Intelligence-gathering by interception of signals
POPULARITY
As featured in Top Cyber News Magazine's 2022 40 Under 40, Thomas Marr is an experienced information security professional with a lengthy history of supporting organizations ranging from tech startups to Fortune 500 companies to the United States Department of Defense (DoD). Thomas is also a proud veteran of the United States Army where he served on active duty as a Military Intelligence Analyst, specializing in signals intelligence (SIGINT) and open source intelligence (OSINT).Thomas actively provides technical expertise to information security community projects as a Subject Matter Expert (SME) who evaluates industry-respected credentials on CompTIA's Certification Advisory Committee for Cybersecurity, as a technical reviewer for global technology book publisher Packt, and as a mentor to junior information security professionals in his free time.
Paul Brown of the Wasson Watch company used to be a signals intelligence specialist with the NSA. He joins us to talk about large scale SIGINT, OPSEC, COMSEC, and the future of an AI-powered trustless internet. He also makes automatic field watches which you can preorder from Wassonwatch.com
Celestar Holdings, located in Tampa, Florida, primarily operates within the intelligence community and holds several contracts with the DIA, according to Senior Recruiting Manager Jacquelyn Weber. Jacquelyn emphasizes that job hopping in the cleared community can hinder career advancement and underscores the importance of including all relevant information on your resume. She also notes that the shifting job market has increased competition for many cleared professionals, so you may need to moderate your requirements accordingly.4:07 Celestar works in the intel community primarily, including work for DIA. Hiring data scientists, all source analysts, SIGINT analysts, imagery analysts, and intel analysts.11:25 Be sure that all your information is on your resume, such as your security clearance, certifications, and other pertinent information that sells you to a potential employer.15:51 Transitioning military personnel need to check with their security officer to understand their clearance status.Find show notes and additional links at: https://clearedjobs.net/celestar-holdings-intel-community-and-market-moves-podcast/_ This show is brought to you by ClearedJobs.Net. Have feedback or questions for us? Email us at rriggins@clearedjobs.net. Sign up for our cleared job seeker newsletter. Create a cleared job seeker profile on ClearedJobs.Net. Engage with us on LinkedIn, Facebook, Instagram, X, or YouTube. _
REVOLUTION! Phase One - Trump/Zelensky The Black Spy Podcast, Season 19, Episode 0004 The Trump/Zelensky debacle in the Oval Office, showed as clearly, as did the Vietnam or Afghanistan end of US engagement optics did, that the United states has ended its adventure in the Ukraine. However, in addition to just this sign that an incoming President wanted to divest himself of a losing, frankly unwinnable war, President Trump is showing a true revolutionary zeal to change the whole US military, industrial and congressional complex. Now transactional business and not secret intelligence driven covert and overt warfare is no longer the preferred model to retain US world-wide hegemony. At least not with a military pier equivalent nation. Russia's "Special Military Operation" in Ukraine, initiated in February 2022, has been framed by the Kremlin as a response to various historical and geopolitical factors. One narrative emphasizes the presence of far-right elements in Ukraine, drawing connections to nationalist groups active during World War II. However, although most western experts reject the portrayal of Ukraine as a neo-Nazi state, noting that while far-right groups exist, they do not hold significant influence in the government or military, they nevertheless have little to say about such far right units killing 14,000 Russian heritaged Ukrainian civilian citizens since 2016. In the early stages of the Cold War, Western intelligence agencies, including the CIA and MI6, reportedly collaborated with former Ukrainian nationalist fighters to undermine Soviet authority. These covert operations aimed to exploit anti-Soviet sentiments. This lasted 10 years and saw the reported death of up to a 100,000 Soviet Citizens. In the end though, it has been stated by the west, that this had limited long-term impact. The 2014 Maidan uprising, which led to the ousting of Ukraine's pro-Russian president, is viewed by Russia as a Western-backed coup that shifted Ukraine towards Euro-Atlantic integration. This assertion is backed up by Sigint in which, Victoria Nuland, the officer in charge of Eastern Europe in the US State Department discussing which Ukrainian's leaders should or shouldn't rule the country with the American Ambassador to the Ukraine The recording ends with Nuland saying she'll have president Biden slap the person they chose to lead Ukraine on the back when they take power! NATO's eastward expansion since 1991 has been perceived by Russia as a direct threat to its security interests. Despite assurances in the 1990s about limiting NATO's growth, to not one inch outside of the then East Germany, the alliance has incorporated several Eastern European countries, heightening tensions, as it attempted to incorporate the Ukraine. The Minsk agreements, brokered by Germany and France, aimed to cease hostilities in Eastern Ukraine. Critics argue that, rather than fostering peace, these accords allowed Ukraine to strengthen its military capabilities, which was confirmed by both the German Chancellor Merkel and French President Holland after they left office. This act intensifying conflicts in regions with significant Russian-speaking populations, such as Donbas and Crimea. In summary, President Trump appeared to validate everything that Russia has hitherto stated is its reason for military actions in Ukraine. The Oval Office statements of President Trump and administration seemed to agree with the justification previously articulated by the Kremlin through a complex interplay of historical grievances, security concerns over NATO's expansion, and perceptions of Western interference in Ukraine's political trajectory meaning their is now little dispute between the US' causes for war and Russia's. As Trump continually states, there would have been no war if he were president! As always, please don't be afraid to contact us and put any questions you might have to any of the Black Spy Podcast team concerning this or any other of our fascinating subjects. And, if you want to continue learning whilst being entertained, please don't forget to subscribe to the Black Spy Podcast for free, so you'll never miss another episode. To contact Firgas Esack of the DAPS Agency go to Linked In To contact Dr. Rachel Taylor please use her Substack account. To contact Carlton King by utilising any of the following: To donate - Patreon.com/TheBlackSpyPodcast Email: carltonking2003@gmail.com Facebook: The Black Spy Podcast Facebook: Carlton King Author Twitter@Carlton_King Instagram@carltonkingauthor To read Carlton's Autobiography: “Black Ops – The incredible true story of a (Black) British secret agent” he incredible true story of a (Black) British secret agent”
The intelligence community is often misunderstood, shrouded in secrecy, and clouded by misinformation. In this solo episode, A.J. Nash pulls back the curtain on how intelligence actually works, breaking down the 18 agencies that make up the U.S. intelligence community, their legal limitations, and the oversight that keeps them in check. He explains the different types of intelligence—SIGINT, HUMINT, OSINT, and more—highlighting their roles in national security. A.J. also addresses the myths surrounding intelligence work, including claims of government surveillance, political weaponization, and conspiracy theories. He details how intelligence professionals are trained to be objective, follow strict oversight, and operate within legal frameworks. With firsthand experience, he challenges misconceptions and explains why the reality of intelligence work is far less sinister than the public is often led to believe.Finally, A.J. discusses the impact of political rhetoric on intelligence agencies, emphasizing the importance of separating fact from fiction. He urges listeners to approach claims about intelligence abuse with scrutiny and to recognize the dedication of those working behind the scenes to protect national security.Send us a textSupport the show
The road to the TRUMPIAN revolution (Part 2) The Black Spy Podcast, Season 19, Episode 0003 Russia's "Special Military Operation" in Ukraine, initiated in February 2022, has been framed by the Kremlin as a response to various historical and geopolitical factors. One narrative emphasizes the presence of far-right elements in Ukraine, drawing connections to nationalist groups active during World War II. However, although most western experts reject the portrayal of Ukraine as a neo-Nazi state, noting that while far-right groups exist, they do not hold significant influence in the government or military, they nevertheless have little to say about such far right units killing 14,000 Russian heritaged Ukrainian civilian citizens since 2016. In the early stages of the Cold War, Western intelligence agencies, including the CIA and MI6, reportedly collaborated with former Ukrainian nationalist fighters to undermine Soviet authority. These covert operations aimed to exploit anti-Soviet sentiments. This lasted 10 years and saw the reported death of up to a 100,000 Soviet Citizens. In the end though, it has been stated by the west, that this had limited long-term impact. The 2014 Maidan uprising, which led to the ousting of Ukraine's pro-Russian president, is viewed by Russia as a Western-backed coup that shifted Ukraine towards Euro-Atlantic integration. This assertion is backed up by Sigint in which, Victoria Nuland, the officer in charge of Eastern Europe in the US State Department discussing which Ukrainian's leaders should or shouldn't rule the country with the American Ambassador to the Ukraine The recording ends with Nuland saying she'll have president Biden slap the person they chose to lead Ukraine on the back when they take power! NATO's eastward expansion since 1991 has been perceived by Russia as a direct threat to its security interests. Despite assurances in the 1990s about limiting NATO's growth, to not one inch outside of the then East Germany, the alliance has incorporated several Eastern European countries, heightening tensions, as it attempted to incorporate the Ukraine. The Minsk agreements, brokered by Germany and France, aimed to cease hostilities in Eastern Ukraine. Critics argue that, rather than fostering peace, these accords allowed Ukraine to strengthen its military capabilities, which was confirmed by both the German Chancellor Merkel and French President Holland after they left office. This act intensifying conflicts in regions with significant Russian-speaking populations, such as Donbas and Crimea. In summary, Russia's military actions in Ukraine are justified by the Kremlin through a complex interplay of historical grievances, security concerns over NATO's expansion, and perceptions of Western interference in Ukraine's political trajectory. However, many of these justifications have been contested by Western leaders, officials and the western mainstream mass media albeit now, President Trump is accepting that all of Russia's grievances are indeed TRUE! As always, please don't be afraid to contact us and put any questions you might have to any of the Black Spy Podcast team concerning this or any other of our fascinating subjects. And, if you want to continue learning whilst being entertained, please don't forget to subscribe to the Black Spy Podcast for free, so you'll never miss another episode. To contact Firgas Esack of the DAPS Agency go to Linked In To contact Dr. Rachel Taylor please use her Substack account. To contact Carlton King by utilising any of the following: To donate - Patreon.com/TheBlackSpyPodcast Email: carltonking2003@gmail.com Facebook: The Black Spy Podcast Facebook: Carlton King Author Twitter@Carlton_King Instagram@carltonkingauthor To read Carlton's Autobiography: “Black Ops – The incredible true story of a (Black) British secret agent”
00:00 -Intro9:08 - Pop Quiz17:30 - Sigint DiscussionIf you haven't already, please be sure to rate the podcast and leave us a review! Email questions/concerns/comments also at itstkandm@gmail.com.
