by simply letting them be blind-sided by events. After the fact, Javiera and Lady Fathom relayed that message very clearly.

god tv american amazon death head world children father chicago europe english stories uk china house mother lost secret hell law state reality land british care west africa brothers chinese european sleep government washington dc turning influence mom current brazil professional santa europa african bbc rome east turkey fantasy cnn boss park ladies iran beyonce captain laws hearing straight hunt mine council concerns narrative honest tears nigeria records worse nations sister weapons southern sisters honestly fate ninjas independence sexuality worlds united nations republic twenty internal wtf fool nato ot fantastic disorders pillars call of duty explaining ram bay bitch nepal sinners sorrow shut romania sake khan exile goddess congo afterlife hungary keeper northern correct congressional instructions shower veil chang budapest rat apprentice added booth illuminati hurry vietnamese sisterhood serpent mali sd auschwitz explicit casper nypd other side ancestors persian task force ebola new world order lagos tibet himalayas birth control summer camp runners sphere novels armenia sneak ajax crawl tibetans arial us presidents martial cameroon azerbaijan spidey oblivion armenian al jazeera defeats top secret malaysian georgian chung traitor strategically gong anglican gathered threatening secret societies yum good boys central asia weep u s condo madi erotica handing goddesses archery bengal black death mmm secret wars weave mongolian oaths south china sea kurdish ish messina sub saharan africa times new roman cheeky pla sakura kurdistan clans high priestess aye chuckie fathom kursk mockery prc gak woot mehmet tajikistan condos eurocentric nepalese caucasus coil tahoma mongols hells uk prime minister errand hittite finest hour eric holder party lines pan africanism yum yum arwen council meeting first house seven pillars lhasa black hand restrain claymore dali lama black lotus jian us attorney general coils in asia saku unconquered javiera squirts gurkha katmandu cael han chinese intelligence services tibetan plateau epona tisza council chambers temujin alerted holy men ismaili melena febe british sas doomsayers literotica okinawans death song caucasus mountains 7p niz spetsnaz free tibet house heads msolistparagraph house head mycenaeans publically black sands shammy great khan his english alamut paradises marda thuggee
SKRAPS of Science & Innovation
R.I.P ... CDC's Epidemic Intelligence Service

SKRAPS of Science & Innovation

Play Episode Listen Later Feb 15, 2025 14:10 Transcription Available


This story was inspired by the post on X by Dr. Farsad Mostashari. Center for Disease Control has been at the forefront of many of the alerts (true and false) and now it's officially gone...This is a sombre take on what has happened. SKRAPS is your podcast, where we on your behalf explores unsaid, underappreciated and sometimes, untold stories of sparks of brilliance in science, technology and innovation. Show CreditsCreated & Produced by: Arun Sridhar & JoJo PlattEditing: Arun SridharSound design: Arun Sridhar & Swaminathan ThiruGnanaSambandamSound mixing and mastering: Swaminathan ThiruGnanaSambandamSocial Media: Twitter: @PodcastSkrapsLinkedIn: SKRAPSArun's Twitter FeedJoJo's Twitter FeedYou can help us fund the production costs by donating as little as $5 or £5 or in any currency of your choice as a one time or a recurring payment HERE

The Insurance Podcast
ITC Episode 1: Clara Analytics, Core Logic, Verisk, & MacKenzie Intelligence Services

The Insurance Podcast

Play Episode Listen Later Nov 30, 2024 69:55


There's a theme to this episode and it revolves around data usage, how it's acquired, how it can be deployed and what can be learned from it. Featuring execs from Clara Analytics, Core Logic, Verisk and McKenzie intelligence ServicesIn this episode:The importance of understanding all aspects of real estate transfers for building intelligenceThe cost of fraud and how it is being counteredHow long term look for underwriting due to climate change will change pricingWhy the knowledge curve for claims processing needs help with data and AIWhen a historical library of CAT data becomes useful and what forWith incredible insights from guests sitting down live at ITC with your hosts, see how the dots connect together to shape the future of insurance, data, and response.Checkout the videos at our youtube channel here: The Insurance PodcastSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Cyber Security Today
Apple Offers 1 Million Dollar Bug Bounty For It's Apple Intelligence Services: Cyber Security Today for Monday, October 28, 2024

Cyber Security Today

Play Episode Listen Later Oct 28, 2024 7:41 Transcription Available


In today's episode of Cybersecurity Today, host Jim Love covers stories including, Cisco releases an emergency patch for a vulnerability exploited in brute force attacks, Delta Airlines sues CrowdStrike over a problematic software update leading to flight disruptions, UnitedHealth confirms the massive data breach at Change Healthcare affecting 100 million people, and Apple announces a $1 million bug bounty for hacking Apple Intelligence servers. Stay informed on these pivotal issues impacting the tech and cybersecurity landscape. 00:00 Emergency Patch for Cisco Vulnerability 02:02 Delta Sues CrowdStrike Over Flight Disruptions 03:48 Apple's $1 Million Bug Bounty Program 05:14 UnitedHealth Data Breach Impact 07:17 Show Wrap-Up and Contact Information

Understate: Lawyer X
DETECTIVES | The London Bombings

Understate: Lawyer X

Play Episode Listen Later Oct 27, 2024 34:21


It's July 7th 2005, and it's a typically busy morning on London's underground. It's like any other day. But then, simultaneously, three trains and a double decker bus explode.  Smoke fills the carriages, and panic and devastation takes over London.  Detective Gary Powell was sitting at his desk when he heard what we now know as the 7/7 terrorist attacks. Gary sits down with host Brent Sanders to talk about this case, and others from his time in the counter terrorism unit of the UK police.  This content contains references to suicide. If this content affects you, the number for Life Line is 13 11 14. See omnystudio.com/listener for privacy information.

Global Research News Hour
Examining the Role of Intelligence Services in Shaping Politics and Perceptions. Kit Klarenberg

Global Research News Hour

Play Episode Listen Later Sep 13, 2024 59:00


This week, on the Global Research News Hour, we analyze major news stories today while taking a look at what has been missed or totally forgotten in major news dialogue, examining the 9/11 attacks, the attack on Israel nearly ago and more. Our guest for the hour will be the phenomenal award-winning Investigative Journalist Kit Klarenberg.

Armenian News Network - Groong: Week In Review Podcast
Iran Rejects Zangezur Corridor, Armenia Azerbaijan Talks, Trade, Intelligence Service, Georgian and Azerbaijani Elections | Ep 361 - Sep 8, 2024

Armenian News Network - Groong: Week In Review Podcast

Play Episode Listen Later Sep 12, 2024 77:46


ANN Groong Week in Review - Sep 1, 2024Topics:  - Iran Shuts Down Talk of “Zangezur Corridor”  - Armenia Azerbaijan Talks  - Iran Armenia Trade / BRICS  - Foreign Intelligence Service  - Georgian and Azerbaijani ElectionsGuest: Amb. Dziunik AghajanianHosts:  - Hovik Manucharyan - TW/@HovikYerevan  - Asbed Bedrossian - TW/@qubriqEpisode 361 | Recorded: September 11, 2024Subscribe and follow us everywhere you are: linktr.ee/groong

