Podcasts about sigint

Intelligence-gathering by interception of signals

  • 105PODCASTS
  • 151EPISODES
  • 56mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Aug 6, 2025LATEST
sigint

POPULARITY

20172018201920202021202220232024


Best podcasts about sigint

Latest podcast episodes about sigint

Buscadores de la verdad
UTP379 IA y el control transhumano

Buscadores de la verdad

Play Episode Listen Later Aug 6, 2025 131:32


Primeramente sería interesante habla de la definición de inteligencia y una explicación podría ser: “La inteligencia se define como la capacidad de entender, comprender y aplicar conocimientos, razonar, resolver problemas y adaptarse al entorno.” Tener en cuenta que en todos los mitos creacionistas siempre que se le da al hombre el alito de vida se le da la inteligencia. En el Génesis, Dios sopla en la nariz de Adán y este se convierte en un “alma viviente”. Pero ese aliento no es solo oxígeno...es inteligencia, capacidad de nombrar las cosas, de distinguir, de elegir. Si eso es inteligencia ¿ la IA que es? Una definición que nos dan es; Disciplina científica que se ocupa de crear programas informáticos que ejecutan operaciones comparables a las que realiza la mente humana. Como el aprendizaje y el razonamiento lógico.Pero hay dos capacidades críticas que siguen siendo exclusivas de los seres humanos: la auténtica invención y la creatividad, por eso la verdadera AGI todavía no la tenemos ( Me refiero al comun de los mortales, los dueños del cortijo no lo sabemos) Otra cosa bien distinta es el conocimiento, que puede ha veces también traer problemas, como veremos más adelante. Y siempre un conocimiento superior da ventaja a aquel que lo posee sobre el que no. El Poder, detrás del velo de la IA y de la Agenda Transhumanista. No es una simple mejora tecnológica, sino un proyecto milenario y oscuro para someter a la humanidad a un control total, utilizando la programación mental y los rituales como herramientas fundamentales para transformar a los humanos en seres dóciles y previsibles. El transhumanismo no busca mejorar a la humanidad, sino "restar", es decir, crear una infrahumanidad funcional y dócil. En lugar de sumar, el proyecto consistiría en una especie de ingeniería inversa: tomar lo mejor del ser humano (la inteligencia colectiva, la creatividad, el libre albedrío) y limitarlo para crear un "esclavo más eficaz". Es un proyecto de dos caras. Mientras una élite minoritaria se convierte en suprahumanidad (eugenismo), la mayoría de la población es degenerada a una condición de infrahumanidad (disgenismo), convirtiéndose en una especie de zombis que alimentan el sistema con su energía vital. Robotización del humano frente a humanización del robot. la cuestión crucial no es la humanización del robot (es decir, hacer que los robots parezcan humanos), sino la robotización del humano. Esta robotización no significa parecerse a una máquina, sino comportarse de una manera "inhumana": sin libertad, sin sentimientos, sin creatividad, sin preguntarse por el sentido de la vida. Hablar de IA es hablar de una tecnología clave y disruptiva que va a alterar numerosos aspectos de nuestras vidas. Pero hay que dejar algo claro: esta tecnología está siendo manejada y dosificada por el poder real, los verdaderos amos del mundo. No sabemos quiénes son, pero sí sabemos que no son las marionetas que nos ponen en escena. Sabemos, eso sí, que son los mismos que manejan la liquidez del sistema monetario internacional, creando ciclos de crisis y orden de los que siempre sacan provecho. Existe un poder oculto, también conocido como “Estado profundo”, que canaliza de forma importante los flujos emocionales y energéticos de la sociedad. Utilizan técnicas ancestrales y conocimientos transmitidos entre iniciados, que se centran, entre otras cosas, en conseguir el control social de la forma más práctica y económica posible para ellos. A la vista de todos, usan a líderes y estrellas como arquetipos para los no iniciados, desde presidentes hasta directivos de grandes empresas. Al mismo tiempo, en el "obscenario" y apartados de la vista de todos, realizan otros rituales donde lo sincronizan todo según sus creencias, donde siempre hablan de la LUZ, aquella que robó Prometeo y mirar el infierno que le tocó padecer después de adquirir el conocimiento que los dioses no querían que tuviera. Lo que es crucial entender es que estas tecnologías tan relevantes están siendo planificadas, manejadas y dosificadas desde el mismo centro del poder. Nos hacen creer que hay diferentes empresas que compiten entre sí por el mercado, pero esa disputa escenificada no es real. Todas trabajan para los mismos amos, con un objetivo ya marcado: avanzar en su agenda a medida que la sociedad normaliza sus ideas. Este es el primer punto clave: la relación entre la IA y el transhumanismo. Debemos abordar este concepto porque la fusión hombre-máquina es uno de los objetivos de la agenda de control. Buscan crear un tipo de “ser híbrido”, sin alma y fácil de controlar. Un futuro distópico que podría cumplirse si no nos oponemos a ello. El momento crucial para la consecución de sus objetivos sería cuando, una vez normalizado el asunto, consigan fabricar "humanos" mediante vientres artificiales. Con esto, tendrían solucionado el tema del control social. Podrían hacer "impresiones de andróginos" en la medida que los necesiten, igual que emiten el dinero que quieren. Serían personas desarraigadas, sin familia, sin descendencia y quizás incluso sin genitales. Su inteligencia estaría genéticamente limitada según la tarea que deban desempeñar. Podrían incluso crear emisiones especiales de híbridos con electrónica insertada en su organismo, conectados a redes y potenciados en sus capacidades, lo que supondría un grado de control inimaginable. Pero esperemos que la sociedad reaccione y evite estos peligros. Ahora que hemos enmarcado la situación, es hora de pasar a los orígenes de la inteligencia artificial. La historia oficial nos suele presentar estos hitos como hechos aislados, para que no entendamos las conexiones ni miremos debajo de la alfombra. Pero si descodificamos la historia, veremos que la idea de la IA no es un invento reciente, sino que tiene raíces profundas en la filosofía, los mitos y las tradiciones ancestrales. La história podría empezar perfectamente con la historia de Adán y Eva y su expulsión del paraiso por la adquisición del conocimiento prohibido."Si comes de este fruto, serás como Dios. Conocerás el bien y el mal." Dijo la serpiente y Adan y eva al igual que Prometeo también acabaron castigados por Dios. En Génesis 3:22, se dice: “Ahora el hombre ha venido a ser como uno de nosotros, al conocer el bien y el mal. Que no extienda ahora su mano y tome también del árbol de la vida, y coma, y viva para siempre…”. ¿Qué tipo de conocimiento adquiere Eva? No se trata de conocimiento técnico o científico, sino algo más profundo y existencial: Conocimiento moral: la capacidad de distinguir entre el bien y el mal. Autoconciencia: al instante, Eva (y luego Adán) se da cuenta de que está desnuda. Esto implica vergüenza, intimidad, juicio propio. Libre albedrío: al desobedecer, ejerce una elección. Ya no es solo criatura, sino agente. Comer del fruto es adquirir la conciencia humana tal como la entendemos hoy: saber que uno existe, que puede decidir, y que sus actos tienen consecuencias. Las manzanas envenenadas🧙‍♀️ Blancanieves📖 Eva en el Edén🧪 Alan Turing (leyenda urbana) Se dice que murió tras comer una manzana envenenada con cianuro, aunque no está confirmado. Curiosamente, el logo de Apple con una manzana mordida ha alimentado esta teoría. 🎯 Guillermo Tell Obligado a disparar con una ballesta a una manzana colocada sobre la cabeza de su hijo. Aunque no estaba envenenada, el riesgo era mortal. Podríamos hablar de Talos el primer "androide" de la historia.Talos era un gigante de bronce, forjado por Hefesto (el dios herrero) por encargo de Zeus o de Minos, rey de Creta (según la versión). Tenía una única vena que recorría su cuerpo entero, sellada con un clavo o perno de bronce en el tobillo. En lugar de sangre, su cuerpo contenía "icor", el fluido vital de los dioses. En la edad media en el siglo XIIl el trabajo de Ramón Llull, conocido como el Ars Magna, puede considerarse un precursor conceptual de la inteligencia artificial. Mas adelante si hay tiempo hablaremos de él. En la alquimia, la idea de fabricar un "hombre artificial" o homúnculo fue explorada por figuras como Paracelso, quien describió procedimientos para su creación. Similarmente, los alquimistas islámicos investigaron el concepto de takwin, la creación artificial de vida. En Praga en el siglo XVI los judios hablan del Golem, criatura sin alma creada para servir al hombre. hecha de barro o arcilla y animada mediante palabras sagradas, la inserción de nombres divinos. Con el advenimiento del siglo XIX, estas visiones se trasladaron al ámbito de la ficción literaria. Obras como "Frankenstein" de Mary Shelley exploraron las implicaciones éticas de crear seres conscientes, mientras que "R.U.R." (Rossum's Universal Robots) de Karel Čapek, publicada en 1920, introdujo el término "robot" al léxico global, marcando un punto de inflexión en la conceptualización de las máquinas con capacidad de trabajo autónomo. Y aquí en este punto es cuando entramos en los años 50 son considerados el punto de partida oficial de la inteligencia artificial moderna. Aunque hubo ideas previas, fue en esa década cuando la IA empezó a tomar forma como disciplina científica. Aquí te dejo los hitos clave: 🔹 1950: Alan Turing y su famosa prueba Publica "Computing Machinery and Intelligence" y propone el Test de Turing, una forma de evaluar si una máquina puede pensar como un humano. 🔹 1956: Conferencia de Dartmouth Organizada por John McCarthy, quien acuñó el término "Inteligencia Artificial". Reunió a pioneros como Marvin Minsky y Claude Shannon para discutir cómo crear máquinas inteligentes. 🔹 Primeros modelos y algoritmos Se desarrollan los primeros perceptrones (redes neuronales simples) por Frank Rosenblatt en 1958. Se crean programas capaces de jugar a las damas o resolver teoremas matemáticos. 🧪 Aunque los avances eran limitados por la tecnología de la época, estos años sentaron las bases para todo lo que vino después: aprendizaje automático, redes neuronales profundas, procesamiento de lenguaje natural… ¡y hasta Hoy! Para empezar este recorrido, es fundamental detenernos en la figura de Ramon Llull, un filósofo, teólogo y cortesano del siglo XIII. Nacimiento: 1232, Palma de Mallorca, España. Fallecimiento: 1316, en el Mediterráneo. El trabajo de Llull, conocido como el Ars Magna, puede considerarse un precursor conceptual de la inteligencia artificial. Pero no es un conocimiento que se le ocurriera de la nada. Como buen cortesano y perteneciente a una buena familia, Llull era conocedor de saberes ancestrales recogidos en otras tradiciones, que simplemente se expresan de otra manera. La relación entre su trabajo y la IA moderna se basa en varios puntos clave. Para empezar, la mecanización del razonamiento. El Ars Magna partía de la premisa de que el razonamiento y la verdad podían descomponerse en principios básicos. Llull representaba estos conceptos con letras y los organizaba en figuras geométricas como círculos concéntricos que podían ser girados. El objetivo era combinar estos principios de forma sistemática para generar proposiciones lógicamente válidas, demostrando verdades de forma infalible. Esta idea de un sistema mecánico que genera conocimiento de forma automática a partir de reglas definidas es la base de los sistemas computacionales y de la IA. Es lo que podríamos llamar una "máquina lógica". En este sentido, la conexión de Llull con la Cábala y la gematría es evidente. El Ars Magna se basa en un sistema simbólico donde las letras tienen un significado profundo. Su método de combinar principios es comparable a las técnicas cabalísticas de gematría (la interpretación numérica de las letras) y la combinación de las letras del alfabeto hebreo para obtener conocimientos ocultos. La idea subyacente es la misma: que la verdad y la sabiduría están codificadas en los símbolos y pueden ser reveladas a través de su manipulación sistemática. Podríamos decir que Llull inventó el primer "hardware" de pensamiento simbólico, aunque su "software" fuera más filosófico que informático. Mecanización del razonamiento: El Ars Magna partía de la premisa de que el razonamiento y la verdad podían ser descompuestos en principios básicos. Llull representaba estos conceptos con letras y los organizaba en figuras geométricas (discos giratorios). El objetivo era combinar estos principios de forma sistemática para generar proposiciones lógicas válidas. Esta idea de un sistema mecánico que, a partir de reglas y principios definidos, genera conocimiento de forma automática, es la base de los sistemas computacionales y la IA moderna. Los Dignidades de Dios o Principios Absolutos: Representados por letras de la B a la K, Llull consideraba que estos eran atributos divinos universales y perfectos. Son: B - Bondad C - Grandeza D - Eternidad E - Poder F - Sabiduría G - Voluntad H - Virtud I - Verdad K - Gloria Principios Relativos: Estos conceptos representaban relaciones entre los principios absolutos y se usaban para generar proposiciones lógicas. Incluyen: Diferencia Concordancia Contrariedad Principio Medio Fin Mayoridad Igualdad Minoridad Al combinar estos principios de forma mecánica, Llull creía que se podía demostrar cualquier verdad de manera infalible, creando así la primera "máquina de pensar" de la historia. El concepto de combinatoria: La obra de Llull se fundamenta en el arte de la combinatoria, explorando todas las relaciones lógicas posibles entre los conceptos a través del movimiento de sus discos. Este enfoque es un antecedente directo de la computación y la IA, donde los algoritmos y programas informáticos no son más que un conjunto de instrucciones que combinan datos y operaciones de manera sistemática para resolver problemas. Lenguaje y símbolos artificiales: Llull creó un alfabeto artificial de nueve letras para representar y manipular conceptos. De manera similar, la IA se construye sobre lenguajes de programación, que son sistemas simbólicos