The road to the TRUMPIAN revolution (Part 1) The Black Spy Podcast, Season 19, Episode 0002 Russia's "Special Military Operation" in Ukraine, initiated in February 2022, has been framed by the Kremlin as a response to various historical and geopolitical factors. One narrative emphasizes the presence of far-right elements in Ukraine, drawing connections to nationalist groups active during World War II. However, although most western experts reject the portrayal of Ukraine as a neo-Nazi state, noting that while far-right groups exist, they do not hold significant influence in the government or military, they nevertheless have little to say about such far right units killing 14,000 Russian heritaged Ukrainian civilian citizens since 2016. In the early stages of the Cold War, Western intelligence agencies, including the CIA and MI6, reportedly collaborated with former Ukrainian nationalist fighters to undermine Soviet authority. These covert operations aimed to exploit anti-Soviet sentiments. This lasted 10 years and saw the reported death of up to a 100,000 Soviet Citizens. In the end though, it has been stated by the west, that this had limited long-term impact. The 2014 Maidan uprising, which led to the ousting of Ukraine's pro-Russian president, is viewed by Russia as a Western-backed coup that shifted Ukraine towards Euro-Atlantic integration. This assertion is backed up by Sigint in which, Victoria Nuland, the officer in charge of Eastern Europe in the US State Department discussing which Ukrainian's leaders should or shouldn't rule the country with the American Ambassador to the Ukraine The recording ends with Nuland saying she'll have president Biden slap the person they chose to lead Ukraine on the back when they take power! NATO's eastward expansion since 1991 has been perceived by Russia as a direct threat to its security interests. Despite assurances in the 1990s about limiting NATO's growth, to not one inch outside of the then East Germany, the alliance has incorporated several Eastern European countries, heightening tensions, as it attempted to incorporate the Ukraine. The Minsk agreements, brokered by Germany and France, aimed to cease hostilities in Eastern Ukraine. Critics argue that, rather than fostering peace, these accords allowed Ukraine to strengthen its military capabilities, which was confirmed by both the German Chancellor Merkel and French President Holland after they left office. This act intensifying conflicts in regions with significant Russian-speaking populations, such as Donbas and Crimea. In summary, Russia's military actions in Ukraine are justified by the Kremlin through a complex interplay of historical grievances, security concerns over NATO's expansion, and perceptions of Western interference in Ukraine's political trajectory. However, many of these justifications have been contested by Western leaders, officials and the western mainstream mass media albeit now, President Trump is accepting that all of Russia's grievances are indeed TRUE! As always, please don't be afraid to contact us and put any questions you might have to any of the Black Spy Podcast team concerning this or any other of our fascinating subjects. And, if you want to continue learning whilst being entertained, please don't forget to subscribe to the Black Spy Podcast for free, so you'll never miss another episode. To contact Firgas Esack of the DAPS Agency go to Linked In To contact Dr. Rachel Taylor please use her Substack account. To contact Carlton King by utilising any of the following: To donate - Patreon.com/TheBlackSpyPodcast Email: carltonking2003@gmail.com Facebook: The Black Spy Podcast Facebook: Carlton King Author Twitter@Carlton_King Instagram@carltonkingauthor To read Carlton's Autobiography: “Black Ops – The incredible true story of a (Black) British secret agent”
Edition No76 | 07-01-2025 - An anchor belonging to the oil tanker Eagle S, suspected of being used to damage undersea cables in the Gulf of Finland, has been located and retrieved from the seabed. This follows the seizure by police in Finland of the Russian-linked dark fleet tanker Eagle S. This is the first time a ship suspected of sabotaging undersea infrastructure has been taken into custody by authorities, according to Estonia Prime Minister Kristen Michal. Estonia Foreign Minister Margus Tsahkna said the damage to undersea infrastructure was not a coincidence. “They have become systematic, and we must consider them an attack on our infrastructure,” he said. The Finnish customs service believes the Eagle S is part of a shadow fleet of ageing tankers being used to evade sanctions on the sale of Russian oil. ---------- SILICON CURTAIN FILM FUNDRAISER A project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's frontline towns. https://buymeacoffee.com/siliconcurtain/extras ---------- Trucks under Christmas Tree https://donorbox.org/trucks-under-christmas-tree/fundraiser/silicon-curtain The Goal of the Campaign for Silicon Curtain: € 10,000 to purchase 1 truck to save Ukrainian lives. ---------- Here are some interesting points about the seizure of the vessel, made by expert Robin Häggblom on Twitter last week. 1) Finnish Defence Forces involvement seems to have been limited. It was the Finnish Border Guard's flagship that shadowed the tanker and caught it in the act, According to Robin this was largely handled by the ministry of the Interior and Law Enforcement, rather than obvious military forces units. 2) The Police told a reporter they don't plan on contacting the Russian authorities. This was a strong and correct gesture of contempt for Russia and its actions. But Robin notes that it may also mark an end to the process of soft appeasement of Russia known as Finlandization, where the USSR and Russia was given special consideration compared to other states. 3) If the Russians have been foolish enough to use shadow fleet vessels as SIGINT platforms, for monitoring and intelligence operations, then we may expect must closer tracking of their grey fleet by NATO powers, and potentially more interventions. The shadow fleet-concept, notes Robin, rests on the right of innocent passage, while intelligence gathering specifically is mentioned as *not* being part of that under UNCLOS Article 19, 2. If there is reason to suspect innocent passage isn't adhered to, it can up new legal actions, which the Western allies have been loath to adopt until now. 4) The operation is typical for how Finland handles hybrid operations. Everything is done according to the book and within a clear legal framework. But the signalling around this operation appears to be unusually strong, which may be intended as a clear message to Russia. More of a show of force than was necessary may indicate that Finland and other countries' patience with Russia's illegal, aggressive and risky actions does have limits. More on this story in forthcoming episodes with experts Elizabeth Braw and Jerry Hendrix. ---------- NEWS SOURCES: https://yle.fi/a/74-20135216 https://www.reuters.com/world/europe/finland-court-rejects-owners-request-release-oil-tanker-2025-01-03/ https://www.lloydslist.com/LL1151950/Finland-police-seize-Russian-linked-dark-fleet-tanker-Eagle-S-in-cable-cutting-investigation ---------- SUPPORT THE CHANNEL: https://www.buymeacoffee.com/siliconcurtain https://www.patreon.com/siliconcurtain ----------
Please enjoy this encore episode where Vice President of Raytheon's Cyber Offense, Defense Expert Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore episode, where the Vice President of Raytheon's Cyber Offense, Defense Expert Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Remi Whiteside discusses his Ph.D. research and dissertation which is entitled: Peering into US Army Media, Information, and Data Literacy Fundamentals against Malign Information in the Open Information Environment: A Qualitative Case Study. According to Remi Whiteside, the US Army currently has no institutionalized program-of-record for educational development, uniquely designed for its population of uniformed Information Professionals in training to detect, analyze, and scrutinize malign information in the Open Information Environment. Unlike its peer services, the US Army does not perceive malign information, a reimagined tool of ideological subversion, as a high-caliber threat so far as to invest the time, money, or resources into critical, foundational metaliteracy competencies needed for its Information Professionals for the Open Information Environment. Recording Date: 1 Aug 2024 Research Question: Remi Whiteside suggests an interested student ask–in relation to media and information—how do narratives derived from the Open Information Environment shape servicemembers' metanarratives and do these metanarratives conflict with military identity? Resources: Peering into US Army Media, Information, and Data Literacy Fundamentals against Malign Information in the Open Information Environment: A Qualitative Case Study Syntactic Structures by Noam Chomsky Rhet Ops: Rhetoric and Information Warfare (Composition, Literacy, and Culture) by Jim Ridolfo and William Hart-Davidson NOEMA Magazine Link to full show notes and resources Guest Bio: Remington Whiteside is an active-duty Chief Warrant Officer in the US Army, career education, and academic researcher into MIDLE (media, information, and data literacy education) and M2DP (malinformation, misinformation, disinformation, propaganda). He started his career as an enlisted Cryptologic Linguist, with work in strategic, SOF, and training environments. He metamorphosed to Signals Intelligence Warrant Officer, specializing in tactical SIGINT, COMINT, OSINT, PAI, OPSEC, and Intelligence Support to Cyber and Electromagnetic Warfare (EW) training as an Observer-Coach-Trainer at Fort Johnson, Louisiana at the Joint Readiness Training Center. Remi holds an undergraduate degree in Middle Eastern studies, a graduate degree in Applied Linguistics with a focus on Computational Linguistics, and a Doctor of Philosophy degree in Education. He is lovingly supported by his wife Sara and his three children: Evolette, Torben, and Soren. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.