Medicare for All
Project 2025 Will Kill Us All

Medicare for All

Play Episode Listen Later Aug 19, 2024 58:02


If there's one thing everyone is talking about these days, it's JD Vance's affinity for couches. But if there are two things everyone is talking about, it's Vance's couches and Project 2025. You may be wondering, what is this mysterious project, and what does it have to do with me? Well, it turns out, a lot! Project 2025 is the right-wing map to a terrifying future, and if its proponents have their way, the future of healthcare is especially grim. Today, we're doing a deep dive into what this thing is and how it could change healthcare as we know it. https://www.youtube.com/watch?v=a4kYQ-Hh5pY Show Notes Gillian Mason, Healthcare-NOW's Executive Director, has read Project 2025 so you don't have to. P25 is the brainchild of the Heritage Foundation, the think tank founded in 1973 because conservative businessmen thought Richard Nixon was too liberal (remember that Nixon created the EPA and advocated for a better national health plan than Obamacare, so they weren't all wrong). They really hit their stride during the Reagan administration when they wrote his policy playbook, which they called the “Mandate for Leadership” — Reagan implemented or initiated about 60 percent of the 2,000 policy changes they recommended. They do this Mandate for Leadership report now every presidential cycle, and it's been pretty influential whenever a Republican wins. These people are unabashed fascists. We use that term a lot kind of casually but these guys literally fit the Merriam-Webster Webster dictionary definition: “a political philosophy, movement, or regime that exalts nation and often race above the individual and that stands for a centralized autocratic government headed by a dictatorial leader, severe economic and social regimentation, and forcible suppression of opposition.” The Heritage Foundation's whole deal is consolidating all authority in the office of the president so he can implement severe economic and social regimentation based on nationalism and barely-veiled-when-it's-not-just-blatant racism. Project 2025 It's the “Mandate for Leadership” for this election season, so it's supposed to be a template for Trump's next four years. Although reading Project 2025 would make you think it was a room full of monkeys at typewriters type situation, it was actually written by a room full of Trump's cronies. Hundreds of people contributed to writing and researching this thing, and a hefty percentage were former Trump appointees and employees of the administration. Also, VP pick JD Vance just wrote the foreword for an upcoming book by Kevin Roberts, the head of the P25 team. Vance has also been a mouthpiece for some of the wilder shit in P25. Trump claims he really doesn't know much about P25. But it's still worth talking about because COINCIDENTALLY it turns out that a lot of his policies are the same as the ones in P25. The Premise: The liberals in Washington, in cahoots with Chinese Communists and the  “totalitarian cult known today as ‘The Great Awokening'” have put “the very moral foundations of our society are in peril.” (This is not an exaggeration— it's literally all on the first page) P25 has 4 main goals: Restore the family as the centerpiece of American life and protect our children. Dismantle the administrative state and return self-governance to the American people. Defend our nation's sovereignty, borders, and bounty against global threats. Secure our God-given individual rights to live freely—what our Constitution calls ‘the Blessings of Liberty.'” All the recommendations are laid out systematically according to the different areas of the federal government they want to control (The Executive Office, Department of Homeland Security, Intelligence Services, Media Agencies, etc.) We'll mainly be focusing on healthcare today but context is important so here are a few highlights of what they're planning to give you some flavor: Reclassify most federal employees as appointees

SAPIR Conversations
S13E2: The Resilience of Israel's Intelligence Services with Chuck Freilich

SAPIR Conversations

Play Episode Listen Later Jul 31, 2024 59:00


Fifty years after the Yom Kippur War, Israel's vaunted military and intelligence establishment again failed to protect the Jewish state. What must it do to regain its reputation and deterrence? Former Israeli deputy national-security adviser Chuck Freilich joined Bret Stephens for a conversation on his recent SAPIR article, "Can Israel's Intelligence Services Be Saved?"

Outgrow's Marketer of the Month
EPISODE 202- From Data to Market: Deloitte's Intelligence Services Center Lead Jonathan Daglish on Ai's Role in Strategizing

Outgrow's Marketer of the Month

Play Episode Listen Later Jul 11, 2024 16:33


Jonathan Daglish is a Senior Manager and the Intelligence Services Centre Lead at Deloitte. He holds a Master's degree in Terrorism, Crime, and Global Security and has extensive experience in intelligence and risk advisory roles, including previous positions at Dataminr and TorchlightGroup Ltd. On The Menu: 1. AI-Powered Social Listening: Preparation for risks using AI. 2. Future Landscape of Decision-Making: Interconnectivity and data points shaping decision processes. 3. Effective Risk Detection with AI: Technologies like NLP and NER in risk identification. 4. Differentiation in Competitive Market: Partnerships with startups and tech companies. 5. Content Marketing Strategies: Snapshot posts, white papers, and event hosting. 6. Fostering Innovation: Collaborations and unrestricted product development. Click here for a free trial: https://bit.ly/495qC9U Follow us on social media to hear from us more - Facebook- https://bit.ly/3ZYLiew Instagram- https://bit.ly/3Usdrtf Linkedin- https://bit.ly/43pdmdU Twitter- https://bit.ly/43qPvKX Pinterest- https://bit.ly/3KOOa9u Happy creating! #JonathanDaglish #Deloitte #Outgrow #AiStrategy #AI #MarketerOfTheMonth #Outgrow #Podcastoftheday #MarketingPodcast

The Bunker
How the Kremlin's spy networks shaped Russia's history

The Bunker

Play Episode Listen Later Jun 16, 2024 31:11


The Kremlin's spy networks are well documented – but what's less known is how they shaped Russian history. In centering the rise and fall of Communism in Russia's history, are we missing a crucial historical axis – the intelligence services which have long kept an eye on citizens across Russia and further afield. Yuri Felshtinsky, author of From Red Terror To Terrorist State: Russia's Intelligence Services and Their Fight For World Domination from Felix Dzerzhinsky to Vladimir Putin, joins Alex Andreou in The Bunker to discuss whether the West fails to tell the full story of modern Russia. We are sponsored by Indeed. Go to Indeed.com/bunker for £100 sponsored credit. www.patreon.com/bunkercast  Written and presented by Alex Andreou. Producer: Liam Tait. Assistant Producer: Adam Wright. Audio editor: Jade Bailey. Managing editor: Jacob Jarvis. Music by Kenny Dickinson. Group Editor: Andrew Harrison. THE BUNKER is a Podmasters Production. Instagram | Twitter Learn more about your ad choices. Visit podcastchoices.com/adchoices

Utajua Hujui
A Quick History of Kenya's National Intelligence Service

Utajua Hujui

Play Episode Listen Later Jun 12, 2024 81:10


Let's learn about the NIS together :) Sources https://kenyanhistory.wordpress.com/2013/11/17/kikuyu-clans-and-their-attributes/ https://theses.hal.science/tel-03134460v1/document https://www.businessdailyafrica.com/bd/lifestyle/society/how-the-british-government-used-reformists-to-capture-mau-mau--4082290 https://selousscouts.tripod.com/use_of_pseudo_gangs_against_the_.htm https://www.dailymaverick.co.za/article/2020-09-14-how-a-british-policeman-helped-normalise-torture-in-a-gulf-monarchy/ https://molisa.wordpress.com/tag/kamau-ngotho/ https://www.amnesty.org/fr/wp-content/uploads/2021/06/afr320301990en.pdf https://www.tandfonline.com/doi/full/10.1080/02684527.2023.2211872

Cyber Security Today
Cyber Security Today, May 27, 2024 - Security controversy over a new Microsoft tool, a new open source threat intelligence service

Cyber Security Today

Play Episode Listen Later May 27, 2024 6:14


This episode reports on fake antivirus web sites to stay away from, and more

The Global Agora
Can Russia's intelligence services help install an American president?

The Global Agora

Play Episode Listen Later May 18, 2024 25:42


Alex Finley is a former officer of the CIA's Directorate of Operations, where she served in West Africa and Europe. She has penned three satires about the CIA: Victor in the Rubble, Victor in the Jungle, and Victor in Trouble. Satire about the CIA? In my view, the agency definitely deserves this kind of genre but still, I ask Alex why she chose it. But, of course, we also talked about some, let's say, more serious stuff, including if Russia's intelligence services can help install an American president. Listen to our conversation. And if you enjoy what I do, please support me on Ko-fi! Thank you. ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://ko-fi.com/amatisak --- Send in a voice message: https://podcasters.spotify.com/pod/show/andrej-matisak/message

Shaye Ganam
Foreign intelligence services are contracting out killings to gangs

Shaye Ganam

Play Episode Listen Later May 7, 2024 7:23


Neil Bisson, Director of Global Intelligence Knowledge Network and is a retired Intelligence Officer at Canadian Security Intelligence Service (CSIS) Learn more about your ad choices. Visit megaphone.fm/adchoices

InsTech London Podcast
Rosina Smith, CPO: McKenzie Intelligence Services: Innovation and the insurtech journey - are we there yet? (301)

InsTech London Podcast

Play Episode Listen Later May 5, 2024 34:30


McKenzie Intelligence Services (MIS) helps accelerate disaster relief and economic recovery for insurers. Matthew Grant spoke to Rosina, Chief Product Officer for MIS, who shares insights from her MBA dissertation's findings on the adoption of technology in insurance, highlighting the necessity of collaboration between insurtechs, insurance companies, and other stakeholders to drive innovation and effectively address the insurance protection gap.  Key talking points include: Transitioning from working for a large organization to the world of startup and scale up MBA Dissertation - the process of writing and publishing  Managing biases - reconsidering the issue with the protection gap Collaboration and disruption - where do you stand as an insurtech? Evolving approaches for insurtechs What you should avoid in partnerships To read Rosina Smith's dissertation ‘Barriers to Adopting Insurtech in Natural Catastrophe (Re)insurance' you can reach out to her on LinkedIn. If you like what you're hearing, please leave us a review on whichever platform you use or contact Matthew Grant on LinkedIn. To find out more about InsTech, our membership and offerings visit www.instech.co or contact us hello@instech.co Continuing Professional Development This InsTech Podcast Episode is accredited by the Chartered Insurance Institute (CII). By listening, you can claim up to 0.5 hours towards your CPD scheme. By the end of this podcast, you should be able to meet the following Learning Objectives: Specify what is the insurance protection gap and why it has historically been misunderstood Identify some reasons why a business partnership between a insurtech start up and an insurer might not be successful Summarise why insurtechs need to reevaluate their strategy when partnering with insurance carriers If your organisation is a member of InsTech and you would like to receive a quarterly summary of the CPD hours you have earned, visit the Episode 301 page of the InsTech website or email cpd@instech.co to let us know you have listened to this podcast. To help us measure the impact of the learning, we would be grateful if you would take a minute to complete a quick feedback survey.

