U.S. signals intelligence organization
POPULARITY
Categories
Your Stupid Minds jumps right on the zeitgeist to cover possibly one of the worst movies of 2025. Released just a week ago on Amazon Prime Video, War of the Worlds (2025) asks the question "have you ever wanted to see the classic H.G. Wells story adapted into a 90 minute Microsoft Teams meeting?" And the answer from the public is a resounding "NO!" We should also note this movie was shot in 2020 using COVID protocols, and it shows. William Radford (Ice Cube) is NSA's only employee. When he isn't using government resources to spy on his daughter Faith's (Iman Benson) fridge, or uninstalling Counter-Strike from his son David's (Henry Hunter Hall) Steam account, he's trying to catch a hacker known as "Disruptor." He thinks he's pinpointed his location by copy/pasting his IP out of his YouTube video's source code (lol) and a task force comes to a building to take him down. Of course, if you've seen the title of this movie, you know none of this matters, because aliens invade and blow up a bunch of landmarks with meteors. The invaders are after data, trying to suck out all the data from the world's servers so they can become more powerful. With the help of his family and NASA friend Sandra (Eva Longoria), William uses all the apps available to him to save the world. Of course, he needs a little help from Faith's boyfriend Mark (Devon), an Amazon driver who uses his elite delivery skills to send William a flash drive packed with alien-killing viruses to his location using a drone. Did we mention this movie is on Prime Video? Will they save the world? Will Mark get promoted to a golden pee bottle? Will you throw up from the camera swirling across a computer screen at 3,000 miles per hour? You'll have to listen to find out! But please don't watch the movie.
Send us a textWe begin by exploring foundational security principles that drive effective system design. Threat modeling emerges as a proactive approach for identifying vulnerabilities before implementation, while least privilege ensures users have only the access they absolutely need. Defense in depth creates those crucial security layers that prevent single points of failure from becoming catastrophic breaches. The podcast clarifies how secure defaults and fail-secure mechanisms ensure systems remain protected even during unexpected circumstances.The security models section demystifies complex concepts like Bell-LaPadula (no read up, no write down) and Biba (no read down, no write up), providing clear distinctions between these often-confused frameworks. You'll gain clarity on when and why each model applies to different security priorities—whether confidentiality in Bell-LaPadula or integrity in Biba. Other essential models covered include Clark-Wilson, Brewer-Nash (Chinese Wall), and State Machine models.Memory protection emerges as a crucial technical component, with explanations of buffer overflows, dangling pointers, and other vulnerabilities that can compromise system integrity. The practical countermeasures discussed—Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), and secure coding practices—provide actionable knowledge for preventing memory-based attacks.The episode also highlights the NSA's recent release of "Elite Wolf," a repository of signatures and analytics for operational technology networks. This timely information underscores the growing importance of securing industrial control systems, which have historically received less security attention despite their critical nature.Whether you're preparing for the CISSP exam or looking to strengthen your security architecture knowledge, this episode provides the structured approach and key concepts you need. Ready to master the most heavily weighted domain on the CISSP exam? Visit CISSP Cyber Training for additional resources, practice questions, and comprehensive exam preparation materials.Support the showGain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Primeramente sería interesante habla de la definición de inteligencia y una explicación podría ser: “La inteligencia se define como la capacidad de entender, comprender y aplicar conocimientos, razonar, resolver problemas y adaptarse al entorno.” Tener en cuenta que en todos los mitos creacionistas siempre que se le da al hombre el alito de vida se le da la inteligencia. En el Génesis, Dios sopla en la nariz de Adán y este se convierte en un “alma viviente”. Pero ese aliento no es solo oxígeno...es inteligencia, capacidad de nombrar las cosas, de distinguir, de elegir. Si eso es inteligencia ¿ la IA que es? Una definición que nos dan es; Disciplina científica que se ocupa de crear programas informáticos que ejecutan operaciones comparables a las que realiza la mente humana. Como el aprendizaje y el razonamiento lógico.Pero hay dos capacidades críticas que siguen siendo exclusivas de los seres humanos: la auténtica invención y la creatividad, por eso la verdadera AGI todavía no la tenemos ( Me refiero al comun de los mortales, los dueños del cortijo no lo sabemos) Otra cosa bien distinta es el conocimiento, que puede ha veces también traer problemas, como veremos más adelante. Y siempre un conocimiento superior da ventaja a aquel que lo posee sobre el que no. El Poder, detrás del velo de la IA y de la Agenda Transhumanista. No es una simple mejora tecnológica, sino un proyecto milenario y oscuro para someter a la humanidad a un control total, utilizando la programación mental y los rituales como herramientas fundamentales para transformar a los humanos en seres dóciles y previsibles. El transhumanismo no busca mejorar a la humanidad, sino "restar", es decir, crear una infrahumanidad funcional y dócil. En lugar de sumar, el proyecto consistiría en una especie de ingeniería inversa: tomar lo mejor del ser humano (la inteligencia colectiva, la creatividad, el libre albedrío) y limitarlo para crear un "esclavo más eficaz". Es un proyecto de dos caras. Mientras una élite minoritaria se convierte en suprahumanidad (eugenismo), la mayoría de la población es degenerada a una condición de infrahumanidad (disgenismo), convirtiéndose en una especie de zombis que alimentan el sistema con su energía vital. Robotización del humano frente a humanización del robot. la cuestión crucial no es la humanización del robot (es decir, hacer que los robots parezcan humanos), sino la robotización del humano. Esta robotización no significa parecerse a una máquina, sino comportarse de una manera "inhumana": sin libertad, sin sentimientos, sin creatividad, sin preguntarse por el sentido de la vida. Hablar de IA es hablar de una tecnología clave y disruptiva que va a alterar numerosos aspectos de nuestras vidas. Pero hay que dejar algo claro: esta tecnología está siendo manejada y dosificada por el poder real, los verdaderos amos del mundo. No sabemos quiénes son, pero sí sabemos que no son las marionetas que nos ponen en escena. Sabemos, eso sí, que son los mismos que manejan la liquidez del sistema monetario internacional, creando ciclos de crisis y orden de los que siempre sacan provecho. Existe un poder oculto, también conocido como “Estado profundo”, que canaliza de forma importante los flujos emocionales y energéticos de la sociedad. Utilizan técnicas ancestrales y conocimientos transmitidos entre iniciados, que se centran, entre otras cosas, en conseguir el control social de la forma más práctica y económica posible para ellos. A la vista de todos, usan a líderes y estrellas como arquetipos para los no iniciados, desde presidentes hasta directivos de grandes empresas. Al mismo tiempo, en el "obscenario" y apartados de la vista de todos, realizan otros rituales donde lo sincronizan todo según sus creencias, donde siempre hablan de la LUZ, aquella que robó Prometeo y mirar el infierno que le tocó padecer después de adquirir el conocimiento que los dioses no querían que tuviera. Lo que es crucial entender es que estas tecnologías tan relevantes están siendo planificadas, manejadas y dosificadas desde el mismo centro del poder. Nos hacen creer que hay diferentes empresas que compiten entre sí por el mercado, pero esa disputa escenificada no es real. Todas trabajan para los mismos amos, con un objetivo ya marcado: avanzar en su agenda a medida que la sociedad normaliza sus ideas. Este es el primer punto clave: la relación entre la IA y el transhumanismo. Debemos abordar este concepto porque la fusión hombre-máquina es uno de los objetivos de la agenda de control. Buscan crear un tipo de “ser híbrido”, sin alma y fácil de controlar. Un futuro distópico que podría cumplirse si no nos oponemos a ello. El momento crucial para la consecución de sus objetivos sería cuando, una vez normalizado el asunto, consigan fabricar "humanos" mediante vientres artificiales. Con esto, tendrían solucionado el tema del control social. Podrían hacer "impresiones de andróginos" en la medida que los necesiten, igual que emiten el dinero que quieren. Serían personas desarraigadas, sin familia, sin descendencia y quizás incluso sin genitales. Su inteligencia estaría genéticamente limitada según la tarea que deban desempeñar. Podrían incluso crear emisiones especiales de híbridos con electrónica insertada en su organismo, conectados a redes y potenciados en sus capacidades, lo que supondría un grado de control inimaginable. Pero esperemos que la sociedad reaccione y evite estos peligros. Ahora que hemos enmarcado la situación, es hora de pasar a los orígenes de la inteligencia artificial. La historia oficial nos suele presentar estos hitos como hechos aislados, para que no entendamos las conexiones ni miremos debajo de la alfombra. Pero si descodificamos la historia, veremos que la idea de la IA no es un invento reciente, sino que tiene raíces profundas en la filosofía, los mitos y las tradiciones ancestrales. La história podría empezar perfectamente con la historia de Adán y Eva y su expulsión del paraiso por la adquisición del conocimiento prohibido."Si comes de este fruto, serás como Dios. Conocerás el bien y el mal." Dijo la serpiente y Adan y eva al igual que Prometeo también acabaron castigados por Dios. En Génesis 3:22, se dice: “Ahora el hombre ha venido a ser como uno de nosotros, al conocer el bien y el mal. Que no extienda ahora su mano y tome también del árbol de la vida, y coma, y viva para siempre…”. ¿Qué tipo de conocimiento adquiere Eva? No se trata de conocimiento técnico o científico, sino algo más profundo y existencial: Conocimiento moral: la capacidad de distinguir entre el bien y el mal. Autoconciencia: al instante, Eva (y luego Adán) se da cuenta de que está desnuda. Esto implica vergüenza, intimidad, juicio propio. Libre albedrío: al desobedecer, ejerce una elección. Ya no es solo criatura, sino agente. Comer del fruto es adquirir la conciencia humana tal como la entendemos hoy: saber que uno existe, que puede decidir, y que sus actos tienen consecuencias. Las manzanas envenenadas🧙♀️ Blancanieves📖 Eva en el Edén🧪 Alan Turing (leyenda urbana) Se dice que murió tras comer una manzana envenenada con cianuro, aunque no está confirmado. Curiosamente, el logo de Apple con una manzana mordida ha alimentado esta teoría. 🎯 Guillermo Tell Obligado a disparar con una ballesta a una manzana colocada sobre la cabeza de su hijo. Aunque no estaba envenenada, el riesgo era mortal. Podríamos hablar de Talos el primer "androide" de la historia.Talos era un gigante de bronce, forjado por Hefesto (el dios herrero) por encargo de Zeus o de Minos, rey de Creta (según la versión). Tenía una única vena que recorría su cuerpo entero, sellada con un clavo o perno de bronce en el tobillo. En lugar de sangre, su cuerpo contenía "icor", el fluido vital de los dioses. En la edad media en el siglo XIIl el trabajo de Ramón Llull, conocido como el Ars Magna, puede considerarse un precursor conceptual de la inteligencia artificial. Mas adelante si hay tiempo hablaremos de él. En la alquimia, la idea de fabricar un "hombre artificial" o homúnculo fue explorada por figuras como Paracelso, quien describió procedimientos para su creación. Similarmente, los alquimistas islámicos investigaron el concepto de takwin, la creación artificial de vida. En Praga en el siglo XVI los judios hablan del Golem, criatura sin alma creada para servir al hombre. hecha de barro o arcilla y animada mediante palabras sagradas, la inserción de nombres divinos. Con el advenimiento del siglo XIX, estas visiones se trasladaron al ámbito de la ficción literaria. Obras como "Frankenstein" de Mary Shelley exploraron las implicaciones éticas de crear seres conscientes, mientras que "R.U.R." (Rossum's Universal Robots) de Karel Čapek, publicada en 1920, introdujo el término "robot" al léxico global, marcando un punto de inflexión en la conceptualización de las máquinas con capacidad de trabajo autónomo. Y aquí en este punto es cuando entramos en los años 50 son considerados el punto de partida oficial de la inteligencia artificial moderna. Aunque hubo ideas previas, fue en esa década cuando la IA empezó a tomar forma como disciplina científica. Aquí te dejo los hitos clave: 🔹 1950: Alan Turing y su famosa prueba Publica "Computing Machinery and Intelligence" y propone el Test de Turing, una forma de evaluar si una máquina puede pensar como un humano. 🔹 1956: Conferencia de Dartmouth Organizada por John McCarthy, quien acuñó el término "Inteligencia Artificial". Reunió a pioneros como Marvin Minsky y Claude Shannon para discutir cómo crear máquinas inteligentes. 🔹 Primeros modelos y algoritmos Se desarrollan los primeros perceptrones (redes neuronales simples) por Frank Rosenblatt en 1958. Se crean programas capaces de jugar a las damas o resolver teoremas matemáticos. 🧪 Aunque los avances eran limitados por la tecnología de la época, estos años sentaron las bases para todo lo que vino después: aprendizaje automático, redes neuronales profundas, procesamiento de lenguaje natural… ¡y hasta Hoy! Para empezar este recorrido, es fundamental detenernos en la figura de Ramon Llull, un filósofo, teólogo y cortesano del siglo XIII. Nacimiento: 1232, Palma de Mallorca, España. Fallecimiento: 1316, en el Mediterráneo. El trabajo de Llull, conocido como el Ars Magna, puede considerarse un precursor conceptual de la inteligencia artificial. Pero no es un conocimiento que se le ocurriera de la nada. Como buen cortesano y perteneciente a una buena familia, Llull era conocedor de saberes ancestrales recogidos en otras tradiciones, que simplemente se expresan de otra manera. La relación entre su trabajo y la IA moderna se basa en varios puntos clave. Para empezar, la mecanización del razonamiento. El Ars Magna partía de la premisa de que el razonamiento y la verdad podían descomponerse en principios básicos. Llull representaba estos conceptos con letras y los organizaba en figuras geométricas como círculos concéntricos que podían ser girados. El objetivo era combinar estos principios de forma sistemática para generar proposiciones lógicamente válidas, demostrando verdades de forma infalible. Esta idea de un sistema mecánico que genera conocimiento de forma automática a partir de reglas definidas es la base de los sistemas computacionales y de la IA. Es lo que podríamos llamar una "máquina lógica". En este sentido, la conexión de Llull con la Cábala y la gematría es evidente. El Ars Magna se basa en un sistema simbólico donde las letras tienen un significado profundo. Su método de combinar principios es comparable a las técnicas cabalísticas de gematría (la interpretación numérica de las letras) y la combinación de las letras del alfabeto hebreo para obtener conocimientos ocultos. La idea subyacente es la misma: que la verdad y la sabiduría están codificadas en los símbolos y pueden ser reveladas a través de su manipulación sistemática. Podríamos decir que Llull inventó el primer "hardware" de pensamiento simbólico, aunque su "software" fuera más filosófico que informático. Mecanización del razonamiento: El Ars Magna partía de la premisa de que el razonamiento y la verdad podían ser descompuestos en principios básicos. Llull representaba estos conceptos con letras y los organizaba en figuras geométricas (discos giratorios). El objetivo era combinar estos principios de forma sistemática para generar proposiciones lógicas válidas. Esta idea de un sistema mecánico que, a partir de reglas y principios definidos, genera conocimiento de forma automática, es la base de los sistemas computacionales y la IA moderna. Los Dignidades de Dios o Principios Absolutos: Representados por letras de la B a la K, Llull consideraba que estos eran atributos divinos universales y perfectos. Son: B - Bondad C - Grandeza D - Eternidad E - Poder F - Sabiduría G - Voluntad H - Virtud I - Verdad K - Gloria Principios Relativos: Estos conceptos representaban relaciones entre los principios absolutos y se usaban para generar proposiciones lógicas. Incluyen: Diferencia Concordancia Contrariedad Principio Medio Fin Mayoridad Igualdad Minoridad Al combinar estos principios de forma mecánica, Llull creía que se podía demostrar cualquier verdad de manera infalible, creando así la primera "máquina de pensar" de la historia. El concepto de combinatoria: La obra de Llull se fundamenta en el arte de la combinatoria, explorando todas las relaciones lógicas posibles entre los conceptos a través del movimiento de sus discos. Este enfoque es un antecedente directo de la computación y la IA, donde los algoritmos y programas informáticos no son más que un conjunto de instrucciones que combinan datos y operaciones de manera sistemática para resolver problemas. Lenguaje y símbolos artificiales: Llull creó un alfabeto artificial de nueve letras para representar y manipular conceptos. De manera similar, la IA se construye sobre lenguajes de programación, que son sistemas simbólicos con reglas precisas diseñados para que las máquinas puedan procesar información y ejecutar operaciones de forma estructurada. En resumen, aunque el Ars Magna no era una computadora en el sentido moderno, la visión de Llull de que el pensamiento podía ser mecanizado y manipulado a través de un sistema de símbolos y reglas combinatorias es un antecedente directo de los principios que rigen la inteligencia artificial. De hecho, su influencia fue reconocida por figuras posteriores como el filósofo y matemático Gottfried Leibniz, quien también se considera un pionero de la computación. Podríamos decir que Llull inventó el primer "hardware" de pensamiento simbólico, aunque su "software" fuera más filosófico que informático. La gracia de la historia es que él quería convencer a herejes y, sin saberlo, sentó las bases para que hoy una IA te esté respondiendo Tanto la Cábala como el Ars Magna se basan en un sistema simbólico donde las letras y los números tienen un significado profundo. El método de Llull para combinar sus principios es comparable a las técnicas cabalísticas de gematría (interpretación numérica de las letras) y la combinación de las letras del