On this week's show, Patrick Gray and Adam Boileau discuss the weeks security news, including: Hezbollah's attempts to avoid SIGINT with pagers ends in explosions The US shines many bright lights on RT's disinfo role Australia counters Chinese bullying in the Pacific Valid accounts are the most prevalent entry point, says CISA's data Ivanti and Fortinet vie for worst vendor of the week Krebs writes up the shift towards charging The Com with terrorism And much, much more… This week's episode is sponsored by Push Security, who bring security visibility to where it needs to be these days – the browser. Luke Jennings joins this week's show to discuss how phish-kit crews are driving the arms race forward, and how detection has to adapt and go where the users are. This episode is also available on Youtube. Show notes Israel planted explosives in Hezbollah's Taiwan-made pagers, sources say | Reuters How Hezbollah used pagers and couriers to counter Israel's high tech surveillance | Reuters Biden administration unveils new evidence of RT's key role in Russian intelligence operations globally | CNN Politics Meta bans RT days after U.S. accused Russian outlet of disinformation U.S. to file charges in Trump campaign hacking case, officials say China suspected of hacking diplomatic body for Pacific islands region Chinese-made port cranes in US included 'backdoor' modems, House report says Stolen account info still chief risk for federal agencies, annual CISA audit finds Notice of Recent Security Incident | Fortinet Blog WordPress.org to require two-factor authentication for plugin developers | CyberScoop Multiple attacks force CISA to order agencies to upgrade or remove end-of-life Ivanti appliance Ivanti Endpoint Manager and Ivanti Endpoint Manager Security Suite and Ivanti Cloud Service Application (CSA) - End Of Life (EOL) The Dark Nexus Between Harm Groups and ‘The Com' – Krebs on Security Feds sentence 12 crypto thieves behind SIM swaps, home invasions Ex-CrowdStrike employees detail rising technical errors before July outage | Semafor Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek Apple seeks dismissal of its NSO Group lawsuit, citing risk of exposing ‘vital security information' US hits Intellexa spyware maker with more sanctions (1) BolivarCucuta on X: "Encuentran muerto al ciudadano israelí Yariv Bokor en Medellín En un apartamento de El Poblado, Medellín, fue encontrado sin vida el ciudadano israelí Yariv Bokor, con aparentes signos de violencia. Bokor estaba vinculado a la empresa Sandvine, la cual tiene relación con NSO https://t.co/EeY1os1omW" / X Instagram to bolster privacy and safety features for millions of teen users Mastercard buys Recorded Future for $2.65 billion | CyberScoop
This morning many were greeted with news that what looks like a cyber attack caused thousands of devices to explode. While it sounds like it's out of a cyberpunk novel, this attack helps us understand how technology can be used to build a pattern of life on not just individuals, but an organization or country. This episode has been sponsored by Obsidian Arms, a manufacturer of tools, parts and firearms, as well as operating as an OEM shop for those looking to bring excellence to the market. Their Minnesota-based shop builds and cuts parts out of U.S.-sourced materials. Their gunsmith tools, custom firearms, and capabilities can be found at www.obsidianarms.comSupport the REDACTED Culture Cast at redactedculture.locals.comSSP and boutique products at redactedllc.comFollow us on Instagram at @redactedllc
Summary Rachel Noble joins Andrew to discuss her role as Director-General of the Australian Signals Directorate. Rachel is the first woman to hold this position. What You'll Learn Intelligence The Australian Signals Directorate: Its purpose and mission The true story of the Pine Gap spy facility Leadership in Intelligence The SIGINT origins of the Five Eyes alliance Reflections The value of team The importance of work-life balance And much, much more … Quotes of the Week “Women lead differently. We talk differently, we engage in different ways. And I've had to learn to own that about myself and not be tempted to try to be like the guys, compete with them on their own terms, or to adopt male behaviors in order to be heard … [Doing that] doesn't really help other women who might come after me.” – Rachel Noble. Resources SURFACE SKIM *SpyCasts* Codebreaking and Codemaking Down Under with John Blaxland and Clare Birgin (2024) Australian National Day Special: Intelligence Down Under with John Blaxland (2024) SPY CHIEFS: Director-General of Security Mike Burgess - ASIO, Australia & America (2022) Keeping Secrets/Disclosing Secrets with Spy Chief turned DG of Australia's National Archives David Fricker (2022) *Beginner Resources* What is SIGINT? YouTube (2020) [2 min. video] Who we are, Australian Signals Directorate (2020) [Short article] Our Agencies, National Intelligence Community of Australia (n.d.) [Overview of each agency in the Australian IC] DEEPER DIVE Primary Sources REDSPICE Blueprint (2022) Report of the Royal Commission on Intelligence and Security (1977) Australian Treaty Series: Five Power Defence Agreements (1971) Australian Treaty Series: Agreement between the Government of the Commonwealth of Australia and the Government of the United States of America relating to the Establishment of a Joint Defence Space Research Facility (1966) Policy file containing Cabinet approval of establishment of Joint Intelligence Organisation and participation of New Zealand Government (1946) ASD Role and effectiveness of Signals Intelligence in World War II (1945) *Wildcard Resource* Rachel mentioned in this podcast episode that one of her favorite treats when coming to the States are Snickerdoodles – A delectable sugar cookie showered in cinnamon-sugar topping. In the cookie world, snickerdoodles are a more recent invention with their first written mention being in an 1889 cookbook. Learn more about the history of cookies here! Learn more about your ad choices. Visit megaphone.fm/adchoices
Artificial intelligence and machine learning are two much-heralded technologies set to revolutionise signals intelligence collection, processing and dissemination. An increasingly congested radio spectrum is set to challenge the limits of human cognition in the search for the signal of interest. In this episode of Radioflash! we catch up with Patrick ‘Krown' Killingsworth, EpiSci's director of autonomy projects. We define the terms Artificial Intelligence (AI) and Machine Learning (ML) and their unique capabilities. ML algorithms are trained on huge amounts of data which makes these algorithms great for processing huge amounts of data, a key requirement in Signals Intelligence (SIGINT). The application of AI and ML in SIGINT is not necessarily about replacing the human but helping the SIGINT operator sort these data. Nonetheless, the continuing introduction of AI and ML into SIGINT analysis prompts concern and enthusiasm in equal measure. Ensuring that enough data are available for training algorithms creates challenges given the paucity of data which the SIGINT cadre may be interested in. We talk about the risks of using synthetic data for training and tackling the risk by anticipating potential problems from the start. AI- and ML-enabled SIGINT systems continue to get smarter, faster and more accurate. The future brings challenges in terms of moving this SIGINT technology from the strategic level to the tactical edge, although edge computing in the tactical domain should help no end in this regard.
Preventing violent actions is the bottom line. Identifying domestic terror cells disguised as activist groups happens first. This involves front line intelligence and the real time collection and analysis of info. This includes surveillance, human intelligence (HUMINT), signals intelligence (SIGINT), and open source intelligence (OSINT). Crucial threat assessments involve collaboration with various law enforcement and intel agencies. Sharing information is key in conducting thorough threat assessments. The goal is to preemptively disrupt potential terrorist activities while respecting civil liberties and lawful activism.
Former Army Chief Warrant Officer Bill Thompson joins Chad Robichaux and Sean Kennard on this episode of Resilient to share SIGINT stories, life after the military, building a business, and much more. RESILIENT: Follow Us On Instagram: https://instagram.com/resilientshow Follow Us On Twitter: https://twitter.com/ResilientShow Follow Us On TikTok: https://www.tiktok.com/@resilientshow Follow Chad: https://www.instagram.com/chadrobo_official Follow Sean: https://www.instagram.com/seantopgunkennard Follow Bill Thompson: https://www.instagram.com/Billthompsonsft Follow Spartan Forge: https://www.instagram.com/spartan.forge/ https://spartanforge.ai/ ----------- SPONSORS: Smith & Wesson: https://www.smith-wesson.com/ Gatorz Eyewear: https://www.gatorz.com/ Midas Gold Group: https://www.midasgoldgroup.com BioPro+: https://www.bioproteintech.com/ ----------- All proceeds go to Mighty Oaks Foundation, a non-profit organization serving military & first responder communities. Learn more about Mighty Oaks at: https://www.mightyoaksprograms.org
00:00 - Introduction 03:52 - Using Linux? 10:15 - HFGCS 17:17 - Range Testing 22:07 - Building Community 26:40 - Determining Range 29:47 - Why not just 20m? 35:25 - Software Backdoors 39:23 - Vehicle TOC 41:15 - Long range HF 41:31 - Building Community 44:57 - VarAC 47:00 - Wire Reports 50:41 - Shortwave Use in Emergencies 57:20 - Drones 58:51 - Cheapest HF Radio 01:02:49 - Boofwang 01:03:24 - Radio and the Younger Generation 01:06:17 - Cheapest SDR 01:07:23 - The Wire 01:09:13 - EMP Protection 01:12:15 - Scanning 01:13:20 - Different Bands 01:14:50 - Antennas 01:18:56 - Bluetooth 01:20:35 - Best of the Best 01:22:20 - Antenna Concealment 01:23:10 - The Wire 01:23:47 - Backup Comms 01:26:10 - Encryption 01:28:10 - Building Community 01:28:36 - Budget HF 01:30:50 - Internet Comms 01:33:44 - WWIII and China 01:36:14 - Energy Needs 01:38:10 - VarAC 01:39:30 - SDRs and SIGINT 01:40:26 - Crypto 01:41:17 - Region-Specific Freqs 01:41:58 - Budget/Gear Categories 01:43:12 - "Buy This" Guide 01:44:37 - Radio Guide 01:45:04 - Apartment Antennas 01:46:09 - Buying Used 01:47:39 - NVIS 01:49:17 - Meshtastic 01:49:58 - Alternatives to Using Laptop 01:50:58 - Priorities 01:52:40 - Long Range Comms 01:56:33 - Tuning 01:57:35 - Livestreams 01:58:41 - Satellites 02:00:00 - Legalities 02:00:42 - Repeaters 02:02:09 - Your Own Repeaters 02:02:53 - Closing Thoughts Download the GhostNet Here: https://github.com/s2underground/GhostNet Receive-Only for Free: https://youtu.be/SsuzTPHcgDY Receive-Only, Off-Grid: https://youtu.be/P9sWFryImDo If you would like to support us, we're on Patreon! https://www.patreon.com/user?u=30479515 Disclaimer: No company sponsored this video. In fact, we have ZERO corporate sponsors. We are funded 100% by you, the viewer. All of our funding comes from direct support from platforms like Patreon, or from ad revenue on YouTube. Please note that even though it hurts our income, we still offer ad-free watching via alternative platforms like Odysee, Gab, and (for now) Rumble: Odysee: https://odysee.com/@S2Underground:7 Gab: https://gab.com/S2underground Rumble: https://rumble.com/c/theunderground BitChute: https://www.bitchute.com/channel/P2NMGFdt3gf3/ Playeur: https://playeur.com/c/S2Underground Our Reading List! https://www.goodreads.com/user/show/133747963-s2-actual The War Kitchen Channel! https://www.youtube.com/channel/UCYmtpjXT22tAWGIlg_xDDPA DISCLAIMER: This content is purely educational and does not advocate for violating any laws. Do not violate any laws or regulations. This is not legal advice. Consult with your attorney. Our Reading List! https://www.goodreads.com/user/show/133747963-s2-actual The War Kitchen Channel! https://www.youtube.com/channel/UCYmtpjXT22tAWGIlg_xDDPA Join us on GhostNet! Download the PDF here: https://github.com/s2underground/GhostNet