SpyCast
“The Director-General of NZ Security Intelligence Service” – with Andrew Hampton

SpyCast

Play Episode Listen Later Apr 9, 2024 76:25


Summary Andrew Hampton joins Andrew (X; LinkedIn) to discuss intelligence in New Zealand. Andrew is the Director General of the New Zealand Security Intelligence Service.  What You'll Learn Intelligence The New Zealand Intelligence Community How geography effects national security The lasting impact of the Christchurch Mosque attacks New Zealand's relationship with China Reflections The power of community organization The nuanced nature of global politics And much, much more … Quotes of the Week “I think for a long time there was a view that our geographical isolation protected us from a range of national security threats. But unfortunately, in the current world, geostrategic competition is playing out in our region. Going back to my old role, you're only one click away from a cyber-attack … This and misinformation and violent extremism are permeating the whole world. ” – Andrew Hampton. Resources  SURFACE SKIM *SpyCasts* CIA Director, Defense Secretary, Gentleman with Leon Panetta (2024) Australian National Day Special: Intelligence Down Under with John Blaxland (2024)  SPY CHIEFS: Director-General of Security Mike Burgess - ASIO, Australia & America (2022) Keeping Secrets/Disclosing Secrets with Spy Chief turned DG of Australia's National Archives David Fricker (2022) *Beginner Resources* What Is The Five Eyes Alliance? K. Haan, Forbes [Short Article] A Brief History of New Zealand, Live and Work New Zealand (2022) [Short article] Why Isn't New Zealand a Part of Australia? History Matters, YouTube (2020) [3 min. video] DEEPER DIVE Books Voyagers: The Settlement of the Pacific, Nicholas Thomas (Basic Books, 2021)  Pacific Century: The Emergence of Modern Pacific Asia, Mark Borthwick (Routledge, 2013) The Penguin History of New Zealand, Michael King (Penguin Books, 2003)  Primary Sources  He Whakaputanga o te Rangatiratanga o Nu Tireni – the Declaration of Independence of the United Tribes of New Zealand (1835) Te Tiriti o Waitangi — the Treaty of Waitangi (1840)  New Zealand Security Intelligence Service Act (1969)  Intelligence and Security Committee Act (1996)  Inspector-General of Intelligence and Security Act (1996) Government Communications Security Bureau Act (2003)  Intelligence and Security Act (2017) *Wildcard Resource* The Women's Suffrage Petition - Te Petihana Whakamana Pōti Wahine In 1893, this document gave all women in New Zealand the right to vote in general elections – Making New Zealand the first country in the world to enact universal women's suffrage! Learn more about your ad choices. Visit megaphone.fm/adchoices

Monocle 24: The Monocle Daily
Russia blames everyone but its intelligence services

Monocle 24: The Monocle Daily

Play Episode Listen Later Mar 28, 2024 38:34


Our panellists discuss Russia's embarrassing intelligence failures and why it's cracking down on gay nightclubs. Plus: the UK's record migration levels, Donald Trump's Bible copies and the role of religion in politics. Plus: saving the dachshund and a letter from the French Alps.See omnystudio.com/listener for privacy information.

Podcasty Aktuality.sk
The Slovak Snapshots: The Minister of Culture wants to nationalize public television

Podcasty Aktuality.sk

Play Episode Listen Later Mar 16, 2024 13:03


In the twenty-fourth episode of "The Slovak Snapshots" podcast, we'll traverse through a diverse landscape of news in Slovakia. From groundbreaking scientific achievements that will leave you in awe, to inspiring community initiatives that'll warm your heart, we've got it all covered. This podcast is purely about Slovakia in English.The Ministry of Culture of the Slovak Republic has submitted a draft law on Slovak Television and Radio to the shortened inter-ministerial consultation procedure. The current institution Radio and Television of Slovakia should not be formally split. The Director General would be elected by a seven-member board composed of three ministerial nominees and four elected in parliament. There should also be a program council, the majority of which is elected by the National Council of the Slovak Republic.Pavol Gašpar became the Deputy Director of the Slovak Information Service (SIS). According to the statement, he has acquired the capabilities of the Director of the Intelligence Service.Slovan Bratislava ended up on the shield of the club from the village, this time saying goodbye to the competition after a poor performance on the pitch. Podbrezová triumphed 3:1 at the Tehelné Pole."The Slovak Snapshots" podcast is made by Zorislav Poljak.

Communism Exposed:East and West
Wuhan Lab's Shi Zhengli was Recruiting Thousand Talent Operatives: Canadian Intelligence Service | Truth Over News

Communism Exposed:East and West

Play Episode Listen Later Mar 13, 2024 15:28


CBC Newfoundland Morning
Canada's federal intelligence service warns everyone that this year could be dangerous for 2SLGBTQ+ people. Human rights activist Gemma Hickey told us what that means for their community

CBC Newfoundland Morning

Play Episode Listen Later Feb 21, 2024 9:00


Last week, CSIS - Canada's national intelligence agency - issued a warning for people in the 2SLGBTQ+ community. The notice says extremists could "inspire and encourage" serious violence against the community, and will almost certainly continue to do that over the coming year. A CSIS spokesperson says "the ecosystem of violent rhetoric within the anti-gender movement, compounded with other extreme worldviews, can lead to serious violence." Gemma Hickey is a human rights and 2SLGBTQ+ advocate.

The Opperman Report
Alan Graham Returns - The Murder of Jim Morrison and more

The Opperman Report

Play Episode Listen Later Feb 10, 2024 52:59


Alan Graham Returns - The Murder of Jim Morrison and more4 days agoAlan Graham returns with more first hand accounts of his involvement with The Doors, the Intelligence Services and covert influencing.Alan is a legend you never heard of. A mover and shaker, an explorer and a priest. This chameleon-like man has stories first hand of what was the best time in music. Hendrix, The Stones, The Beatles... AND he was Jim Morrison's brother in law.Alan was there. He has the keys to the cupboard with the skeletons.Books and WebsiteAlan Graham's Video BlogAl Graham's TravelogueAlan Graham – Food CriticGhost Radio Network – podcast & videosWorldwide Crime Watch – podcast & videosAlan Graham's YouTube Channel

The Opperman Report
Alan Graham - Part 3

The Opperman Report

Play Episode Listen Later Feb 10, 2024 54:00


Alan Graham - Part 38 hours agoAlan Graham returns once again with more first hand accounts of his involvement with The Doors, the Intelligence Services and covert influencing.Alan is a legend you never heard of. A mover and shaker, an explorer and a priest. This chameleon-like man has stories first hand of what was the best time in music. Hendrix, The Stones, The Beatles... AND he was Jim Morrison's brother in law.Books and WebsiteAlan Graham's Video BlogAl Graham's TravelogueAlan Graham – Food CriticGhost Radio Network – podcast & videosWorldwide Crime Watch – podcast & videosAlan Graham's YouTube Channel

MOATS The Podcast with George Galloway
South Africa Buries Israel In The Hague | Trump The Frontrunner To Face Biden

MOATS The Podcast with George Galloway

Play Episode Listen Later Jan 18, 2024 67:53


On this Moats, George Galloway reflects on the images of a disoriented little girl in Gaza as she stumbles through the smoke and rubble in a stained and dishevelled party dress looking for her parents or sanctuary. How can the world look away from such an image? In the Hague, South Africa buries Israel under the accusations of genocide as Israel continues to argue its right to self defence under international law. Jewish former South African ANC commander, Ronnie Kasrils, talks his pride in his country at the Hague, a South Africa that is willing to fight for the freedoms of suppressed people and how Jews have historically opposed racism and apartheid. Palestinian-American Lawyer, Lara Elborno, says her people feel seen as South Africa refers to the Nakba and genocidal intent against the Palestinian people in the Hague and why this case may have massive ramifications across the world for suppressed people. Niko House returns to Moats to discuss the landslide victory for Donald Trump in the first contest for the Republican race for a presidential nominee and why he needs to pick his running mate carefully.Ronnie Kasrils: Former Minister of Intelligence Services of South AfricaLara Elborno: Palestinian-American International Lawyer, Activist and Co-Host of The Palestine Pod - X: https://twitter.com/thegazangirl- Instagram: https://www.instagram.com/gazangirl- YouTube: https://www.youtube.com/@ThePalestinePodNiko House: Political Commentator and Founder of MCSC Network- X: https://twitter.com/realnikohouse- Instagram: https://instagram.com/realnikohouse- Facebook: https://www.facebook.com/nikoforthepeople- YouTube: https://www.youtube.com/@Forthepeoplepodcast305 Get bonus content on Patreon Become a MOATS Graduate at https://plus.acast.com/s/moatswithgorgegalloway. Hosted on Acast. See acast.com/privacy for more information.