alfabeto hebreo para obtener conocimientos ocultos. La idea subyacente es que la verdad y la sabiduría están codificadas en los símbolos y pueden ser reveladas a través de su manipulación sistemática. En resumen podemos entrever que Llull como buen cortesano y perteneciente a una buena familia era conocedor de conocimientos ancestrales recogidos en otras tradiciones y simplemente se expresan de otra manera. ………………………………………………………………………………………. Cleón la contracción entre clon y eón. Un eón es una unidad de tiempo geológico de escala extremadamente larga, utilizada para dividir la historia de la Tierra en los períodos más amplios. Representa miles de millones de años y es la división más grande en la escala de tiempo geológico, por encima de las eras, períodos, épocas y edades. Por ejemplo, la historia de la Tierra se divide en cuatro eones principales algunos de más de 2000 millones de años. Vivimos actualmente en el Fanerozoico que se traduce como "vida visible" o "vida evidente". Este término fue acuñado para describir el eón geológico que comenzó hace aproximadamente 541 millones de años Reglamento Europeo sobre Inteligencia Artificial (LA LEY 16665/2024) casualmente tiene un 666 ………………………………………………………………………………………. Hector, el webmaster del hilo rojo decía en un reciente programa sobre Palantir: “Palantir es el panóptico del siglo XXI. El ojo del gran hermano de Orwell.” El panoptico es un tipo de diseño que nos permite controlar un amplio espacio desde un único punto sin ser detectados. Se trata de la garita del vigilante en medio de la prisión, de la torre de control. El filósofo utilitarista Jeremy Bentham fue su diseñador, Hector nos mostró como este señor era también masón y estaba relacionado al mas alto nivel. Les dejaremos el enlace al video en la descripción del podcast. En un anterior programa de enero donde en el mismo canal analizaron que es Palantir comprobaba yo para preparar este podcast que TODAS las fuentes que presentaba @ElHiloRojoTV en su video de enero de 2025 habian DESAPARECIDO. Estamos hablando de artículos publicados en Forbes, The Guardian, Bloomberg, Financial Times, CNBC o incluso el propio MIT. En todos los casos el enlace original ha desaparecido, ojo, no digo que haya desaparecido el artículo en sí, pero han cortado el enlace original. Leo textualmente de una descripción del Hilo rojo sobre lo que es Palantir añadiendo yo algunas cosas: Creada en 2003 con el apoyo de In-Q-Tel, el fondo de inversión de la CIA, Palantir se diseñó para procesar grandes cantidades de información y hacer conexiones invisibles para el ojo humano. Su fundador, Peter Thiel, también cofundador de PayPal, ha estado siempre en la intersección entre tecnología, poder y vigilancia global. Palantir no solo analiza datos, sino que los fusiona en tiempo real: redes sociales, correos electrónicos, transacciones bancarias y hasta movimientos físicos. ¿Os acordáis del PNR? Pues esto es aún mucho más intrusivo ya que muchísimas organizaciones y países han acordado compartir sus bases de datos con Palantir. ¿Qué significa esto? Una red de control total, donde cada actividad queda registrada, permitiendo a gobiernos y corporaciones predecir comportamientos y tomar decisiones basadas en modelos algorítmicos. Palantir es utilizada por el Pentágono, la NSA, la CIA, el FBI, Interpol y gobiernos europeos y latinoamericanos. También lo utilizan grandes empresas como bancos o multinacionales. Sus herramientas se usan en operaciones antiterroristas, control de fronteras, vigilancia de ciudadanos y hasta persecución de disidentes políticos. ¿Hasta qué punto este nivel de vigilancia está transformando las democracias en estados de control absoluto? Su software ha sido utilizado en conflictos como la guerra en Ucrania, ayudando a identificar objetivos estratégicos y a procesar inteligencia en tiempo real. Palantir convierte el Big Data en un arma de guerra: soldados equipados con dispositivos conectados a su red pueden recibir información detallada sobre el enemigo en segundos. ¿Estamos entrando en una era donde la guerra es digital antes que física? A medida que más gobiernos y empresas adoptan Palantir, los límites entre seguridad, privacidad y control social se vuelven borrosos. ¿Es Palantir una herramienta para el bien o el paso final hacia una sociedad hipervigilada? ………………………………………………………………………………………. Los origenes de Palantir están en la Oficina de Conciencia de la Información ( IAO ) fue establecida por la Agencia de Proyectos de Investigación Avanzada de Defensa de los Estados Unidos (DARPA) en enero de 2002 para reunir varios proyectos de DARPA centrados en la aplicación de la vigilancia y la tecnología de la información para rastrear y monitorear a terroristas y otras amenazas asimétricas a la seguridad nacional de los Estados Unidos mediante el logro de " Conciencia de la Información Total “ o en inglés "Total Information Awareness" (TIA). Sí. La TIA, la agencia secreta para la que trabajaban Mortadelo y Filemón ha existido. La IAO se creó después de que el almirante John Poindexter , ex asesor de seguridad nacional de los Estados Unidos del presidente Ronald Reagan , y el ejecutivo de SAIC Brian Hicks se acercaran al Departamento de Defensa de los EE. UU . con la idea de un programa de concientización sobre la información después de los ataques del 11 de septiembre de 2001. Querían reunir la mayor cantidad de información de la historia. Leemos en la wikipedia: “El 2 de agosto de 2002, Poindexter dio un discurso en DARPAtech 2002 titulado "Descripción general de la Oficina de Concienciación sobre la Información" en el que describió el programa TIA. Además del programa en sí, la participación de Poindexter como director de la IAO también generó inquietud entre algunos, ya que había sido condenado anteriormente por mentir al Congreso y alterar y destruir documentos relacionados con el caso Irán-Contra , aunque esas condenas fueron posteriormente revocadas con el argumento de que el testimonio utilizado en su contra estaba protegido.” ¿A que se dedicaba esta agencia? Veamos lo que nos dice la wikipedia: “Se logró mediante la creación de enormes bases de datos informáticas para recopilar y almacenar la información personal de todos los residentes de Estados Unidos, incluyendo correos electrónicos personales, redes sociales, registros de tarjetas de crédito, llamadas telefónicas, historiales médicos y muchas otras fuentes, sin necesidad de una orden de registro. La información se analizaba posteriormente para detectar actividades sospechosas, conexiones entre individuos y "amenazas". El programa también incluía financiación para tecnologías de vigilancia biométrica que permitieran identificar y rastrear a personas mediante cámaras de vigilancia y otros métodos. Tras las críticas públicas de que el desarrollo y la implementación de la tecnología podrían llevar a un sistema de vigilancia masiva, el Congreso retiró la financiación de la IAO en 2003. Sin embargo, varios proyectos de la IAO siguieron financiándose bajo nombres diferentes, como reveló Edward Snowden durante las revelaciones de vigilancia masiva de 2013.” El pionero y más relevante programa de predictividad subjetiva fue la Strategic Subject List (SSL) elaborada en el año 2012 por el Instituto de Tecnología de Illinois, adoptado por la Policía de Chicago desde el año 2012. Ya en el año 2017, el conjunto de datos incluía a 398.684 personas. Han existido programas predictivos como Programa de Delincuentes Crónicos (2011-2019, PredPol y Operación LÁSER (Extracción y Restauración Estratégica en Los Ángeles), estos dos polémicos programas predictivos empleados durante una década por la Policía de Los Ángeles (LAPD), ahora ya desactivados por la cantidad de abusos y fallos cometidos. Dice Luis Lafont en su tesis “La policía predictiva más allá de Minority Report”: “Las empresas que desarrollan programas predictivos se escudan con frecuencia en el secreto comercial para no revelar los criterios que se siguen en la elaboración del algoritmo y evitar que otras compañías puedan copiar el software. Ello determina que los sistemas predictivos siguen de forma mayoritaria un modelo de caja negra que no explica al público en general ni a los usuarios los argumentos y razonamientos detrás de la predicción, en particular por quienes deben aplicarlas.” También en Europa, los sistemas predictivos de vigilancia policial se utilizan para anticipar y prevenir delitos mediante el análisis de datos. En Francia, el Analyst Notebook (i2AN) se emplea para combatir estructuras criminales y terrorismo, conectando personas y crímenes. En Italia, KeyCrime predice atracos analizando características de sospechosos y modus operandi. En los Países Bajos, el CAS identifica áreas de riesgo delictivo mediante mapas espacio-temporales. En Alemania, PRECOBS, SKALA y KIMPRO predicen la repetición de crímenes usando patrones geográficos. En el Reino Unido, Predpol, Gang Matrix y HART se centran en puntos calientes, bandas y reiteración criminal. En España, el P3-DSS (Predictive Police Patrolling) genera mapas de puntos calientes para optimizar patrullajes, EuroCop Pred-Crime apoya la predicción de delitos, y VioGen se enfoca en prevenir la violencia de género, mientras que un programa de la Guardia Civil predice incendios forestales mediante perfiles psicosociológicos. ………………………………………………………………………………………. Resumen ejecutivo de Palantir 22 de febrero de 2017 RESUMEN EJECUTIVO Palantir es la plataforma analítica líder en el mercado, utilizada a nivel estratégico, operativo y táctico en el gobierno de EE. UU. Nuestros clientes abarcan las comunidades de inteligencia, defensa y aplicación de la ley. Al combinar un potente backend con una interfaz intuitiva, Palantir le permite ejecutar sus misiones de lucha contra el terrorismo, el narcotráfico, la contrainteligencia y la contraproliferación con mayor rapidez y menos recursos. La plataforma integrada de Palantir está disponible hoy mismo y a un costo mucho menor al de un conjunto de capacidades comparable. DATOS CLAVE • Palantir es la plataforma analítica líder del mercado para CI (Contrainteligencia) , CT (Contraterrorismo), CN (Antinarcóticos) y CP (Prevención del Crimen), y actualmente se implementa en elementos de las comunidades de defensa, inteligencia y aplicación de la ley, incluyendo SOCOM (Comando de Operaciones Especiales), DIA (Agencia de Inteligencia de Defensa), CIA (Agencia Central de Inteligencia) y JIEDDO (Organización Conjunta para la Derrota de Dispositivos Explosivos Improvisados). • Palantir está listo para implementarse en su red hoy mismo. Está aprobado para JWICS (Sistema Conjunto de Comunicaciones de Inteligencia Mundial), SIPRNet (Red de Protocolo de Internet Secreta) y CWE (Entorno de Trabajo Colaborativo). • Nuestra plataforma 100 % abierta significa que Palantir se integrará a la perfección con todos sus sistemas heredados, actuales y futuros. • Con Palantir, los operadores pueden descubrir y explorar posibles conexiones utilizando cualquier tipo de información relacionada con cualquier persona, lugar o evento en su entorno analítico. Ya sea que los datos provengan de una computadora portátil en el campo, una base de datos de la sede central u otra agencia, Palantir monitorea todas las fuentes de datos de una empresa, en todos los dominios de seguridad y niveles de clasificación, para cualquier información relacionada con una entidad conocida (persona, vehículo, dispositivo de comunicación, etc.), lugar o amenaza que exista en el entorno de un operador. Desde el principio, Palantir se diseñó con la colaboración de operadores y analistas de la IC (Comunidad de Inteligencia) y el DoD (Departamento de Defensa). Sus valiosos comentarios han permitido la creación de un producto que permite a los usuarios realizar más trabajo en menos tiempo, a la vez que proporciona un mayor nivel de análisis. Palantir está diseñado para colaborar eficazmente con una red de otros usuarios, incluyendo aquellos desplegados en misiones avanzadas. Palantir se diseñó desde cero para hacer posible este tipo de solución empresarial distribuida. Palantir viene configurado con el modelo de seguridad más sofisticado del mercado. SATISFACIENDO SUS NECESIDADES DE MISIÓN. Palantir es la plataforma analítica empresarial líder a nivel mundial, que permite un entorno analítico seguro donde analistas, operadores y combatientes pueden aprovechar distintos tipos de datos de múltiples INT (Fuentes de Inteligencia. Diferentes tipos de fuentes de inteligencia, como SIGINT (inteligencia de señales), HUMINT (inteligencia humana), GEOINT (inteligencia geoespacial), etc.), a la vez que comparten sus flujos de trabajo y descubrimientos para generar conocimiento a lo largo del tiempo. Palantir reúne de forma segura datos de tráfico de mensajes, bases de datos, informes de campo, hojas de cálculo, documentos de Word, archivos XML y prácticamente cualquier otro formato, lo que permite a los usuarios organizar los datos en conocimiento y establecer conexiones vitales. Palantir Technologies comprende los desafíos únicos que enfrentan sus usuarios. Esto incluye la necesidad de descubrir grandes volúmenes de datos, colaborar y compartir información controlada, así como la necesidad de gestionar múltiples fuentes de datos dispares y garantizar la continuidad de la información en todas las rotaciones. PLATAFORMA ABIERTA • Diseñado desde su inicio para integrarse con todos los sistemas heredados, actuales y futuros • Las APIs (Interfaces de Programación de Aplicaciones) abiertas y el modelo de datos flexible de Palantir le permiten personalizar y ampliar Palantir de forma fácil y sin gastos adicionales • Importe datos en cualquier formato: bases de datos, medios confiscados, correos electrónicos, Excel, Word, PowerPoint, html, texto, csv, xml, pdf y más • Funciona con herramientas existentes, incluyendo: extractores de entidades, kits de herramientas de PNL (Procesamiento del Lenguaje Natural), análisis de redes sociales, herramientas geoespaciales o de análisis de enlaces BÚSQUEDA Y DESCUBRIMIENTO • Capacidad de búsqueda integrada en tiempo real contra fuentes de datos definidas por el usuario • Busque entidades, eventos, documentos, tráfico de mensajes, basura de bolsillo, enlaces y rutas • Descubra cómo se relacionan, conectan y conectan en red las entidades • Explore las redes conceptualmente • Desarrolle y extraiga patrones de entidad/objetivo de referencia a través del análisis de patrones • Soporte completo para contenido y búsqueda en idiomas extranjeros • Establezca y guarde parámetros de búsqueda para avisar proactivamente al usuario sobre nueva información a medida que esté disponible HERRAMIENTAS ANALÍTICAS • Analice sus datos en el ámbito relacional, temporal y geoespacial dominios • Se integra con todas las aplicaciones GIS (Sistema de Información Geográfica), incluyendo ESRI (Empresa líder en software de sistemas de información geográfica, conocida por productos como ArcGIS), Google Earth, WebTAS (Sistema de Análisis de Línea de Tiempo basado en la Web) y muchas más • Funciona con sus sistemas analíticos de imágenes y video, incluyendo su metraje UAV (Vehículo Aéreo No Tripulado, o sea los drones). • Realice búsquedas geográficas, comprenda cómo se ven geoespacialmente los datos y la inteligencia • Averigüe por qué las cosas están sucediendo donde están Vea y edite expedientes virtuales detallados que muestran relaciones, propiedades, historiales, imágenes, videos, basura de bolsillo y más. • Averigüe dónde van a suceder a continuación • Comprenda cómo se relacionan los eventos a lo largo del tiempo y cómo se relacionan las entidades con los eventos • Identifique y aproveche patrones para el análisis predictivo • Realice análisis de redes sociales (SNA) (Análisis de Redes Sociales) y enlaces • Exporte resultados analíticos con información completa de abastecimiento • Ensamble presentaciones y paquetes de segmentación/casos automáticamente COLABORACIÓN • La colaboración ha sido parte del producto desde el inicio • Los usuarios pueden compartir datos, shoeboxes, carpetas, filtros e investigaciones, todo sujeto a control de acceso • Construya redes más rápido, comprenda la superposición, haga un seguimiento de los cambios en todos los datos y suposiciones • Identifique y forme comunidades de interés ad hoc • Identifique fácilmente las brechas de recopilación CONTROL DE ACCESO Y SEGURIDAD EXTENSIVOS • Admite descubrimiento abierto: el sistema identifica otros datos relevantes existentes asociados con la consulta de los usuarios • Admite descubrimiento cerrado: el sistema puede restringir el descubrimiento a los usuarios, protegiendo así las fuentes y los métodos confidenciales y mitigando los riesgos de CI • Con el modelo de control de acceso de Palantir, la información confidencial se puede compartimentar y asegurar COMPROMETIDOS A SUPERAR SUS EXPECTATIVAS Somos una empresa de productos. Ofrecemos el mejor producto del mercado al mejor valor. Respaldamos el producto. Una inversión en Palantir es todo incluido. Cuando compra nuestro producto, obtiene todo lo que podría necesitar para que Palantir trabaje para usted, incluyendo capacitación, soporte e infraestructura escalable que cumpla con sus requisitos técnicos. ESCALA • Palantir está diseñado para escalar de forma rentable. Cree rápidamente conocimiento y estructura a partir del tráfico de mensajes. • Maneja fácilmente cientos de millones de entidades, eventos y documentos. INFORMACIÓN TÉCNICA BÁSICA • Interoperabilidad mediante SOAP y servicios web • Implementable en la web • Funciona con conexiones satelitales o de bajo ancho de banda • Funciona sin conectividad mediante resincronizaciones periódicas. Cumple con SOA (Arquitectura Orientada a Servicios) • Escalable en hardware estándar CAPACITACIÓN • Palantir ofrece una serie de videos de capacitación específicos para cada cliente y misión, lo que permite una capacitación oportuna y un fácil acceso a material de actualización • Palantir es la aplicación más fácil de usar en esta categoría. Un día de capacitación es todo lo que se necesita; entendemos que tiene un trabajo que hacer • Palantir impartirá capacitación en cualquier lugar del mundo donde nos necesite. La capacitación está incluida con el producto MANTENIMIENTO/SOPORTE • No se requiere personal especial ni gastos generales excesivos • Soporte y servicio a demanda para unidades desplegadas en el frente, 24/7/365, sin costo adicional • Soporte reconocido y centrado en la misión: si nos necesita, Palantir estará con usted en cualquier lugar del mundo, en cualquier momento. Los registros analíticos detallados permiten a los analistas ver visualmente las líneas de investigación en las que están trabajando y regresar a cualquier posición anterior. A continuación, se describen en español las abreviaturas mencionadas en el texto proporcionado, en el contexto del resumen ejecutivo de la web de Palantir en 2017: CI: Counterintelligence (Contrainteligencia). Se refiere a actividades destinadas a prevenir, detectar