The Jalisco New Generation Cartel (Cartel Jalisco Nueva Generación or CJNG) is one of the most powerful and violent drug trafficking organizations operating in Mexico. It emerged in the early 2010s as a splinter group of the Milenio Cartel, another criminal organization based in Jalisco, Mexico.The roots of the CJNG can be traced back to the mid-2000s when the Milenio Cartel was headed by Ignacio "Nacho" Coronel Villarreal. After Coronel's death in a shootout with Mexican security forces in 2010, a power struggle erupted within the cartel. Nemesio Oseguera Cervantes, also known as "El Mencho," emerged as a prominent figure within the organization.Under El Mencho's leadership, the CJNG rapidly expanded its influence and territory, becoming one of the most dominant cartels in Mexico. They have been involved in drug trafficking, money laundering, extortion, and other criminal activities. The CJNG's primary operations involve the trafficking of cocaine, methamphetamine, heroin, and fentanyl into the United States.The CJNG has gained notoriety for its brutality and willingness to engage in violence to achieve its objectives. They have been responsible for numerous acts of violence, including assassinations, mass killings, and the use of explosives. The cartel has also targeted Mexican security forces, engaging in confrontations with police and military personnel.Despite efforts by Mexican and international law enforcement to dismantle the CJNG, the cartel has proven to be resilient and adaptable. They have a highly decentralized structure, with cells operating across Mexico and even extending into other countries. This makes it difficult for authorities to target the organization as a whole.The CJNG's influence extends beyond its criminal activities, as it also seeks to exert control over local communities through intimidation and coercion. They have been known to infiltrate local governments and law enforcement agencies, further complicating efforts to combat their operations.In recent years, the CJNG has increasingly clashed with rival cartels, particularly the Sinaloa Cartel, leading to widespread violence in parts of Mexico. The cartel's ability to maintain its dominance in the face of such challenges underscores its strength and resilience.It has been during this war that the use of Drones by both sides has accelerated. The repurposing of commercial drones for military applications has become increasingly prevalent in the modern era, presenting both opportunities and challenges for military forces around the world. Here are some ways in which commercial drones have been adapted for military use:Surveillance and Reconnaissance: Commercial drones equipped with high-resolution cameras and sensors are being used for intelligence gathering, surveillance, and reconnaissance (ISR) missions. These drones can provide real-time imagery of enemy positions, movements, and terrain, allowing military forces to make informed decisions.Target Acquisition: Drones equipped with advanced sensors, such as infrared or electro-optical cameras, can identify and track potential targets on the battlefield. This information can be relayed to military command centers for further analysis and action.Communication Relays: Commercial drones can be outfitted with communication equipment to serve as mobile relays, extending the range and effectiveness of military communications networks. This is particularly useful in remote or rugged environments where traditional communication infrastructure is lacking.Cargo Delivery: Drones are being used to deliver essential supplies, ammunition, and medical equipment to troops in the field. This can help reduce the logistical burden on military convoys and reduce the risk to personnel from ground-based transportation.Electronic Warfare: Commercial drones can be modified to carry electronic warfare payloads, such as signal jammers or signal intelligence (SIGINT) equipment, to disrupt enemy communications and radar systems.Combat Operations: In some cases, commercial drones have been weaponized and used for offensive purposes on the battlefield. These drones may carry small arms, explosives, or other munitions to engage enemy targets.Mine Detection and Clearance: Drones equipped with specialized sensors can be used for mine detection and clearance operations, helping to reduce the risk to military personnel and civilians in conflict-affected areas.In our second article:The Kinahan Cartel is an organized crime group based in Dublin, Ireland, known for its involvement in drug trafficking, arms smuggling, money laundering, and other illicit activities. Led by Christy Kinahan Sr., the cartel rose to prominence in the early 2000s and has since established an extensive network across Europe, particularly in Spain, where they have significant operations.The cartel gained widespread notoriety for its violent turf wars with rival criminal gangs, most notably the Hutch gang, which escalated into a series of shootings and murders in Dublin. These conflicts have led to a significant number of casualties and have drawn considerable attention from law enforcement agencies in Ireland and abroad.The Kinahan Cartel has also been linked to high-profile international drug trafficking operations, often utilizing sophisticated methods to smuggle narcotics into Europe. They have been the focus of numerous police investigations and have faced significant legal scrutiny, resulting in arrests and convictions of several of its members.Despite law enforcement efforts to dismantle the organization, the Kinahan Cartel continues to operate, albeit under increased pressure and surveillance. The cartel's activities remain a major concern for authorities, as they continue to pose a significant threat to public safety and the stability of the region's criminal underworld. Despite all of the sanctions and the effort to bring the Kinahan cartel down, they not only remain elusive, but have even grown their wealth.(commercial at 10:20)to contact me:bobbycapucci@protonmai.comsource:Cartel thugs use monster 'GTA 5 guns' as enemies now 'terrorise villages' in drone blitz - Daily Starsource:Kinahan cartel is now worth a whopping $1.6 billion following 50 per cent rise - Irish Star
The Jalisco New Generation Cartel (Cartel Jalisco Nueva Generación or CJNG) is one of the most powerful and violent drug trafficking organizations operating in Mexico. It emerged in the early 2010s as a splinter group of the Milenio Cartel, another criminal organization based in Jalisco, Mexico.The roots of the CJNG can be traced back to the mid-2000s when the Milenio Cartel was headed by Ignacio "Nacho" Coronel Villarreal. After Coronel's death in a shootout with Mexican security forces in 2010, a power struggle erupted within the cartel. Nemesio Oseguera Cervantes, also known as "El Mencho," emerged as a prominent figure within the organization.Under El Mencho's leadership, the CJNG rapidly expanded its influence and territory, becoming one of the most dominant cartels in Mexico. They have been involved in drug trafficking, money laundering, extortion, and other criminal activities. The CJNG's primary operations involve the trafficking of cocaine, methamphetamine, heroin, and fentanyl into the United States.The CJNG has gained notoriety for its brutality and willingness to engage in violence to achieve its objectives. They have been responsible for numerous acts of violence, including assassinations, mass killings, and the use of explosives. The cartel has also targeted Mexican security forces, engaging in confrontations with police and military personnel.Despite efforts by Mexican and international law enforcement to dismantle the CJNG, the cartel has proven to be resilient and adaptable. They have a highly decentralized structure, with cells operating across Mexico and even extending into other countries. This makes it difficult for authorities to target the organization as a whole.The CJNG's influence extends beyond its criminal activities, as it also seeks to exert control over local communities through intimidation and coercion. They have been known to infiltrate local governments and law enforcement agencies, further complicating efforts to combat their operations.In recent years, the CJNG has increasingly clashed with rival cartels, particularly the Sinaloa Cartel, leading to widespread violence in parts of Mexico. The cartel's ability to maintain its dominance in the face of such challenges underscores its strength and resilience.It has been during this war that the use of Drones by both sides has accelerated. The repurposing of commercial drones for military applications has become increasingly prevalent in the modern era, presenting both opportunities and challenges for military forces around the world. Here are some ways in which commercial drones have been adapted for military use:Surveillance and Reconnaissance: Commercial drones equipped with high-resolution cameras and sensors are being used for intelligence gathering, surveillance, and reconnaissance (ISR) missions. These drones can provide real-time imagery of enemy positions, movements, and terrain, allowing military forces to make informed decisions.Target Acquisition: Drones equipped with advanced sensors, such as infrared or electro-optical cameras, can identify and track potential targets on the battlefield. This information can be relayed to military command centers for further analysis and action.Communication Relays: Commercial drones can be outfitted with communication equipment to serve as mobile relays, extending the range and effectiveness of military communications networks. This is particularly useful in remote or rugged environments where traditional communication infrastructure is lacking.Cargo Delivery: Drones are being used to deliver essential supplies, ammunition, and medical equipment to troops in the field. This can help reduce the logistical burden on military convoys and reduce the risk to personnel from ground-based transportation.Electronic Warfare: Commercial drones can be modified to carry electronic warfare payloads, such as signal jammers or signal intelligence (SIGINT) equipment, to disrupt enemy communications and radar systems.Combat Operations: In some cases, commercial drones have been weaponized and used for offensive purposes on the battlefield. These drones may carry small arms, explosives, or other munitions to engage enemy targets.Mine Detection and Clearance: Drones equipped with specialized sensors can be used for mine detection and clearance operations, helping to reduce the risk to military personnel and civilians in conflict-affected areas.In our second article:The Kinahan Cartel is an organized crime group based in Dublin, Ireland, known for its involvement in drug trafficking, arms smuggling, money laundering, and other illicit activities. Led by Christy Kinahan Sr., the cartel rose to prominence in the early 2000s and has since established an extensive network across Europe, particularly in Spain, where they have significant operations.The cartel gained widespread notoriety for its violent turf wars with rival criminal gangs, most notably the Hutch gang, which escalated into a series of shootings and murders in Dublin. These conflicts have led to a significant number of casualties and have drawn considerable attention from law enforcement agencies in Ireland and abroad.The Kinahan Cartel has also been linked to high-profile international drug trafficking operations, often utilizing sophisticated methods to smuggle narcotics into Europe. They have been the focus of numerous police investigations and have faced significant legal scrutiny, resulting in arrests and convictions of several of its members.Despite law enforcement efforts to dismantle the organization, the Kinahan Cartel continues to operate, albeit under increased pressure and surveillance. The cartel's activities remain a major concern for authorities, as they continue to pose a significant threat to public safety and the stability of the region's criminal underworld. Despite all of the sanctions and the effort to bring the Kinahan cartel down, they not only remain elusive, but have even grown their wealth.(commercial at 10:20)to contact me:bobbycapucci@protonmai.comsource:Cartel thugs use monster 'GTA 5 guns' as enemies now 'terrorise villages' in drone blitz - Daily Starsource:Kinahan cartel is now worth a whopping $1.6 billion following 50 per cent rise - Irish Star