Travel Medicine Podcast
1011 Disease Detectives: The Epidemic Intelligence Service

Travel Medicine Podcast

Play Episode Listen Later Jan 6, 2024 49:54


Happy New Year Listeners! In this episode Drs J and Santhosh explore the secret intelligence branch fighting to keep us safe from diseases before they start! Along the way they cover Alexander Langmuir, military and science working together, the infectious avengers, the bill nye of bioterrorism, case files from epidemics, the oswego county exercise, the fellowship curriculum, disease investigation in movies and more! So sit back and relax as we debrief you on gathering disease intelligence!Support Us spiritually, emotionally or financially here! or on ACAST+travelmedicinepodcast.comX/Twitter: @doctorjcomedy @toshyfroTikotok: DrjtoksmedicineGmail: travelmedicinepodcast@gmail.comSpotify: https://open.spotify.com/show/28uQe3cYGrTLhP6X0zyEhTFacebook: facebook.com/travelmedicinepodcastPatreon: https://www.patreon.com/travelmedicinepodcastFurther Readinghttps://ajph.aphapublications.org/doi/pdf/10.2105/AJPH.42.3.239https://watermark.silverchair.com/144-Supplement_8-S16.pdf?token=AQECAHi208BE49Ooan9kkhW_Ercy7Dm3ZL_9Cf3qfKAc485ysgAAA34wggN6BgkqhkiG9w0BBwagggNrMIIDZwIBADCCA2AGCSqGSIb3DQEHATAeBglghkgBZQMEAS4wEQQMoDNLP5Pd4SAIfaBvAgEQgIIDMaZ7uEAZxG5iRAXMffAHHosAdNs8oCqB0kdTU_TTXnxSBwmBzllYos-U_H-ZpFkAGEQ-PpjZKkeJgts_JyN9kihOcnL_hsT6IhYy-t2ViE4e7wBljs9zIw2bijneQdq_blBWkcs_2X7mJsp7AiHdAeFnPJDNm9TOnHOTG4yMiRUYBEzioFxHxtV4-kaniouMTVuMafAMYl42pEoY-7Ts1kBAUGFtPmlQncFt2gCnmc41cfekAIhzCKS8WM6tTc6cbx_Jyr_ikyHb568NbeP_NQpxuRy6L1TYvoW_Yc2qh8QMg1NRHDNbC1foLSYQ1s-g-2KN_RgykC9Zn9SZXTH5xWimBQ9C0i4thz0NOEHnZbUr4Q0yZ8yc5r0QSYkcYB-Vf5E-_O_2ujNmM2TXvfR5iEliD4boCaO0jeF8fqKoDqQGLdXyd26BifAWgItBPlcodURKq_btxU5dcL3UahGxMiFSKHfsLim5q9WjuFfrLcXWDRb0_7z_TzHtJR0Y4vIyKaMYmBXFH41pqk05_OLfnqo4Il0O9wnqNW6DHXeqWuXin0gf5whhEKqu8li3U6x-UWmBG4DRFedXYtLoGbY4bU0sCp4bIrQiuCjfArHkrouoLlS2n7UbFXmjUF14UiTCJ4xd53DWn1aL12nA_54YPAEMIfGRg7Ou6_opOFQNYZpvhBDadABOZ416B16FNuJ5hfoNG1Fbe3zEsp5AjZVxlO1Z12DIUvLIezinaiffZUTnM459l5JBDzXsyyj3WESc2nLtd5k25XYDg1GU4BaaWPAdDnjx9cMYoJIqwZhJ1p7KliHTDJO4eILRTOUfgTW5Pqk9xw7-BfuFqNJAza_2d4M02enTIfiYMBp46rGnW9s0WzK9XQpeiTR2SuIr8-0PXji2sBtm0Lb0P1S4vX5eonypPBVgk98FNE8UDUkbS5pPmOSDs8eWOyjZBenuLYKupz5SgixvzYNcK_N3DVlPW8yU2tXm5Nkj9MiHxtkzTBLeOgAh1Aegx1jNPm7bmMDeWq_U8tkm3AnNfNkVbDaUzzDF8WZuVLcT4Qewj0vy_pMG8qvw_HENghTM5IMCRNYZZZ8 Supporting us monthly has all sorts of perks! You get ad free episodes, bonus musical parody, behind the scenes conversations not available to regular folks and more!! Your support helps us to pay for more guest interviews, better equipment, and behind the scenes people who know what they are doing! https://plus.acast.com/s/travelmedicinepodcast. Hosted on Acast. See acast.com/privacy for more information.

@BEERISAC: CPS/ICS Security Podcast Playlist
Encore: Active visibility into OT systems.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 28, 2023 41:48


Podcast: Control Loop: The OT Cybersecurity Podcast (LS 35 · TOP 3% what is this?)Episode: Encore: Active visibility into OT systems.Pub date: 2023-12-27Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek's ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA's ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services.Control Loop News Brief.Rockwell Stratix routers vulnerable to Cisco zero-day.PN1653 | Stratix® 5800 & 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation)SecurityWeek's ICS Cyber Security Conference.2023 ICS Cybersecurity Conference (SecurityWeek)Malware attacks against IoT devices increase by 400%.Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler)Nuclear power plant operator cited over cybersecurity plan.UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK)Rockwell and Dragos announce partnership.Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire)CISA's ICS advisories.CISA Releases Two Industrial Control Systems Advisories (CISA)Hitachi Energy's RTU500 Series Product (Update B) (CISA)CISA Releases Nine Industrial Control Systems Advisories (CISA)Control Loop Interview.Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems. Control Loop Learning Lab.On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence.Control Loop OT Cybersecurity Briefing.A companion monthly newsletter is available through free subscription and on the CyberWire's website.The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Encore: Active visibility into OT systems.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 28, 2023 41:48


Podcast: Control Loop: The OT Cybersecurity Podcast (LS 33 · TOP 5% what is this?)Episode: Encore: Active visibility into OT systems.Pub date: 2023-12-27Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek's ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA's ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services.Control Loop News Brief.Rockwell Stratix routers vulnerable to Cisco zero-day.PN1653 | Stratix® 5800 & 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation)SecurityWeek's ICS Cyber Security Conference.2023 ICS Cybersecurity Conference (SecurityWeek)Malware attacks against IoT devices increase by 400%.Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler)Nuclear power plant operator cited over cybersecurity plan.UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK)Rockwell and Dragos announce partnership.Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire)CISA's ICS advisories.CISA Releases Two Industrial Control Systems Advisories (CISA)Hitachi Energy's RTU500 Series Product (Update B) (CISA)CISA Releases Nine Industrial Control Systems Advisories (CISA)Control Loop Interview.Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems. Control Loop Learning Lab.On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence.Control Loop OT Cybersecurity Briefing.A companion monthly newsletter is available through free subscription and on the CyberWire's website.The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The CyberWire
Encore: Active visibility into OT systems. [Control Loop]

The CyberWire

Play Episode Listen Later Dec 27, 2023 41:48 Very Popular


Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek's ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA's ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services. Control Loop News Brief. Rockwell Stratix routers vulnerable to Cisco zero-day. PN1653 | Stratix® 5800 & 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation) SecurityWeek's ICS Cyber Security Conference. 2023 ICS Cybersecurity Conference (SecurityWeek) Malware attacks against IoT devices increase by 400%. Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler) Nuclear power plant operator cited over cybersecurity plan. UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK) Rockwell and Dragos announce partnership. Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire) CISA's ICS advisories. CISA Releases Two Industrial Control Systems Advisories (CISA) Hitachi Energy's RTU500 Series Product (Update B) (CISA) CISA Releases Nine Industrial Control Systems Advisories (CISA) Control Loop Interview. Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems.  Control Loop Learning Lab. On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence. Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

Control Loop: The OT Cybersecurity Podcast
Encore: Active visibility into OT systems.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later Dec 27, 2023 41:48


Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek's ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA's ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services. Control Loop News Brief. Rockwell Stratix routers vulnerable to Cisco zero-day. PN1653 | Stratix® 5800 & 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation) SecurityWeek's ICS Cyber Security Conference. 2023 ICS Cybersecurity Conference (SecurityWeek) Malware attacks against IoT devices increase by 400%. Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler) Nuclear power plant operator cited over cybersecurity plan. UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK) Rockwell and Dragos announce partnership. Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire) CISA's ICS advisories. CISA Releases Two Industrial Control Systems Advisories (CISA) Hitachi Energy's RTU500 Series Product (Update B) (CISA) CISA Releases Nine Industrial Control Systems Advisories (CISA) Control Loop Interview. Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems.  Control Loop Learning Lab. On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence. Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

AP Audio Stories
UK says Russia's intelligence service behind sustained attempts to meddle in British democracy

AP Audio Stories

Play Episode Listen Later Dec 7, 2023 0:32


AP correspondent Karen Chammas reports.