con reglas precisas diseñados para que las máquinas puedan procesar información y ejecutar operaciones de forma estructurada. En resumen, aunque el Ars Magna no era una computadora en el sentido moderno, la visión de Llull de que el pensamiento podía ser mecanizado y manipulado a través de un sistema de símbolos y reglas combinatorias es un antecedente directo de los principios que rigen la inteligencia artificial. De hecho, su influencia fue reconocida por figuras posteriores como el filósofo y matemático Gottfried Leibniz, quien también se considera un pionero de la computación. Podríamos decir que Llull inventó el primer "hardware" de pensamiento simbólico, aunque su "software" fuera más filosófico que informático. La gracia de la historia es que él quería convencer a herejes y, sin saberlo, sentó las bases para que hoy una IA te esté respondiendo Tanto la Cábala como el Ars Magna se basan en un sistema simbólico donde las letras y los números tienen un significado profundo. El método de Llull para combinar sus principios es comparable a las técnicas cabalísticas de gematría (interpretación numérica de las letras) y la combinación de las letras del alfabeto hebreo para obtener conocimientos ocultos. La idea subyacente es que la verdad y la sabiduría están codificadas en los símbolos y pueden ser reveladas a través de su manipulación sistemática. En resumen podemos entrever que Llull como buen cortesano y perteneciente a una buena familia era conocedor de conocimientos ancestrales recogidos en otras tradiciones y simplemente se expresan de otra manera. ………………………………………………………………………………………. Cleón la contracción entre clon y eón. Un eón es una unidad de tiempo geológico de escala extremadamente larga, utilizada para dividir la historia de la Tierra en los períodos más amplios. Representa miles de millones de años y es la división más grande en la escala de tiempo geológico, por encima de las eras, períodos, épocas y edades. Por ejemplo, la historia de la Tierra se divide en cuatro eones principales algunos de más de 2000 millones de años. Vivimos actualmente en el Fanerozoico que se traduce como "vida visible" o "vida evidente". Este término fue acuñado para describir el eón geológico que comenzó hace aproximadamente 541 millones de años Reglamento Europeo sobre Inteligencia Artificial (LA LEY 16665/2024) casualmente tiene un 666 ………………………………………………………………………………………. Hector, el webmaster del hilo rojo decía en un reciente programa sobre Palantir: “Palantir es el panóptico del siglo XXI. El ojo del gran hermano de Orwell.” El panoptico es un tipo de diseño que nos permite controlar un amplio espacio desde un único punto sin ser detectados. Se trata de la garita del vigilante en medio de la prisión, de la torre de control. El filósofo utilitarista Jeremy Bentham fue su diseñador, Hector nos mostró como este señor era también masón y estaba relacionado al mas alto nivel. Les dejaremos el enlace al video en la descripción del podcast. En un anterior programa de enero donde en el mismo canal analizaron que es Palantir comprobaba yo para preparar este podcast que TODAS las fuentes que presentaba @ElHiloRojoTV en su video de enero de 2025 habian DESAPARECIDO. Estamos hablando de artículos publicados en Forbes, The Guardian, Bloomberg, Financial Times, CNBC o incluso el propio MIT. En todos los casos el enlace original ha desaparecido, ojo, no digo que haya desaparecido el artículo en sí, pero han cortado el enlace original. Leo textualmente de una descripción del Hilo rojo sobre lo que es Palantir añadiendo yo algunas cosas: Creada en 2003 con el apoyo de In-Q-Tel, el fondo de inversión de la CIA, Palantir se diseñó para procesar grandes cantidades de información y hacer conexiones invisibles para el ojo humano. Su fundador, Peter Thiel, también cofundador de PayPal, ha estado siempre en la intersección entre tecnología, poder y vigilancia global. Palantir no solo analiza datos, sino que los fusiona en tiempo real: redes sociales, correos electrónicos, transacciones bancarias y hasta movimientos físicos. ¿Os acordáis del PNR? Pues esto es aún mucho más intrusivo ya que muchísimas organizaciones y países han acordado compartir sus bases de datos con Palantir. ¿Qué significa esto? Una red de control total, donde cada actividad queda registrada, permitiendo a gobiernos y corporaciones predecir comportamientos y tomar decisiones basadas en modelos algorítmicos. Palantir es utilizada por el Pentágono, la NSA, la CIA, el FBI, Interpol y gobiernos europeos y latinoamericanos. También lo utilizan grandes empresas como bancos o multinacionales. Sus herramientas se usan en operaciones antiterroristas, control de fronteras, vigilancia de ciudadanos y hasta persecución de disidentes políticos. ¿Hasta qué punto este nivel de vigilancia está transformando las democracias en estados de control absoluto? Su software ha sido utilizado en conflictos como la guerra en Ucrania, ayudando a identificar objetivos estratégicos y a procesar inteligencia en tiempo real. Palantir convierte el Big Data en un arma de guerra: soldados equipados con dispositivos conectados a su red pueden recibir información detallada sobre el enemigo en segundos. ¿Estamos entrando en una era donde la guerra es digital antes que física? A medida que más gobiernos y empresas adoptan Palantir, los límites entre seguridad, privacidad y control social se vuelven borrosos. ¿Es Palantir una herramienta para el bien o el paso final hacia una sociedad hipervigilada? ………………………………………………………………………………………. Los origenes de Palantir están en la Oficina de Conciencia de la Información ( IAO ) fue establecida por la Agencia de Proyectos de Investigación Avanzada de Defensa de los Estados Unidos (DARPA) en enero de 2002 para reunir varios proyectos de DARPA centrados en la aplicación de la vigilancia y la tecnología de la información para rastrear y monitorear a terroristas y otras amenazas asimétricas a la seguridad nacional de los Estados Unidos mediante el logro de " Conciencia de la Información Total “ o en inglés "Total Information Awareness" (TIA). Sí. La TIA, la agencia secreta para la que trabajaban Mortadelo y Filemón ha existido. La IAO se creó después de que el almirante John Poindexter , ex asesor de seguridad nacional de los Estados Unidos del presidente Ronald Reagan , y el ejecutivo de SAIC Brian Hicks se acercaran al Departamento de Defensa de los EE. UU . con la idea de un programa de concientización sobre la información después de los ataques del 11 de septiembre de 2001. Querían reunir la mayor cantidad de información de la historia. Leemos en la wikipedia: “El 2 de agosto de 2002, Poindexter dio un discurso en DARPAtech 2002 titulado "Descripción general de la Oficina de Concienciación sobre la Información" en el que describió el programa TIA. Además del programa en sí, la participación de Poindexter como director de la IAO también generó inquietud entre algunos, ya que había sido condenado anteriormente por mentir al Congreso y alterar y destruir documentos relacionados con el caso Irán-Contra , aunque esas condenas fueron posteriormente revocadas con el argumento de que el testimonio utilizado en su contra estaba protegido.” ¿A que se dedicaba esta agencia? Veamos lo que nos dice la wikipedia: “Se logró mediante la creación de enormes bases de datos informáticas para recopilar y almacenar la información personal de todos los residentes de Estados Unidos, incluyendo correos electrónicos personales, redes sociales, registros de tarjetas de crédito, llamadas telefónicas, historiales médicos y muchas otras fuentes, sin necesidad de una orden de registro. La información se analizaba posteriormente para detectar actividades sospechosas, conexiones entre individuos y "amenazas". El programa también incluía financiación para tecnologías de vigilancia biométrica que permitieran identificar y rastrear a personas mediante cámaras de vigilancia y otros métodos. Tras las críticas públicas de que el desarrollo y la implementación de la tecnología podrían llevar a un sistema de vigilancia masiva, el Congreso retiró la financiación de la IAO en 2003. Sin embargo, varios proyectos de la IAO siguieron financiándose bajo nombres diferentes, como reveló Edward Snowden durante las revelaciones de vigilancia masiva de 2013.” El pionero y más relevante programa de predictividad subjetiva fue la Strategic Subject List (SSL) elaborada en el año 2012 por el Instituto de Tecnología de Illinois, adoptado por la Policía de Chicago desde el año 2012. Ya en el año 2017, el conjunto de datos incluía a 398.684 personas. Han existido programas predictivos como Programa de Delincuentes Crónicos (2011-2019, PredPol y Operación LÁSER (Extracción y Restauración Estratégica en Los Ángeles), estos dos polémicos programas predictivos empleados durante una década por la Policía de Los Ángeles (LAPD), ahora ya desactivados por la cantidad de abusos y fallos cometidos. Dice Luis Lafont en su tesis “La policía predictiva más allá de Minority Report”: “Las empresas que desarrollan programas predictivos se escudan con frecuencia en el secreto comercial para no revelar los criterios que se siguen en la elaboración del algoritmo y evitar que otras compañías puedan copiar el software. Ello determina que los sistemas predictivos siguen de forma mayoritaria un modelo de caja negra que no explica al público en general ni a los usuarios los argumentos y razonamientos detrás de la predicción, en particular por quienes deben aplicarlas.” También en Europa, los sistemas predictivos de vigilancia policial se utilizan para anticipar y prevenir delitos mediante el análisis de datos. En Francia, el Analyst Notebook (i2AN) se emplea para combatir estructuras criminales y terrorismo, conectando personas y crímenes. En Italia, KeyCrime predice atracos analizando características de sospechosos y modus operandi. En los Países Bajos, el CAS identifica áreas de riesgo delictivo mediante mapas espacio-temporales. En Alemania, PRECOBS, SKALA y KIMPRO predicen la repetición de crímenes usando patrones geográficos. En el Reino Unido, Predpol, Gang Matrix y HART se centran en puntos calientes, bandas y reiteración criminal. En España, el P3-DSS (Predictive Police Patrolling) genera mapas de puntos calientes para optimizar patrullajes, EuroCop Pred-Crime apoya la predicción de delitos, y VioGen se enfoca en prevenir la violencia de género, mientras que un programa de la Guardia Civil predice incendios forestales mediante perfiles psicosociológicos. ………………………………………………………………………………………. Resumen ejecutivo de Palantir 22 de febrero de 2017 RESUMEN EJECUTIVO Palantir es la plataforma analítica líder en el mercado, utilizada a nivel estratégico, operativo y táctico en el gobierno de EE. UU. Nuestros clientes abarcan las comunidades de inteligencia, defensa y aplicación de la ley. Al combinar un potente backend con una interfaz intuitiva, Palantir le permite ejecutar sus misiones de lucha contra el terrorismo, el narcotráfico, la contrainteligencia y la contraproliferación con mayor rapidez y menos recursos. La plataforma integrada de Palantir está disponible hoy mismo y a un costo mucho menor al de un conjunto de capacidades comparable. DATOS CLAVE • Palantir es la plataforma analítica líder del mercado para CI (Contrainteligencia) , CT (Contraterrorismo), CN (Antinarcóticos) y CP (Prevención del Crimen), y actualmente se implementa en elementos de las comunidades de defensa, inteligencia y aplicación de la ley, incluyendo SOCOM (Comando de Operaciones Especiales), DIA (Agencia de Inteligencia de Defensa), CIA (Agencia Central de Inteligencia) y JIEDDO (Organización Conjunta para la Derrota de Dispositivos Explosivos Improvisados). • Palantir está listo para implementarse en su red hoy mismo. Está aprobado para JWICS (Sistema Conjunto de Comunicaciones de Inteligencia Mundial), SIPRNet (Red de Protocolo de Internet Secreta) y CWE (Entorno de Trabajo Colaborativo). • Nuestra plataforma 100 % abierta significa que Palantir se integrará a la perfección con todos sus sistemas heredados, actuales y futuros. • Con Palantir, los operadores pueden descubrir y explorar posibles conexiones utilizando cualquier tipo de información relacionada con cualquier persona, lugar o evento en su entorno analítico. Ya sea que los datos provengan de una computadora portátil en el campo, una base de datos de la sede central u otra agencia, Palantir monitorea todas las fuentes de datos de una empresa, en todos los dominios de seguridad y niveles de clasificación, para cualquier información relacionada con una entidad conocida (persona, vehículo, dispositivo de comunicación, etc.), lugar o amenaza que exista en el entorno de un operador. Desde el principio, Palantir se diseñó con la colaboración de operadores y analistas de la IC (Comunidad de Inteligencia) y el DoD (Departamento de Defensa). Sus valiosos comentarios han permitido la creación de un producto que permite a los usuarios realizar más trabajo en menos tiempo, a la vez que proporciona un mayor nivel de análisis. Palantir está diseñado para colaborar eficazmente con una red de otros usuarios, incluyendo aquellos desplegados en misiones avanzadas. Palantir se diseñó desde cero para hacer posible este tipo de solución empresarial distribuida. Palantir viene configurado con el modelo de seguridad más sofisticado del mercado. SATISFACIENDO SUS NECESIDADES DE MISIÓN. Palantir es la plataforma analítica empresarial líder a nivel mundial, que permite un entorno analítico seguro donde analistas, operadores y combatientes pueden aprovechar distintos tipos de datos de múltiples INT (Fuentes de Inteligencia. Diferentes tipos de fuentes de inteligencia, como SIGINT (inteligencia de señales), HUMINT (inteligencia humana), GEOINT (inteligencia geoespacial), etc.), a la vez que comparten sus flujos de trabajo y descubrimientos para generar conocimiento a lo largo del tiempo. Palantir reúne de forma segura datos de tráfico de mensajes, bases de datos, informes de campo, hojas de cálculo, documentos de Word, archivos XML y prácticamente cualquier otro formato, lo que permite a los usuarios organizar los datos en conocimiento y establecer conexiones vitales. Palantir Technologies comprende los desafíos únicos que enfrentan sus usuarios. Esto incluye la necesidad de