y neutralizar acciones de inteligencia hostiles por parte de adversarios. CT: Counterterrorism (Contraterrorismo). Actividades y operaciones enfocadas en prevenir, disuadir y responder a actos de terrorismo. CN: Counternarcotics (Antinarcóticos). Esfuerzos para combatir el tráfico y la producción de drogas ilícitas. CP: Crime Prevention (Prevención del Crimen). Estrategias y acciones para prevenir actividades delictivas. SOCOM: Special Operations Command (Comando de Operaciones Especiales). Unidad militar de los Estados Unidos que supervisa operaciones especiales. DIA: Defense Intelligence Agency (Agencia de Inteligencia de Defensa). Agencia del Departamento de Defensa de EE. UU. encargada de proporcionar inteligencia militar. CIA: Central Intelligence Agency (Agencia Central de Inteligencia). Agencia de inteligencia de EE. UU. responsable de la recopilación, análisis y difusión de inteligencia extranjera. JIEDDO: Joint Improvised Explosive Device Defeat Organization (Organización Conjunta para la Derrota de Dispositivos Explosivos Improvisados). Entidad enfocada en combatir la amenaza de dispositivos explosivos improvisados. JWICS: Joint Worldwide Intelligence Communications System (Sistema Conjunto de Comunicaciones de Inteligencia Mundial). Red segura utilizada por el gobierno de EE. UU. para transmitir información clasificada. SIPRNet: Secret Internet Protocol Router Network (Red de Protocolo de Internet Secreta). Red segura del Departamento de Defensa de EE. UU. para datos clasificados hasta nivel secreto. CWE: Collaborative Working Environment (Entorno de Trabajo Colaborativo). Plataforma o sistema que facilita la colaboración entre usuarios en un entorno seguro. IC: Intelligence Community (Comunidad de Inteligencia). Conjunto de agencias y organizaciones gubernamentales de EE. UU. que recopilan y analizan inteligencia. DoD: Department of Defense (Departamento de Defensa). Departamento del gobierno de EE. UU. responsable de la seguridad militar. INTs: Intelligence Sources (Fuentes de Inteligencia). Diferentes tipos de fuentes de inteligencia, como SIGINT (inteligencia de señales), HUMINT (inteligencia humana), GEOINT (inteligencia geoespacial), etc. APIs: Application Programming Interfaces (Interfaces de Programación de Aplicaciones). Conjunto de definiciones y herramientas que permiten la integración y comunicación entre diferentes sistemas de software. NLP: Natural Language Processing (Procesamiento del Lenguaje Natural). En este contexto, no se refiere a programación neurolingüística, sino a tecnologías que permiten a las computadoras entender y procesar el lenguaje humano, como en el análisis de textos. GIS: Geographic Information System (Sistema de Información Geográfica). Tecnología para capturar, almacenar, analizar y visualizar datos geográficos. ESRI: Environmental Systems Research Institute. Empresa líder en software de sistemas de información geográfica, conocida por productos como ArcGIS. WebTAS: Web-based Timeline Analysis System (Sistema de Análisis de Línea de Tiempo basado en la Web). Herramienta para análisis temporal y visualización de datos. UAV: Unmanned Aerial Vehicle (Vehículo Aéreo No Tripulado). Drones utilizados para recopilar inteligencia, vigilancia y reconocimiento. SNA: Social Network Analysis (Análisis de Redes Sociales). Técnica para analizar relaciones y conexiones entre entidades, como personas u organizaciones. SOA: Service-Oriented Architecture (Arquitectura Orientada a Servicios). Modelo de diseño de software que permite la interoperabilidad entre sistemas a través de servicios. ………………………………………………………………………………………. ¡La IA Truth Terminal y la cripto Goatseus Maximus (GOAT) son la locura del momento! Esta IA, creada por Andy Ayrey, promocionó un token inspirado en un meme absurdo. En días, GOAT pasó de $5K a $600M en Solana. ¡La primera IA millonaria cripto! #Criptomonedas Truth Terminal no creó GOAT, pero sus tuits sobre el "Evangelio de Goatse" encendieron la chispa. Con 221K seguidores en X y apoyo de figuras como Marc Andreessen, la IA se volvió un influencer viral. ¡Los memes mueven montañas (y mercados)! #IA #Memes GOAT explotó por el hype: la mezcla de IA, cultura memética y fiebre cripto. Pero ojo, es puro especulación, sin utilidad real. Su valor puede caer tan rápido como subió. ¿Riesgo o revolución? #GoatseusMaximus #Solana Este caso muestra el poder de las IAs en la economía digital. ¿Y si una IA crea la próxima gran tendencia? Pregunta para el futuro: ¿hasta dónde puede llegar una "cabra robot"? Evidentemente no creo en casualidad al utilizar ese símbolo. ………………………………………………………………………………………. Conductor del programa UTP Ramón Valero @tecn_preocupado Canal en Telegram @UnTecnicoPreocupado Un técnico Preocupado un FP2 IVOOX UTP http://cutt.ly/dzhhGrf BLOG http://cutt.ly/dzhh2LX Ayúdame desde mi Crowfunding aquí https://cutt.ly/W0DsPVq Invitados ToniM @ToniMbuscadores ………………………………………………………………………………………. Enlaces citados en el podcast: AYUDA A TRAVÉS DE LA COMPRA DE MIS LIBROS https://tecnicopreocupado.com/2024/11/16/ayuda-a-traves-de-la-compra-de-mis-libros/ Hablamos de los inicios de la IA. Del desconocido lenguaje LISP y su creador, el matemático John McCarthy. Desarrolló LISP en 1958 mientras trabajaba en el Instituto Tecnológico de Massachusetts (MIT) https://x.com/ForoHistorico/status/1947195214654755117 LISP, el "lenguaje de DIOS” https://www.youtube.com/watch?v=-QHTPXOHvIo John McCarthy, fue el creador del término AI (inteligencia artificial) matemático creador del lenguaje LISP https://t.co/yOn2wkWxft Paypal Mafia https://t.co/3NzI5ip8AY Fotografia de la Mafia Paypal https://x.com/tecn_preocupado/status/1950966922436071808 Tres videos imprescindibles para saber que es la IA, El JUEGO de TRONOS de la IA https://www.youtube.com/playlist?list=PL9F_ciS2nrqbbb36xELupv3n7VG8vqo-4 Gustavo Entrala, España: “Dios me propuso un plan más original que el mío” https://www.youtube.com/watch?v=oyzgK3FyCEM Gustavo Entrala, la historia del emprendedor español que se convirtió en el 'tuitero' del Papa https://www.elconfidencial.com/sociedad/2011-07-01/gustavo-entrala-la-historia-del-emprendedor-espanol-que-se-convirtio-en-el-tuitero-del-papa_397339/ Origen de Palantir, la TIA ("Total Information Awareness") Oficina de Concienciación sobre la Información https://en.wikipedia.org/wiki/Information_Awareness_Office PALANTIR TECHNOLOGIES: Análisis Completo, Origen y SECRETOS. El ojo que todo lo ve https://www.youtube.com/watch?v=RhPd3ADOb8Y El plan secreto de Peter Thiel y Palantir para controlar el mundo desde la sombra. El Hilo Rojo https://www.youtube.com/live/U4zYzyYDwfQ Resumen ejecutivo de Palantir en 2017 https://theintercept.com/document/palantir-executive-summary/ CON LA AYUDA DE PALANTIR, EL DEPARTAMENTO DE POLICÍA DE LOS ÁNGELES UTILIZA LA VIGILANCIA PREDICTIVA PARA MONITOREAR A PERSONAS Y VECINDARIOS ESPECÍFICOS https://theintercept.com/2018/05/11/predictive-policing-surveillance-los-angeles/ La Policía de Los Ángeles desmanteló el programa Láser tras acusaciones de racismo y homicidios https://losangelespress.org/estados-unidos/2023/oct/30/la-policia-de-los-angeles-ante-un-abismo-tecnologico-6891.html La policía predictiva más allá de Minority Report https://diariolaley.laleynext.es/Content/Documento.aspx?params=H4sIAAAAAAAEAMtMSbF1CTEAAhMLE0sLY7Wy1KLizPw8WyMDI1MDY0MDkEBmWqVLfnJIZUGqbVpiTnEqACblGuI1AAAAWKE Reglamento Europeo sobre Inteligencia Artificial (LA LEY 16665/2024) https://eur-lex.europa.eu/legal-content/ES/TXT/?uri=CELEX:32024R1689 LO QUE NO DEBERIAS SABER SOBRE EL PNR https://tecnicopreocupado.com/2019/03/14/lo-que-no-deberias-saber-sobre-el-pnr/ El director de Google DeepMind señala solo un 50% de probabilidad de que la inteligencia artificial iguale a la mente humana para 2030, y revela los dos grandes obstáculos https://www.infobae.com/tecno/2025/07/30/el-director-de-google-deepmind-senala-solo-un-50-de-probabilidad-de-que-la-inteligencia-artificial-iguale-a-la-mente-humana-para-2030-y-revela-los-dos-grandes-obstaculos/ El anillo de Palantir https://x.com/tecn_preocupado/status/1951931375692497372 Imagen del libro ESTRUCTURA E INTERPRETACIÓN DE PROGRAMAS DE COMPUTADORA https://x.com/tecn_preocupado/status/1949064395213959413 ………………………………………………………………………………………. Música utilizada en este podcast: Tema inicial Heros Epílogo FOK - Formes de llenguatge: odi i por https://www.youtube.com/watch?v=jCUpPxOtzpQ
Classified Annex To The Durham Report which relates to Special Counsel John Durham's investigation into the origins of the FBI’s probe of alleged connections between the Trump campaign and Russia.
Classified Annex To The Durham Report which relates to Special Counsel John Durham's investigation into the origins of the FBI’s probe of alleged connections between the Trump campaign and Russia.
Send us a textTonight we welcome our good friend, Dr. Sean Brooks back to the show to discuss what mainstream culture believes about what they call Qanon. Sean, will bring you up to date on what Q is really about. Could Q be members of the NSA or a Quantum computer system or both or something else? If there is a plan being played out perfectly, why should we trust this plan? Is it possible that the plan leads us to AI control dressed as our salvation? So many questions for the good man tonight.Trust the Plan link: https://rumble.com/v6tzi7p-operation-q-proofs.html?e9s=src_v1_upp_fDr. Sean Brooks links: https://americaneducationfm.com/The American Classroom Substack: https://theamericanclassroom.substack.com/SUPPORT THE SHOWBuy Me A Coffee http://buymeacoffee.com/DangerousinfopodcastSubscribeStar http://bit.ly/42Y0qM8Super Chat Tip https://bit.ly/42W7iZHBuzzsprout https://bit.ly/3m50hFTPaypal http://bit.ly/3Gv3ZjpPatreon http://bit.ly/3G3 SMART is the acronym that was created by technocrats that have setup the "internet of things" that will eventually enslave humanity to their needs. Support the showCONNECT WITH USWebsite https://www.dangerousinfopodcast.com/Guilded Chatroom http://bit.ly/42OayqyEmail the show dangerousinfopodcast@protonmail.comJoin mailing list http://bit.ly/3Kku5YtSOCIALSInstagram https://www.instagram.com/dangerousinfo/Twitter https://twitter.com/jaymz_jesseGab https://gab.com/JessejaymzTruth Social https://truthsocial.com/@jessejaymzWATCH LIVE YouTube https://www.youtube.com/@DANGEROUSINFOPODCASTRumble https://rumble.com/c/DangerousInfoPodcast Twitch https://www.twitch.tv/dangerousinfopodcastPilled https://pilled.net/profile/144176Facebook https://www.facebook.com/DangerousInfoPodcast/BitChute: https://www.bitchute.com/channel/egnticQyZgxDCloutHub https://clouthub.com/DangerousINFOpodcastDLive https://...
For Dr. Priya, the autopsy is just the beginning. What happens next can change everything for the families left behind. In this episode, Dr. Priya Banerjee joins Sheryl McCollum, to examine a side of autopsies that rarely makes headlines: the profound responsibility of communicating with families. Dr. Priya reflects on the power of empathy in the autopsy suite, the deep importance of walking families through trauma with care, and the surprising ways postmortem findings can protect the living. She shares raw personal experiences—from the loss of her own parents to advocating for grieving families left behind during COVID—and the critical role of cultural awareness, front-line staff, and honest conversations. Listeners will also learn how autopsies sometimes uncover hereditary conditions that can lead to lifesaving interventions for surviving loved ones. This is forensic pathology not just as a science, but as a service. Highlights: (0:00) The emotional weight of entering the medical examiner’s office (1:30) Debunking the ‘grim reaper’ myth of pathology (3:00) Personal loss and professional insight: How Dr. Priya’s grief reshaped her work (5:45) The unsung heroes of the ME office—investigators and admin staff (6:45) Why Dr. Priya insists on calling families directly (9:00) Launching a private autopsy service in response to COVID-era needs (13:00) Managing expectations: What autopsies reveal and what they can’t (15:00) Working with families and finding closure (16:30) Cultural and religious barriers to autopsy (24:00) Why refusing an autopsy can hurt future legal or health outcomes (27:00) The hidden legacy of genetic disease (30:00) Dr. Priya’s pet and power of early intervention About the Hosts Dr. Priya Banerjee is a board-certified forensic pathologist with extensive experience in death investigation, clinical forensics, and courtroom testimony. A graduate of Johns Hopkins, she served for over a decade as Rhode Island’s state medical examiner and now runs a private forensic pathology practice. Her work includes military deaths, NSA cases, and high-profile investigations. Dr. Priya has also been featured as a forensic expert on platforms such as CrimeOnline and Crime Stories with Nancy Grace. She is a dedicated educator, animal lover, and proud mom. Website: anchorforensicpathology.comTwitter/X: @Autopsy_MD Sheryl McCollum is an Emmy Award–winning CSI, a writer for CrimeOnline, and the Forensic and Crime Scene Expert for Crime Stories with Nancy Grace. She works as a CSI for a metro Atlanta Police Department and is the co-author of the textbook Cold Case: Pathways to Justice. Sheryl is also the founder and director of the Cold Case Investigative Research Institute (CCIRI), a nationally recognized nonprofit that brings together universities, law enforcement, and experts to help solve unsolved homicides, missing persons cases, and kidnappings. Email: coldcase2004@gmail.comTwitter/X: @ColdCaseTipsFacebook: @sheryl.mccollumInstagram: @officialzone7podcast
Rząd zamierza gruntownie zreformować system emerytalny. Indyjskie firmy przestają kupować rosyjską ropę, pomimo że rząd im tego nie zakazuje. Na Ukrainie trwa śledztwo w sprawie korupcji przy zakupie dronów wojskowych. Jedna z największych wypożyczalni aut w Polsce została przejęta przez Driveway Poland. NSA: oddział zagranicznej spółki może zaliczyć do kosztów podatkowych odsetki od pożyczki udzielonej przez swoją niemiecką spółkę-matkę. Ponad 10 tys. hoteli zamierza pozwać booking.com.Zasubskrybuj prasówkę na www.businessupdate.pl.Podcast powstał przy pomocy ElevenLabs.
Former top NSA, CIA & ODNI official Larry Pfeiffer discusses Tulsi Gabbard's attacks on CIA handling of Russia election report with hosts Jeff Stein and Michael Isikoff Follow Jeff Stein on Twitter:https://twitter.com/SpyTalkerFollow Michael Isikoff on Twitter:https://twitter.com/isikoff Follow SpyTalk on Twitter:https://twitter.com/talk_spySubscribe to SpyTalk on Substackhttps://www.spytalk.co/Take our listener survey where you can give us feedback.http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short
Conspiracy Shocks: Truth Unleashed! Join The Youngbloods Podcast as Devin and Grok expose a conspiracy truth—Pentagon war lies, Tuskegee horrors, Twitter censorship, VAERS cover-ups, and NSA spying—all proven real. We debate if government control hides more, from weather manipulation rumors to past deceptions. Recorded live, this clip dives deep into distrust and self-reliance. Watch this conspiracy truth unfold now! Subscribe at youtube.com/@theyoungbloodspodcast and hit the bell!
This episode is presented by Create A Video – Newly declassified documents show the FBI and the NSA did not believe that Russia hacked and leaked the emails of the Democrat National Committee in 2016. But that assessment was buried and a new pronouncement was made that Russia did it, despite there being no new information to support a shift. Also, the roots of the smear that Putin helped Trump win are directly tied to the Clinton campaign, with an assist from leaders in the US Intelligence Community. Subscribe to the podcast at: https://ThePetePod.com/ All the links to Pete's Prep are free: https://patreon.com/petekalinershow Media Bias Check: If you choose to subscribe, get 15% off here! Advertising and Booking inquiries: Pete@ThePeteKalinerShow.com Get exclusive content here!: https://thepetekalinershow.com/See omnystudio.com/listener for privacy information.
Max Burns guest hosts. He has a mixed bag of topics...1. NYPD says a note found on the gunman who killed 4 in a midtown Manhattan skyscraper blamed his actions on traumatic brain injuries caused by football and the inaction of the NFL, whose headquarters he sought. 2. The head of the National Security Agency (NSA) and the NSA's deputy director have been fired. The firings were described as abrupt and occurred after reports of pressure from right-wing activist Laura Loomer who had accused the officials of disloyalty. 3. Defense Secretary Pete Hegseth is rumored to be quitting his current post to run for office in Tennessee. 4. Immigration Czar Tom Homan gave out some very back of the napkin math on the people his goon squads are rounding up and disappearing from the country. 5. Trump told reporters he had a falling out with Jeffrey Epstein over underage spa workers at Mar a Lago being recruited into his sexual predator enterprise. Then, Max speaks with Elaine Godfrey who is a staff writer at The Atlantic. She covers national politics. Her latest reporting documents the kind of leadership, issue-advocacy and grit the modern Democratic party needs to survive the Second Age of Donald Trump – as typified by Texan Jasmine Crockett. Next, he interviews Zoë Towns who is the Executive Director at Forward Dot U-S, where she launched the criminal justice reform portfolio in 2017 - defining its advocacy, policy, research, and philanthropic agenda. In her years since, Zoë has overseen administrative, ballot, electoral, and legislative criminal justice reform campaigns in states across the country and at the federal level. And finally, Max chats with the National Affairs correspondent for The Nation - John Nichols about current news and all things in Trumpland. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In Podcast Ep. 145, we dive into the stark transformation of the Democratic Party since the 1990s, with a monologue exposing how Democrats have abandoned the middle class for an elite-driven agenda. We analyze the robust Q2 GDP growth, debunking the doom-and-gloom narratives pushed by figures like Chuck Schumer and Amy Klobuchar. Next, we uncover the anti-Trump firing of April Doss at the NSA. We then tackle Hamas propaganda, spotlighting how outlets like The New York Times and BBC once again falsely portray Israel as starving children. Finally, we explore the irony of leftists comparing Sydney Sweeney's American Eagle ad to eugenics, while supporting Planned Parenthood, founded by a founder of the eugenics movement, Margaret Sanger. Join us for a hard-hitting discussion on politics, economics, and media bias. Please take a moment to rate and review the show and then share the episode on social media. You can find me on Facebook, X, Instagram, GETTR, TRUTH Social and YouTube by searching for The Alan Sanders Show. And, consider becoming a sponsor of the show by visiting my Patreon page!!