Silicon Curtain
296. Yuri Felshtinsky - Russia Went from Red Terror to a Terrorist State led by the Intelligence Services

Silicon Curtain

Play Episode Listen Later Nov 24, 2023 70:59


INTRO: The history of Russia after 1917 is traditionally written as the rise of the Communist Party, and its entrenchment in power throughout the 20th century. But is this missing a key piece of the equation? Yuri Felshtinsky and Vladimir Popov have written a stunning book, that benefits from the trove of new historical sources available from inside the Russian secret services. It retells the familiar story from an entirely new angle – starting with the pivotal role of Felix Dzerzhinsky, the leader of the Communist Secret Service, the Cheka. It then traces the intense and bitter struggles of the Cheka to wrest state control from the Communist party. With the presidency of Vladimir Putin in 1999, Dzerzhinsky's ultimate goal finally came to fruition. It explains why modern Russia, a state without ideology, is the world's only mafia-state programmed to forever extort, pillage and loot it's people and the world. ---------- ABOUT: Dr Yuri Felshtinsky is a prominent author, historian, and journalist, and expert on Russia and the former Soviet Union. He has appeared in print, TV, and radio interviews worldwide, and is widely known as co-author of the book “Blowing Up Russia” with Alexander Litvinenko, a former Lieutenant Colonel in the FSB who was poisoned with radioactive polonium in London in 2006. ---------- LINKS: https://www.amazon.co.uk/Red-Terror-Mafia-State-Intelligence/dp/1783342501/ref=sr_1_1?crid=3AZ4FJFR61BZ1&keywords=popov&qid=1699637170&sprefix=popov%2Caps%2C148&sr=8-1 ---------- BOOKS: From Red Terror to Terrorist State: Russia's Secret Intelligence Services and Their Fight for World Domination from Felix Dzerzhinsky to Vladimir Putin Hardcover – 4 Nov. 2023 by Yuri Felshtinsky (Author), Vladimir Popov (Author) Publisher: Gibson House ----- WATCH NEXT: Denis Zakharov https://youtu.be/HCVPAJrAoyI Vlad Vexler https://youtu.be/RDQ92lLLwyM Konstantin Samoilov https://youtu.be/gbINoWwiq-Y Boris Bondarev https://youtu.be/-fP-vggvDXo Konstantin von Eggert MBE (Hon) https://youtu.be/Rj6pTGVlG1E ---------- PLATFORMS: Twitter: https://twitter.com/CurtainSilicon Instagram: https://www.instagram.com/siliconcurtain/ Podcast: https://open.spotify.com/show/4thRZj6NO7y93zG11JMtqm Linkedin: https://www.linkedin.com/in/finkjonathan/ Patreon: https://www.patreon.com/siliconcurtain ---------- Welcome to the Silicon Curtain podcast. Please like and subscribe if you like the content we produce. It will really help to increase the popularity of our content in YouTube's algorithm. Our material is now being made available on popular podcasting platforms as well, such as Spotify and Apple Podcasts.

Spybrary
A Spy Alone - Interview with Charles Beaumont, Former MI6 Officer Turned Author

Spybrary

Play Episode Listen Later Nov 20, 2023 54:11


David Clark interviews former MI6 officer and debut author Charles Beaumont, whose novel A Spy Alone has just been published in the UK. (Available on Kindle elsewhere.) A QUICK HEADS UP. A Spybrary first, due to Charles Beaumont's work for the Intelligence Services, our technical division has digitally altered his voice to protect his identity. Spybrary's David Clark and Charles Beaumont discuss the themes of the book, including Russian interference in the UK's political affairs, the complexities of modern espionage, and the influence of spy fiction on real-world intelligence operations. Charles shares his literary influences, the portrayal of characters in his book, and the challenges of writing spy fiction in the post-Cold War era. Charles also reveals which spy movies and spy TV series he rates best!

Management Matters Podcast
Artificial Intelligence Services to Citizens with Jim Williams, David Bray, and Alan Shark

Management Matters Podcast

Play Episode Listen Later Nov 13, 2023 30:36


In this episode of Management Matters we host part 1 of the Academy-GovExec TV  series on Artificial Intelligence featuring Academy Fellows, Jim Williams, David Bray, and Alan Shark, moderated by GovExec's George Jackson.  This first episode focuses on how AI can best be used by government agencies to interact with the public when offering services.  Support the Podcast Today at:donate@napawash.org or 202-347-3190Music Credits: Sea Breeze by Vlad Gluschenko | https://soundcloud.com/vgl9Music promoted by https://www.free-stock-music.comCreative Commons Attribution 3.0 Unported Licensehttps://creativecommons.org/licenses/by/3.0/deed.en_

@BEERISAC: CPS/ICS Security Podcast Playlist
Active visibility into OT systems.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 2, 2023 41:48


Podcast: Control Loop: The OT Cybersecurity Podcast (LS 33 · TOP 5% what is this?)Episode: Active visibility into OT systems.Pub date: 2023-11-01Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek's ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA's ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services.Control Loop News Brief.Rockwell Stratix routers vulnerable to Cisco zero-day.PN1653 | Stratix® 5800 & 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation)SecurityWeek's ICS Cyber Security Conference.2023 ICS Cybersecurity Conference (SecurityWeek)Malware attacks against IoT devices increase by 400%.Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler)Nuclear power plant operator cited over cybersecurity plan.UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK)Rockwell and Dragos announce partnership.Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire)CISA's ICS advisories.CISA Releases Two Industrial Control Systems Advisories (CISA)Hitachi Energy's RTU500 Series Product (Update B) (CISA)CISA Releases Nine Industrial Control Systems Advisories (CISA)Control Loop Interview.Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems. Control Loop Learning Lab.On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence.Control Loop OT Cybersecurity Briefing.A companion monthly newsletter is available through free subscription and on the CyberWire's website.The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Active visibility into OT systems.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 2, 2023 41:48


Podcast: Control Loop: The OT Cybersecurity Podcast (LS 35 · TOP 3% what is this?)Episode: Active visibility into OT systems.Pub date: 2023-11-01Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek's ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA's ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services.Control Loop News Brief.Rockwell Stratix routers vulnerable to Cisco zero-day.PN1653 | Stratix® 5800 & 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation)SecurityWeek's ICS Cyber Security Conference.2023 ICS Cybersecurity Conference (SecurityWeek)Malware attacks against IoT devices increase by 400%.Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler)Nuclear power plant operator cited over cybersecurity plan.UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK)Rockwell and Dragos announce partnership.Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire)CISA's ICS advisories.CISA Releases Two Industrial Control Systems Advisories (CISA)Hitachi Energy's RTU500 Series Product (Update B) (CISA)CISA Releases Nine Industrial Control Systems Advisories (CISA)Control Loop Interview.Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems. Control Loop Learning Lab.On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence.Control Loop OT Cybersecurity Briefing.A companion monthly newsletter is available through free subscription and on the CyberWire's website.The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Dubious
Breaking the Iron Wall: How Israel's Feared Intelligence Services Missed the Hamas Attack