The Jalisco New Generation Cartel (Cartel Jalisco Nueva Generación or CJNG) is one of the most powerful and violent drug trafficking organizations operating in Mexico. It emerged in the early 2010s as a splinter group of the Milenio Cartel, another criminal organization based in Jalisco, Mexico.The roots of the CJNG can be traced back to the mid-2000s when the Milenio Cartel was headed by Ignacio "Nacho" Coronel Villarreal. After Coronel's death in a shootout with Mexican security forces in 2010, a power struggle erupted within the cartel. Nemesio Oseguera Cervantes, also known as "El Mencho," emerged as a prominent figure within the organization.Under El Mencho's leadership, the CJNG rapidly expanded its influence and territory, becoming one of the most dominant cartels in Mexico. They have been involved in drug trafficking, money laundering, extortion, and other criminal activities. The CJNG's primary operations involve the trafficking of cocaine, methamphetamine, heroin, and fentanyl into the United States.The CJNG has gained notoriety for its brutality and willingness to engage in violence to achieve its objectives. They have been responsible for numerous acts of violence, including assassinations, mass killings, and the use of explosives. The cartel has also targeted Mexican security forces, engaging in confrontations with police and military personnel.Despite efforts by Mexican and international law enforcement to dismantle the CJNG, the cartel has proven to be resilient and adaptable. They have a highly decentralized structure, with cells operating across Mexico and even extending into other countries. This makes it difficult for authorities to target the organization as a whole.The CJNG's influence extends beyond its criminal activities, as it also seeks to exert control over local communities through intimidation and coercion. They have been known to infiltrate local governments and law enforcement agencies, further complicating efforts to combat their operations.In recent years, the CJNG has increasingly clashed with rival cartels, particularly the Sinaloa Cartel, leading to widespread violence in parts of Mexico. The cartel's ability to maintain its dominance in the face of such challenges underscores its strength and resilience.It has been during this war that the use of Drones by both sides has accelerated. The repurposing of commercial drones for military applications has become increasingly prevalent in the modern era, presenting both opportunities and challenges for military forces around the world. Here are some ways in which commercial drones have been adapted for military use:Surveillance and Reconnaissance: Commercial drones equipped with high-resolution cameras and sensors are being used for intelligence gathering, surveillance, and reconnaissance (ISR) missions. These drones can provide real-time imagery of enemy positions, movements, and terrain, allowing military forces to make informed decisions.Target Acquisition: Drones equipped with advanced sensors, such as infrared or electro-optical cameras, can identify and track potential targets on the battlefield. This information can be relayed to military command centers for further analysis and action.Communication Relays: Commercial drones can be outfitted with communication equipment to serve as mobile relays, extending the range and effectiveness of military communications networks. This is particularly useful in remote or rugged environments where traditional communication infrastructure is lacking.Cargo Delivery: Drones are being used to deliver essential supplies, ammunition, and medical equipment to troops in the field. This can help reduce the logistical burden on military convoys and reduce the risk to personnel from ground-based transportation.Electronic Warfare: Commercial drones can be modified to carry electronic warfare payloads, such as signal jammers or signal intelligence (SIGINT) equipment, to disrupt enemy communications and radar systems.Combat Operations: In some cases, commercial drones have been weaponized and used for offensive purposes on the battlefield. These drones may carry small arms, explosives, or other munitions to engage enemy targets.Mine Detection and Clearance: Drones equipped with specialized sensors can be used for mine detection and clearance operations, helping to reduce the risk to military personnel and civilians in conflict-affected areas.In our second article:The Kinahan Cartel is an organized crime group based in Dublin, Ireland, known for its involvement in drug trafficking, arms smuggling, money laundering, and other illicit activities. Led by Christy Kinahan Sr., the cartel rose to prominence in the early 2000s and has since established an extensive network across Europe, particularly in Spain, where they have significant operations.The cartel gained widespread notoriety for its violent turf wars with rival criminal gangs, most notably the Hutch gang, which escalated into a series of shootings and murders in Dublin. These conflicts have led to a significant number of casualties and have drawn considerable attention from law enforcement agencies in Ireland and abroad.The Kinahan Cartel has also been linked to high-profile international drug trafficking operations, often utilizing sophisticated methods to smuggle narcotics into Europe. They have been the focus of numerous police investigations and have faced significant legal scrutiny, resulting in arrests and convictions of several of its members.Despite law enforcement efforts to dismantle the organization, the Kinahan Cartel continues to operate, albeit under increased pressure and surveillance. The cartel's activities remain a major concern for authorities, as they continue to pose a significant threat to public safety and the stability of the region's criminal underworld. Despite all of the sanctions and the effort to bring the Kinahan cartel down, they not only remain elusive, but have even grown their wealth.(commercial at 10:20)to contact me:bobbycapucci@protonmai.comsource:Cartel thugs use monster 'GTA 5 guns' as enemies now 'terrorise villages' in drone blitz - Daily Starsource:Kinahan cartel is now worth a whopping $1.6 billion following 50 per cent rise - Irish StarBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
***This lecture is sponsored by the IAFIE Washington DC Chapter and the IWP IAFIE Alpha Student Chapter*** About the Lecture: For a long time, the Australian Signals intelligence (or Sigint) story has been kept secret. Until now… Why does Australia have a national signals intelligence agency? What does it do and why is it controversial? And how significant are its ties with key partners, the United States, the United Kingdom, Canada and New Zealand, to this arrangement? Revealing Secrets is a compelling account of Australian Signals intelligence, its efforts at revealing the secrets of other nations, and keeping ours safe. It brings to light those clever Australians whose efforts were for so long entirely unknown or overlooked. Blaxland and Birgin traverse the royal commissions and reviews that shaped Australia's intelligence community in the 20th century and consider the advent and the impact of cyber. In unearthing this integral, if hidden and little understood, part of Australian statecraft, this book increases our understanding of the past, present and what lies ahead. About the Speakers: John Blaxland is Professor of International Security and Intelligence Studies in the Strategic and Defence Studies Centre (SDSC), Coral Bell School of Asia Pacific Affairs at the Australian National University (ANU). He is a Senior Fellow of the Higher Education Academy and a Fellow of the Royal Society of New South Wales. He was also formerly a military intelligence officer, Head of SDSC and Director of the ANU Southeast Asia Institute. He is the author and editor of several publications on military history, intelligence and international security affairs. Clare Birgin's career in the Department of Foreign Affairs and Trade (DFAT) spanned 30 years, with a focus on national security and intelligence. She had postings in Warsaw, Moscow, Geneva, and Washington DC as the Liaison Officer of the Office of National Assessments, followed by postings as Ambassador in Hungary, Serbia, Kosovo, Romania, North Macedonia and Montenegro. Subsequently she was a Visiting Fellow at the ANU before joining John Blaxland's history writing team. She has been awarded the Polish Government's Knight's Cross Medal and the Bene Merito Medal by the former Polish Foreign Minister.
In this episode of From the Crows' Nest, host Ken Miller sits down with Dr. David Thirtyacre, Assistant Professor in the College of Aeronautics at the Embry-Riddle Aeronautical University. David is the Chair and Chief Pilot for the Department of Flight and currently instructs at the undergraduate and graduate levels in Flight Operations, Aerodynamics, Aircraft Performance, Unmanned Systems, Airborne Robotics, and Aviation and Aerospace Simulation Systems. He retired from the USAF with 27 years of duty in the fighter community with over 3500 hours piloting fighter aircraft and was a pioneer in the use of unmanned systems. They discuss how sUAS are used in current conflicts around the world and the capabilities they offer, including signals intelligence (SIGINT), tactical communications and networking, and as a weapons system. David also shares his thoughts on how artificial intelligence is rapidly evolving the use of sUAS and what the future holds for this advanced technology. To learn more about today's topics or to stay updated on EMSO and EW developments, visit our homepage.
Summary Leon Panetta (Panetta Institute) joins Andrew (X; LinkedIn) to discuss his lifetime of American public service. Secretary Panetta was the 2023 recipient of SPY's William H. Webster Award. What You'll Learn Intelligence Directing the Central Intelligence Agency Intelligence & the Abbottabad Raid Working within the Clinton Administration A life's dedication to the safety of the American public Reflections The power of patience and the ability to listen Handing immense pressure and responsibility And much, much more … Resources SURFACE SKIM *SpyCasts* My Life in American Intelligence with Barry Zulauf (2023) David Petraeus on Ukraine & Intelligence with the former CIA Director & 4* General (2023) Intelligence, Special Operations, and Strategy with Michael Vickers (2023) The 75th Anniversary of the CIA with former Director Robert Gates (2022) *Beginner Resources* What Does the Secretary of Defense Do? MasterClass (2022) [Short article] How did the US find and kill Osama bin Laden? 60 Minutes Australia, YouTube (2018) [4 min. video] Leon E. Panetta, Panetta Institute for Public Policy (n.d.) [Short biography] DEEPER DIVE Books The Spymasters: How the CIA Directors Shape History and the Future, C. Whipple (Scribner, 2021) The Gatekeepers: How the White House Chiefs of Staff Define Every Presidency, C. Whipple (Crown, 2018) Worthy Fights: A Memoir of Leadership in War and Peace, L. Panetta & J. Newton (Penguin Books, 2014) SECDEF: The Nearly Impossible Job of Secretary of Defense, C. A. Stevenson (Potomac Books, 2007) Primary Sources Statement on Syria before the Senate Armed Services Committee (2012) Nomination of Hon. Leon E. Panetta to be Secretary of Defense (2011) Statement to Employees by CIA Director Leon Panetta on the Death of Usama Bin Ladin (2011) Nomination of Leon Panetta to be Director, Central Intelligence Agency (2009) Memorandum for Leon Panetta on POTUS' Time Investment (1996) Letter from Brown to Panetta Regarding Fiscal Year 1994-1997 (1993) Letter to the Honorable Leon E. Panetta from George Bush (1977) *Wildcard Resource* Secretary Panetta now lives on a lovely vineyard in sunny California. Speaking of wine and spies, check out Vint Hill Winery in Warrenton, Virginia. In 1942 the US Army set up top-secret SIGINT operations at the now-vineyard after the farm's owner, a Ham Radio enthusiast, set up a wire on the roof of the barn that could reach signals from Berlin. The farm was the site of The Signal Corps cryptographic school, which famously intercepted messages from Hiroshi Oshima in 1943.
Welcome back to the Grey Dynamics Podcast! This week we are talking to Michael Blicher Soerensen. Michael is a veteran of the Danish army, specialising in electronic warfare and SIGINT. He is currently a global security site lead at Meta. We discussed what makes a good analyst, deploying to Iraq, corporate intelligence and much more. Enjoy!Find MichaelLinkedInWe spoke about:2:40 - Michael's background5:15 - Opportunities after working in SIGINT and Electronic Warfare9:17 - Killings your darlings10:40 - Adjusting to work outside of the army14:09 - Learning to build rapport with collegues in the workplace16:22 - What makes a good intelligence analyst20:21 - Discovering new career opportunities and staying open minded24:49 - Michael's experience on deployment28:17 - Michael's experience working with allied intelligence counterparts32:07 - Commentary on how training and background can heavily influence analyst's perspectives36:32 - Tailoring intelligence to the consumers needs and creating valuable products38:08 - Issues in the field of OSINT48:30 - Intelligence professionals being able to educate consumers on intelligence can and cannot do51:30 - Competing with other internal and external intelligence professionals in the corporate world1:01:50 - Lack of Tactical intelligence in the private sector1:03:24 - Intelligence products currently consumed by in the corporate world1:05:47 - Cultural RecommendationsAdvance Your Intelligence Career Today!Sign up to the Grey Dynamics Intelligence School (GDIS) for Top Instructors, Practical Skills, and Real-World Application.We are the first fully online intelligence school helping professionals to achieve their long term goals. Our school with tons of new material is currently under construction and will be out there very soon. Meanwhile, you can sign up and be the first to know when we launch, plus get exclusive tips and offers.Get access to exclusive Grey Dynamics ReportsWith security clearance, you can take a crucial role in our intelligence community. As a cleared member, you get access to secret & top secret grade publications. If you are a Top Secret holder you also get access to our community area, where you can interact with other members and with our analysts! Subscribe today! Hosted on Acast. See acast.com/privacy for more information.