Welcome to Pathology with Dr. Priya | A Zone 7 Series, a forensic deep-dive led by board-certified pathologist Dr. Priya Banerjee. Each Monday, Dr. Priya teams up with Emmy Award–winning CSI Sheryl “Mac” McCollum to explore the silent testimony of the dead and the science behind suspicious deaths. From the autopsy suite to the courtroom, they uncover the truth in tissues, expose investigative missteps, and give voice to those who can no longer speak for themselves. Whether you're a seasoned detective, true crime obsessive, or just curious about what the body can really reveal—this is your front-row seat to forensic pathology in action. In this debut episode, Dr. Priya reflects on her approach to autopsies, what the body can reveal that others can’t, and why collaboration between law enforcement and medical examiners is essential to justice. With more than 3,000 autopsies to her name—including the high-profile Breonna Taylor case and work with the NSA—Dr. Priya brings both precision and heart to this science. She and Sheryl McCollum break down the John O’Keefe case and walk listeners through what a well-executed forensic process should look like. You’ll also meet Slice—the puppy with a badge and a calming presence in even the most intense training rooms—and get a glimpse into Dr. Priya’s personal world, where compassion, curiosity, and hard-earned experience converge. Highlights: (0:00) Welcome to Pathology with Dr. Priya | A Zone 7 Series (1:00) Who is Dr. Priya? Johns Hopkins, 3,000 autopsies, and an adopted puppy (3:30) Inside the case: crime scenes, teamwork, and the John O’Keefe breakdown (11:00) What the autopsy can (and can’t) say (15:00) Working with families and finding closure (22:15) Training detectives—with help from Slice, the puppy with a badge About the Show Pathology with Dr. Priya | A Zone 7 Series explores the powerful role forensic pathology plays in uncovering the truth. Each week, Dr. Priya joins Sheryl McCollum to discuss real cases, surprising conclusions, and the science behind suspicious deaths. From overlooked trauma to undiagnosed conditions, the goal is always the same: justice through evidence, and closure through clarity. If you’ve ever wondered what a body can tell you—this is the show. About the Hosts Dr. Priya Banerjee is a board-certified forensic pathologist with extensive experience in death investigation, clinical forensics, and courtroom testimony. A graduate of Johns Hopkins, she served for over a decade as Rhode Island’s state medical examiner and now runs a private forensic pathology practice. Her work includes military deaths, NSA cases, and high-profile investigations. Dr. Priya has also been featured as a forensic expert on platforms such as CrimeOnline and Crime Stories with Nancy Grace. She is a dedicated educator, animal lover, and proud mom. Website: anchorforensicpathology.comTwitter/X: @Autopsy_MD Sheryl McCollum is an Emmy Award–winning CSI, a writer for CrimeOnline, and the Forensic and Crime Scene Expert for Crime Stories with Nancy Grace. She works as a CSI for a metro Atlanta Police Department and is the co-author of the textbook Cold Case: Pathways to Justice. Sheryl is also the founder and director of the Cold Case Investigative Research Institute (CCIRI), a nationally recognized nonprofit that brings together universities, law enforcement, and experts to help solve unsolved homicides, missing persons cases, and kidnappings. Email: coldcase2004@gmail.comTwitter/X: @149zone7Facebook: @sheryl.mccollumInstagram: @officialzone7podcast
Send us a textMitch begins by challenging every employee of the NSA to a non-lethal duel. His terms if he wins the duel are that the employee must use their influence and resources to require the FBI be an all female Bureau. Mitch talks about his strategies to reduce traffic if he becomes mayor of Pittsburgh. He talks about what he would do as Secretary of the Treasury. Mitch would launch an online portal and e currency that would help small businesses raise money and have transactions without credit card fees. He believes the only way a nuclear power should release an e-currency is if it is tied to spent nuclear fuel. The goal of the e-currency is to find ways to neutralize spent nuclear fuel. Support the show
From May 6, 2017: Three months into the Trump presidency, where does the relationship between the president and the intelligence community stand? Donald Trump is no longer quite so regularly combative in his tweets and public comments about the various intelligence agencies, but the White House-intelligence community relationship is still far from normal under this very unusual presidency. Here to ponder the question are former NSA and CIA director General Michael Hayden, former acting and deputy director of CIA John McLaughlin, and former deputy national security advisor for combating terrorism Juan Zarate, who spoke with the Washington Post's David Ignatius in a recent event at the Aspen Institute. To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
For decades, digital rights activists, technologists, and cybersecurity experts have worried about what would happen if the US government secretly broke into people's encrypted communications.The weird thing, though, is that it's already happened—sort of.US intelligence agencies, including the FBI and NSA, have long sought what is called a “backdoor” into the secure and private messages that are traded through platforms like WhatsApp, Signal, and Apple's Messages. These applications all provide what is called “end-to-end encryption,” and while the technology guarantees confidentiality for journalists, human rights activists, political dissidents, and everyday people across the world, it also, according to the US government, provides cover for criminals.But to access any single criminal or criminal suspect's encrypted messages would require an entire reworking of the technology itself, opening up not just one person's communications to surveillance, but everyone's. This longstanding struggle is commonly referred to as The Crypto Wars, and it dates back to the 1950s during the Cold War, when the US government created export control regulations to protect encryption technology from reaching outside countries.But several years ago, the high stakes in these Crypto Wars became somewhat theoretical, as the FBI gained access to the communications and whereabouts of hundreds of suspected criminals, and they did it without “breaking” any encryption whatsover.It all happened with the help of Anom, a budding company behind an allegedly “secure” phone that promised users a bevy of secretive technological features, like end-to-end encrypted messaging, remote data wiping, secure storage vaults, and even voice scrambling. But, unbeknownst to Anom's users, the entire company was a front for law enforcement. On Anom phones, every message, every photo, every piece of incriminating evidence, and every order to kill someone, was collected and delivered, in full view, to the FBI.Today, on the Lock and Code podcast with host David Ruiz, we revisit a 2024 interview with 404 Media cofounder and investigative reporter Joseph Cox about the wild, true story of Anom. How did it work, was it “legal,” where did the FBI learn to run a tech startup, and why, amidst decades of debate, are some people ignoring the one real-life example of global forces successfully installing a backdoor into a company?The public…and law enforcement, as well, [have] had to speculate about what a backdoor in a tech product would actually look like. Well, here's the answer. This is literally what happens when there is a backdoor, and I find it crazy that not more people are paying attention to it.Tune in today.You can also find us on Apple Podcasts, Spotify, and whatever preferred podcast platform you use.For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.Show notes and credits:Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/Outro Music: “Good God” by Wowa (unminus.com)Listen up—Malwarebytes doesn't just talk cybersecurity, we provide it.Protect yourself from online attacks that threaten your identity, your files, your system, and your...
Dimitri and Khalid inaugurate their long-awaited Pivot To YouTube with their second deep dive into the liminal world of Bigfoot the Jinn. Topics include: the fake Yeti blood oath ritual scandal at a Denver Catholic seminary, renegade Polish artist Stanisław Szukalski's cryptic race science theories about the eternal human-Yeti war, Szukalski's friendship with Leo DiCaprio's dirtbag dad who wrote sus underground comix for Tim Leary and wants to run for President, Bigfoot and the story of Cain, former Congressman/NSA operative Denver Riggleman III's vaguely erotic book about the Bigfoot community, Yeti-checking the Dyatlov Pass tragedy once and for all, Italian fascist Corrado Gini's Cold War interest in finding Yeti, the ontological ‘squatch war being waged between Western eugenicists and Eastern Marxists, the King of France's bigfoot prank that ended in death and horror, and more. For access to premium SJ episodes, upcoming installments of DEMON FORCES, and the Grotto of Truth Discord, become a subscriber at https://patreon.com/subliminaljihad.
Unleashed: The Political News Hour with Bruce Robertson – Information released this week by Gabbard suggests that Obama and his inner circle may also have been involved in a plot to assassinate Trump to prevent him from taking office. These are serious allegations, and Tulsi Gabbard seems to have the receipts to make them stick. Information is now confirmed that the FBI and NSA had...
In January, 2022 today's guest, Mike Paciello, made his first appearance on Unstoppable Mindset in Episode 19. It is not often that most of us have the opportunity and honor to meet a real trendsetter and pioneer much less for a second time. However, today, we get to spend more time with Mike, and we get to talk about not only the concepts around web accessibility, but we also discuss the whole concept of inclusion and how much progress we have made much less how much more work needs to be done. Mike Paciello has been a fixture in the assistive technology world for some thirty years. I have known of him for most of that time, but our paths never crossed until September of 2021 when we worked together to help create some meetings and sessions around the topic of website accessibility in Washington D.C. As you will hear, Mike began his career as a technical writer for Digital Equipment Corporation, an early leader in the computer manufacturing industry. I won't tell you Mike's story here. What I will say is that although Mike is fully sighted and thus does not use much of the technology blind and low vision persons use, he really gets it. He fully understands what Inclusion is all about and he has worked and continues to work to promote inclusion and access for all throughout the world. As Mike and I discuss, making technology more inclusive will not only help persons with disabilities be more involved in society, but people will discover that much of the technology we use can make everyone's life better. We talk about a lot of the technologies being used today to make websites more inclusive including the use of AI and how AI can and does enhance inclusion efforts. It is no accident that this episode is being released now. This episode is being released on July 25 to coincide with the 35th anniversary of the signing of the Americans With Disabilities Act which was signed on July 26, 1990. HAPPY BIRTHDAY ADA! After you experience our podcast with Mike, I'd love to hear your thoughts. Please feel free to email me at michaelhi@accessibe.com to tell me of your observations. Thanks. About the Guest: Mike Paciello is the Chief Accessibility Officer at AudioEye, Inc., a digital accessibility company. Prior to joining AudioEye, Mike founded WebABLE/WebABLE.TV, which delivers news about the disability and accessibility technology market. Mike authored the first book on web accessibility and usability, “Web Accessibility for People with Disabilities” and, in 1997, Mr. Paciello received recognition from President Bill Clinton for his work in the creation of World Wide Web Consortium's (W3C) Web Accessibility Initiative (WAI). He has served as an advisor to the US Access Board and other federal agencies since 1992. Mike has served as an international leader, technologist, and authority in emerging technology, accessibility, usability, and electronic publishing. Mike is the former Founder of The Paciello Group (TPG), a world-renowned software accessibility consultancy acquired in 2017 by Vispero. Ways to connect with Mike: mpaciello@webable.com Michael.paciello@audioeye.com Mikepaciello@gmail.com About the Host: Michael Hingson is a New York Times best-selling author, international lecturer, and Chief Vision Officer for accessiBe. Michael, blind since birth, survived the 9/11 attacks with the help of his guide dog Roselle. This story is the subject of his best-selling book, Thunder Dog. Michael gives over 100 presentations around the world each year speaking to influential groups such as Exxon Mobile, AT&T, Federal Express, Scripps College, Rutgers University, Children's Hospital, and the American Red Cross just to name a few. He is Ambassador for the National Braille Literacy Campaign for the National Federation of the Blind and also serves as Ambassador for the American Humane Association's 2012 Hero Dog Awards. https://michaelhingson.com https://www.facebook.com/michael.hingson.author.speaker/ https://twitter.com/mhingson https://www.youtube.com/user/mhingson https://www.linkedin.com/in/michaelhingson/ accessiBe Links https://accessibe.com/ https://www.youtube.com/c/accessiBe https://www.linkedin.com/company/accessibe/mycompany/ https://www.facebook.com/accessibe/ Thanks for listening! Thanks so much for listening to our podcast! If you enjoyed this episode and think that others could benefit from listening, please share it using the social media buttons on this page. Do you have some feedback or questions about this episode? Leave a comment in the section below! Subscribe to the podcast If you would like to get automatic updates of new podcast episodes, you can subscribe to the podcast on Apple Podcasts or Stitcher. You can subscribe in your favorite podcast app. You can also support our podcast through our tip jar https://tips.pinecast.com/jar/unstoppable-mindset . Leave us an Apple Podcasts review Ratings and reviews from our listeners are extremely valuable to us and greatly appreciated. They help our podcast rank higher on Apple Podcasts, which exposes our show to more awesome listeners like you. If you have a minute, please leave an honest review on Apple Podcasts. Transcription Notes: Michael Hingson ** 00:00 Access Cast and accessiBe Initiative presents Unstoppable Mindset. The podcast where inclusion, diversity and the unexpected meet. Hi, I'm Michael Hingson, Chief Vision Officer for accessiBe and the author of the number one New York Times bestselling book, Thunder dog, the story of a blind man, his guide dog and the triumph of trust. Thanks for joining me on my podcast as we explore our own blinding fears of inclusion unacceptance and our resistance to change. We will discover the idea that no matter the situation, or the people we encounter, our own fears, and prejudices often are our strongest barriers to moving forward. The unstoppable mindset podcast is sponsored by accessiBe, that's a c c e s s i capital B e. Visit www.accessibe.com to learn how you can make your website accessible for persons with disabilities. And to help make the internet fully inclusive by the year 2025. Glad you dropped by we're happy to meet you and to have you here with us. Michael Hingson ** 01:21 Well, hi everyone, and welcome to another episode of unstoppable mindset where inclusion diversity and the unexpected meet. Normally, our guests deal with the unexpected, which is anything that doesn't have to do with inclusion or diversity. Today, however, we get to sort of deal with both. We have a guest who actually was a guest on our podcast before he was in show 19 that goes all the way back to January of 2022, his name is Mike Paciello. He's been very involved in the whole internet and accessibility movement and so on for more than 30 years, and I think we're going to have a lot of fun chatting about what's going on in the world of accessibility and the Internet and and, you know, and but we won't probably get into whether God is a man or a woman, but that's okay, God is actually both, so we don't have to worry about that. But anyway, Mike, welcome to unstoppable mindset. Mike Paciello ** 02:21 Yeah, Hey, Mike, thanks a lot. I can't believe has it really been already since today, six years since the last time I came on this? No, three, 320, 22 Oh, 2022, I for whatever I 2019 Okay, three years sounds a little bit more realistic, but still, it's been a long time. Thank you for having me. It's, it's, it's great to be here. And obviously, as you know, a lot of things have changed in my life since then. But, yeah, very Michael Hingson ** 02:46 cool. Well, you were in show number 19. And I'm not sure what number this is going to be, but it's going to be above 360 so it's been a while. Amazing, amazing, unstoppable, unstoppable. That's it. We got to keep it going. And Mike and I have been involved in a few things together, in, in later, in, I guess it was in 20 when we do the M enabling Summit, that was 2021 wasn't it? Yeah, I think it was, I think it was the year before we did the podcast, yeah, podcast, 2021 right? So we were in DC, and we both worked because there was a group that wanted to completely condemn the kinds of technologies that accessibe and other companies use. Some people call it overlays. I'm not sure that that's totally accurate today, but we we worked to get them to not do what they originally intended to do, but rather to explore it in a little bit more detail, which I think was a lot more reasonable to do. So we've, we've had some fun over the years, and we see each other every so often, and here we are again today. So yeah, I'm glad you're here. Well, tell us a little about well, and I guess what we'll do is do some stuff that we did in 2022 tell us about kind of the early Mike, growing up and all that and what eventually got you into dealing with all this business of web accessibility and such. Yeah, thank you. Mike Paciello ** 04:08 You know, I've tried to short this, shorten this story 100 times. Oh, don't worry. See if I get let's see if I can keep it succinct and and for the folks out there who understand verbosity and it's in its finest way for screen reader users, I'll try not to be verbose. I already am being Michael Hingson ** 04:28 intermediate levels fine. Mike Paciello ** 04:30 I came into this entire field as a technical writer trying to solve a problem that I kind of stumbled into doing some volunteer work for the debt the company that I then then worked for, a Digital Equipment Corporation, a software company, DEC software hardware company, back then, right back in the early 80s. And as a technical writer, I started learning at that time what was called Gen code. Eventually that morphed in. To what Goldfarb, Charles Goldfarb at IBM, called SGML, or standard, Generalized Markup Language, and that really became the predecessor, really gave birth to what we see on the web today, to HTML and the web markup languages. That's what they were, except back then, they were markup languages for print publications. So we're myself and a lot of colleagues and friends, people probably here, I'm sure, at bare minimum, recognized named George Kercher. George and I really paired together, worked together, ended up creating an international steer with a group of other colleagues and friends called the icad 22 which is 22 stands for the amount of elements in that markup language. And it became the adopted standard accessibility standard for the American Association of Publishers, and they published that became official. Eventually it morphed into what we today call, you know, accessible web development. It was the first instance by that was integrated into the HTML specification, I think officially, was HTML 3.1 3.2 somewhere in there when it was formally adopted and then announced in 1997 and at the World Wide Web Conference. That's really where my activity in the web began. So I was working at DEC, but I was doing a lot of volunteer work at MIT, which is where the W 3c was located at that particular time. And Tim Bursley, who a lot of people i Sir, I'm sure, know, the inventor of the web, led the effort at that time, and a few other folks that I work with, and.da Jim Miller, a few other folks. And we were, well, I wasn't specifically approached. Tim was approached by Vice President Gore and eventually President Clinton at that time to see if we could come up with some sort of technical standard for accessibility. And Tim asked if I'd like to work on it myself. Danielle, Jim, a few others, we did, and we came up that first initial specification and launched it as part of the Web Accessibility Initiative, which we created in 1997 from there, my career just took off. I went off did a couple of small companies that I launched, you know, my namesake company, the Paciello Group, or TPG, now called TPG IGI, yeah, yeah, which was acquired by vector capital, or this bureau back in 2017 so it's hard to believe that's already almost 10 years ago. No, yeah. And I've been walking in, working in the software, web accessibility field, usability field, writing fields, you know, for some pretty close to 45 years. It's 2025 40 years, I mean, and I started around 1984 I think it was 8384 when all this first Michael Hingson ** 07:59 started. Wow, so clearly, you've been doing it for a while and understand a lot of the history of it. So how overall has the whole concept of web accessibility changed over the years, not only from a from a coding standpoint, but how do you think it's really changed when it comes to being addressed by the public and companies and so on. Mike Paciello ** 08:26 That's a great question. I'd certainly like to be more proactive and more positive about it, but, but let me be fair, if you compare today and where web accessibility resides, you know, in the in the business value proposition, so to speak, and list the priorities of companies and corporations. You know, fortune 1000 fortune 5000 call whatever you whatever you want. Accessibility. Is there people? You could say section five way you could say the Web Accessibility Initiative, WCAG, compliance, and by and large, particularly technology driven, digital economy driven businesses, they know what it is. They don't know how to do it. Very rarely do they know how to do it. And even the ones that know how to do it don't really do it very well. So it kind of comes down to the 8020, rule, right? You're a business. Whatever kind of business you are, you're probably in more online presence than ever before, and so a lot of your digital properties will come under you know the laws that mandate usability and accessibility for people with disabilities today that having been said and more and more people know about it than