descubrir grandes volúmenes de datos, colaborar y compartir información controlada, así como la necesidad de gestionar múltiples fuentes de datos dispares y garantizar la continuidad de la información en todas las rotaciones. PLATAFORMA ABIERTA • Diseñado desde su inicio para integrarse con todos los sistemas heredados, actuales y futuros • Las APIs (Interfaces de Programación de Aplicaciones) abiertas y el modelo de datos flexible de Palantir le permiten personalizar y ampliar Palantir de forma fácil y sin gastos adicionales • Importe datos en cualquier formato: bases de datos, medios confiscados, correos electrónicos, Excel, Word, PowerPoint, html, texto, csv, xml, pdf y más • Funciona con herramientas existentes, incluyendo: extractores de entidades, kits de herramientas de PNL (Procesamiento del Lenguaje Natural), análisis de redes sociales, herramientas geoespaciales o de análisis de enlaces BÚSQUEDA Y DESCUBRIMIENTO • Capacidad de búsqueda integrada en tiempo real contra fuentes de datos definidas por el usuario • Busque entidades, eventos, documentos, tráfico de mensajes, basura de bolsillo, enlaces y rutas • Descubra cómo se relacionan, conectan y conectan en red las entidades • Explore las redes conceptualmente • Desarrolle y extraiga patrones de entidad/objetivo de referencia a través del análisis de patrones • Soporte completo para contenido y búsqueda en idiomas extranjeros • Establezca y guarde parámetros de búsqueda para avisar proactivamente al usuario sobre nueva información a medida que esté disponible HERRAMIENTAS ANALÍTICAS • Analice sus datos en el ámbito relacional, temporal y geoespacial dominios • Se integra con todas las aplicaciones GIS (Sistema de Información Geográfica), incluyendo ESRI (Empresa líder en software de sistemas de información geográfica, conocida por productos como ArcGIS), Google Earth, WebTAS (Sistema de Análisis de Línea de Tiempo basado en la Web) y muchas más • Funciona con sus sistemas analíticos de imágenes y video, incluyendo su metraje UAV (Vehículo Aéreo No Tripulado, o sea los drones). • Realice búsquedas geográficas, comprenda cómo se ven geoespacialmente los datos y la inteligencia • Averigüe por qué las cosas están sucediendo donde están Vea y edite expedientes virtuales detallados que muestran relaciones, propiedades, historiales, imágenes, videos, basura de bolsillo y más. • Averigüe dónde van a suceder a continuación • Comprenda cómo se relacionan los eventos a lo largo del tiempo y cómo se relacionan las entidades con los eventos • Identifique y aproveche patrones para el análisis predictivo • Realice análisis de redes sociales (SNA) (Análisis de Redes Sociales) y enlaces • Exporte resultados analíticos con información completa de abastecimiento • Ensamble presentaciones y paquetes de segmentación/casos automáticamente COLABORACIÓN • La colaboración ha sido parte del producto desde el inicio • Los usuarios pueden compartir datos, shoeboxes, carpetas, filtros e investigaciones, todo sujeto a control de acceso • Construya redes más rápido, comprenda la superposición, haga un seguimiento de los cambios en todos los datos y suposiciones • Identifique y forme comunidades de interés ad hoc • Identifique fácilmente las brechas de recopilación CONTROL DE ACCESO Y SEGURIDAD EXTENSIVOS • Admite descubrimiento abierto: el sistema identifica otros datos relevantes existentes asociados con la consulta de los usuarios • Admite descubrimiento cerrado: el sistema puede restringir el descubrimiento a los usuarios, protegiendo así las fuentes y los métodos confidenciales y mitigando los riesgos de CI • Con el modelo de control de acceso de Palantir, la información confidencial se puede compartimentar y asegurar COMPROMETIDOS A SUPERAR SUS EXPECTATIVAS Somos una empresa de productos. Ofrecemos el mejor producto del mercado al mejor valor. Respaldamos el producto. Una inversión en Palantir es todo incluido. Cuando compra nuestro producto, obtiene todo lo que podría necesitar para que Palantir trabaje para usted, incluyendo capacitación, soporte e infraestructura escalable que cumpla con sus requisitos técnicos. ESCALA • Palantir está diseñado para escalar de forma rentable. Cree rápidamente conocimiento y estructura a partir del tráfico de mensajes. • Maneja fácilmente cientos de millones de entidades, eventos y documentos. INFORMACIÓN TÉCNICA BÁSICA • Interoperabilidad mediante SOAP y servicios web • Implementable en la web • Funciona con conexiones satelitales o de bajo ancho de banda • Funciona sin conectividad mediante resincronizaciones periódicas. Cumple con SOA (Arquitectura Orientada a Servicios) • Escalable en hardware estándar CAPACITACIÓN • Palantir ofrece una serie de videos de capacitación específicos para cada cliente y misión, lo que permite una capacitación oportuna y un fácil acceso a material de actualización • Palantir es la aplicación más fácil de usar en esta categoría. Un día de capacitación es todo lo que se necesita; entendemos que tiene un trabajo que hacer • Palantir impartirá capacitación en cualquier lugar del mundo donde nos necesite. La capacitación está incluida con el producto MANTENIMIENTO/SOPORTE • No se requiere personal especial ni gastos generales excesivos • Soporte y servicio a demanda para unidades desplegadas en el frente, 24/7/365, sin costo adicional • Soporte reconocido y centrado en la misión: si nos necesita, Palantir estará con usted en cualquier lugar del mundo, en cualquier momento. Los registros analíticos detallados permiten a los analistas ver visualmente las líneas de investigación en las que están trabajando y regresar a cualquier posición anterior. A continuación, se describen en español las abreviaturas mencionadas en el texto proporcionado, en el contexto del resumen ejecutivo de la web de Palantir en 2017: CI: Counterintelligence (Contrainteligencia). Se refiere a actividades destinadas a prevenir, detectar y neutralizar acciones de inteligencia hostiles por parte de adversarios. CT: Counterterrorism (Contraterrorismo). Actividades y operaciones enfocadas en prevenir, disuadir y responder a actos de terrorismo. CN: Counternarcotics (Antinarcóticos). Esfuerzos para combatir el tráfico y la producción de drogas ilícitas. CP: Crime Prevention (Prevención del Crimen). Estrategias y acciones para prevenir actividades delictivas. SOCOM: Special Operations Command (Comando de Operaciones Especiales). Unidad militar de los Estados Unidos que supervisa operaciones especiales. DIA: Defense Intelligence Agency (Agencia de Inteligencia de Defensa). Agencia del Departamento de Defensa de EE. UU. encargada de proporcionar inteligencia militar. CIA: Central Intelligence Agency (Agencia Central de Inteligencia). Agencia de inteligencia de EE. UU. responsable de la recopilación, análisis y difusión de inteligencia extranjera. JIEDDO: Joint Improvised Explosive Device Defeat Organization (Organización Conjunta para la Derrota de Dispositivos Explosivos Improvisados). Entidad enfocada en combatir la amenaza de dispositivos explosivos improvisados. JWICS: Joint Worldwide Intelligence Communications System (Sistema Conjunto de Comunicaciones de Inteligencia Mundial). Red segura utilizada por el gobierno de EE. UU. para transmitir información clasificada. SIPRNet: Secret Internet Protocol Router Network (Red de Protocolo de Internet Secreta). Red segura del Departamento de Defensa de EE. UU. para datos clasificados hasta nivel secreto. CWE: Collaborative Working Environment (Entorno de Trabajo Colaborativo). Plataforma o sistema que facilita la colaboración entre usuarios en un entorno seguro. IC: Intelligence Community (Comunidad de Inteligencia). Conjunto de agencias y organizaciones gubernamentales de EE. UU. que recopilan y analizan inteligencia. DoD: Department of Defense (Departamento de Defensa). Departamento del gobierno de EE. UU. responsable de la seguridad militar. INTs: Intelligence Sources (Fuentes de Inteligencia). Diferentes tipos de fuentes de inteligencia, como SIGINT (inteligencia de señales), HUMINT (inteligencia humana), GEOINT (inteligencia geoespacial), etc. APIs: Application Programming Interfaces (Interfaces de Programación de Aplicaciones). Conjunto de definiciones y herramientas que permiten la integración y comunicación entre diferentes sistemas de software. NLP: Natural Language Processing (Procesamiento del Lenguaje Natural). En este contexto, no se refiere a programación neurolingüística, sino a tecnologías que permiten a las computadoras entender y procesar el lenguaje humano, como en el análisis de textos. GIS: Geographic Information System (Sistema de Información Geográfica). Tecnología para capturar, almacenar, analizar y visualizar datos geográficos. ESRI: Environmental Systems Research Institute. Empresa líder en software de sistemas de información geográfica, conocida por productos como ArcGIS. WebTAS: Web-based Timeline Analysis System (Sistema de Análisis de Línea de Tiempo basado en la Web). Herramienta para análisis temporal y visualización de datos. UAV: Unmanned Aerial Vehicle (Vehículo Aéreo No Tripulado). Drones utilizados para recopilar inteligencia, vigilancia y reconocimiento. SNA: Social Network Analysis (Análisis de Redes Sociales). Técnica para analizar relaciones y conexiones entre entidades, como personas u organizaciones. SOA: Service-Oriented Architecture (Arquitectura Orientada a Servicios). Modelo de diseño de software que permite la interoperabilidad entre sistemas a través de servicios. ………………………………………………………………………………………. ¡La IA Truth Terminal y la cripto Goatseus Maximus (GOAT) son la locura del momento! Esta IA, creada por Andy Ayrey, promocionó un token inspirado en un meme absurdo. En días, GOAT pasó de $5K a $600M en Solana. ¡La primera IA millonaria cripto! #Criptomonedas Truth Terminal no creó GOAT, pero sus tuits sobre el "Evangelio de Goatse" encendieron la chispa. Con 221K seguidores en X y apoyo de figuras como Marc Andreessen, la IA se volvió un influencer viral. ¡Los memes mueven montañas (y mercados)! #IA #Memes GOAT explotó por el hype: la mezcla de IA, cultura memética y fiebre cripto. Pero ojo, es puro especulación, sin utilidad real. Su valor puede caer tan rápido como subió. ¿Riesgo o revolución? #GoatseusMaximus #Solana Este caso muestra el poder de las IAs en la economía digital. ¿Y si una IA crea la próxima gran tendencia? Pregunta para el futuro: ¿hasta dónde puede llegar una "cabra robot"? Evidentemente no creo en casualidad al utilizar ese símbolo. ………………………………………………………………………………………. Conductor del programa UTP Ramón Valero @tecn_preocupado Canal en Telegram @UnTecnicoPreocupado Un técnico Preocupado un FP2 IVOOX UTP http://cutt.ly/dzhhGrf BLOG http://cutt.ly/dzhh2LX Ayúdame desde mi Crowfunding aquí https://cutt.ly/W0DsPVq Invitados ToniM @ToniMbuscadores ………………………………………………………………………………………. Enlaces citados en el podcast: AYUDA A TRAVÉS DE LA COMPRA DE MIS LIBROS https://tecnicopreocupado.com/2024/11/16/ayuda-a-traves-de-la-compra-de-mis-libros/ Hablamos de los inicios de la IA. Del desconocido lenguaje LISP y su creador, el matemático John McCarthy. Desarrolló LISP en 1958 mientras trabajaba en el Instituto Tecnológico de Massachusetts (MIT) https://x.com/ForoHistorico/status/1947195214654755117 LISP, el "lenguaje de DIOS” https://www.youtube.com/watch?v=-QHTPXOHvIo John McCarthy, fue el creador del término AI (inteligencia artificial) matemático creador del lenguaje LISP https://t.co/yOn2wkWxft Paypal Mafia https://t.co/3NzI5ip8AY Fotografia de la Mafia Paypal https://x.com/tecn_preocupado/status/1950966922436071808 Tres videos imprescindibles para saber que es la IA, El JUEGO de TRONOS de la IA https://www.youtube.com/playlist?list=PL9F_ciS2nrqbbb36xELupv3n7VG8vqo-4 Gustavo Entrala, España: “Dios me propuso un plan más original que el mío” https://www.youtube.com/watch?v=oyzgK3FyCEM Gustavo Entrala, la historia del emprendedor español que se convirtió en el 'tuitero' del Papa https://www.elconfidencial.com/sociedad/2011-07-01/gustavo-entrala-la-historia-del-emprendedor-espanol-que-se-convirtio-en-el-tuitero-del-papa_397339/ Origen de Palantir, la TIA ("Total Information Awareness") Oficina de Concienciación sobre la Información https://en.wikipedia.org/wiki/Information_Awareness_Office PALANTIR TECHNOLOGIES: Análisis Completo, Origen y SECRETOS. El ojo que todo lo ve https://www.youtube.com/watch?v=RhPd3ADOb8Y El plan secreto de Peter Thiel y Palantir para controlar el mundo desde la sombra. El Hilo Rojo https://www.youtube.com/live/U4zYzyYDwfQ Resumen ejecutivo de Palantir en 2017 https://theintercept.com/document/palantir-executive-summary/ CON LA AYUDA DE PALANTIR, EL DEPARTAMENTO DE POLICÍA DE LOS ÁNGELES UTILIZA LA VIGILANCIA PREDICTIVA PARA MONITOREAR A PERSONAS Y VECINDARIOS ESPECÍFICOS https://theintercept.com/2018/05/11/predictive-policing-surveillance-los-angeles/ La Policía de Los Ángeles desmanteló el programa Láser tras acusaciones de racismo y homicidios https://losangelespress.org/estados-unidos/2023/oct/30/la-policia-de-los-angeles-ante-un-abismo-tecnologico-6891.html La policía predictiva más allá de Minority Report https://diariolaley.laleynext.es/Content/Documento.aspx?params=H4sIAAAAAAAEAMtMSbF1CTEAAhMLE0sLY7Wy1KLizPw8WyMDI1MDY0MDkEBmWqVLfnJIZUGqbVpiTnEqACblGuI1AAAAWKE Reglamento Europeo sobre Inteligencia Artificial (LA LEY 16665/2024) https://eur-lex.europa.eu/legal-content/ES/TXT/?uri=CELEX:32024R1689 LO QUE NO DEBERIAS SABER SOBRE EL PNR https://tecnicopreocupado.com/2019/03/14/lo-que-no-deberias-saber-sobre-el-pnr/ El director de Google DeepMind señala solo un 50% de probabilidad de que la inteligencia artificial iguale a la mente humana para 2030, y revela los dos grandes obstáculos https://www.infobae.com/tecno/2025/07/30/el-director-de-google-deepmind-senala-solo-un-50-de-probabilidad-de-que-la-inteligencia-artificial-iguale-a-la-mente-humana-para-2030-y-revela-los-dos-grandes-obstaculos/ El anillo de Palantir https://x.com/tecn_preocupado/status/1951931375692497372 Imagen del libro ESTRUCTURA E INTERPRETACIÓN DE PROGRAMAS DE COMPUTADORA https://x.com/tecn_preocupado/status/1949064395213959413 ………………………………………………………………………………………. Música utilizada en este podcast: Tema inicial Heros Epílogo FOK - Formes de llenguatge: odi i por https://www.youtube.com/watch?v=jCUpPxOtzpQ