Currently working as a United States government official, Kayla Williams was an Arabic linguist/interpreter and SIGINT operations specialist in the Army. Although she did not support the Invasion of Iraq, she took part in one of the earliest invasions using her skills to help with interrogations. Explore more at https://downrangepod.com/. Subscribe to Tenderfoot+ for ad-free listening and early episodes at https://tenderfoot.tv/plus/. Follow the show at @downrangepodcast. Learn more about your ad choices. Visit megaphone.fm/adchoices
RR The Wire 2130Z December 1, 2023PRECEDENCE: ROUTINE RRDTG: 213001Z DEC 23ICOD: 200001Z DEC 23CONTROLS: Public ReleaseQQQQBLUF: GAZA CEASEFIRE HAS BROKEN. TENSIONS REMAIN IN NORTHERN BRAZIL. -----BEGIN TEARLINE------International Events-Middle East: In Gaza, the ceasefire between Israel and Hamas has been broken. It is unclear as which side began hostilities first (or if the deadline was reached), as both sides launched nearly simultaneous attacks. Hamas has conducted substantial rocket attacks in the North, with Israel conducting substantial airstrikes IVO the Rafah border crossing. Attacks from Hezbollah in Lebanon continue as well. Due to the intensity of the conflict, humanitarian aid shipments into Gaza via the Rafah crossing have stopped for the time being.Europe: In Russia, Vladimir Putin signs decree increasing the total size of the AFRF by 170,000. AC: This is not a deployment or mobilization, but rather an increase in the standing size of the Russian military. Currently Russia's military is comprised of roughly 1.3 million service members. This move comes three weeks after Russia's (and NATO's) formal withdrawal from the Treaty on Conventional Armed Forces in Europe (CFE), the treaty intended to limit the numbers of troops in Europe at the height of the Cold War.South America: Brazil continues to bolster defenses along the border with Venezuela amid high tensions in the region. AC: Limited reports on social media indicate Brazil has moved forces into a salient north of Boa Vista. Due to terrain limitations and the access of roads, a Venezuelan land-based invasion of Guyana (if it were to happen) could be conducted via Brazil's territory.-Homefront-GA: Local reporting indicates a woman has possibly attempted to self-immolate outside the Israeli Consulate in Atlanta. NFI ATT. AC: Though a currently developing event, initial reports indicate the woman was wearing/holding a Palestinian flag, suggesting the motive for the incident as being linked to the current conflict in the Middle East.-Analyst Comments-In the Middle East, Israel has almost certainly made good use of the ceasefire to continue SIGINT collection efforts within Gaza. However, it is unclear as to how effective this intelligence gathering would have been as Hamas militants clearly understand Israel's superior technical intelligence capability. As a result, airstrikes are likely to be intense as targeting efforts catch up to the intelligence picture.-----END TEARLINE-----Analyst: S2AEND REPORTNNNN
We discuss Israel's use of white phosphorus incendiary bombs in Gaza and how Hamas planned the attack in plain sight, posting a training video in which they broke through a full-scale replica of the Israeli border wall just 2 weeks before Oct 7.Visit betterhelp.com/DUBIOUS today to get 10% off your first month of therapy. If you like our content, please become a patron to get all our episodes ad-free. First, we look at the humanitarian situation in Gaza, the communications blackout and Israel's use of white phosphorus, violating international humanitarian law. Human Rights Watch verified videos “taken in Lebanon and Gaza on October 10 and 11, 2023, respectively, showing multiple airbursts of artillery-fired white phosphorus over the Gaza City port and two rural locations along the Israel-Lebanon border, and interviewed people who described an attack in Gaza. (…) Upon contact, white phosphorus can burn people, thermally and chemically, down to the bone as it is highly soluble in fat and therefore in human flesh. White phosphorus fragments can exacerbate wounds even after treatment, entering the bloodstream and causing multiple organ failure. Already dressed wounds can reignite when dressings are removed, and the wounds are re-exposed to oxygen. Even relatively minor burns are often fatal.” 1 Then we address the multiple and catastrophic security failures by Israel's intelligence community and military. We look at SIGINT, HUMINT and IMINT failures. How did Shin Bet, the Mossad and the IDF miss this attack? Here are the main points: Intelligence officers failed to monitor certain communication channels used by Palestinian attackers. Military personnel and intelligence officers over relied on border surveillance equipment that was easily shut down by attackers. The commanders were all in one place, clustered in a single border base, that was overrun in the initial phase of the incursion, preventing communication with the rest of the armed forces. Intelligence officers accepted at face value assertions by Hamas military leaders, made on private channels, that they were not preparing for battle. The officers were aware that Hamas knew these phone calls were being monitored by Israel. 2 Another issue we address is Israeli reservists' criticism for Yair Netanyahu, Benjamin Netanyahu's son, who remains in Miami rather than joining the fight against Hamas. The 32-year-old is currently living in Florida, where he moved in April 2023, after he was sued for defamation in Israel over social media posts against a political activist. 3 We also discuss Israel's ground invasion (land incursion) in Gaza and the regional ripple effects: as Israel pushes ahead, regional players are preparing their next moves. Hezbollah might attack from the north, and Iran has hinted at getting involved directly. Egypt, Lebanon, Syria, and Turkey might play crucial roles in the coming weeks. While Qatar is trying to negotiate with Hamas, Saudi Arabia is staying out of the mix. Also included: the Gaza tunnels, the hostages, similarities to 9/11 from an intelligence perspective, Benjamin Netanyahu's stance on a two-state solution and his policies which ensured Hamas is not eradicated, and what might come next. 1. Human Rights Watch Israel: White Phosphorus Used in Gaza, Lebanon Human Rights Watch, October 2023 ⇤2. Ronen Bergman and Patrick Kingsley How Israel's Feared Security Services Failed to Stop Hamas's Attack The New York Times, October 2023 ⇤3. Graeme Massie Israeli reservists question absence of Netanyahu's son who remains in Miami Independent, October 2023 ⇤
Buy a tee! https://www.10percenttrue.com/product-page/magnum-classic-teeSupport me with a coffee! https://www.buymeacoffee.com/10percenttrue Discussion on Discord: https://discord.gg/9vJ3hPYFQh0:00 intro1:16 Bodo - why F-15s were there6:20 intercepting Bear/Badger/Coot without a radar lock and why12:05 interesting intercepts 15:55 Naval Badgers a different challenge 16:44 “KGB Coot”18:00 Velocity Search vs TWS?20:10 SIGINT 25:25 levels of “co-operation” of the intercepted 31:25 no IRST, no loss?38:00 continued but a hostile witness!45:35 HOBS and associated tactics 54:40 MATRA story1:01:10 “Eagle Eye”1:10:15 defensive shortcomings1:15:20 Light Grey Aloofness/Ego-jet/Stratification of the community 1:35:05 AMRAAM the great equaliser1:38:30 to share the secrets of employment or not?1:45:15 Jekyll & Hyde?1:48:10 loose ends and YT comments questions including VMAX, can you trust the books? 2:04:00 callsign storySupport the show
OPSEC, short for Operation Security is Military Jargon for keeping information vital to the security and success of an operation out out the hands of those who would use open source intelligence gathering tools to gain leverage against one's unit, people, or community. Maintaining a clear control of OPSEC is difficult to measure unless you are actively capable of discerning what an opposing force knows about you and your plans. Traditional and cultural references includes spy novels, thrillers, and a news broadcast that's a little to revealing about what is really going on behind the curtain. A double edged sword for any society which claims to be free, OPSEC includes governments actively taking steps to compartmentalize information and restrict its spread across even its own population. We start by comparing OPSEC to the board game STRATEGO, which helps build the concept. However, in our world where terms like "5th Generation Warfare" regularly appear in political discourse, the idea of Operation Security runs the risk of inciting paranoia. Support the REDACTED Culture Cast at redactedculture.locals.comSSP and boutique products at redactedllc.comFollow us on Instagram at @redactedllc
Come along as we discuss Australia's most secret location! All of our wonderful links can be found here: https://linktr.ee/allts Pine Gap is a highly secretive and strategically important facility located near Alice Springs in the Northern Territory of Australia. Officially known as the Joint Defence Facility Pine Gap, it is operated by both the United States and Australia and primarily serves as a ground station for several satellite communication and intelligence-gathering activities. While much of the base's operations are classified, its publicly acknowledged functions include signals intelligence (SIGINT) collection, satellite tracking, and missile early warning. Here's an overview of Pine Gap and some conspiracy theories associated with it: Official Purpose: Pine Gap was established in 1966 and has been officially described as a satellite tracking station and a key part of the U.S. global intelligence network. Its primary functions include monitoring and tracking satellites, collecting signals intelligence, and providing support for U.S. military and intelligence activities worldwide. Conspiracy Theories: Alien and UFO Activity: Some conspiracy theories suggest that Pine Gap is involved in the study and reverse engineering of extraterrestrial technology or even contact with aliens. These claims often tie the base to UFO sightings and alleged government cover-ups. Weather Modification: There have been allegations that Pine Gap is involved in weather modification or control experiments. These claims usually link the facility to natural disasters or extreme weather events. Mind Control: Some conspiracy theorists believe that Pine Gap is involved in mind control experiments, including the development of technologies like HAARP (High-Frequency Active Auroral Research Program). They argue that the base has the capability to manipulate human thoughts and behaviors. Global Surveillance: Concerns about mass surveillance and data collection have led to speculation that Pine Gap plays a significant role in global surveillance programs. Edward Snowden's revelations about NSA activities have fueled these suspicions. Nuclear Weapons: Some theories suggest that Pine Gap is involved in the management and control of nuclear weapons, potentially as part of a broader global defense network. Security and Secrecy: Pine Gap is known for its extreme security measures and the presence of both Australian and American personnel. The secrecy surrounding its activities has contributed to the proliferation of conspiracy theories. Government Denials: Both the Australian and U.S. governments have consistently denied many of the conspiracy theories associated with Pine Gap. They maintain that the facility's functions are consistent with its official descriptions and that it operates within the bounds of international law. In summary, Pine Gap is a real and strategically important facility with confirmed intelligence-gathering functions. While conspiracy theories persist, they often lack substantial evidence and are strongly refuted by official sources. As with many secretive government installations, Pine Gap continues to be a subject of intrigue and speculation.