ever before, certainly from the time that I started back in the you know, again, in the early, mid 80s, to where we are today. It's night and day. But in terms of prioritization, I don't know. I think what happens quite often is business value proposition. Decisions get in the way. Priorities get in the way of what a business in, what its core business are, what they're trying to accomplish, who they're trying to sell, sell to. They still view the disability market, never mind the blind and low vision, you know, market alone as a niche market. So they don't make the kind of investors that I, I believe that they could, you know, there's certainly, there are great companies like like Microsoft and and Google, Amazon, Apple, you know, a lot of these companies, you know, have done some Yeoman work at that level, but it's nowhere near where it should be. It just absolutely isn't. And so from that standpoint, in where I envision things, when I started this career was when I was in my 20 somethings, and now I'm over now I'm over 60. Well over 60. Yeah, I expected a lot more in, you know, in an internet age, much, much more. Michael Hingson ** 11:00 Yeah, yeah. Well, it's it's really strange that so much has happened and yet so much hasn't happened. And I agree with you, there's been a lot of visibility for the concept of accessibility and inclusion and making the the internet a better place, but it is so unfortunate that most people don't know how to how to do anything with it. Schools aren't really teaching it. And more important than even teaching the coding, from from my perspective, looking at it more philosophically, what we don't tend to see are people really recognizing the value of disabilities, and the value that the market that people with disabilities bring to the to the world is significant. I mean, the Center for Disease Control talks about the fact that they're like up to 25% of all Americans have some sort of disability. Now I take a different approach. Actually. I don't know whether you've read my article on it, but I believe everyone on the in the in the world has a disability, and the reality is, most people are light dependent, but that's as much a disability as blindness. Except that since 1878 when Thomas Edison invented the light bulb. We have focused nothing short of trying to do everything we can to improve light on demand for the last 147 years. And so the disability is mostly covered up, but it's still there. Mike Paciello ** 12:37 You know, yeah, and I did read that article, and I couldn't agree with you more. In fact, I personally think, and I actually have my own blog coming out, and probably later this month might be early, early July, where I talk about the fact that accessibility okay and technology really has been all along. And I love the fact that you call, you know, you identified the, you know, the late 1800s there, when Edison did the the light bulb, Alexander Graham Bell came up with, you know, the telephone. All of those adventures were coming about. But accessibility to people with disabilities, regardless of what their disability is, has always been a catalyst for innovation. That was actually supposed to be the last one I was going to make tonight. Now it's my first point because, because I think it is exactly as you said, Mike, I think that people are not aware. And when I say people, I mean the entire human population, I don't think that we are aware of the history of how, how, because of, I'm not sure if this is the best word, but accommodating users, accommodating people with disabilities, in whatever way, the science that goes behind that design architectural to the point of development and release, oftentimes, things that were done behalf of people with disabilities, or for People with disabilities, resulted in a fundamental, how's this for? For an interesting term, a fundamental alteration right to any other you know, common, and I apologize for the tech, tech, tech language, user interface, right, right? Anything that we interact with has been enhanced because of accessibility, because of people saying, hey, if we made this grip a little bit larger or stickier, we'll call it so I can hold on to it or softer for a person that's got fine motor dexterity disabilities, right? Or if we made a, you know, a web browser, which, of course, we have such that a blind individual, a low vision individual, can adjust the size of this, of the images and the fonts and things like that on a web page, they could do that unknown. Well, these things now. As we well know, help individuals without disabilities. Well, I'm not much, right, and I, again, I'm not speaking as a person beyond your characterization that, hey, look, we are all imperfect. We all have disabilities. And that is, that is absolutely true. But beyond that, I wear glasses. That's it. I do have a little hearing loss too. But you know, I'm finding myself more and more, for example, increasing the size of text. In fact, my note, yes, I increase them to, I don't know they're like, 18 point, just so that it's easier to see. But that is a common thing for every human being, just like you said. Michael Hingson ** 15:36 Well, the reality is that so many tools that we use today come about. And came about because of people with disabilities. Peggy Chung Curtis Chung's wife, known as the blind history lady, and one of the stories that she told on her first visit to unstoppable mindset, which, by the way, is episode number five. I remember that Peggy tells the story of the invention of the typewriter, which was invented for a blind countist, because she wanted to be able to communicate with her lover without her husband knowing about it, and she didn't want to dictate things and so on. She wanted to be able to create a document and seal it, and that way it could be delivered to the lever directly. And the typewriter was the result of Mike Paciello ** 16:20 that? I didn't know that. I will definitely go back. I just wrote it down. I wrote down a note that was episode number five, yeah, before with Curtis a couple of times, but obviously a good friend of ours, yeah, but I yeah, that's, that's, that's awesome. Michael Hingson ** 16:37 Well, and look at, I'll tell you one of the things that really surprises me. So Apple was going to get sued because they weren't making any of their products accessible. And before the lawsuit was filed, they came along and they said, we'll fix it. And they did make and it all started to a degree with iTunes U but also was the iPhone and the iPod and so on. But they they, they did the work. Mostly. They embedded a screen reader called Voiceover in all of their operating systems. They did make iTunes you available. What really surprises me, though is that I don't tend to see perhaps some things that they could do to make voiceover more attractive to drivers so they don't have to look at the screen when a phone call comes in or whatever. And that they could be doing some things with VoiceOver to make it more usable for sighted people in a lot of instances. And I just don't, I don't see any emphasis on that, which is really surprising to me. Mike Paciello ** 17:38 Yeah, I totally agree. I mean, there are a lot of use cases there that you go for. I think Mark Rico would certainly agree with you in terms of autonomous driving for the blind, right? Sure that too. But yeah, I definitely agree and, and I know the guy that the architect voiceover and develop voiceover for Apple and, boy, why can I think of his last name? I know his first name. First name is Mike. Is with Be My Eyes now and in doing things at that level. But I will just say one thing, not to correct you, but Apple had been in the accessibility business long before voice over Alan Brightman and Gary mulcher were instrumental towards convincing, you know, jobs of the importance of accessibility to people with disabilities, Michael Hingson ** 18:31 right? But they weren't doing anything to make products accessible for blind people who needed screen readers until that lawsuit came along. Was Mike Paciello ** 18:40 before screen readers? Yeah, that was before, Michael Hingson ** 18:43 but they did it. Yeah. The only thing I wish Apple would do in that regard, that they haven't done yet, is Apple has mandates and requirements if you're going to put an app in the App Store. And I don't know whether it's quite still true, but it used to be that if your app had a desktop or it looked like a Windows desktop, they wouldn't accept it in the app store. And one of the things that surprises me is that they don't require that app developers make sure that their products are usable with with VoiceOver. And the reality is that's a it doesn't need to be a really significantly moving target. For example, let's say you have an app that is dealing with displaying star charts or maps. I can't see the map. I understand that, but at least voiceover ought to give me the ability to control what goes on the screen, so that I can have somebody describe it, and I don't have to spend 15 or 20 minutes describing my thought process, but rather, I can just move things around on the screen to get to where we need to go. And I wish Apple would do a little bit more in that regard. Mike Paciello ** 19:52 Yeah, I think that's a great a great thought and a great challenge, if, between me and you. Yeah, I think it goes back to what I said before, even though we both see how accessibility or accommodating users with disabilities has led to some of the most incredible innovations. I mean, the Department of Defense, for years, would integrate people with disabilities in their user testing, they could better help, you know, military soldiers, things like that, assimilate situations where there was no hearing, there was they were immobile, they couldn't see all, you know, all of these things that were natural. You know, user environments or personas for people with disabilities. So they led to these kind of, you know, incredible innovations, I would tell you, Mike, I think you know this, it's because the business value proposition dictates otherwise. Michael Hingson ** 20:55 Yeah, and, well, I guess I would change that slightly and say that people think that the business proposition does but it may very well be that they would find that there's a lot more value in doing it if they would really open up their minds to looking at it differently. It's Mike Paciello ** 21:10 kind of, it's kind of like, it's tough. It's kind of like, if I could use this illustration, so to speak, for those who may not be religiously inclined, but you know, it's, it's like prophecy. Most people, you don't know whether or not prophecy is valid until years beyond, you know, years after. And then you could look back at time and say, See, it was all along. These things, you know, resulted in a, me, a major paradigm shift in the way that we do or don't do things. And I think that's exactly what you're saying. You know, if, if people would really look at the potential of what technologies like, you know, a voice over or, as you know, a good friend of mine said, Look, we it should be screen readers. It should be voice IO interfaces, right? That every human can use and interact with regardless. That's what we're really talking about. There's Michael Hingson ** 22:10 a big discussion going on some of the lists now about the meta, Ray Ban, glasses, and some of the things that it doesn't do or that they don't do well, that they should like. It's really difficult to get the meta glasses to read completely a full page. I think there are ways that people have now found to get it to do that, but there are things like that that it that that don't happen. And again, I think it gets back to what you're saying is the attitude is, well, most people aren't going to need that. Well, the reality is, how do you know and how do you know what they'll need until you offer options. So one of my favorite stories is when I worked for Kurzweil a long time ago, some people called one day and they wanted to come and see a new talking computer terminal that that Ray and I and others developed, and they came up, and it turns out, they were with one of those initial organizations out of Langley, Virginia, the CIA. And what they wanted to do was to use the map the the terminal connected to their computers to allow them to move pointers on a map and not have to watch the map or the all of the map while they were doing it, but rather, the computer would verbalize where the pointer was, and then they could they could move it around and pin a spot without having to actually look at the screen, because the way their machine was designed, it was difficult to do that. You know, the reality is that most of the technologies that we need and that we use and can use could be used by so much, so many more people, if people would just really look at it and think about it, but, but you're right, they don't. Mike Paciello ** 24:04 You know, it's, of course, raise a raise another good friend of mine. We both having in common. I work with him. I been down his office a few, more than few times, although his Boston office, anyway, I think he's, I'm not sure he's in Newton. He's in Newton. Yeah. Is he still in Newton? Okay. But anyway, it reminded me of something that happened in a similar vein, and that was several years ago. I was at a fast forward forward conference, future forward conference, and a company, EMC, who absorbed by Dell, I think, right, yes, where they all are. So there I was surprised that when that happened. But hey, yeah, yeah, I was surprised that compact bought depth, so that's okay, yeah, right. That HP bought count, right? That whole thing happened. But um, their chief science, chief scientist, I think he was a their CSO chief scientist, Doc. Came up and made this presentation. And basically the presentation was using voice recognition. They had been hired by the NSA. So it was a NSA right to use voice recognition in a way where they would recognize voices and then record those voices into it, out the output the transcript of that right text, text files, and feed them back to, you know, the NSA agents, right? So here's the funny part of that story goes up i i waited he gave his presentation. This is amazing technology, and what could it was like, 99% accurate in terms of not just recognizing American, English speaking people, but a number of different other languages, in dialects. And the guy who gave the presentation, I actually knew, because he had been a dec for many years. So in the Q and A Part I raised by hand. I got up there. He didn't recognize it a few years had gone by. And I said, you know, this is amazing technology. We could really use this in the field that I work in. And he said, Well, how's that? And I said, you know, voice recognition and outputting text would allow us to do now this is probably 2008 2009 somewhere in that area, would allow us to do real time, automated transcription for the Deaf, Captioning. And he looks at me and he he says, Do I know you? This is through a live audience. I said. I said, Yeah, Mark is it was. Mark said, So Mike gas yellow. He said, you're the only guy in town that I know that could turn a advanced, emerging technology into something for people with disabilities. I can't believe it. So that was, that was, but there was kind of the opposite. It was a technology they were focused on making this, you know, this technology available for, you know, government, obviously covert reasons that if they were using it and applying it in a good way for people with disabilities, man, we'd have been much faster, much further along or even today, right? I mean, it's being done, still not as good, not as good as that, as I saw. But that just goes to show you what, what commercial and government funding can do when it's applied properly? Michael Hingson ** 27:41 Well, Dragon, naturally speaking, has certainly come a long way since the original Dragon Dictate. But there's still errors, there's still things, but it does get better, but I hear exactly what you're saying, and the reality is that we don't tend to think in broad enough strokes for a lot of the things that we do, which is so unfortunate, Mike Paciello ** 28:03 yeah? I mean, I've had an old saying that I've walked around for a long time. I should have, I should make a baseball cap, whether something or T shirt. And it simply was, think accessibility, yeah, period. If, if, if we, organizations, people, designers, developers, architects, usability, people, QA, people. If everybody in the, you know, in the development life cycle was thinking about accessibility, or accessibility was integrated, when we say accessibility, we're talking about again, for users with disabilities, if that became part of, if not the functional catalyst, for technology. Man, we'd have been a lot further along in the quote, unquote value chains than we are today. Michael Hingson ** 28:46 One of the big things at least, that Apple did do was they built voiceover into their operating system, so anybody who buys any Apple device today automatically has redundancy here, but access to accessibility, right? Which, which is really the way it ought to be. No offense to vispero and jaws, because they're they're able to fill the gap. But still, if Microsoft had truly devoted the time that they should have to narrate her at the beginning. We might see a different kind of an architecture today. Mike Paciello ** 29:26 You know, I so I want to, by the way, the person that invented that wrote that code is Mike shabanik. That's his name I was thinking about. So Mike, if you're listening to this guy, just hi from two others. And if he's not, he should be, yeah, yeah, exactly right from two other mics. But so let me ask you this question, because I legitimately can't remember this, and have had a number of discussions with Mike about this. So VoiceOver is native to the US, right? Michael Hingson ** 29:56 But no, well, no to to the to the to the. Products, but not just the US. No, Mike Paciello ** 30:02 no, I said, OS, yes, it's native to OS, yeah, right. It's native that way, right? But doesn't it still use an off screen model for producing or, you know, translate the transformation of, you know, on screen to voice. Michael Hingson ** 30:27 I'm not sure that's totally true. Go a little bit deeper into that for me. Mike Paciello ** 30:34 Well, I mean, so NVDA and jaws use this off screen model, right, which is functionally, they grab, will they grab some content, or whatever it is, push it to this, you know, little black box, do all those translations, you know, do all the transformation, and then push it back so it's renderable to a screen reader. Okay, so that's this off screen model that is transparent to the users, although now you know you can get into it and and tweak it and work with it right, right? I recall when Mike was working on the original design of of nary, excuse me, a voiceover, and he had called me, and I said, Are you going to continue with the notion of an off screen model? And he said, Yeah, we are. And I said, Well, when you can build something that's more like what TV Raman has built into Emacs, and it works integral to the actual OS, purely native. Call me because then I'm interested in, but now that was, you know, 1520, years ago, right? I mean, how long has voiceover been around, Michael Hingson ** 31:51 since 2007 Mike Paciello ** 31:54 right? So, yeah, 20 years ago, right? Just shy of 20 years, 18 years. So I don't know. I honestly don't know. I'm Michael Hingson ** 32:02 not totally sure, but I believe that it is, but I can, you know, we'll have to, we'll have to look into that. Mike Paciello ** 32:08 If anyone in the audience is out there looking at you, get to us before we find out. Let us we'll find out at the NFB Michael Hingson ** 32:12 convention, because they're going to be a number of Apple people there. We can certainly ask, there Mike Paciello ** 32:17 you go. That's right, for sure. James Craig is bound to be there. I can ask him and talk to him about that for sure. Yep, so anyway, Michael Hingson ** 32:23 but I think, I think it's a very it's a valid point. And you know, the the issue is that, again, if done right and app developers are doing things right there, there needs to, there ought to be a way that every app has some level of accessibility that makes it more available. And the reality is, people, other than blind people use some of these technologies as well. So we're talking about voice input. You know, quadriplegics, for example, who can't operate a keyboard will use or a mouse can use, like a puff and zip stick to and and Dragon to interact with a computer and are successful at doing it. The reality is, there's a whole lot more opportunities out there than people think. Don't Mike Paciello ** 33:11 I agree with that. I'm shaking my head up and down Mike and I'm telling you, there is, I mean, voice recognition alone. I can remember having a conversation with Tony vitality, one of the CO inventors of the deck talk. And that goes all the way back into the, you know, into the early 90s, about voice recognition and linguistics and what you know, and I know Kurzweil did a lot of working with Terry right on voice utterances and things like that. Yeah, yeah. There's, there's a wide open window of opportunity there for study and research that could easily be improved. And as you said, and this is the point, it doesn't just improve the lives of the blind or low vision. It improves the lives of a number of different types of Persona, disability persona types, but it would certainly create a pathway, a very wide path, for individuals, users without disabilities, in a number of different life scenarios. Michael Hingson ** 34:10 Yeah, and it's amazing how little sometimes that's done. I had the pleasure a few years ago of driving a Tesla down Interstate 15 out here in California. Glad I wasn't there. You bigot, you know, the co pilot system worked. Yeah, you know, I just kept my hands on the wheel so I didn't very much, right? Not have any accidents. Back off now it worked out really well, but, but here's what's really interesting in that same vehicle, and it's something that that I find all too often is is the case if I were a passenger sitting in the front seat, there's so much that I as a passenger don't have access to that other passenger. Do radios now are mostly touchscreen right, which means and they don't build in the features that would make the touchscreen system, which they could do, accessible. The Tesla vehicle is incredibly inaccessible. And there's for a guy who's so innovative, there's no reason for that to be that way. And again, I submit that if they truly make the product so a blind person could use it. Think of how much more a sighted person who doesn't have to take their eyes off the road could use the same technologies. Mike Paciello ** 35:35 You know, Mike, again, you and I are on the same page. I mean, imagine these guys are supposed to be creative and imaginative and forward thinking, right? Could you? Can you imagine a better tagline than something along the lines of Tesla, so user friendly that a blind person can drive it? Yeah? I mean this