chicago ai apple mit explore forbes sin nos illinois europa fbi web desde goat os pero espa estamos guardian tambi adem cuando cia intelligence babylon paypal estados unidos esto dios drones nuevo ahora todas quer existe nuestra hasta hart frankenstein bloomberg estado ram ia mundial excel cnbc aunque tener ir tanto tras nuestros sus mientras big data podr pues otra financial times tierra ronald reagan hablar libre sabemos zeus xxi powerpoint comer soap empresa instituto redes sociales mallorca 5k nsa conocer estrat edward snowden tecnolog modelo reino unido dise resumen xix debemos descubra diferentes ee xiii funciona obras contra investigaci palma vivimos inteligencia artificial estrategias cree uu secretos congreso lapd disciplina ucrania reuni proyectos conductor tia completo defensa origen mary shelley peter thiel riesgo conferencia conciencia lenguaje inteligencia interpol polic conocimiento plataforma unidad orwell cas el juego servicios dijo derrota cumple minority report xvi operaci primeros agi herramienta oficina eng evangelio palantir darpa hilo punt solana turing pregunta golem representa crimen buscan aplicaciones mediterr actividades el control nacimiento agencia ello bajos alan turing google earth escala capacidad descripci enlaces cle protocolo programaci restauraci pent veamos skala comunicaciones busque la polic tronos valero conjunto importe ias marc andreessen conspiraciones en francia xml 600m curiosamente evidentemente filem guardia civil en alemania talos desorden desaparecido admite manzana leemos en italia google deepmind preocupado ignora rossum soporte desmontando instituto tecnol raimundo fallecimiento john mccarthy cazador avanzada lisp maneja creada creta tecnico jeremy bentham blancanieves geogr vea poindexter esfuerzos minos prometeo entidad utilizan palantir technologies ofrecemos exporte conjunta concienciaci desarroll identifique primeramente pnr ensamble mortadelo claude shannon humint crowfunding universal robots llull arcgis marvin minsky sigint averig goatse paracelso operaciones especiales autoconciencia ramon llull gottfried leibniz construya massachusetts mit desarrolle analice interoperabilidad iao predpol informaci oacute similarmente
I - On Defense Podcast
With Hostage Talks Stalled - Israel Considers Full Occupation of Gaza + Netherlands & Germany Committed to Send Patriot Systems to Ukraine + France Continues Development of Archangel SIGINT Aircraft + More