Tim served in the USAF and the NSA from 1975 to 1988 during some of the most tense periods of the Cold War. This included stints at the US Air Force Electronic Warfare Center at Kelly AFB, Texas, and RAF Chicksands, in the UK working on SIGINT collection of USSR/Warsaw Pact/Other targets. He also served as part of the Cryptologic Support Group, Strategic Air Command HQ, Offutt AFB, Nebraska providing SIGINT briefings to SAC leadership on worldwide events In 1983 he transferred to the NSA and later GCHQ, Cheltenham, Glos 1984-1988. We hear about how the first indications that something was amiss the morning Chernobyl reactor exploded in 1986, the day the cleaners answered the secure phone at SAC HQ, and how at GCHQ the US and British intelligence share information as part of the UKUSA Agreement. 0:00 Introduction and Tim's background in the US Air Force 5:12 Understanding electronic warfare and data gathering at Kelly Air Force Base 16:58 Posting at RAF Chicksands in Bedford, UK, and monitoring for changes in regular patterns 25:52 The Soviet invasion of Afghanistan and the Iranian hostage crisis 36:19 Able Archer alerts and other instances of signals intelligence at Strategic Air Command, Nebraska 44:16 Incident of the KAL007 Korean airliner and US Navy exercise incidents 57:08 Misinterpretation during a briefing on a recon flight of TU-95 bear bombers and gathering intel on the Soviet Union 1:01:18 Constant pressure to provide intel on Soviet leadership and missile alerts during Soviet drills 1:05:34 Transition from Air Force to NSA and role at the NSA 1:14:08 Tracking Chinese air defense and transition to GCHQ 1:22:08 U.S. stance during the Falkland conflict and witnessing the Chernobyl reactor explosion 1:30:59 Anecdote about NSA bureaucracy and language proficiency test 1:34:21 Closing and thanks to supporters Table of contents powered by PodcastAI✨ Extra episode info here https://coldwarconversations.com/episode310/ The fight to preserve Cold War history continues and via a simple monthly donation, you will give me the ammunition to continue to preserve Cold War history. You'll become part of our community, get ad-free episodes, and get a sought-after CWC coaster as a thank you and you'll bask in the warm glow of knowing you are helping to preserve Cold War history. Just go to https://coldwarconversations.com/donate/ If a monthly contribution is not your cup of tea, We also welcome one-off donations via the same link. Find the ideal gift for the Cold War enthusiast in your life! Just go to https://coldwarconversations.com/store/ Thanks to listener Phil Curme for introducing me to Tim. You can read his blog here walkingthebattlefields.com Follow us on Twitter https://twitter.com/ColdWarPod Facebook https://www.facebook.com/groups/coldwarpod/ Instagram https://www.instagram.com/coldwarconversations/ Youtube https://youtube.com/@ColdWarConversations Love history? Check out Into History at this link https://intohistory.com/coldwarpod Learn more about your ad choices. Visit megaphone.fm/adchoices
Kara, with a remarkable 18-year career, has dedicated herself to the pursuit of hunting criminals worldwide. Her expertise in intelligence began serving in the United States Air Force deploying to both Iraq and Afghanistan. This is where she honed her expertise in various fields, including SIGINT and AllSource Analysis. Kara honed her skills in open source and social media intelligence while actively pursuing human traffickers. @kara_the_huntress https://karasmithconsulting.com Watch on YouTube: https://bit.ly/3opNURn PATREON: patreon.com/brassandunity - - - - - - - - - - - - SUPPORT OUR SPONSORS H.V.M.N - 20% off with code BRASS20 - https://hvmn.com/pages/home Mindful Meds - 15% off with code BRASS - https://mindfulmeds.io Brass & Unity - 20% off with code UNITY - http://brassandunity.com Three Horses Hat Co - 15% off with code BRASS - https://threehorseshatco.com/ Combat Flip Flops - 25% off with code UNITY - https://combatflipflops.com - - - - - - - - - - - - - SHOP B&U Jewelry & Eyewear: https://brassandunity.com - - - - - - - - - - - - - Follow #brassandunity - - - - - - - - - - - - - CHARITY Honour House - https://www.honourhouse.ca Vet Solutions - https://vetsolutions.org Heroic Hearts - https://www.heroicheartsproject.org Warrior Angels Foundation - https://warriorangelsfoundation.org All Secure Foundation - http://allsecurefoundation.org Defenders of Freedom - http://defendersoffreedom.us The Boot Campaign - https://bootcampaign.org The Overwatch Foundation - http://overwatchfoundationusa.org
Kara, with a remarkable 18-year career, has dedicated herself to the pursuit of hunting criminals worldwide. Her expertise in intelligence began serving in the United States Air Force deploying to both Iraq and Afghanistan. This is where she honed her expertise in various fields, including SIGINT and AllSource Analysis. Kara honed her skills in open source and social media intelligence while actively pursuing human traffickers. @kara_the_huntress https://karasmithconsulting.com Watch on YouTube: https://bit.ly/3opNURn PATREON: patreon.com/brassandunity - - - - - - - - - - - - SUPPORT OUR SPONSORS H.V.M.N - 20% off with code BRASS20 - https://hvmn.com/pages/home Mindful Meds - 15% off with code BRASS - https://mindfulmeds.io Brass & Unity - 20% off with code UNITY - http://brassandunity.com Three Horses Hat Co - 15% off with code BRASS - https://threehorseshatco.com/ Combat Flip Flops - 25% off with code UNITY - https://combatflipflops.com - - - - - - - - - - - - - SHOP B&U Jewelry & Eyewear: https://brassandunity.com - - - - - - - - - - - - - Follow #brassandunity - - - - - - - - - - - - - CHARITY Honour House - https://www.honourhouse.ca Vet Solutions - https://vetsolutions.org Heroic Hearts - https://www.heroicheartsproject.org Warrior Angels Foundation - https://warriorangelsfoundation.org All Secure Foundation - http://allsecurefoundation.org Defenders of Freedom - http://defendersoffreedom.us The Boot Campaign - https://bootcampaign.org The Overwatch Foundation - http://overwatchfoundationusa.org
Chatting about the five eyes and some of their responsibilities and also a bit of history on SIGINT gathering methods. #usa #airforce #navy #army #sigint #marines #history #engineering #aviation #science #avgeeksSources https://www.newscientist.com/article/mg21729071-900-glow-planes-plasmas-take-the-drag-out-of-air-travel/ https://giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices https://www.l3harris.com/all-capabilities/signals-intelligence-sigint-systems https://macdonaldlaurier.ca/canada-evolve-five-eyes-report/ https://www.theguardian.com/world/2010/jun/24/intelligence-sharing-codebreakers-agreement-ukusa https://www.fiveeyesconnect.com/Please Support Strange Recon! Paypal - https://www.paypal.com/paypalme/strangerecon Google - strangerecon@gmail.com Patreon - https://www.patreon.com/strangerecon Buy Strange Recon merch! https://www.strangereconpodcast.com/
How have historical intelligence organisations evolved into the national security agencies we know today? Who were Australia's early intelligence professionals? And how has this rich history contributed to the formation of key signals intelligence agreements such as Five Eyes?In this episode of the National Security Podcast, Clare Birgin and Professor John Blaxland join Dr Will Stoltz to discuss their recently released book, Revealing Secrets: An unofficial history of Australian Signals intelligence & the advent of cyber.Clare Birgin is a former Australian diplomat and former Visiting Fellow at The Australian National UniversityJohn Blaxland is a Professor of International Security and Intelligence Studies at the ANU Strategic and Defence Studies CentreDr Will Stoltz is Expert Associate at the ANU National Security College and Senior Manager at CyberCXShow notes: Revealing Secrets: An unofficial history of Australian Signals intelligence & the advent of cyberANU National Security College academic programs: find out more We'd love to hear from you! Send in your questions, comments, and suggestions to NatSecPod@anu.edu.au. You can tweet us @NSC_ANU and be sure to subscribe so you don't miss out on future episodes. The National Security Podcast is available on Acast, Apple Podcasts, Spotify, and wherever you get your podcasts. Hosted on Acast. See acast.com/privacy for more information.