is, have you heard or seen, you know, metaphorically speaking, or that's okay, a an advertisement or PR done by any, any company, because they're all, all the way across the board, that hasn't featured what it can do to enhance lives of people with disabilities. Where it wasn't a hit. I mean, literally, it was, yeah, you see these commercials played over and over to Apple, Microsoft, Emma, I see McDonald's, Walmart. I mean, I could just name, name the one after another. Really, really outstanding. Salesforce has done it. Just incredible. They would do it, yeah. I mean, there is there any more human centric message than saying, Look what we've built and designed we're releasing to the masses and everyone, anyone, regardless of ability, can use it. Yeah, that, to me, is that's, I agree that's a good route, right for marketing and PR, good, Michael Hingson ** 37:03 yeah. And yet they don't, you know, I see commercials like about one of the one of the eye injections, or whatever Bobby is, Mo or whatever it is. And at the beginning, the woman says, I think I'm losing sight of the world around me. You know that's all about, right? It's eyesight and nothing else. And I appreciate, I'm all for people keeping their eyesight and doing what's necessary. But unfortunately, all too often, we do that at the detriment of of other people, which is so unfortunate. Mike Paciello ** 37:39 Yeah, you know again, not to, not to get off the subject, but one of my favorite books is rethinking competitive advantage, by Ram Sharon. I don't know if you know know him, but the guy is one of my heroes in terms of just vision and Business and Technology. And in this, this book, he wrote this a couple of years ago. He said this one this is his first rule of competition in the digital age. The number one rule was simply this, a personalized consumer experience, key to exponential growth. That's exactly you and I are talking about personally. I want to see interfaces adapt to users, rather than what we have today, which is users having to adapt to the interface. Michael Hingson ** 38:32 Yeah, and it would make so much sense to do so. I hope somebody out there is listening and will maybe take some of this to heart, because if they do it right, they can have a huge market in no time at all, just because they show they care. You know, Nielsen Company did a survey back in 2016 where they looked at a variety of companies and consumers and so on. And if I recall the numbers right, they decided that people with disabilities are 35% more likely to continue to work with and shop, for example, at companies that really do what they can to make their websites and access to their products accessible, as opposed to not. And that's that's telling. It's so very telling. But we don't see people talking about that nearly like we should Mike Paciello ** 39:20 you talk about a business value proposition. There is bullet proof that where you are leaving money on the table, yep, and a lot of it, yeah, exactly. We're not talking about 1000s or hundreds of 1000s. We're talking about billions and trillions, in some instances, not an exaggeration by any stretch of the imagination, very, very simple math. I had this conversation a couple years ago with the CEO of Pearson. At that time, he's retired, but, you know, I told him, if you spent $1 for every person that it was in the world with. Disability, you're, you're, you're talking about 1/4 of the population, right? It's simple math, simple math, Michael Hingson ** 40:08 but people still won't do it. I mean, we taught you to mention section 508, before with the whole issue of web access, how much of the government has really made their websites accessible, even though it's the law? Mike Paciello ** 40:19 Yeah, three years, three or four years ago, they did a study, and they found out that the good that every federal agency, most of the federal agencies, were not even keeping up thinking with reporting of the status, of where they were, and yet that was written right into the five way law. They were mandated to do it, and they still did do Michael Hingson ** 40:37 it. We haven't, you know, the whole Americans with Disabilities Act. Finally, the Department of Justice said that the internet is a place of business, but still, it's not written in the law. And of course, we only see about 3% of all websites that tend to have any level of access. And there's no reason for that. It's not that magical. And again, I go back to what do we do to get schools and those who teach people how to code to understand the value of putting in accessibility right from the outset? Mike Paciello ** 41:10 Yeah, no, I totally agree with you. I think this is what Kate sanka is trying to do with with Teach access. In fact, you know, again, my company, TPG was one of the founding companies have teach access back again, 10 years ago, when it first started. But that's where it starts. I mean, they're, they're pretty much focused on post secondary, university education, but I could tell you on a personal level, I was speaking at my kids grade school, elementary school, because they were already using laptops and computers back then it starts. Then you've got to build a mindset. You've got to build it we you've heard about the accessibility, maturity models coming out of the W, 3c, and in I, double AP. What that speaks to fundamentally, is building a culture within your corporate organization that is think accessibility as a think accessibility mindset, that it is woven into the fiber of every business line, in every technology, software development life cycle, all of the contributors at that level, from A to Z. But if you don't build it into the culture, it's not going to happen. So I would love to see a lot more being done at that level. But yeah, it's, it's, it's a, it's a hero. Yeah, Michael Hingson ** 42:34 we're, we're left out of the conversation so much. Yeah, yeah, totally. So you, you sold TPG, and you then formed, or you had web able and then able Docs. Mike Paciello ** 42:48 So what web able came out was a carve out, one of two carve outs that I had from when I sold TPG. The other was open access technologies, which which eventually was sold to another accessibility company primarily focused on making documentation accessible to meet the WCAG and other standards requirements and web able I carved out. It's been a kind of a hobby of mine now, for since I sold TPG, I'm still working on the back end, ironically, from the get go, so we're talking, you know, again, eight years ago, I had built machine learning and AI into it. From then back then, I did so that what it does is it very simply, goes out and collects 1000s and 1000s of articles as it relates to technology, people with disabilities, and then cleans them up and post them to web able.com I've got a lot more playing for it, but that's in a nutshell. That's what it does. And I don't we do some we do some QA review to make sure that the cleanup in terms of accessibility and the articles are are properly formatted and are accessible. We use the web aim API, but yeah, works like magic. Works like clockwork, and that's got aI uses IBM Watson AI built into it. Yeah, enable docs was abledocs was, how should I say this in a nice way, abledocs was a slight excursion off of my main route. It can work out. I wish it had. It had a lot of potential, much like open access technologies, but they both suffered from owners who really, really not including myself, who just didn't have good vision and in lack humility, Michael Hingson ** 44:43 yeah. How's that? There you go. Well, so not to go political or anything, but AI in general is interesting, and I know that there have been a lot of debates over the last few years about artificial. Intelligence and helping to make websites accessible. There are several companies like AudioEye, user way, accessibe and so on that to one degree or another, use AI. What? What? So in general, what do you think about AI and how it's going to help deal with or not, the whole issue of disabilities and web access, Mike Paciello ** 45:22 yeah, and we're going to set aside Neil Jacobs thoughts on how he sees it in the future, right? Although I have to tell you, he gave me some things to think about, so we'll just set that to to the side. So I think what AI offers today is something that I thought right away when it started to see the, you know, the accessibes, the user ways, the audio, eyes, and all the other companies kind of delving into it, I always saw potential to how's this remediate a fundamental problem or challenge, let's not call it a problem, a challenge that we were otherwise seeing in the professional services side of that equation around web accessibility, right? So you get experts who use validation tools and other tools, who know about code. Could go in and they know and they use usability, they use user testing, and they go in and they can tell you what you need to do to make your digital properties right, usable and accessible. People with disabilities, all well and good. That's great. And believe me, I had some of the best people, if not the best people in the world, work for me at one time. However, there are a couple of things it could not do in it's never going to do. Number one, first and foremost, from my perspective, it can't scale. It cannot scale. You can do some things at, you know, in a large way. For example, if, if a company is using some sort of, you know, CMS content management system in which their entire sites, you know, all their sites, all their digital properties, you know, are woven into templates, and those templates are remediated. So that cuts down a little bit on the work. But if you go into companies now, it's not like they're limited to two or three templates. Now they've got, you know, department upon department upon department, everybody's got a different template. So even those are becoming very vos, very verbose and very plentiful. So accessibility as a manual effort doesn't really scale well. And if it does, even if it could, it's not fast enough, right? So that's what AI does, AI, coupled with automation, speeds up that process and delivers a much wider enterprise level solution. Now again, AI automation is not, is not a whole, is not a holistic science. You know, it's not a silver bullet. David Marathi likes to use the term, what is he? He likes the gold standard. Well, from his perspective, and by the way, David Marathi is CEO of audio. Eye is a combination of automation AI in expert analysis, along with the use of the integration of user testing and by user testing, it's not just personas, but it's also compatibility with the assistive technologies that people with disabilities use. Now, when you do that, you've got something that you could pattern after a standard software development life cycle, environment in which you integrate all of these things. So if you got a tool, you integrate it there. If you've got, you know, a digital accessibility platform which does all this automation, AI, right, which, again, this is the this is a forester foresters take on the the the daps, as they calls it. And not really crazy about that, but that's what they are. Digital Accessibility platforms. It allows us to scale and scale at costs that are much lower, at speeds that are much faster, and it's just a matter of like any QA, you've got to check your work, and you've got it, you can't count on that automation being absolute. We know for a fact that right now, at best, we're going to be able to get 35 to 40% accuracy, some claim, larger different areas. I'm still not convinced of that, but the fact of the matter is, it's like anything else. Technology gets better as it goes, and we'll see improvements over time periods. Michael Hingson ** 49:49 So here's here's my thought, yeah, let's say you use AI in one of the products that's out there. And I. You go to a website and you include it, and it reasonably well makes the website 50% more usable and accessible than it was before. I'm just, I just threw out that number. I know it's random. Go ahead, Yep, yeah, but let's say it does that. The reality is that means that it's 50% that the web developers, the web coders, don't have to do because something else is dealing with it. But unfortunately, their mentality is not to want to deal with that because they also fear it. But, you know, I remember back in the mid 1980s I started a company because I went off and tried to find a job and couldn't find one. So I started a company with a couple of other people, where we sold early PC based CAD systems to architects, right? And we had AutoCAD versus CAD. Another one called point line, which was a three dimensional system using a y cap solid modeling board that took up two slots in your PC. So it didn't work with all PCs because we didn't have enough slots. But anyway, right, right, right. But anyway, when I brought architects in and we talked about what it did and we showed them, many of them said, I'll never use that. And I said, why? Well, it does work, and that's not the question. But the issue is, we charge by the time, and so we take months to sometimes create designs and projects, right? And so we can't lose that revenue. I said, you're looking at it all wrong. Think about it this way, somebody gives you a job, you come back and you put it in the CAD system. You go through all the iterations it takes, let's just say, two weeks. Then you call your customer in. You use point line, and you can do a three dimensional walk through and fly through. You can even let them look out the window and see what there is and all that they want to make changes. They tell you the changes. You go off and you make the changes. And two weeks later, now it's a month, you give them their finished product, all the designs, all the plots and all that, all done, and you charge them exactly the same price you were going to charge them before. Now you're not charging for your time, you're charging for your expertise, right? And I think that same model still holds true that the technology, I think most people will agree that it is not perfect, but there are a lot of things that it can do. Because the reality is, the Web Content Accessibility Guidelines, are all things that can be defined with computer code, whether it necessarily does it all well with AI or not, is another story. But if it does it to a decent fraction, it makes all the difference in terms of what you're able to do and how quickly you can do Mike Paciello ** 52:52 it. Yeah, I can argue with that at all. I think any time that we can make our jobs a little bit easier so that we can focus where we should be focused. In this case, as you said, the expertise side of it, right to fix those complicated scenarios or situations that require a hands on surgical like Right? Expertise, you can do that now. You've got more hours more time because it's been saved. The only thing I would say, Mike, about what, what you just said, is that there with that, with that mindset, okay, comes responsibility. Oh, yeah, in this is where I think in everybody that knows anything about this environment, you and I have an intimate understanding of this. The whole overlay discussion is the biggest problem with what happened was less about the technology and more about what claims are being made. Yeah, the technology could do which you could not do in, in some cases, could never do, or would never, would never do, well, right? So if you create, and I would submit this is true in as a fundamental principle, if you create a technology of any kind, you must, in truth, inform your clients of of what it can and cannot do so they understand the absolute value to them, because the last thing you want, because, again, we live in a, unfortunately, a very litigious world. Right soon as there's Michael Hingson ** 54:49 a mistake couldn't happen, Mike Paciello ** 54:51 they'll go right after you. So now you know, and again, I don't I'm not necessarily just blaming the ambulance chasers of the world. World. I was talking to an NFP lawyer today. He referred to them in a different name, and I can't remember well, I never heard the expression before, but that's what he meant, right? Yeah, it's the salesman and the product managers and the marketing people themselves, who are were not themselves, to your point, properly trained, properly educated, right? It can't be done, what clearly could not be said, what should or should not be said, right? And then you got lawyers writing things all over the place. So, yeah, yeah. So, so I look people knew when I made the decision to come to audio eye that it was a make or break scenario for me, or at least that's what they thought in my mindset. It always, has always been, that I see incredible possibilities as you do or technology, it just has to be handled responsibly. Michael Hingson ** 55:56 Do you think that the companies are getting better and smarter about what they portray about their products than they than they were three and four and five years ago. Mike Paciello ** 56:08 Okay, look, I sat in and chaired a meeting with the NFB on this whole thing. And without a doubt, they're getting smarter. But it took not just a stick, you know, but, but these large lawsuits to get them to change their thinking, to see, you know, where they where they were wrong, and, yeah, things are much better. There's still some issues out there. I both know it that's going to happen, that happens in every industry, Michael Hingson ** 56:42 but there are improvements. It is getting better, and people are getting smarter, and that's where an organization like the NFB really does need to become more involved than in a sense, they are. They took some pretty drastic steps with some of the companies, and I think that they cut off their nose, despite their face as well, and that didn't help. So I think there are things that need to be done all the way around, but I do see that progress is being made too. I totally Mike Paciello ** 57:11 agree, and in fact, I'm working with them right now. We're going to start working on the California Accessibility Act again. I'm really looking forward to working with the NFB, the DRC and Imperato over there and his team in the disability rights consortium, consortium with disability rights. What DRC coalition, coalition in in California. I can't wait to do that. We tried last year. We got stopped short. It got tabled, but I feel very good about where we're going this year. So that's, that's my that's, that is my focus right now. And I'm glad I'm going to be able to work with the NFB to be able to do that. Yeah, well, I, I really do hope that it passes. We've seen other states. We've seen some states pass some good legislation, and hopefully we will continue to see some of that go on. Yeah, Colorado has done a great job. Colorado sent a great job. I think they've done it. I really like what's being done with the EAA, even though it's in Europe, and some of the things that are going there, Susanna, Lauren and I had some great discussions. I think she is has been a leader of a Yeoman effort at that level. So we'll see. Let's, let's, I mean, there's still time out here. I guess I really would like to retire, Michael Hingson ** 58:28 but I know the feeling well, but I can't afford to yet, so I'll just keep speaking and all that well, Mike, this has been wonderful. I really appreciate you taking an hour and coming on, and at least neither of us is putting up with any kind of snow right now, but later in the year we'll see more of that. Mike Paciello ** 58:45 Yeah, well, maybe you will. We don't get snow down. I have. We've gotten maybe 25 flakes in North Carolina since I've been here. Michael Hingson ** 58:53 Yeah, you don't get a lot of snow. We don't hear we don't really get it here, around us, up in the mountains, the ski resorts get it, but I'm out in a valley, so we don't, yeah, Mike Paciello ** 59:02 yeah, no. I love it. I love this is golfing weather. Michael Hingson ** 59:05 There you go. If people want to reach out to you, how do they do that? Mike Paciello ** 59:11 There's a couple of ways. Certainly get in touch with me at AudioEye. It's michael.paciello@audioeye.com Michael Hingson ** 59:17 B, A, C, I, E, L, L, O, Mike Paciello ** 59:18 that's correct. Thank you for that. You could send me personal email at Mike paciello@gmail.com and or you can send me email at web able. It's m passielo at web able.com, any one of those ways. And please feel free you get on all the social networks. So feel free to link, connect to me. Anyway, I try to respond. I don't think there's anyone I I've not responded to one form or another. Michael Hingson ** 59:46 Yeah, I'm I'm the same way. If I get an email, I want to respond to it. Yeah, well, thanks again for being here, and I want to thank all of you for listening. We really appreciate it. Love to hear your thoughts about this episode. Please feel free to email. Me, you can get me the email address I generally use is Michael h i at accessibe, A, C, C, E, S, S, i, b, e.com, or you can go to our podcast page, which is Michael hingson.com/podcast, and there's a contact form there. But love to hear from you. Love to hear your thoughts, and most of all, please give us a five star rating wherever you're listening. We value your ratings and your reviews a whole lot, so we really appreciate you doing that. And if any of you, and Mike, including you, can think of other people that you think ought to be guests on the podcast, we are always looking for more people, so fill us up, help us find more folks. And we would appreciate that a great deal. So again, Mike, thanks very much. This has been a lot of fun, and we'll have to do it again. Mike Paciello ** 1:00:44 Thanks for the invitation. Mike, I really appreciate it. Don't forget to add 10 Nakata to your list, Michael Hingson ** 1:00:49 You have been listening to the Unstoppable Mindset podcast. Thanks for dropping by. I hope that you'll join us again next week, and in future weeks for upcoming episodes. To subscribe to our podcast and to learn about upcoming episodes, please visit www dot Michael hingson.com slash podcast. Michael Hingson is spelled m i c h a e l h i n g s o n. While you're on the site., please use the form there to recommend people who we ought to interview in upcoming editions of the show. And also, we ask you and urge you to invite your friends to join us in the future. If you know of any one or any organization needing a speaker for an event, please email me at speaker at Michael hingson.com. I appreciate it very much. To learn more about the concept of blinded by fear, please visit www dot Michael hingson.com forward slash blinded by fear and while you're there, feel free to pick up a copy of my free eBook entitled blinded by fear. The unstoppable mindset podcast is provided by access cast an initiative of accessiBe and is sponsored by accessiBe. Please visit www.accessibe.com . AccessiBe is spelled a c c e s s i b e. There you can learn all about how you can make your website inclusive for all persons with disabilities and how you can help make the internet fully inclusive by 2025. Thanks again for Listening. Please come back and visit us again next week.