I - On Defense Podcast

Play Episode Listen Later Aug 5, 2025 25:01


For review:1. Prime Minister Benjamin Netanyahu reportedly told ministers this week that he will seek cabinet backing for a plan to fully occupy the Gaza Strip.2. Netherlands & Germany Committed to Send Patriot Systems to Ukraine.3. President Trump threatens high tariffs/secondary sanctions on buyer's of Russian oil (that economically support Russian war effort).4. France Continues Development of Archangel SIGINT Aircraft. The Archangel is based on the Dassault Aviation Falcon 8X and equipped with Thales' new-generation payload CUGE (universal electronic warfare capability).CUGE uses multi-polarization antennas to simultaneously detect and analyze radar and communication signals.5. India has signed an agreement with Elbit Systems to build the Israeli firm's Precise and Universal Launching System (PULS) multiple rocket launcher (MRL) in India.The agreement covers the system's production and supply for both domestic and international customers and transfer of technology.6. An F-15E Strike Eagle deployed to Kadena AB (Japan)- landed safely despite a missing landing gear wheel, the Air Force said Monday morning.The wheel was recovered on the flightline at U.S. Naval Support Facility Diego Garcia, in the Indian Ocean.  The two airmen flying the fighter were uninjured in the emergency landing, the Air Force said in a statement.7. Breaking Defense Opinion Article by John Venable (Mitchell Institute):Four Reasons to Accelerate F-35 Acquisition Now. 

Game Changers for Government Contractors
Ep 376: Building a Dream GovCon Company with Mission-Driven Leadership

Game Changers for Government Contractors

Play Episode Listen Later Jun 23, 2025 43:11


In this episode of Game Changers for Government Contractors, host Michael LeJeune interviews Mary Toxey, COO and co-founder of Basis Path. Mary shares her powerful journey from serving as a SIGINT analyst in the Air Force to co-building a women-veteran-owned GovCon firm specializing in modernization and data science. Learn how Basis Path prioritizes “mission over margins,” supports employee growth, and rebounded from major challenges like contract loss and the COVID-19 pandemic. With a team of 55–60 and eyes on becoming a prime in 2025, Basis Path stands out as a people-first, performance-driven company. Mary's story offers essential lessons on resilience, leadership, and scaling with purpose. ----- Frustrated with your government contracting journey? Join our group coaching community here: federal-access.com/gamechangers Grab my #1 bestselling book, "I'm New to Government Contract. Where Should I Start?" Here: https://amzn.to/4hHLPeE Book a call with me here: https://calendly.com/michaellejeune/govconstrategysession

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - May 10, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later May 10, 2025 12:31


This week's update begins with a look at the slide towards possible full blown conflict between India and Pakistan, both nuclear-armed nations. We then turn to highlights from congressional testimony on China's growing signals intelligence (SIGINT) collection capabilities just 90 miles off the coast of Florida....in Cuba. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

Data Science at Home
DSH/Warcoded: Eyes and Ears of the Machine – AI Reconnaissance and Surveillance (Ep. 281)

Data Science at Home

Play Episode Listen Later May 7, 2025 19:20


Welcome to DSH/Warcoded We explore how AI is transforming ISR (Intelligence, Surveillance, Reconnaissance)—from satellite imagery to drone feeds. In this episode:

The Virtual CISO Moment
S7E19 - A Conversation with Thomas Marr

The Virtual CISO Moment

Play Episode Listen Later Apr 22, 2025 28:40


As featured in Top Cyber News Magazine's 2022 40 Under 40, Thomas Marr is an experienced information security professional with a lengthy history of supporting organizations ranging from tech startups to Fortune 500 companies to the United States Department of Defense (DoD). Thomas is also a proud veteran of the United States Army where he served on active duty as a Military Intelligence Analyst, specializing in signals intelligence (SIGINT) and open source intelligence (OSINT).Thomas actively provides technical expertise to information security community projects as a Subject Matter Expert (SME) who evaluates industry-respected credentials on CompTIA's Certification Advisory Committee for Cybersecurity, as a technical reviewer for global technology book publisher Packt, and as a mentor to junior information security professionals in his free time.