Episode 230. I'm joined by former Army and NSA SIGINT analyst "Madman Actual" to talk the outward degradation of America's military and the message that's sending the world. National security begins with the image we put forth. We also dive into SIGINT tasks, why you need to train in many domains, and the role civilians may play in the standing in the gap. Tactical Signals Exploitation: 5-6 August Get the Merch: Brushbeater Store The Guerilla's Guide to the Baofeng Radio is a #1 Bestseller! Knightsbridge Research discount code: SCOUT Nehemiah Strong discount code: SCOUT1 Radio Contra Sponsors: Civil Defense Manual Tactical Wisdom Blacksmith Publishing Radio Contra Patron Program Brushbeater Training Calendar Brushbeater Forum Palmetto State Armory Primary Arms
In the Army, there is a saying that Military Intelligence is an Oxymoron. And that could hold if we were to be satisfied with cynicism having the final say in how we move forward as a culture. If the intel world is messed up, than rightly it need to be fixed. But if that is not the case, were do we start looking to remedy this issue? Andrew's history in Military Intelligence serves as context for how he sees information turned into something useful, both for a command structure and for the individual looking to be an asset to their community. In this podcast we dive deeper into that perspective and how we as citizens can add value to those we care about. Support the REDACTED Culture Cast at redactedculture.locals.comSSP and boutique products at redactedllc.comFollow us on Instagram at @redactedllc
We've poked holes in the US system and talked about Russian intelligence declining, so today, let's look at what the US dominates: signal intelligence (SIGINT). Full Newsletter: https://mailchi.mp/zeihan/the-united-states-dominates-signal-intelligence
In this episode of the Radio Resistance Podcast, we're joined by U.S. Army Veteran Ed Grondin who shares his insights on the controversial withdrawal of U.S. troops from Afghanistan under President Biden, and the subsequent after-action reports that were referred to as political whitewashing by many.Ed provides a unique perspective on the decision to evacuate Afghanistan in 2021 and the efforts to shift blame to the Trump administration.You don't want to miss this candid discussion on the current state of affairs.Ed served in the U.S. Army between 1994 and 2015. During that time, he served in the 2nd Ranger Bn, 1st Special Forces group as well as a number of other army units. He started his career as an infantryman. During this time, he served as a machine gunner, sniper, scout, mortarman and many other positions.He transitioned from infantry to military intelligence and served as a signals intelligence (SIGINT) analyst. He served as a Special Operation Team Alpha or SOT-A and later served as an instructor.Although not having served, Ed was actively involved in the fight in Afghanistan as a SIGINT analyst.Support the show
The year 1915 was a significant year for the participants of the Great War, and a great many memorable events occurred. The Gallipoli Campaign commenced, along with the Raid on the Suez Canal, the Second Battle of Ypres began, the RMS Lusitania passenger ship was sent to the seabed by a German U-Boat, to name a few. A lot was happening. The Great War was heating up. These campaigns, events and battles are definitely areas of WWI that most military history enthusiasts have heard of, but have you heard of the Battle of Dogger Bank? You can find the Hardtack Community on all of our socials via our linktree. If you have any feedback on our episodes or suggestions for future episodes, please send us an email: hardtackpod@gmail.com Don't forget to rate us and subscribe! Make your Own Hardtack! Hardtack Recipe (Survival Bread) - Bread Dad Civil War Recipe: Hardtack (1861) – The American Table Sources: Germany's high sea fleet in the World War, written by Carl Friedrich Heinrich Reinhard Scheer (Admiral in the Imperial German Navy) https://archive.org/details/germanyshighseaf00sche The king's ships were at sea : the war in the North Sea, August 1914-February 1915 by Goldrick, James https://archive.org/details/kingsshipswereat0000gold/page/n5/mode/2up https://archive.org/details/navaloperations00newbgoog/page/n14/mode/2up (from page 82) Philbin, Tobias R., III (1982). Admiral von Hipper: The Inconvenient Hero. Amsterdam: B. R. Grüner Publishing Co. Battle of Dogger Bank: https://navymuseum.co.nz/explore/by-themes/world-war-one/battle-of-dogger-bank/ The Battle of Dogger Bank as then Lieutenant AD Boyle serving in HMS New Zealand recalled it: https://navymuseum.co.nz/explore/by-themes/world-war-one/battle-of-dogger-bank-lt-a-d-boyle/ SIGINT and Electronic Warfare (As it relates to Room 40) https://web.archive.org/web/20120805161935/http://www.nsa.gov/public_info/_files/cryptologic_spectrum/electronic_warfare.pdf https://www.iwm.org.uk/history/voices-of-the-first-world-war-war-at-sea https://www.westernfrontassociation.com/world-war-i-articles/the-battle-of-dogger-bank-january-1915/ --- Send in a voice message: https://anchor.fm/hardtackpod/message Support this podcast: https://anchor.fm/hardtackpod/support
Mike Jones AKA the H4unt3d hacker, is a security researcher who formerly hacked underGROUND groups. He served in the military for several years within SIGINT operations. Mike started the H4unt3d hacker podcast from scratch, wanting to give people a unique point of view about cybersecurity. He has built a global community of members from different walks of life, religions, backgrounds and disciplines.Mike transends into BarCode to discuss his origins, Hacktivism, SIGNIT, in the military, podcasting takeaways, Hackers For Vets, and Podcasting in the Metaverse.TIMESTAMPS0:02:43 - The origin of Mike Jones AKA the Haunted Hacker0:04:34 - How Aspergers Amplified his Life of Hacking0:06:07 - Signals Intelligence: How It All Began0:07:44 - Military intelligence to hacktivist0:10:21 - The Impact of Hacktivism on Civil Rights0:12:07 - Podcasting Success0:18:15 - The Future of the Haunted Hacker Podcast0:19:57 - The Benefits and Use Cases of Virtual Reality0:22:46 - The Benefits and Challenges of Creating Virtual Reality Videos0:24:12 - Cyber Beard Shaved Charity Raises $120,0000:28:04 - Hackers for Vets: A Mission to Help Military Veterans Transition to the Civilian World0:30:41 - The Dark Side and horror filmsSYMLINKSLinkedinTwitterthe H4unt3d Hacker podcastthe H4unt3d Hacker YouTubeHacker For VetsHorizon WorldsGhost Tours of Chattanooga SALEM'S LOTSAWESCAPE ROOMUnknown Caller | Chattanooga, TNThe Blue Light | Chattanooga, TNThe Church | Denver, COExcaliber | Chicago, ILSnow Crash by Neal StephensonDRINK INSTRUCTIONRED RUM2 oz Rum1 oz Grenadine2 1/2 oz Orange JuiceMix rum and grenadine in a cocktail shaker. Pour into a highball glass over crushed ice and orange juice. EPISODE SPONSORTuxCareCONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
A follow-up with guest, John Ramirez who reveals fascinating information that he uncovered over the years and some interesting perspectives. John Ramirez served from 1984 to 2009 in the CIA Directorate of Science and Technology, Directorate of Intelligence, and the ODNI National Counterproliferation Center (NCPC). At CIA he was an intelligence analyst and Chief, ELINT Analysis Branch specializing in ballistic missile defense, weapons systems radars, and technical collection operations. At the NCPC he was the SIGINT specialist and the multi-discipline collection requirements strategist. John is a US Navy veteran, 1973 to 1979, in the Electronics Warfare Technician field on board surface ships. John majored in political science and graduated in 1983 from the George Washington University, Washington, DC. John is a member of the Association of Former Intelligence Officers and the Central Intelligence Retirees Association.
This week, Alan, Quinta, and Scott flew solo to talk through some of the week's big national security news stories, including:“Jake, Mr. Sullivan if You're NSSty.” The Biden administration finally unveiled its long awaited (and overdue) National Security Strategy last week, through a high-profile event at Georgetown University featuring National Security Advisor Jake Sullivan. Does it hit the mark? Does it even matter? “Big Subpoena Energy.” The Jan. 6 committee confidently closed its last live session with a bang last week, in the form of a unanimous vote to subpoena former President Trump for his testimony. Trump responded with a 14-page rant a few days later that repeated many of his grievances over the 2020 election but did not address whether he would comply. Why did the committee take this step? Is there any way to compel Trump to cooperate? Will it need to?“Is it SIGINT or SIJINT?” The Biden administration has issued a new Executive Order limiting its collection of signals intelligence, as part of an effort to come to agreement with the European Union's legal system and its stringent privacy protections. Will these new arrangements be invalidated by European courts like their two predecessors? Or could they finally be up to snuff?For object lessons, Alan recommended the impressive (if highly depressing) new European sci-fi film "Vesper." Quinta seconded Carlos Lozada's takedown of one of the Senate's most milquetoast members. And Scott celebrated the 90th birthday of a real legal legend and all around phenomenal human, Judge Guido Calabresi. Hosted on Acast. See acast.com/privacy for more information.
Chrome extensions steal browser data. A business email compromise attack is under investigation in Kentucky. Belarusian Cyber Partisans claim to have a complete Belarusian passport database. Organizing a cyber militia. CISA releases twelve ICS security advisories. Our guest is Asaf Kochan of Sentra on overemphasizing “the big one.” Carole Theriault cautions against getting ahead of yourself in the cryptocurrency supply chain. Cosplaying" hardware. And Canada welcomes a new SIGINT boss. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/168 Selected reading. Chrome extensions with 1.4 million installs steal browsing data (BleepingComputer) Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users (McAfee Blog) Police investigate electronic theft of federal funds (City of Lexington) FBI, Secret Service join Kentucky investigation into $4 million cybercrime theft (The Record by Recorded Future) Russian hackers blamed for ongoing Montenegro cyberattack (Tech Monitor) “For the 1st time in human history a #hacktivist collective obtained passport info of the ALL country's citizens.” (Cyber Partisans) Inside the IT Army of Ukraine, ‘A Hub for Digital Resistance' (The Record by Recorded Future) Ukraine takes down cybercrime group hitting crypto fraud victims (BleepingComputer) Hitachi Energy FACTS Control Platform (FCP) Product (CISA) Hitachi Energy Gateway Station (GWS) Product (CISA) Hitachi Energy MSM Product (CISA). Hitachi Energy RTU500 series (CISA) Fuji Electric D300win (CISA) Honeywell ControlEdge (CISA) Honeywell Experion LX (CISA) Honeywell Trend Controls Inter-Controller Protocol (CISA) Omron CX-Programmer (CISA) PTC Kepware KEPServerEX (CISA) Sensormatic Electronics iSTAR (CISA) Mitsubishi Electric GT SoftGOT2000 (CISA) Walmart Sells Fake 30TB Hard Drive That's Actually Two Small SD Cards in a Trench Coat (Vice)
Disclaimer: No company sponsored this video. In fact, we have no sponsors. We are funded 100% by you, the viewer. All of the equipment and materials used in this video were purchased by us with our own personal funds. As such, we have no financial incentive to recommend certain brands or products, and none of the companies mentioned in this video were given prior notice that we would be featuring their products. We are happy to help companies develop better products, but we must maintain neutrality in order to ensure the longevity of this content. Specific gear comes and goes, but doctrine lasts a lifetime. We take this unique approach to encourage a more educational perspective, rather than getting caught up in the tiny details of gear that sometimes overwhelms the tactical community and warfare doctrine in general. This content is purely educational and does not advocate for violating any laws. Do not violate any laws or regulations. This is not legal advice. Consult with your attorney. If you would like to support us, we're on Patreon! https://www.patreon.com/user?u=30479515 And if you don't like Patreon, we're also on Utreon! https://utreon.com/c/S2Underground/ Our Reading List! https://www.goodreads.com/user/show/133747963-s2-actual The War Kitchen Channel! https://www.youtube.com/channel/UCYmtpjXT22tAWGIlg_xDDPA
WWI saw a dramatic evolution in the technical collection of intelligence. From the start, SIGINT – the interception of communication signals – played a major role in the war. As the war went on, it was clear that secure communications could mean the difference between victory or defeat. This led to the rise of code interceptors, code makers and code breakers. When the US Army arrived on the battlefields of France, it had to quickly find ways to encrypt its communications. One solution was to use Native American languages to transmit information. Today, many are familiar with the Navajo Code Talkers of WWII, but few know that Native Americans served as Code Talkers in WWI. To discuss the WWI Code Talkers, the WWI History Podcast hosted Dr. William C. Meadows, Professor of Sociology and Anthropology at Missouri State University and author of The First Code Talkers: Native American Communicators in World War I.
The ongoing demand for gun confiscations, body armor bans, and night vision limits now includes calls for... handheld radio controls! Isaac dissects a recent Slate article lamenting the ability of far-right extremists to use handheld radios to communicate after they have been de-platformed from Twitter. Original Article: Far-Right Extremists Are Using Personal Radios to Plan Violence To be honest, this only barely scratches the surface of all the preposterous assumptions the article is built on, but hey, it's a start. We specifically ignored the technical errors with this journalism like all the pre-existing SIGINT capabilities that exist, the fact that all spectrum around DC is monitored and recorded by a host of three-letter agencies, the wide proliferation of SDRs, and more - just because that would be an endless list of infinite rabbit trails. Keep in touch with us here: https://trex-arms.com/newsletter/