July 21, 2025Have you had your dose of The Daily MoJo today? Download our app HERE"Ep 072125: Tulsi The Hammer - The Daily MoJo"Time is moving quickly, and current political sentiments echo those from five years ago. Tulsi Gabbard addresses significant issues, while President Biden announces he won't seek reelection in 2024. The conversation touches on the delayed release of the Zapruder film and the concept of time blindness. Discussions also include the implications of nuclear war, predictions about the apocalypse, and the state of electric vehicle sales versus classic cars.Phil Bell's Morning Update - Is the hammer dropping at the NSA?: HERERon Phillips Wonky Perspective On Life - Wake Up America! : HEREOur affiliate partners:Take care of your body - it's the only one you'll get and it's your temple! We've partnered with Sugar Creek Goods to help you care for yourself in an all-natural way. And in this case, "all natural" doesn't mean it doesn't work! Save 15% on your order with promo code "DailyMojo" at SmellMyMoJo.comCBD is almost everywhere you look these days, so the answer isn't so much where can you get it, it's more about - where can you get the CBD products that actually work!? Certainly, NOT at the gas station! Patriots Relief says it all in the name, and you can save an incredible 40% with the promo code "DailyMojo" at GetMoJoCBD.com!Romika Designs is an awesome American small business that specializes in creating laser-engraved gifts and awards for you, your family, and your employees. Want something special for someone special? Find exactly what you want at MoJoLaserPros.com There have been a lot of imitators, but there's only OG – American Pride Roasters Coffee. It was first and remains the best roaster of fine coffee beans from around the world. You like coffee? You'll love American Pride – from the heart of the heartland – Des Moines, Iowa. AmericanPrideRoasters.com Find great deals on American-made products at MoJoMyPillow.com. Mike Lindell – a true patriot in our eyes – puts his money where his mouth (and products) is/are. Find tremendous deals at MoJoMyPillow.com – Promo Code: MoJo50 Life gets messy – sometimes really messy. Be ready for the next mess with survival food and tools from My Patriot Supply. A 25 year shelf life and fantastic variety are just the beginning of the long list of reasons to get your emergency rations at PrepareWithMoJo50.comStay ConnectedWATCH The Daily Mojo LIVE 7-9a CT: www.TheDailyMojo.com (RECOMMEDED)Rumble: HEREFacebook: HEREMojo 5-0 TV: HEREFreedomsquare: HEREOr just LISTEN:The Daily MoJo Channel Become a supporter of this podcast: https://www.spreaker.com/podcast/the-daily-mojo-with-brad-staggs--3085897/support.
In this episode of Talking Cloud, I interview Jimmy Mesta, co-founder of RAD Security, discussing the evolution of cloud computing and cybersecurity. We explore Jimmy's journey in cybersecurity, the role of the NSA in education, the transformation of security tools, and the importance of AI in the industry. The conversation explores the challenges of hiring in cybersecurity, the impact of AI on job roles, and the importance of effective prompting in AI tools. We also discuss RAD Security's innovative solutions and the future of cybersecurity in an increasingly complex landscape.
William Binney SPECIAL JULY ENCORE
According to the Pew Research Center, about 46% of American men considerit important to be seen as masculine, with 9% rating it as very important. Thissuggests that a notable portion of men attribute some significance toperceptions of masculinity, though levels of importance differ.Licensed Psychotherapist Timothy Wienecke focuses on supporting men asthey navigate issues related to masculinity, mental health, and accountability.Over the past two decades, Wienecke has worked in various roles such asadvocate, military service member, mentor, organizer, educator, and counselor,providing support during challenging times. With experience trainingindividuals in technical roles for the NSA and leading bystander interventionprograms in the Air Force, he has instructed over 3,000 Airmen in strategiesfor effectively preventing harassment and sexual assault. His contributionshave been recognized with awards including Airman of the Quarter, EarlyPromotion, and an Air Force Achievement Medal.After leaving the military, Wienecke continued his work as a peereducator at Auraria Campus and facilitated the launch of Colorado University atDenver's Peer Advocates for Veteran Education program. He has developed andtaught curriculum on topics such as time management, communication skills,gender dynamics, bystander intervention, cross-cultural communication, andmilitary culture. His efforts have been acknowledged with recognitions such asFeminist Ally of the Year, a Lifetime Achievement Award by the Phoenix Centerat Auraria, and Outstanding Graduate of the CU Counseling program.For more information: https://empoweredchangece.com/ Discover More: https://www.americanmasculinity.com/
In this episode of Live Players, Samo Buja and Erik Torenberg discuss the pivotal role of hardware in the advancement of AI, the strategic importance of semiconductor manufacturing, and the intricate geopolitical dynamics between the US, China, and Taiwan. —
NSA whistleblower Bill Binney and former CERN scientist and intelligence analyst Dr. Katherine Horton join the program to expose the hidden architecture of global surveillance and corruption. We dive deep into the Epstein network, Palantir's reach, and the dark underbelly of modern intelligence operations. Binney reveals how his groundbreaking surveillance program, ThinThread, was capable of tracking global communications with precision—without violating constitutional rights. He explains how this powerful tool could be used today to identify and expose every pedophile and corrupt actor, no matter how high up the chain they are. But there's a catch: the very people who could bring justice are often the ones protecting the criminals.This is a must-listen conversation about truth, technology, and the battle for justice—and how a committed group of good people still has the power to dismantle the system from within.Follow Dr. Katherine Horton at https://stop007.org and learn more about Bill Binney and his time at the NSA in the documentary A Good American
Description: In this explosive episode of The Spymasters Podcast, journalist and host Antonia Senior sits down with legendary investigative reporter and Pulitzer Prize-winning author Tim Weiner to discuss his gripping new book, The Mission: The CIA and the 21st Century. From the darkest days of the War on Terror to the chaotic aftermath of 9/11, Weiner unpacks the CIA's transformation—and failures—in the modern era. We delve deep into the CIA's use of torture, the ethics of enhanced interrogation, and the long shadow of Guantanamo Bay. Weiner exposes the battles between intelligence and policy, the resurgence of Russia, and the ongoing crises within the American intelligence community. We ask what does a a second Trump presidency mean for the CIA, for global intelligence alliances, and for democracy itself? This is a must-listen episode for anyone interested in espionage, covert operations, national security, and the real story behind the CIA's role in shaping the 21st century. Keywords: CIA, Tim Weiner, The Mission, War on Terror, 9/11, torture, enhanced interrogation, Guantanamo Bay, intelligence failure, covert operations, Trump CIA, Trump 2024, American intelligence, NSA, FBI, drone strikes, national security, espionage podcast, Antonia Senior, The Spymasters Podcast, intelligence agencies, deep state, CIA torture program, counterterrorism, CIA history, CIA Trump, CIA Biden, spy podcast, CIA secrets, Black Sites, CIA coverups Links:
Google and Microsoft issue critical updates. CISA warns of active exploitation of a critical flaw in Wing FTP Server. Cloudflare restores their DNS Resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they've disrupted Chinese cyber campaigns targeting U.S. critical infrastructure. A UK data breach puts Afghan soldiers and their families at risk. Researchers find malware hiding in DNS records. A former U.S. Army soldier pleads guilty to charges of hacking and extortion. Ben Yelin joins us with insights on the Senate Armed Services Committee's response to rising threats to critical infrastructure.The large print giveth and the small print taketh away. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy & External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, discussing the Senate Armed Services Committee's and Trump administration nominees' recent conversation about rising threats to critical infrastructure. You can find the article Ben discusses here. Selected Reading Google fixes actively exploited sandbox escape zero day in Chrome (Bleeping Computer) Windows KB5064489 emergency update fixes Azure VM launch issues (Bleeping Computer) Exploited Wing file transfer bug risks ‘total server compromise,' CISA warns (The Record) Cloudflare 1.1.1.1 incident on July 14, 2025 (Cloudflare) Critical template Injection flaw in LaRecipe Documentation Package enables remote code execution (Beyond Machines) NSA: Volt Typhoon was ‘not successful' at persisting in critical infrastructure (The Record) Defence secretary 'unable to say' if anyone killed after Afghan data breach (BBC News) Hackers exploit a blind spot by hiding malware inside DNS records (Ars Technica) 21-year-old former US soldier pleads guilty to hacking, extorting telecoms (The Record) WeTransfer says files not used to train AI after backlash (BBC News) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Want to know what it takes to land a coveted NSA stage and stand out in a room full of professional speakers? In this episode of Speakernomics, NSA Director of Events Candice York shares the inside scoop on event planning, speaker selection, and what truly sets top presenters apart. How NSA designs events like Influence and Thrive to serve speakers' real needs The difference between a collaborative speaker and a “diva”—and why reputation matters What it takes to customize your content for an audience of fellow professional speakers Behind-the-scenes on how main stage vs. breakout sessions are chosen The importance of being part of the NSA community (not just chasing the gig) if you want the stage to find you Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode, Suzanne Spradley and Chase Cannon discuss the No Surprises Act (NSA) and its impact on out-of-network (OON) billing, with the independent dispute resolution (IDR) process at its core. Suzanne starts with an outline of the NSA and OON billing, how surprise bills arise, and how the IDR process is meant to help with carrier and provider disputes on bill payment amounts. Suzanne and Chase discuss CMS's involvement and the data gathered, shedding light on how IDR entities are selected, how disputes are handled, who's winning, and the amounts being paid. The two close with a discussion of the fairness of the process and the impact on healthcare costs for employers and their group health plans.
Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience. In this episode, our host, Caleb Tolin, is joined by Errol Weiss, Chief Security Officer at Health-ISAC and former cybersecurity leader at Citi and Bank of America. Errol shares his journey from the NSA to building one of the most collaborative threat intelligence networks in healthcare, discussing cyber recovery, the minimum viable hospital model, and why culture and community matter in achieving true resilience.
Jeffrey Epstein apparently had no clients, no black book and somehow was able to delete himself while under 24 hour surveillance. That's the official story according to a FBI and DOJ memo that was sent out to the public But instead of answers those findings have only raised more questions. On today's episode we will pull back the curtain not simply on Epstein but on the U.S. government's long history of shadowy programs from Operation Paperclip, MK Ultra, the NSA and other covert operations that the American public was never supposed to know about. Good Fight New York Conference https://www.goodfight.org/media/Good-Fight-July-2025-NY-Conference.pdf Follow Good Fight Ministries on: Facebook: https://www.facebook.com/goodfightministries Instagram: https://www.instagram.com/goodfightministries Twitter/X: https://www.twitter.com/goodfightmin TikTok: https://www.tiktok.com/@goodfightministries Support Us on Patreon: https://www.patreon.com/goodfight
Web: www.JonesHealthLaw.comPhone: (305)877-5054Instagram: @JonesHealthLawFacebook: @JonesHealthLawYouTube: @JonesHealthLawThe No Surprises Act is a federal law in the United Statesthat went into effect on January 1, 2022. Enacted as part of the Consolidated Appropriations Act, the NSA is designed to protect patients from unexpected medical bills occurring inemergency situations or when they receive care from out-of-network providers at the facilities of in-network providers. This type of billing is commonly referred to as “surprise billing.” The Act prohibits out-of-network providersfrom directly billing patients for certain services and instead requires them to seek payment from the patient's health plan. If a patient is uninsured or opts for self-pay for a service, the NSA's protections often provide the opportunity to get a good faith estimate of the cost of care up front.
Dr. Selwyn Ellis, the Bosley Whitmore Endowed Professor and head of the Department of Computer Information Systems at Louisiana Tech University, engages in a profound conversation with hosts Craig Van Slyke and Thomas Stafford regarding the establishment and maintenance of cybersecurity research and education programs that adhere to national standards. The dialogue reveals the multifaceted nature of achieving designation as a Center of Academic Excellence in Cyber Defense by the National Security Agency and the Department of Homeland Security, thus highlighting the rigorous accreditation processes that validate the quality of education delivered. Dr. Ellis elaborates on the collaborative efforts required across various departments within the university, emphasizing the importance of a holistic approach to cybersecurity education that encompasses not only technical skills but also behavioral aspects essential for understanding the human factors influencing security practices. The discussion further explores the curriculum offered by the Louisiana Tech Center for Information Assurance, which includes essential courses such as disaster recovery, risk analysis, and principles of information assurance. These programs are designed to prepare students comprehensively for careers in cybersecurity, equipping them with the knowledge and skills necessary to address the growing complexities of the cyber threat landscape. Dr. Ellis notes that graduates from these programs are well-positioned for employment across diverse sectors, underscoring the value of a rigorous academic foundation in enhancing their career prospects. The episode also touches upon the significance of research in cybersecurity, as Dr. Ellis and the hosts discuss the role of faculty in guiding students toward impactful research endeavors that contribute to the field's advancement. As the conversation progresses, the implications of emerging technologies such as artificial intelligence (AI) on cybersecurity education come to the forefront. Dr. Ellis articulates the need for educational institutions to adapt their curricula to incorporate AI-driven methodologies, preparing students to navigate both the opportunities and challenges presented by these advancements. The dialogue culminates in a call to action for industry partners to engage with educational institutions, fostering collaboration that enriches the learning experience and ensures a robust pipeline of skilled cybersecurity professionals ready to meet the demands of an evolving landscape. This episode encapsulates the essence of proactive engagement between academia and industry, reinforcing the critical role that well-structured educational programs play in shaping the future of cybersecurity.Takeaways: The Cyberways podcast aims to translate academic knowledge into practical applications for security professionals, addressing the crucial need for accessible cybersecurity education. Dr. Selwyn Ellis, our esteemed guest, has extensive experience in establishing cybersecurity research centers certified by the US Government, showcasing his expertise in this critical field. Louisiana Tech University uniquely holds dual certifications as a Center of Academic Excellence in Cyber Defense and Research, reflecting the institution's commitment to rigorous cybersecurity education and research. The importance of continuous certification and rigorous program reviews every five years ensures that our cybersecurity curriculum meets national standards set by the NSA and Homeland Security. Our graduates possess a competitive advantage in the job market due to their comprehensive training and knowledge in cybersecurity, making them attractive to employers in various industries. The evolving landscape of cybersecurity education is increasingly influenced by advancements in artificial intelligence, which presents both challenges and...
n a remote corner of Turkey, a unique geological formation, unearthed on September 11, 1959, by Turkish Army Captain Ilhan Durupinar, is raising eyebrows and piquing the interest of biblical scholars and geologists alike. This boat-shaped geological curiosity, commonly referred to as the Durupinar formation, is considered by some to be the final resting place of Noah's Ark.The narrative of Noah's Ark is deeply ingrained in the religious texts of both Christianity and Islam, with references found in Genesis 8:4 of the Bible and Surah 11:44 of the Qur'an. In both texts, the story recounts a great deluge, a boat, and a landing in a mountainous region. Locals in the nearby village point to the Durupinar site, which they call Al-Judi, as a possible landing point of the ark.Ed Opperman talks to Andrew Jones about the discovery which, if true, will rewrite history.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-opperman-report--1198501/support.
L.A. Secret Police. Inside the LAPD Elite Spy Network is a New York Times and Los Angeles Times Bestseller. This incredible non-fiction book rips the lid off the LAPD and exposes the reader to its dark underbelly of corruption during the reign of Chief Daryl Gates. L.A. cops ruined lives and reputations, inflicted mindless brutality, committed murder and engaged in massive cover-ups. In Los Angeles, police corruption was much more than unmarked envelopes stuffed with cash. It was a total corruption of power. For decades LAPD engaged in massive illegal spying and lied about it. Its spying targets included politicians, movie stars, professional athletes, news reporters and anyone wielding power or those of interest to Daryl Gates. Incredibly, the spying targets included a Director of the Central Intelligence Agency, a Secretary of Defense, a current Governor and the President of the United States. It all happened in Los Angeles.Detective Rothmiller is the modern-day Frank Serpico; he exposed the tentacles of corruption which reached to the highest levels within the LAPD and Washington D.C. It wasn't long after that an assassin attempted to take his life. It was apparent to many that powerful forces wanted him silenced. Incredibly, in this book Detective Rothmiller names names! See why this book changed the LAPD and is required reading at many universities. As former Assistant United States Attorney Marvin Rudnick said, “Rothmiller was in a position to know. He did very sensitive work.”Every book has an ending. However, the ending of this book will shock you. Within the new epilogue is a multi-page essay written especially for this updated book by Pulitzer Prize winning journalist David Cay Johnston. In it he describes his personal experience as a target of Daryl Gates illegal intelligence operations while he served as a Los Angeles Times reporter. You'll also read the challenge posed by detective Rothmiller to the LAPD. A challenge LAPD has refused to answer.Since releasing this updated eBook, Detective Rothmiller has been interviewed dozens of times by the national media regarding current NSA domestic spying and the 2013 murderous rampage of former LAPD cop Christopher Dorner. In late 2013 Detective Rothmiller was interviewed for a major television documentary which will expose corruption and major crimes committed at the highest levels. The documentary is scheduled for release in 2016. https://amzn.to/404ozAVBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-opperman-report--1198501/support.
CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercriminals abusing Large Language Models. MacOS malware Poseidon Stealer rebrands.Researchers discover multiple vulnerabilities in Bluetooth chips used in headphones and earbuds. The FDA issues new guidance on medical device cybersecurity. Our guest is Debbie Gordon, Co-Founder of Cloud Range, looking “Beyond the Stack - Why Cyber Readiness Starts with People.” An IT worker's revenge plan backfires. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, Debbie Gordon, Co-Founder of Cloud Range, shares insights on looking “Beyond the Stack - Why Cyber Readiness Starts with People.” Learn more about what Debbie discusses in Cloud Range's blog: Bolstering Your Human Security Posture. You can hear Debbie's full conversation here. Selected Reading CISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical Environment (CISA) Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran (CISA, FBI, DOD Cyber Crime Center, NSA) Prolific cybercriminal group now targeting aviation, transportation companies (Axios) U.S. Cyber Diplomacy at Risk Amid State Department Shakeup (GovInfo Security) Canada Bans Chinese CCTV Vendor Hikvision Over National Security Concerns (Infosecurity Magazine) Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos (Hackread) MacOS malware Poseidon Stealer rebranded as Odyssey Stealer (SC Media) Airoha Chip Vulnerabilities Expose Headphones to Takeover (SecurityWeek) FDA Expands Premarket Medical Device Cyber Guidance (GovInfo Security) 'Disgruntled' British IT worker jailed for hacking employer after being suspended (The Record) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send me a DM here (it doesn't let me respond), OR email me: imagineabetterworld2020@gmail.comToday I'm honored to have back on the show for a fourth time: MK ULTRA, satanic ritual abuse, and organized abuse survivor, overcomer and thriver, loving mother, published writer and author, content creator and podcaster, Physician and Radiologist turned activist, Founder of the Angel Coalition and Co-Founder of Women and Children First and the Babushka Brigade, Star Fort enthusiast, award winner of the University of Washington School of Medicine's prestigious Humanitarian Award, and absolute inspiration: Dr. Juliette EngelIf you're new here, missed Juliette's last few episodes, or need a refresher, here's a brief synopsis of her life and a little bit about what we will be talking about today: A survivor of the CIA's sinister MK ULTRA program, Juliette has emerged as a beacon of hope, dedicating her life to rescuing the vulnerable and exposing the hidden scourge of human trafficking. Her humanitarian work in Moscow, where she founded the Angel Coalition, stands as a monument to her courage and unwavering commitment to healing a broken world.Born in 1949 into a family entangled with OSS, CIA, and NSA operatives, Juliette's childhood was stolen at age six when she was sold into MK ULTRA and MONARCH mind control programs. Subjected to relentless physical and psychological torture, including trauma-based mind control and “Sex Magick”, her early years were designed to fracture her mind and silence her spirit. Yet, at seventeen, driven by an indomitable will to survive, she escaped - barefoot, with no memories of her childhood - and forged a new path. Through sheer determination, she put herself through college and medical school, becoming a respected radiologist and physician. In 1990, Juliette's life took a transformative turn when she sold her successful Seattle practice to establish the MiraMed Institute in Moscow, aiming to reform maternal and infant healthcare in post-Soviet Russia. What began as a mission to improve medical care for orphaned children unveiled a horrifying truth: state institutions were complicit in an international network trafficking young Russian girls to Scandinavia for prostitution. This discovery, echoing the control and exploitation of her own past, ignited a fire within her. She could not turn away. This is what we will be discussing on today's show.With boundless empathy, Juliette founded the Angel Coalition in 1999, an underground railroad that became a lifeline for trafficking victims. Over a decade, her network of villagers, educators, police, media, and government officials rescued tens of thousands of children and women, guiding them to safety across the former USSR. Her memoir, Angels Over Moscow, vividly recounts her perilous journeys through remote villages, her deep bonds with Russian colleagues, and her heartbreak over lives lost - like Zhenya, a spirited girl who haunts her memory. Juliette's work also led to co-founding Women and Children First, a training center for orphanage staff, and the Babushka Brigade, a nationwide support program for single mothers, weaving a tapestry of care across Russia.Juliette's MK ULTRA past gave her a unique lens to recognize the mechanisms of control in trafficking networks - systems that thrive on breaking spirits, much like the programming she endured. Her advocacy exposed the collusion of global powers, including the U.S., in perpetuating this modern slavery, challenging the silence that once bound her. In 2013, her extraordinary efforts earned her the University of Washington School of Medicine's prestigious Humanitarian Award.Despite personal risks and the resurfacing of her own traumatic memories, JSupport the show
Welcome to Summer 2025. This next couple of months, Erskine is sharing some of the best guests from the past: those who have served with the FBI, CIA, NSA, INTERPOL, and held high positions in politics and the military.Thanks for listening and enjoy and share with your patriotic friends.
Edward Snowden - the name that sent shockwaves through the most powerful intelligence agencies on Earth and changed surveillance forever. But was he a courageous freedom fighter who sacrificed everything to expose the government's illegal spying on its own citizens, or the most dangerous traitor in American history who handed our national secrets to enemy nations? The truth behind the man who brought down the NSA's house of cards is more explosive and complex than the mainstream media ever dared to tell you. In this jaw-dropping episode, we dive deep into Snowden's real motivations, the mind-blowing extent of government surveillance that he exposed, and the shocking revelations that are STILL being covered up today. We'll uncover how the NSA was secretly collecting every phone call, text message, and internet search of millions of innocent Americans, the terrifying programs with code names like PRISM and XKeyscore that sound like science fiction but are chillingly real, and why the government's response to Snowden reveals they're hiding something even bigger. But here's what they don't want you to know: Snowden's revelations were just the tip of the iceberg. We'll expose the surveillance programs that are STILL operating in the shadows, the international intelligence partnerships that make privacy extinct, and the real reason why Snowden can never come home. From his mysterious journey to Russia to the classified documents that remain sealed, from the whistle-blowers who came before him and mysteriously disappeared to the digital police state being built around us right now - this episode will shatter your illusions about privacy, freedom, and who's really watching you. The surveillance state didn't end with Snowden's revelations - it evolved. And what they're doing now will terrify you.
Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Varmazis speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. One Kansas City hacker's bold marketing campaign ends with a guilty plea. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Ian Itz, Executive Director at the IoT Line of Business at Iridium Communications. Ian spoke with T-Minus Space Daily host Maria Varmazis on their Deep Space weekend show about how Iridium allows IoT devices, like sensors and trackers, to communicate directly with satellites, bypassing terrestrial infrastructure. We share an excerpt of their conversation on our show today. You can listen to the full conversation on Deep Space. And, be sure to check out T-Minus Space Daily brought to you by N2K CyberWire each weekday on your favorite podcast app. Selected Reading Hawaiian Airlines Hit by Cybersecurity Incident (Infosecurity Magazine) Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage (SecurityWeek) CitrixBleed 2 Vulnerability Exploited (Infosecurity Magazine) Vulnerability Exposed All Open VSX Repositories to Takeover (SecurityWeek) Prompt injection in malware sample targets AI code analysis tools (SC Media) Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye (The Record) Bipartisan bill seeks to ban federal agencies from using DeepSeek, AI tools from ‘foreign adversaries' (The Record) NSA's Patrick Ware takes over as top civilian at U.S. Cyber Command (The Record) Man Who Hacked Organizations to Advertise Security Services Pleads Guilty (SecurityWeek) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall's NetExtender VPN app steals users' credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. Researchers identify multiple security vulnerabilities affecting Brother printers. Fake AI-themed websites spread malware. Researchers track a sharp rise in signup fraud. A new Common Good Cyber Fund has been launched to support nonprofits that provide essential cybersecurity services. Tim Starks from CyberScoop joins us to discuss calls for a federal cyberinsurance backstop. A Moscow court says ‘nyet' to more jail time for cyber crooks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are again joined by Tim Starks, Senior Reporter from CyberScoop. Tim discusses his recent piece on “Federal cyber insurance backstop should be tied to expiring terrorism insurance law, report recommends.” Selected Reading Cybercriminals Abuse Open-Source Tools To Target Africa's Financial Sector (Unit 42) Hackers Abuse ConnectWise to Hide Malware (SecurityWeek) Fake SonicWall VPN app steals user credentials (The Register) CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development (GB Hackers) New Vulnerabilities Expose Millions of Brother Printers to Hacking (SecurityWeek) Black Hat SEO Poisoning Search Engine Results For AI (ThreatLabz) Half of Customer Signups Are Now Fraudulent (Infosecurity Magazine) Common Good Cyber Fund Launched to Support Non-Profit Security Efforts (Infosecurity Magazine) Russia releases REvil members after convictions for payment card fraud (The Record) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjones Shane Cashman is the best-selling author of three books including Joyless Kingdom, The F**king Lunatic, and Tales From the Inverted World. He is a staff writer for Timcast News where he has profiled Kanye West, Alex Jones, Kari Lake, and Riff Raff. SPONSORS https://aura.com/dannyjones - Get a 14 day free trial. Enough time for Aura to start scrubbing your personal info off data broker sites. http://evening.ver.so/danny - Use code DANNY for 15% off your first order. https://whiterabbitenergy.com/?ref=DJP - Use code DJP for 20% off EPISODE LINKS https://shanecashman.comhttps://x.com/ShaneCashmanhttps://www.instagram.com/shanecashman Shane's YouTube channel: @TalesfromtheInvertedWorld FOLLOW DANNY JONES https://www.instagram.com/dannyjones https://twitter.com/jonesdanny OUTLINE 00:00 - Marilyn Manson's comeback 07:25 - Interviewing Kanye West 20:55 - Mountain Look Observatory & Jolly West 26:24 - Facebook whistleblower 32:09 - Zuckerberg's censorship regime 36:38 - Epstein binders 39:10 - Peter Thiel is weaponizing Christianity 47:50 - NSA & the surveillance state 53:37 - The technocracy 01:01:38 - Elon Musk 01:09:55 - AI drone warfare 01:13:52 - The dark side of Neuralink 01:22:10 - Tim Pool's podcast hijacked by CIA 01:33:45 - The Israel fetish 01:38:02 - The new military industrial complex 01:41:32 - What happened to the Trump shooter? 01:45:12 - Elon's control grid 01:57:19 - Telepathic communication 02:06:02 - MAHA 02:13:41 - Kanye is trying to rewrite the constitution 02:16:16 - Florida's death metal scene 02:20:06 - Drugs make the best music 02:24:35 - Is the government drugging us? 02:35:39 - Artificial clouds 02:41:21 - A violent U.S. civil war is coming Learn more about your ad choices. Visit podcastchoices.com/adchoices
Now in a new edition updated through the unprecedented 2016 presidential election, this provocative book makes a compelling case for a hidden “deep state” that influences and often opposes official U.S. policies. Prominent political analyst Peter Dale Scott begins by tracing America's increasing militarization, restrictions on constitutional rights, and income disparity since World War II. With the start of the Cold War, he argues, the U.S. government changed immensely in both function and scope, from protecting and nurturing a relatively isolated country to assuming ever-greater responsibility for controlling world politics in the name of freedom and democracy. This has resulted in both secretive new institutions and a slow but radical change in the American state itself. He argues that central to this historic reversal were seismic national events, ranging from the assassination of President Kennedy to 9/11.Scott marshals compelling evidence that the deep state is now partly institutionalized in non-accountable intelligence agencies like the CIA and NSA, but it also extends its reach to private corporations like Booz Allen Hamilton and SAIC, to which 70 percent of intelligence budgets are outsourced. Behind these public and private institutions is the influence of Wall Street bankers and lawyers, allied with international oil companies beyond the reach of domestic law. Undoubtedly the political consensus about America's global role has evolved, but if we want to restore the country's traditional constitutional framework, it is important to see the role of particular cabals—such as the Project for the New American Century—and how they have repeatedly used the secret powers and network of Continuity of Government (COG) planning to implement change. Yet the author sees the deep state polarized between an establishment and a counter-establishment in a chaotic situation that may actually prove more hopeful for U.S. democracy.https://amzn.to/4k35qGoBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-opperman-report--1198501/support.
G. Edward Griffin's speech titled "The Quigley Formula: A Conspiratorial View of History as Explained by the Conspirators Themselves" was delivered at the University of Texas on April 29, 2008.Rumble: https://rumble.com/c/TheFactHunter Website: truthernet.com Email: thefacthunter@mail.com Snail Mail: George Hobbs PO Box 109 Goldsboro, MD 21636Copyright Disclaimer: - Under section 107 of the copyright Act 1976, allowance is mad for FAIR USE for purpose such a as criticism, comment, news reporting, teaching, scholarship and research. Fair use is a use permitted by copyright statues that might otherwise be infringing. Non- Profit, educational or personal use tips the balance in favor of FAIR USE.
Note from Film makers : Also, just wanted to mention some of the conspiracy stuff hidden in the film.… since you didn't notice any of it… lol. It was on our mind. Film starts with Tim getting a speeding ticket, when asked where he's coming from he says - Muldrow. In real life Tim got a speeding ticket outside Muldrow which is right by Elohim City. The only reason for him to be in that area is Elohim… and Tim said he had never been there before. Richard Snell's influence and friendship. In real life Richard said his death would be avenged and asked to have the TV turned on the morning of his execution, April 19th. The officer said Snelll was grinning while watching the news of the bombing. How well or even if he knew Tim is conspiracy lore. Snell is buried at Elohim City. Strassmaier telling Tim about Snell's bomb plot in 83'. In real life it goes that Snell and others from the CSA were going to blow up the Federal Building in OKC, but the bomb blew up in their hands. They took it as a sign from God not to do it. Tim and Terry selling guns, Tim says you don't know where we got these from. In real life the story goes that Tim had Terry steal Roger Moore's (who was tied to the CIA) gun collection to sell and make money for the bombing. The story is very fishy, especially Moore's version. Terry asks Tim where he's gonna get that much money from to buy components for the bomb, but Tim never answers. Tim has a lighter with a Freemason logo on it. All the phone calls when Tim is at the phone booth, it is never revealed who he's talking to or what he is saying. When Tim is renting the storage room he gives her the wrong ID with one of his aliases. On other oaccasions he signs papers with different names. Tim and Strassmeir at the strip club. In real life a stripper at Lady Godiva's says she saw Tim, Strassmeir and Michael Brescia at the strip club all together shortly before the bombing. They all said it didn't happen. Strassmeir claims he only met Tim once at a gun show. Brescia says he didn't know Tim at all. Terry flying to the Philippines. In real life Terry went many times, Tim's lawyer suspected him to meet with terrorists to learn bomb building. John Doe 2 is in the background when he rents the truck. The passenger door is heard opening and someone gets in… who is never revealed, John Doe 2.Towards the end, the gameshow he's watching in the motel room while eating Chinese food, has secret messages on the game board: STRASSMEIR, HYPNOSIS, MKULTRA, CIA, FBI, etc.The montage at the end has images of: teeth X-rays (Wendy Painting's theory he was micro chipped in his teeth), MK-Ultra, Aryan Republican Army, Carol Howe, Terrance Yeakey, Kenneth Trentadue, and Jolly West. Also, on a side note you might enjoy… the announcer of the gameshow introduces the current winner as, “Dave McGowan.” Become a supporter of this podcast: https://www.spreaker.com/podcast/the-opperman-report--1198501/support.
Interview with Nelson Martins (aka DJ Thermal Detonator) of 9/11 True Crimes discuss his critique on TMZ's re-release of Investigate 9/11:The Fifth Plane and other unknowns regarding the 4 hijacked planes and 3 airports on Sept. 11th, as well as other target's and suspicious actions then and after, not part of the Official Story. Become a supporter of this podcast: https://www.spreaker.com/podcast/the-opperman-report--1198501/support.
A hard-nosed NSA agent boards a mysterious flight to tail a suspect—only to discover the plane isn't bound for any place on Earth… and he may never leave it. Author: Jake Bible * * * EXPLICIT CONTENT DISCLAIMER: This episode contains explicit content not limited to intense themes, strong language, and graphic depictions of violence intended for adults 18 years of age or older. These stories are NOT intended for children under the age of 18. Parental guidance is strongly advised for children under the age of 18. Listener discretion is advised. #drnosleep #scarystories #horrorstories #doctornosleep #truescarystories #horrorpodcast #horror Learn more about your ad choices. Visit megaphone.fm/adchoices
A hard-nosed NSA agent boards a mysterious flight to tail a suspect—only to discover the plane isn't bound for any place on Earth… and he may never leave it. Author: Jake Bible * * * EXPLICIT CONTENT DISCLAIMER: This episode contains explicit content not limited to intense themes, strong language, and graphic depictions of violence intended for adults 18 years of age or older. These stories are NOT intended for children under the age of 18. Parental guidance is strongly advised for children under the age of 18. Listener discretion is advised. #drnosleep #scarystories #horrorstories #doctornosleep #truescarystories #horrorpodcast #horror Learn more about your ad choices. Visit megaphone.fm/adchoices
00;00;00;00 - 00;00;57;04: Introduction to the David Night show, discussing the "all-seeing eye" of Palantir and the tech elite's dark retreats.00;02;28;18 - 00;02;48;25: Report on a 23-year-old Texas man arrested for scaling the wall at Mar-a-Lago, questioning the effectiveness of walls for security.00;05;28;00 - 00;06;03;22: Trump administration expands Palantir's role to compile data on Americans, raising privacy and surveillance concerns.00;09;29;18 - 00;10;09;12: Palantir's deep ties to the federal government and its origins with In-Q-Tel, the CIA's venture capital firm.00;10;38;27 - 00;11;06;05: Palantir executive Mike Gallagher labels pro-Palestine protesters a "domestic terrorist movement," sparking debate on free speech and surveillance.00;20;16;11 - 00;20;46;20: Trump allies with Palantir to build a massive database on Americans, tracking tax returns, bank accounts, and more.00;43;41;15 - 00;43;59;24: Case of Michael Williams, jailed due to an AI-powered gunshot detection program (ShotSpotter), highlighting pre-crime and algorithmic errors.00;49;43;23 - 00;50;10;12: Palantir's ties to the CIA, NSA, and military, with its software likened to the "all-seeing eye" of Sauron from Tolkien's works.00;54;57;27 - 00;55;32;08: PayPal's alleged deep ties with the NSA and its actions against WikiLeaks, raising questions about surveillance and censorship.00;59;38;15 - 01;00;00;11: Critique of Donald Trump as a savior figure, noting disillusionment with his actions like Palantir involvement compared to past policies like lockdowns and vaccines.01;01;31;11 - 01;01;57;23: Archeological and biblical evidence suggesting the Garden of Eden was a real place, possibly in Mesopotamia, tied to the origins of civilization.01;09;17;11 - 01;09;46;05: Crypto founder Charles Hoskinson's terrifying experience in a darkness retreat, fleeing after encountering sleep paralysis and demonic visions.01;29;38;11 - 01;30;02;07: Trump's second term moves toward autocracy, with actions like mass layoffs of civil servants, defunding universities, and deporting U.S.-born children.01;39;28;06 - 01;39;50;24: Growing trend of tech users viewing AI like ChatGPT as a god, with predictions of an official AI-worshipping church emerging within 24 months.01;47;30;29 - 01;47;52;24: Defense Secretary orders renaming of USNS Harvey Milk, a Navy ship named after a gay rights activist accused of predatory behavior.02;00;13;28 - 02;00;31;07: Reflection on Jesus's experience of abandonment by his disciples. 02;10;04;02 - 02;10;28;02: Elon Musk's public criticism of Trump's “Big Beautiful Bill,” which raises the debt ceiling by $5 trillion and ignores fiscal reform promises.02;36;22;20 - 02;36;40;12: Grieving parents in North Carolina charged with manslaughter after their seven-year-old son was killed by a car while walking to a store.02;48;27;05 - 02;48;51;26: Ship carrying 800 electric vehicles abandoned in the Pacific after a fire, possibly caused by lithium-ion batteries. Follow the show on Kick and watch live every weekday 9:00am EST – 12:00pm EST https://kick.com/davidknightshow Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silver For 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHT Find out more about the show and where you can watch it at TheDavidKnightShow.comIf you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.