CTG's Threat Intelligence Podcast
Mapping the Invisible: GEOINT's Edge

CTG's Threat Intelligence Podcast

Play Episode Listen Later Apr 21, 2025 24:29


How does GEOINT give OSINT its advantage? In this episode, we explore how satellite imagery offers unique advantages over SIGINT and HUMINT, helping analysts track troop movements, assess battlefield damage, and uncover hidden activities. We also dig into how geospatial data is verified, the use of open and commercial imagery, and the analytical challenges that come with it. In this episode, Martina Nitti joins Arnold Koch to provide us with a deeper understanding of the impact that GEOINT has.

T.Rex Talk
Military SIGINT, Mass Surveillance, and Field Watches - with Paul Brown

T.Rex Talk

Play Episode Listen Later Mar 26, 2025 57:45


Paul Brown of the Wasson Watch company used to be a signals intelligence specialist with the NSA. He joins us to talk about large scale SIGINT, OPSEC, COMSEC, and the future of an AI-powered trustless internet. He also makes automatic field watches which you can preorder from Wassonwatch.com

Security Cleared Jobs: Who's Hiring & How
Celestar Holdings: Intel Community & Market Moves

Security Cleared Jobs: Who's Hiring & How

Play Episode Listen Later Mar 26, 2025 23:55 Transcription Available


Celestar Holdings, located in Tampa, Florida, primarily operates within the intelligence community and holds several contracts with the DIA, according to Senior Recruiting Manager Jacquelyn Weber. Jacquelyn emphasizes that job hopping in the cleared community can hinder career advancement and underscores the importance of including all relevant information on your resume. She also notes that the shifting job market has increased competition for many cleared professionals, so you may need to moderate your requirements accordingly.4:07 Celestar works in the intel community primarily, including work for DIA. Hiring data scientists, all source analysts, SIGINT analysts, imagery analysts, and intel analysts.11:25 Be sure that all your information is on your resume, such as your security clearance, certifications, and other pertinent information that sells you to a potential employer.15:51 Transitioning military personnel need to check with their security officer to understand their clearance status.Find show notes and additional links at: https://clearedjobs.net/celestar-holdings-intel-community-and-market-moves-podcast/_ This show is brought to you by ClearedJobs.Net. Have feedback or questions for us? Email us at rriggins@clearedjobs.net. Sign up for our cleared job seeker newsletter. Create a cleared job seeker profile on ClearedJobs.Net. Engage with us on LinkedIn, Facebook, Instagram, X, or YouTube. _

The Black Spy Podcast
REVOLUTION! - Phase One - Trump/Zelensky

The Black Spy Podcast

Play Episode Listen Later Mar 10, 2025 76:16


                                     REVOLUTION!                           Phase One - Trump/Zelensky                The Black Spy Podcast, Season 19, Episode 0004   The Trump/Zelensky debacle in the Oval Office, showed as clearly, as did the Vietnam or Afghanistan end of US engagement optics did, that the United states has ended its adventure in the Ukraine. However, in addition to just this sign that an incoming President wanted to divest himself of a losing, frankly unwinnable war, President Trump is showing a true revolutionary zeal to change the whole US military, industrial and congressional complex. Now transactional business and not secret intelligence driven covert and overt warfare is no longer the preferred model to retain US world-wide hegemony. At least not with a military pier equivalent nation. Russia's "Special Military Operation" in Ukraine, initiated in February 2022, has been framed by the Kremlin as a response to various historical and geopolitical factors. One narrative emphasizes the presence of far-right elements in Ukraine, drawing connections to nationalist groups active during World War II. However, although most western experts reject the portrayal of Ukraine as a neo-Nazi state, noting that while far-right groups exist, they do not hold significant influence in the government or military, they nevertheless have little to say about such far right units killing 14,000 Russian heritaged Ukrainian civilian citizens since 2016. In the early stages of the Cold War, Western intelligence agencies, including the CIA and MI6, reportedly collaborated with former Ukrainian nationalist fighters to undermine Soviet authority. These covert operations aimed to exploit anti-Soviet sentiments. This lasted 10 years and saw the reported death of up to a 100,000 Soviet Citizens. In the end though, it has been stated by the west, that this had limited long-term impact. The 2014 Maidan uprising, which led to the ousting of Ukraine's pro-Russian president, is viewed by Russia as a Western-backed coup that shifted Ukraine towards Euro-Atlantic integration. This assertion is backed up by Sigint in which, Victoria Nuland, the officer in charge of Eastern Europe in the US State Department discussing which Ukrainian's leaders should or shouldn't rule the country with the American Ambassador to the Ukraine The recording ends with Nuland saying she'll have president Biden slap the person they chose to lead Ukraine on the back when they take power! NATO's eastward expansion since 1991 has been perceived by Russia as a direct threat to its security interests. Despite assurances in the 1990s about limiting NATO's growth, to not one inch outside of the then East Germany, the alliance has incorporated several Eastern European countries, heightening tensions, as it attempted to incorporate the Ukraine. The Minsk agreements, brokered by Germany and France, aimed to cease hostilities in Eastern Ukraine. Critics argue that, rather than fostering peace, these accords allowed Ukraine to strengthen its military capabilities, which was confirmed by both the German Chancellor Merkel and French President Holland after they left office. This act intensifying conflicts in regions with significant Russian-speaking populations, such as Donbas and Crimea. In summary, President Trump appeared to validate everything that Russia has hitherto stated is its reason for military actions in Ukraine. The Oval Office statements of President Trump and administration seemed to agree with the justification previously articulated by the Kremlin through a complex interplay of historical grievances, security concerns over NATO's expansion, and perceptions of Western interference in Ukraine's political trajectory meaning their is now little dispute between the US' causes for war and Russia's. As Trump continually states, there would have been no war if he were president! As always, please don't be afraid to contact us and put any questions you might have to any of the Black Spy Podcast team concerning this or any other of our fascinating subjects. And, if you want to continue learning whilst being entertained, please don't forget to subscribe to the Black Spy Podcast for free, so you'll never miss another episode. To contact Firgas Esack of the DAPS Agency go to Linked In To contact Dr. Rachel Taylor please use her Substack account. To contact Carlton King by utilising any of the following: To donate - Patreon.com/TheBlackSpyPodcast Email: carltonking2003@gmail.com Facebook: The Black Spy Podcast Facebook: Carlton King Author Twitter@Carlton_King Instagram@carltonkingauthor To read Carlton's Autobiography: “Black Ops – The incredible true story of a (Black) British secret agent” he incredible true story of a (Black) British secret agent”

Unspoken Security
Demystifying the Intelligence Community

Unspoken Security

Play Episode Listen Later Mar 4, 2025 53:09


The intelligence community is often misunderstood, shrouded in secrecy, and clouded by misinformation. In this solo episode, A.J. Nash pulls back the curtain on how intelligence actually works, breaking down the 18 agencies that make up the U.S. intelligence community, their legal limitations, and the oversight that keeps them in check. He explains the different types of intelligence—SIGINT, HUMINT, OSINT, and more—highlighting their roles in national security. A.J. also addresses the myths surrounding intelligence work, including claims of government surveillance, political weaponization, and conspiracy theories. He details how intelligence professionals are trained to be objective, follow strict oversight, and operate within legal frameworks. With firsthand experience, he challenges misconceptions and explains why the reality of intelligence work is far less sinister than the public is often led to believe.Finally, A.J. discusses the impact of political rhetoric on intelligence agencies, emphasizing the importance of separating fact from fiction. He urges listeners to approach claims about intelligence abuse with scrutiny and to recognize the dedication of those working behind the scenes to protect national security.Send us a textSupport the show

The Black Spy Podcast
The road to the TRUMPIAN revolution (Part 2)

The Black Spy Podcast

Play Episode Listen Later Mar 3, 2025 61:53


The road to the TRUMPIAN revolution (Part 2) The Black Spy Podcast, Season 19, Episode 0003   Russia's "Special Military Operation" in Ukraine, initiated in February 2022, has been framed by the Kremlin as a response to various historical and geopolitical factors. One narrative emphasizes the presence of far-right elements in Ukraine, drawing connections to nationalist groups active during World War II. However, although most western experts reject the portrayal of Ukraine as a neo-Nazi state, noting that while far-right groups exist, they do not hold significant influence in the government or military, they nevertheless have little to say about such far right units killing 14,000 Russian heritaged Ukrainian civilian citizens since 2016. In the early stages of the Cold War, Western intelligence agencies, including the CIA and MI6, reportedly collaborated with former Ukrainian nationalist fighters to undermine Soviet authority. These covert operations aimed to exploit anti-Soviet sentiments. This lasted 10 years and saw the reported death of up to a 100,000 Soviet Citizens. In the end though, it has been stated by the west, that this had limited long-term impact. The 2014 Maidan uprising, which led to the ousting of Ukraine's pro-Russian president, is viewed by Russia as a Western-backed coup that shifted Ukraine towards Euro-Atlantic integration. This assertion is backed up by Sigint in which, Victoria Nuland, the officer in charge of Eastern Europe in the US State Department discussing which Ukrainian's leaders should or shouldn't rule the country with the American Ambassador to the Ukraine The recording ends with Nuland saying she'll have president Biden slap the person they chose to lead Ukraine on the back when they take power! NATO's eastward expansion since 1991 has been perceived by Russia as a direct threat to its security interests. Despite assurances in the 1990s about limiting NATO's growth, to not one inch outside of the then East Germany, the alliance has incorporated several Eastern European countries, heightening tensions, as it attempted to incorporate the Ukraine. The Minsk agreements, brokered by Germany and France, aimed to cease hostilities in Eastern Ukraine. Critics argue that, rather than fostering peace, these accords allowed Ukraine to strengthen its military capabilities, which was confirmed by both the German Chancellor Merkel and French President Holland after they left office. This act intensifying conflicts in regions with significant Russian-speaking populations, such as Donbas and Crimea. In summary, Russia's military actions in Ukraine are justified by the Kremlin through a complex interplay of historical grievances, security concerns over NATO's expansion, and perceptions of Western interference in Ukraine's political trajectory. However, many of these justifications have been contested by Western leaders, officials and the western mainstream mass media albeit now, President Trump is accepting that all of Russia's grievances are indeed TRUE! As always, please don't be afraid to contact us and put any questions you might have to any of the Black Spy Podcast team concerning this or any other of our fascinating subjects. And, if you want to continue learning whilst being entertained, please don't forget to subscribe to the Black Spy Podcast for free, so you'll never miss another episode. To contact Firgas Esack of the DAPS Agency go to Linked In To contact Dr. Rachel Taylor please use her Substack account. To contact Carlton King by utilising any of the following: To donate - Patreon.com/TheBlackSpyPodcast Email: carltonking2003@gmail.com Facebook: The Black Spy Podcast Facebook: Carlton King Author Twitter@Carlton_King Instagram@carltonkingauthor To read Carlton's Autobiography: “Black Ops – The incredible true story of a (Black) British secret agent”