Dubious

Play Episode Listen Later Nov 1, 2023 869115:55


We discuss Israel's use of white phosphorus incendiary bombs in Gaza and how Hamas planned the attack in plain sight, posting a training video in which they broke through a full-scale replica of the Israeli border wall just 2 weeks before Oct 7.Visit betterhelp.com/DUBIOUS today to get 10% off your first month of therapy. If you like our content, please become a patron to get all our episodes ad-free. First, we look at the humanitarian situation in Gaza, the communications blackout and Israel's use of white phosphorus, violating international humanitarian law. Human Rights Watch verified videos “taken in Lebanon and Gaza on October 10 and 11, 2023, respectively, showing multiple airbursts of artillery-fired white phosphorus over the Gaza City port and two rural locations along the Israel-Lebanon border, and interviewed people who described an attack in Gaza. (…) Upon contact, white phosphorus can burn people, thermally and chemically, down to the bone as it is highly soluble in fat and therefore in human flesh. White phosphorus fragments can exacerbate wounds even after treatment, entering the bloodstream and causing multiple organ failure. Already dressed wounds can reignite when dressings are removed, and the wounds are re-exposed to oxygen. Even relatively minor burns are often fatal.” 1 Then we address the multiple and catastrophic security failures by Israel's intelligence community and military. We look at SIGINT, HUMINT and IMINT failures. How did Shin Bet, the Mossad and the IDF miss this attack? Here are the main points: Intelligence officers failed to monitor certain communication channels used by Palestinian attackers. Military personnel and intelligence officers over relied on border surveillance equipment that was easily shut down by attackers. The commanders were all in one place, clustered in a single border base, that was overrun in the initial phase of the incursion, preventing communication with the rest of the armed forces. Intelligence officers accepted at face value assertions by Hamas military leaders, made on private channels, that they were not preparing for battle. The officers were aware that Hamas knew these phone calls were being monitored by Israel. 2 Another issue we address is Israeli reservists' criticism for Yair Netanyahu, Benjamin Netanyahu's son, who remains in Miami rather than joining the fight against Hamas. The 32-year-old is currently living in Florida, where he moved in April 2023, after he was sued for defamation in Israel over social media posts against a political activist. 3 We also discuss Israel's ground invasion (land incursion) in Gaza and the regional ripple effects: as Israel pushes ahead, regional players are preparing their next moves. Hezbollah might attack from the north, and Iran has hinted at getting involved directly. Egypt, Lebanon, Syria, and Turkey might play crucial roles in the coming weeks. While Qatar is trying to negotiate with Hamas, Saudi Arabia is staying out of the mix. Also included: the Gaza tunnels, the hostages, similarities to 9/11 from an intelligence perspective, Benjamin Netanyahu's stance on a two-state solution and his policies which ensured Hamas is not eradicated, and what might come next. 1. Human Rights Watch Israel: White Phosphorus Used in Gaza, Lebanon Human Rights Watch, October 2023 ⇤2. Ronen Bergman and Patrick Kingsley How Israel's Feared Security Services Failed to Stop Hamas's Attack The New York Times, October 2023 ⇤3. Graeme Massie Israeli reservists question absence of Netanyahu's son who remains in Miami Independent, October 2023 ⇤

Control Loop: The OT Cybersecurity Podcast
Active visibility into OT systems.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later Nov 1, 2023 41:48


Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek's ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA's ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services. Control Loop News Brief. Rockwell Stratix routers vulnerable to Cisco zero-day. PN1653 | Stratix® 5800 & 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation) SecurityWeek's ICS Cyber Security Conference. 2023 ICS Cybersecurity Conference (SecurityWeek) Malware attacks against IoT devices increase by 400%. Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler) Nuclear power plant operator cited over cybersecurity plan. UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK) Rockwell and Dragos announce partnership. Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire) CISA's ICS advisories. CISA Releases Two Industrial Control Systems Advisories (CISA) Hitachi Energy's RTU500 Series Product (Update B) (CISA) CISA Releases Nine Industrial Control Systems Advisories (CISA) Control Loop Interview. Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems.  Control Loop Learning Lab. On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence. Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

The CyberWire
Some intelligence services understand the value of being underestimated.

The CyberWire

Play Episode Listen Later Oct 26, 2023 30:22


StripedFly gets reclassified. YoroTrooper is interested in the Commonwealth of Independent States. The current state of DDoS attacks. Ukrainian hacktivists deface Russian artists' Spotify pages. Trolls amplify a Musky meme. In our Industry Voices segment, Matt Howard from Virtru explains securing data at the employee edge. Our guest is Seth Blank from Valimail, to discuss email security and DMARC. And while trolls might like Mr.Musk, the crooks heart Mr. Gosling. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/205 Selected reading. Sophisticated StripedFly Spy Platform Masqueraded for Years as Crypto Miner (Zeroday) Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan (Cisco Talos Blog) DDoS threat report for 2023 Q3 (The Cloudflare Blog)  Russian artists' Spotify accounts defaced by pro-Ukraine hackers (Record)  Elon Musk Mocked Ukraine, and Russian Trolls Went Wild (WIRED) Ryan Gosling Tops McAfee's 2023 Hacker Celebrity Hot List (Business Wire) Learn more about your ad choices. Visit megaphone.fm/adchoices

@BEERISAC: CPS/ICS Security Podcast Playlist
A look at a Whole-of-State cybersecurity strategy.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 20, 2023 51:52


Podcast: Control Loop: The OT Cybersecurity Podcast (LS 35 · TOP 3% what is this?)Episode: A look at a Whole-of-State cybersecurity strategy.Pub date: 2023-10-18Microsoft on the state of OT security. Israeli and Palestinian hacktivists target ICS. Coinmining as an (alleged, potential) front for espionage or stage for sabotage. EPA withdraws water system cybersecurity memorandum. Colonial Pipeline says new ransomware claims are due to unrelated third-party breach. Most organizations are struggling with IoT security. CISA views China as the top threat to US critical infrastructure. Improving security for open-source ICS software. CISA ICS advisories. Guest Kuldip Mohanty, CIO of North Dakota, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Kuldip shares how critical infrastructure is treated within the "Whole-of-State” cybersecurity strategy his team implements in North Dakota. On the Learning Lab, Mark Urban shares the first part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services.Control Loop News Brief.Microsoft on the state of OT security.Microsoft Digital Defense Report 2023 (Microsoft)Microsoft Digital Defense Report: Behind the Scenes Creating OT Vulnerabilities (aDolus)Zero-days affect industrial routers.10 zero-day vulnerabilities in industrial cell router could lead to code execution, buffer overflows (Cisco Talos)Israeli and Palestinian hacktivists target ICS.Hacktivists in Palestine and Israel after SCADA and other industrial control systems (Cybernews)Coinmining as an (alleged, potential) front for espionage or stage for sabotage.Across U.S., Chinese Bitcoin Mines Draw National Security Scrutiny (The New York Times)EPA withdraws water system cybersecurity memorandum.EPA withdraws cyber audit requirement for water systems (Nextgov)Colonial Pipeline says new ransomware claims are due to unrelated third-party breach.Reports of second cyberattack on Colonial Pipeline false, company says (Fox 5 Atlanta)Colonial Pipeline attributes ransomware claims to ‘unrelated' third-party data breach (The Record)Most organizations are struggling with IoT security.New Global Survey Reveals 97% of Organizations Face Challenges Securing IoT and Connected Devices (Keyfactor)Ransomware attack on Clorox.Clorox Security Breach Linked to Group Behind Casino Hacks (Bloomberg)Clorox Warns of a Sales Mess After Cyberattack (The Wall Street Journal)CISA views China as the top threat to US critical infrastructure.China is top cyber threat to US utilities, other critical infrastructure: CISA (Utility Dive)Improving security for open-source ICS software.Improving Security of Open Source Software in Operational Technology and Industrial Control Systems (CISA)CISA's ICS advisories.Mitsubishi Electric MELSEC-Q Series PLCs (Update A) (CISA)CISA Releases Nineteen Industrial Control Systems Advisories (CISA)Control Loop Interview.Guest is Kuldip Mohanty, CIO of North Dakota, discussing how critical infrastructure is treated within the “whole of state” security strategy used in North Dakota.Control Loop Learning Lab.On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, to examine cyber threat intelligence. Control Loop OT Cybersecurity Briefing.A companion monthly newsletter is available through free subscription and on the CyberWire's website.The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
A look at a Whole-of-State cybersecurity strategy.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 20, 2023 51:52


Podcast: Control Loop: The OT Cybersecurity Podcast (LS 33 · TOP 5% what is this?)Episode: A look at a Whole-of-State cybersecurity strategy.Pub date: 2023-10-18Microsoft on the state of OT security. Israeli and Palestinian hacktivists target ICS. Coinmining as an (alleged, potential) front for espionage or stage for sabotage. EPA withdraws water system cybersecurity memorandum. Colonial Pipeline says new ransomware claims are due to unrelated third-party breach. Most organizations are struggling with IoT security. CISA views China as the top threat to US critical infrastructure. Improving security for open-source ICS software. CISA ICS advisories. Guest Kuldip Mohanty, CIO of North Dakota, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Kuldip shares how critical infrastructure is treated within the "Whole-of-State” cybersecurity strategy his team implements in North Dakota. On the Learning Lab, Mark Urban shares the first part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services.Control Loop News Brief.Microsoft on the state of OT security.Microsoft Digital Defense Report 2023 (Microsoft)Microsoft Digital Defense Report: Behind the Scenes Creating OT Vulnerabilities (aDolus)Zero-days affect industrial routers.10 zero-day vulnerabilities in industrial cell router could lead to code execution, buffer overflows (Cisco Talos)Israeli and Palestinian hacktivists target ICS.Hacktivists in Palestine and Israel after SCADA and other industrial control systems (Cybernews)Coinmining as an (alleged, potential) front for espionage or stage for sabotage.Across U.S., Chinese Bitcoin Mines Draw National Security Scrutiny (The New York Times)EPA withdraws water system cybersecurity memorandum.EPA withdraws cyber audit requirement for water systems (Nextgov)Colonial Pipeline says new ransomware claims are due to unrelated third-party breach.Reports of second cyberattack on Colonial Pipeline false, company says (Fox 5 Atlanta)Colonial Pipeline attributes ransomware claims to ‘unrelated' third-party data breach (The Record)Most organizations are struggling with IoT security.New Global Survey Reveals 97% of Organizations Face Challenges Securing IoT and Connected Devices (Keyfactor)Ransomware attack on Clorox.Clorox Security Breach Linked to Group Behind Casino Hacks (Bloomberg)Clorox Warns of a Sales Mess After Cyberattack (The Wall Street Journal)CISA views China as the top threat to US critical infrastructure.China is top cyber threat to US utilities, other critical infrastructure: CISA (Utility Dive)Improving security for open-source ICS software.Improving Security of Open Source Software in Operational Technology and Industrial Control Systems (CISA)CISA's ICS advisories.Mitsubishi Electric MELSEC-Q Series PLCs (Update A) (CISA)CISA Releases Nineteen Industrial Control Systems Advisories (CISA)Control Loop Interview.Guest is Kuldip Mohanty, CIO of North Dakota, discussing how critical infrastructure is treated within the “whole of state” security strategy used in North Dakota.Control Loop Learning Lab.On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, to examine cyber threat intelligence. Control Loop OT Cybersecurity Briefing.A companion monthly newsletter is available through free subscription and on the CyberWire's website.The podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control Loop: The OT Cybersecurity Podcast
A look at a Whole-of-State cybersecurity strategy.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later Oct 18, 2023 51:52