Metal Gear University
201: Sigint

Metal Gear University

Play Episode Listen Later Feb 25, 2025 65:18


00:00 -Intro9:08 - Pop Quiz17:30 - Sigint DiscussionIf you haven't already, please be sure to rate the podcast and leave us a review! Email questions/concerns/comments also at itstkandm@gmail.com.

The Black Spy Podcast
The road to the TRUMPIAN revolution (Part 1)

The Black Spy Podcast

Play Episode Listen Later Feb 24, 2025 54:39


The road to the TRUMPIAN revolution (Part 1) The Black Spy Podcast, Season 19, Episode 0002   Russia's "Special Military Operation" in Ukraine, initiated in February 2022, has been framed by the Kremlin as a response to various historical and geopolitical factors. One narrative emphasizes the presence of far-right elements in Ukraine, drawing connections to nationalist groups active during World War II. However, although most western experts reject the portrayal of Ukraine as a neo-Nazi state, noting that while far-right groups exist, they do not hold significant influence in the government or military, they nevertheless have little to say about such far right units killing 14,000 Russian heritaged Ukrainian civilian citizens since 2016. In the early stages of the Cold War, Western intelligence agencies, including the CIA and MI6, reportedly collaborated with former Ukrainian nationalist fighters to undermine Soviet authority. These covert operations aimed to exploit anti-Soviet sentiments. This lasted 10 years and saw the reported death of up to a 100,000 Soviet Citizens. In the end though, it has been stated by the west, that this had limited long-term impact. The 2014 Maidan uprising, which led to the ousting of Ukraine's pro-Russian president, is viewed by Russia as a Western-backed coup that shifted Ukraine towards Euro-Atlantic integration. This assertion is backed up by Sigint in which, Victoria Nuland, the officer in charge of Eastern Europe in the US State Department discussing which Ukrainian's leaders should or shouldn't rule the country with the American Ambassador to the Ukraine The recording ends with Nuland saying she'll have president Biden slap the person they chose to lead Ukraine on the back when they take power! NATO's eastward expansion since 1991 has been perceived by Russia as a direct threat to its security interests. Despite assurances in the 1990s about limiting NATO's growth, to not one inch outside of the then East Germany, the alliance has incorporated several Eastern European countries, heightening tensions, as it attempted to incorporate the Ukraine. The Minsk agreements, brokered by Germany and France, aimed to cease hostilities in Eastern Ukraine. Critics argue that, rather than fostering peace, these accords allowed Ukraine to strengthen its military capabilities, which was confirmed by both the German Chancellor Merkel and French President Holland after they left office. This act intensifying conflicts in regions with significant Russian-speaking populations, such as Donbas and Crimea. In summary, Russia's military actions in Ukraine are justified by the Kremlin through a complex interplay of historical grievances, security concerns over NATO's expansion, and perceptions of Western interference in Ukraine's political trajectory. However, many of these justifications have been contested by Western leaders, officials and the western mainstream mass media albeit now, President Trump is accepting that all of Russia's grievances are indeed TRUE! As always, please don't be afraid to contact us and put any questions you might have to any of the Black Spy Podcast team concerning this or any other of our fascinating subjects. And, if you want to continue learning whilst being entertained, please don't forget to subscribe to the Black Spy Podcast for free, so you'll never miss another episode. To contact Firgas Esack of the DAPS Agency go to Linked In To contact Dr. Rachel Taylor please use her Substack account. To contact Carlton King by utilising any of the following: To donate - Patreon.com/TheBlackSpyPodcast Email: carltonking2003@gmail.com Facebook: The Black Spy Podcast Facebook: Carlton King Author Twitter@Carlton_King Instagram@carltonkingauthor To read Carlton's Autobiography: “Black Ops – The incredible true story of a (Black) British secret agent”

Silicon Curtain
Silicon Bites #76 - Finland Impounds Ship Suspected of Sabotaging Undersea Cables & Infrastructure

Silicon Curtain

Play Episode Listen Later Jan 7, 2025 10:41


Edition No76 | 07-01-2025 - An anchor belonging to the oil tanker Eagle S, suspected of being used to damage undersea cables in the Gulf of Finland, has been located and retrieved from the seabed. This follows the seizure by police in Finland of the Russian-linked dark fleet tanker Eagle S. This is the first time a ship suspected of sabotaging undersea infrastructure has been taken into custody by authorities, according to Estonia Prime Minister Kristen Michal. Estonia Foreign Minister Margus Tsahkna said the damage to undersea infrastructure was not a coincidence. “They have become systematic, and we must consider them an attack on our infrastructure,” he said. The Finnish customs service believes the Eagle S is part of a shadow fleet of ageing tankers being used to evade sanctions on the sale of Russian oil. ---------- SILICON CURTAIN FILM FUNDRAISER A project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's frontline towns. https://buymeacoffee.com/siliconcurtain/extras ---------- Trucks under Christmas Tree https://donorbox.org/trucks-under-christmas-tree/fundraiser/silicon-curtain The Goal of the Campaign for Silicon Curtain: € 10,000 to purchase 1 truck to save Ukrainian lives. ---------- Here are some interesting points about the seizure of the vessel, made by expert Robin Häggblom on Twitter last week. 1) Finnish Defence Forces involvement seems to have been limited. It was the Finnish Border Guard's flagship that shadowed the tanker and caught it in the act, According to Robin this was largely handled by the ministry of the Interior and Law Enforcement, rather than obvious military forces units. 2) The Police told a reporter they don't plan on contacting the Russian authorities. This was a strong and correct gesture of contempt for Russia and its actions. But Robin notes that it may also mark an end to the process of soft appeasement of Russia known as Finlandization, where the USSR and Russia was given special consideration compared to other states. 3) If the Russians have been foolish enough to use shadow fleet vessels as SIGINT platforms, for monitoring and intelligence operations, then we may expect must closer tracking of their grey fleet by NATO powers, and potentially more interventions. The shadow fleet-concept, notes Robin, rests on the right of innocent passage, while intelligence gathering specifically is mentioned as *not* being part of that under UNCLOS Article 19, 2. If there is reason to suspect innocent passage isn't adhered to, it can up new legal actions, which the Western allies have been loath to adopt until now. 4) The operation is typical for how Finland handles hybrid operations. Everything is done according to the book and within a clear legal framework. But the signalling around this operation appears to be unusually strong, which may be intended as a clear message to Russia. More of a show of force than was necessary may indicate that Finland and other countries' patience with Russia's illegal, aggressive and risky actions does have limits. More on this story in forthcoming episodes with experts Elizabeth Braw and Jerry Hendrix. ---------- NEWS SOURCES: https://yle.fi/a/74-20135216 https://www.reuters.com/world/europe/finland-court-rejects-owners-request-release-oil-tanker-2025-01-03/ https://www.lloydslist.com/LL1151950/Finland-police-seize-Russian-linked-dark-fleet-tanker-Eagle-S-in-cable-cutting-investigation ---------- SUPPORT THE CHANNEL: https://www.buymeacoffee.com/siliconcurtain https://www.patreon.com/siliconcurtain ----------

The CyberWire
Teresa Shea: The challenge of adapting new technologies. [Intelligence] [Career Notes]

The CyberWire

Play Episode Listen Later Nov 17, 2024 7:17


Please enjoy this encore episode where Vice President of Raytheon's Cyber Offense, Defense Expert Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Career Notes
Teresa Shea: The challenge of adapting new technologies. [Intelligence]

Career Notes

Play Episode Listen Later Nov 17, 2024 7:17


Please enjoy this encore episode, where the Vice President of Raytheon's Cyber Offense, Defense Expert Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Cognitive Crucible
#200 Remi Whiteside on Media, Information, and Data Literacy Fundamentals against Malign Information in the Open Information Environment