Microsoft on the state of OT security. Israeli and Palestinian hacktivists target ICS. Coinmining as an (alleged, potential) front for espionage or stage for sabotage. EPA withdraws water system cybersecurity memorandum. Colonial Pipeline says new ransomware claims are due to unrelated third-party breach. Most organizations are struggling with IoT security. CISA views China as the top threat to US critical infrastructure. Improving security for open-source ICS software. CISA ICS advisories. Guest Kuldip Mohanty, CIO of North Dakota, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Kuldip shares how critical infrastructure is treated within the "Whole-of-State” cybersecurity strategy his team implements in North Dakota. On the Learning Lab, Mark Urban shares the first part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos' Director of Intelligence Services. Control Loop News Brief. Microsoft on the state of OT security. Microsoft Digital Defense Report 2023 (Microsoft) Microsoft Digital Defense Report: Behind the Scenes Creating OT Vulnerabilities (aDolus) Zero-days affect industrial routers. 10 zero-day vulnerabilities in industrial cell router could lead to code execution, buffer overflows (Cisco Talos) Israeli and Palestinian hacktivists target ICS. Hacktivists in Palestine and Israel after SCADA and other industrial control systems (Cybernews) Coinmining as an (alleged, potential) front for espionage or stage for sabotage. Across U.S., Chinese Bitcoin Mines Draw National Security Scrutiny (The New York Times) EPA withdraws water system cybersecurity memorandum. EPA withdraws cyber audit requirement for water systems (Nextgov) Colonial Pipeline says new ransomware claims are due to unrelated third-party breach. Reports of second cyberattack on Colonial Pipeline false, company says (Fox 5 Atlanta) Colonial Pipeline attributes ransomware claims to ‘unrelated' third-party data breach (The Record) Most organizations are struggling with IoT security. New Global Survey Reveals 97% of Organizations Face Challenges Securing IoT and Connected Devices (Keyfactor) Ransomware attack on Clorox. Clorox Security Breach Linked to Group Behind Casino Hacks (Bloomberg) Clorox Warns of a Sales Mess After Cyberattack (The Wall Street Journal) CISA views China as the top threat to US critical infrastructure. China is top cyber threat to US utilities, other critical infrastructure: CISA (Utility Dive) Improving security for open-source ICS software. Improving Security of Open Source Software in Operational Technology and Industrial Control Systems (CISA) CISA's ICS advisories. Mitsubishi Electric MELSEC-Q Series PLCs (Update A) (CISA) CISA Releases Nineteen Industrial Control Systems Advisories (CISA) Control Loop Interview. Guest is Kuldip Mohanty, CIO of North Dakota, discussing how critical infrastructure is treated within the “whole of state” security strategy used in North Dakota. Control Loop Learning Lab. On the Learning Lab, Mark Urban is joined by Dragos' Director of Intelligence Services, Paul Lukoskie, to examine cyber threat intelligence.  Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

Control Loop: The OT Cybersecurity Podcast
Intelligence services within the convergence of OT and IT.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later Sep 6, 2023 37:27


Crude "cyberattack" on rail control systems stops Polish trains. Energy One discloses cyberattack against its corporate systems. NIAC calls for a National Water Strategy. Department of Energy holds contest to provide cybersecurity funding for rural utilities. Researchers aim to secure US military's power grids. A technical issue grounds the UK's air traffic control system's automated features. Guest Mark Ryland, Director of the Office of the CISO at Amazon Web Services, joining us as part of a Dragos webinar, Securing Digital Transformation: OT Cybersecurity Innovation and Resilience. On the Learning Lab, Mark Urban is joined by Dragos Vice President of Product Management Kimberly Graham in part three of their discussion on the convergence of OT and IT.  Control Loop News Brief. Crude "cyberattack" on rail control systems stops Polish trains. Two Men Arrested Following Poland Railway Hacking (SecurityWeek) Century-old technology hack brought 20 trains to a halt in Poland (Cybernews) Poland investigates hacking attack on state railway network (Reuters) Poland investigates train mishaps for possible Russian connection (Washington Post) Energy One discloses cyberattack against its corporate systems. Australian Energy Software Firm Energy One Hit by Cyberattack (SecurityWeek) US energy company suffers third-party data breach. Eversource Data Breach: Utility Warns MA Customers (Patch) NIAC calls for a National Water Strategy. Presidential Council Calls for Water Department to Address Cyber Threats (MeriTalk) Department of Energy holds contest to provide cybersecurity funding for rural utilities. DOE launches cyber contest to benefit rural utilities (CyberScoop) Researchers aim to secure US military's power grids. Protecting the protectors: Virginia Tech researchers work to secure power grid communication on military bases. (Newswise) A technical issue grounds the UK's air traffic control system's automated features. Cancelled flights: Air traffic disruption caused by flight data issue (BBC) Flight chaos ‘to last for days' after air traffic control failure (The Telegram) Control Loop Interview. Our guest is Mark Ryland, Director of the Office of the CISO at Amazon Web Services, joining us as part of a Dragos webinar, Securing Digital Transformation: OT Cybersecurity Innovation and Resilience. You can view the entire webinar here.  Control Loop Learning Lab. On the Learning Lab, Mark Urban is joined by Dragos Vice President of Product Management Kimberly Graham in part three of their discussion on the convergence of OT and IT.  Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

Don't Look Now
238 - The FBI

Don't Look Now

Play Episode Listen Later Sep 5, 2023 34:13


Take a listen and learn about the history and formation of the FBI, the US's most famous federal intelligence and law enforcement service.

Channel Partners Online
Coffee with Craig and James Episode No. 128: Channel Partner Strategies Intelligence Service

Channel Partners Online

Play Episode Listen Later Aug 25, 2023 51:52


The most successful partner businesses don't get there by accident. A dedication to proven channel partner strategies helped them become the companies they are today. Channel Futures, its parent company, Informa Tech, and research arm Omdia, have a new, first-of-its-kind service available to the entire channel community that's poised to make a huge impact on decision-making for companies that choose to take advantage of the offer. That's why Craig and James invited Debbie Kane and Devan Adams, the team behind the brand-new Channel Futures research and consulting practice, to the podcast. They discuss the goals of the new practice and share some of the information they've already unveiled that might just surprise you. You'll also find out how to take advantage of their research. Of course, we'll update you on the latest sessions added to the Channel Futures Leadership Summit agenda and talk about the news stories of the week we've found to be most compelling. Go here for access to Debbie and Devan's work, on the Omdia Channel Partner Strategies Intelligence Service webpage: https://omdia.tech.informa.com/products/channel-partner-strategies-intelligence-service

The CyberWire
Cyberespionage by several intelligence services, some of contracted out. Developments in the cyber underworld. Vulnerabilities reported in CPUs. Some notes on Patch Tuesday.

The CyberWire

Play Episode Listen Later Aug 9, 2023 31:23


Reports of a Wide-ranging cyberespionage campaign by China's Ministry of State Security. EvilProxy phishing tool targets executives, and defeats multifactor authentication. Vulnerabilities in CPUs. Yashma ransomware targets a wide range of countries. MacOS threat trends. Is there a Russian attempt to disrupt British elections? Rob Boyce from Accenture checks in from the Blackhat conference. Maria Varmazis talking with Black Hat Aerospace Village's Kaylin Trychon and Steve Luczynski. Ukraine claims to have stopped a Russian spyware campaign. And Patch Tuesday has come and gone, but the vulnerabilities remain–unless, of course, you've applied the patches. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/151 Selected reading. Chinese hackers targeted at least 17 countries across Asia, Europe and North America (Record) RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale (Recorded Future) Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations (Proofpoint)  ‘Downfall' vulnerability leaves billions of Intel CPUs at risk  (CyberScoop)  New Inception attack leaks sensitive data from all AMD Zen CPUs (BleepingComputer) New Yashma Ransomware Variant Targets Multiple English-Speaking Countries (The Hacker News)  Suspected Vietnamese hacker targets Chinese, Bulgarian organizations with new ransomware (Record) Black Hat USA 2023 – Bitdefender macOS Threat Report Reveals Key Dangers for Mac Users (Bitdefender)  Russia ‘tops list of suspects' in cyber attack which exposed data of 40m UK voters (The Telegraph) Electoral Commission hack: Five things you need to know (Computing) ‘Hostile actors' hacked British voter registry, electoral agency says (Washington Post) Electoral Commission apologises for security breach involving UK voters' data (the Guardian)  Ukraine says it prevented Russian hacking of armed forces combat system (Reuters)  Ukraine says it thwarted attempt to breach military tablets (Record) Russian secret services try to penetrate operation planning electronic system of Ukraine's army (Ukrainska Pravda) Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns (SecurityWeek)  Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days (SecurityWeek) Microsoft Releases August 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA) Fortinet Releases Security Update for FortiOS (Cybersecurity and Infrastructure Security Agency CISA) Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)  Patch Tuesday review: August 2023. (CyberWire)

EpochTV
Is America's Foreign Intelligence Service Interfering in US Elections?

EpochTV

Play Episode Listen Later Apr 12, 2023 39:11


Over the last decade, the U.S. government has turned its attention from hostile foreign actors to ordinary American citizens. It's the assault on our constitutional rights that threatens to turn a beacon of democracy into a third-world security regime. And in the middle of this “whole of society” approach to censorship, surveillance, and propaganda is the agency tasked to keep Americans safe at home and abroad—the CIA. ⭕️ Watch in-depth videos based on Truth & Tradition at Epoch TV

The CyberWire
Pyongyang's intelligence services have been busy in cyberspace. Hacktivists exaggerate the effects of their attacks on OT. Ghostwriter is back. A twice-told tale: ineffective cyberwar campaigns.

The CyberWire

Play Episode Listen Later Mar 23, 2023 27:24


DPRK threat actor Kimsuky uses a Chrome extension to exfiltrate emails, while ScarCruft prospects South Korean organizations. Hacktivists' claims of attacks on OT networks may be overstated. Ghostwriter remains active in social engineering attempts to target Ukrainian refugees. Joe Carrigan has cyber crime by the numbers. Our guest is Christian Sorensen from SightGain with analysis of the cyber effects of Russia's war. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/56 Selected reading. North Korean hackers using Chrome extensions to steal Gmail emails (BleepingComputer) Joint Cyber Security Advisory (Korean) (BundesamtfuerVerfassungsschutz) North Korean APT group ‘Kimsuky' targeting experts with new spearphishing campaign (Record) ScarCruft's Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques (The Hacker News) The Unintentional Leak: A glimpse into the attack vectors of APT37 (Zscaler) CHM Malware Disguised as Security Email from a Korean Financial Company: Redeyes (Scarcruft) (ASEC BLOG)  A Propaganda Group is Using Fake Emails to Target Ukrainian Refugees (Bloomberg)  We (Did!) Start the Fire: Hacktivists Increasingly Claim Targeting of OT Systems | Mandiant (Mandiant) Fact or fiction, hacktivists' claims of industrial sabotage in Russia or Ukraine get attention online (CyberScoop) The 5×5—Conflict in Ukraine's information environment (Atlantic Council) How the Russia-Ukraine conflict has impacted cyber-warfare (teiss) CommonMagic APT gang attacking organisations in Ukraine (Tech Monitor)

The CyberWire
How the C2C market sustains ransomware gangs. In Russia's war, intelligence services deploy wipers, and hacktivist auxiliaries handle the DDoS. And a look into other corners of the cyber underworld.

The CyberWire

Play Episode Listen Later Feb 1, 2023 32:34


Microsoft tallies more than a hundred ransomware gangs. Sandworm's NikoWiper hits Ukraine's energy sector. Mobilizing cybercriminals in a hybrid war. Firebrick Ostrich and business email compromise. Telegram is used for sharing stolen data and selling malware. Crypto scams find their way into app stores. Bryan Vorndran of the FBI Cyber Division outlines the services the FBI provides during an incident response. Ann Johnson from Afternoon Cyber Tea speaks with actor producer Tim Murck about the intersection of cyber awareness and storytelling. And we are shocked - shocked! - that there are fraudulent cyber professional credentials circulating online. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/21 Selected reading. Microsoft: Over 100 threat actors deploy ransomware in attacks (BleepingComputer)  SocGholish: A Tale of FakeUpdates (Reliaquest) ESET APT Activity Report T3 2022 (WeLiveSecurity)  Pro-Russian DDoS attacks raise alarm in Denmark, U.S. (The Record from Recorded Future News) ChristianaCare's website restored after attack; pro-Russia 'hacktivist' group takes credit (Delaware News Journal) Univ. of Iowa Hospitals website possibly hit by cyberattack (KCRG) Cyber attack causes problems with UM Health websites (The Detroit News) How the war in Ukraine has strengthened the Kremlin's ties with cybercriminals (The Record from Recorded Future News) Dark Covenant 2.0: Cybercrime, the Russian State, and War in Ukraine (Recored Future) Russia's cyberwar against Ukraine offers vital lessons for the West (Atlantic Council)  BEC Group Uses Secondary Personas & Lookalike Domains in Third-Party… (Abnormal Intelligence) Telegram's place in the cyber underworld. (CyberWire) Crypto scams found in the App Store. (CyberWire) Exposure to third-party risk. (CyberWire) Cyber certification deceit. (CyberWire)

The Todd Herman Show
Do we have laws? Do we have a national intelligence service? Do we have a national police force? Precise language ... Ep_579_Hr-1

The Todd Herman Show

Play Episode Listen Later Jan 16, 2023 48:20


Do we have laws? Do we have a national intelligence service? Do we have a national police force? Precise language can defeat propaganda. Laws apply to everyone. Diktats are selective. What do we have? The man who filmed Ray Epps is going to prison for 60-days while Epps--who appears to be one of the key J6 breach-team players--is still walking around free. Joe Biden's staff has suddenly decided to do some Winter cleaning of the FigureHead's offices and homes and--would you lookie there?--he has classified documents scattered about . . . documents he could not have declassified. Will the FBI sweep his homes and offices? One of the FigureHead's offices at the U-Penn is in a facility funded by the CCP . . . will our national security apparatus call out the alarm? We either have laws or diktats, a national police force or a diktat-enforcing body, a national security program or international diktat enforcing agencies. What does God say? The Lord Jesus taught the apostles that exactly none of us are greater than the other. If we were a godly Nation, our leaders would not be hoarding power and lording it over us. They would be public servants, not perfect, not sinless, but they would not be practicing and perfecting the act of living in lies. Luke 9: 46-48 46 An argument started among the disciples as to which of them would be the greatest. 47 Jesus, knowing their thoughts, took a little child and had him stand beside him. 48 Then he said to them, “Whoever welcomes this little child in my name welcomes me; and whoever welcomes me welcomes the one who sent me. For it is the one who is least among you all who is the greatest.”· Biden team informs DOJ of third classified document discovery· The FigureHead stresses the Classified Docs were with his Corvette· President of Mexico Thanks Joe Biden for Not Building ‘Even One Meter' of Border Wall; “Although the conservatives don't like it.”· Second Stash Of Classified Docs Found At Separate Biden Location, NBC News reports. Here we go. Can't wait to hear the Democrat media spin this one away.· Reading directly from a script, Joe Biden answers a question about taking and keeping classified and top secret documents from his time as Vice President: "People know I take classified documents, classified information seriously."· Democrat Rep. Pete Aguilar on Joe Biden keeving classified documents after leaving VP office: "He did the right thing..."· Jesse Waters goes nuclear on Joe Biden's ties to China and classified docs discovered at UPenn· Man Who Filmed Ray Epps and Led “Fed Fed Fed” Chant Sentenced to 60 Days in Prison Talks to Revolver News Exclusively· Protesters and Rioters in Brazil are forcibly injected with the mRNA· Australia is concerned it can't stop “misinformation” in private conversations; Fresh attempts to try and undermine a right to privacy.