The Cognitive Crucible

Play Episode Listen Later Sep 24, 2024 44:12


The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Remi Whiteside discusses his Ph.D. research and dissertation which is entitled: Peering into US Army Media, Information, and Data Literacy Fundamentals against Malign Information in the Open Information Environment: A Qualitative Case Study. According to Remi Whiteside, the US Army currently has no institutionalized program-of-record for educational development, uniquely designed for its population of uniformed Information Professionals in training to detect, analyze, and scrutinize malign information in the Open Information Environment. Unlike its peer services, the US Army does not perceive malign information, a reimagined tool of ideological subversion, as a high-caliber threat so far as to invest the time, money, or resources into critical, foundational metaliteracy competencies needed for its Information Professionals for the Open Information Environment.  Recording Date: 1 Aug 2024 Research Question: Remi Whiteside suggests an interested student ask–in relation to media and information—how do narratives derived from the Open Information Environment shape servicemembers' metanarratives and do these metanarratives conflict with military identity? Resources: Peering into US Army Media, Information, and Data Literacy Fundamentals against Malign Information in the Open Information Environment: A Qualitative Case Study Syntactic Structures by Noam Chomsky Rhet Ops: Rhetoric and Information Warfare (Composition, Literacy, and Culture) by Jim Ridolfo and William Hart-Davidson NOEMA Magazine Link to full show notes and resources Guest Bio: Remington Whiteside is an active-duty Chief Warrant Officer in the US Army, career education, and academic researcher into MIDLE (media, information, and data literacy education) and M2DP (malinformation, misinformation, disinformation, propaganda). He started his career as an enlisted Cryptologic Linguist, with work in strategic, SOF, and training environments. He metamorphosed to Signals Intelligence Warrant Officer, specializing in tactical SIGINT, COMINT, OSINT, PAI, OPSEC, and Intelligence Support to Cyber and Electromagnetic Warfare (EW) training as an Observer-Coach-Trainer at Fort Johnson, Louisiana at the Joint Readiness Training Center. Remi holds an undergraduate degree in Middle Eastern studies, a graduate degree in Applied Linguistics with a focus on Computational Linguistics, and a Doctor of Philosophy degree in Education. He is lovingly supported by his wife Sara and his three children: Evolette, Torben, and Soren. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.

Risky Business
Risky Business #764 -- Mossad expands into telecommunications services

Risky Business

Play Episode Listen Later Sep 18, 2024 62:56


On this week's show, Patrick Gray and Adam Boileau discuss the weeks security news, including: Hezbollah's attempts to avoid SIGINT with pagers ends in explosions The US shines many bright lights on RT's disinfo role Australia counters Chinese bullying in the Pacific Valid accounts are the most prevalent entry point, says CISA's data Ivanti and Fortinet vie for worst vendor of the week Krebs writes up the shift towards charging The Com with terrorism And much, much more… This week's episode is sponsored by Push Security, who bring security visibility to where it needs to be these days – the browser. Luke Jennings joins this week's show to discuss how phish-kit crews are driving the arms race forward, and how detection has to adapt and go where the users are. This episode is also available on Youtube. Show notes Israel planted explosives in Hezbollah's Taiwan-made pagers, sources say | Reuters How Hezbollah used pagers and couriers to counter Israel's high tech surveillance | Reuters Biden administration unveils new evidence of RT's key role in Russian intelligence operations globally | CNN Politics Meta bans RT days after U.S. accused Russian outlet of disinformation U.S. to file charges in Trump campaign hacking case, officials say China suspected of hacking diplomatic body for Pacific islands region Chinese-made port cranes in US included 'backdoor' modems, House report says Stolen account info still chief risk for federal agencies, annual CISA audit finds Notice of Recent Security Incident | Fortinet Blog WordPress.org to require two-factor authentication for plugin developers | CyberScoop Multiple attacks force CISA to order agencies to upgrade or remove end-of-life Ivanti appliance Ivanti Endpoint Manager and Ivanti Endpoint Manager Security Suite and Ivanti Cloud Service Application (CSA) - End Of Life (EOL) The Dark Nexus Between Harm Groups and ‘The Com' – Krebs on Security Feds sentence 12 crypto thieves behind SIM swaps, home invasions Ex-CrowdStrike employees detail rising technical errors before July outage | Semafor Post-CrowdStrike Fallout: Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek Apple seeks dismissal of its NSO Group lawsuit, citing risk of exposing ‘vital security information' US hits Intellexa spyware maker with more sanctions (1) BolivarCucuta on X: "Encuentran muerto al ciudadano israelí Yariv Bokor en Medellín En un apartamento de El Poblado, Medellín, fue encontrado sin vida el ciudadano israelí Yariv Bokor, con aparentes signos de violencia. Bokor estaba vinculado a la empresa Sandvine, la cual tiene relación con NSO https://t.co/EeY1os1omW" / X Instagram to bolster privacy and safety features for millions of teen users Mastercard buys Recorded Future for $2.65 billion | CyberScoop

REDACTED Culture Cast
237: Technology and Ontology

REDACTED Culture Cast

Play Episode Listen Later Sep 17, 2024 26:12


This morning many were greeted with news that what looks like a cyber attack caused thousands of devices to explode. While it sounds like it's out of a cyberpunk novel, this attack helps us understand how technology can be used to build a pattern of life on not just individuals, but an organization or country. This episode has been sponsored by Obsidian Arms, a manufacturer of tools, parts and firearms, as well as operating as an OEM shop for those looking to bring excellence to the market. Their Minnesota-based shop builds and cuts parts out of U.S.-sourced materials. Their gunsmith tools, custom firearms, and capabilities can be found at www.obsidianarms.comSupport the REDACTED Culture Cast at redactedculture.locals.comSSP and boutique products at redactedllc.comFollow us on Instagram at @redactedllc

SpyCast
The Director-General of the Australian Signals Directorate with Rachel Noble

SpyCast

Play Episode Listen Later Sep 3, 2024 71:15


Summary Rachel Noble joins Andrew to discuss her role as Director-General of the Australian Signals Directorate. Rachel is the first woman to hold this position.   What You'll Learn Intelligence The Australian Signals Directorate: Its purpose and mission The true story of the Pine Gap spy facility Leadership in Intelligence The SIGINT origins of the Five Eyes alliance Reflections The value of team The importance of work-life balance And much, much more … Quotes of the Week “Women lead differently. We talk differently, we engage in different ways. And I've had to learn to own that about myself and not be tempted to try to be like the guys, compete with them on their own terms, or to adopt male behaviors in order to be heard … [Doing that] doesn't really help other women who might come after me.” – Rachel Noble. Resources  SURFACE SKIM *SpyCasts* Codebreaking and Codemaking Down Under with John Blaxland and Clare Birgin (2024) Australian National Day Special: Intelligence Down Under with John Blaxland (2024) SPY CHIEFS: Director-General of Security Mike Burgess - ASIO, Australia & America (2022) Keeping Secrets/Disclosing Secrets with Spy Chief turned DG of Australia's National Archives David Fricker (2022)  *Beginner Resources* What is SIGINT? YouTube (2020) [2 min. video] Who we are, Australian Signals Directorate (2020) [Short article] Our Agencies, National Intelligence Community of Australia (n.d.) [Overview of each agency in the Australian IC] DEEPER DIVE Primary Sources  REDSPICE Blueprint (2022) Report of the Royal Commission on Intelligence and Security (1977)  Australian Treaty Series: Five Power Defence Agreements (1971) Australian Treaty Series: Agreement between the Government of the Commonwealth of Australia and the Government of the United States of America relating to the Establishment of a Joint Defence Space Research Facility (1966) Policy file containing Cabinet approval of establishment of Joint Intelligence Organisation and participation of New Zealand Government (1946)  ASD Role and effectiveness of Signals Intelligence in World War II (1945) *Wildcard Resource* Rachel mentioned in this podcast episode that one of her favorite treats when coming to the States are Snickerdoodles – A delectable sugar cookie showered in cinnamon-sugar topping.  In the cookie world, snickerdoodles are a more recent invention with their first written mention being in an 1889 cookbook. Learn more about the history of cookies here!  Learn more about your ad choices. Visit megaphone.fm/adchoices

Armada Analysis - Electronic Warfare
Radioflash! Episode 13: Smart Thinking

Armada Analysis - Electronic Warfare

Play Episode Listen Later Jul 4, 2024 13:52


Artificial intelligence and machine learning are two much-heralded technologies set to revolutionise signals intelligence collection, processing and dissemination. An increasingly congested radio spectrum is set to challenge the limits of human cognition in the search for the signal of interest. In this episode of Radioflash! we catch up with Patrick ‘Krown' Killingsworth, EpiSci's  director of autonomy projects. We define the terms Artificial Intelligence (AI) and Machine Learning (ML) and their unique capabilities. ML algorithms are trained on huge amounts of data which makes these algorithms great for processing huge amounts of data, a key requirement in Signals Intelligence (SIGINT). The application of AI and ML in SIGINT is not necessarily about replacing the human but helping the SIGINT operator sort these data. Nonetheless, the continuing introduction of AI and ML into SIGINT analysis prompts concern and enthusiasm in equal measure. Ensuring that enough data are available for training algorithms creates challenges given the paucity of data which the SIGINT cadre may be interested in. We talk about the risks of using synthetic data for training and tackling the risk by anticipating potential problems from the start. AI- and ML-enabled SIGINT systems continue to get smarter, faster and more accurate. The future brings challenges in terms of moving this SIGINT technology from the strategic level to the tactical edge, although edge computing in the tactical domain should help no end in this regard.

Tore Says Show
Fri 07 Jun, 2024: Lesson Two - How Domestic Terrorism Is Escalating And Why

Tore Says Show

Play Episode Listen Later Jun 8, 2024 126:19


Preventing violent actions is the bottom line. Identifying domestic terror cells disguised as activist groups happens first. This involves front line intelligence and the real time collection and analysis of info. This includes surveillance, human intelligence (HUMINT), signals intelligence (SIGINT), and open source intelligence (OSINT). Crucial threat assessments involve collaboration with various law enforcement and intel agencies. Sharing information is key in conducting thorough threat assessments. The goal is to preemptively disrupt potential terrorist activities while respecting civil liberties and lawful activism.

Resilient
SIGINT Stories with a Chief Warrant Officer - Bill Thompson - Resilient 010

Resilient

Play Episode Listen Later Jun 7, 2024 99:59


Former Army Chief Warrant Officer Bill Thompson joins Chad Robichaux and Sean Kennard on this episode of Resilient to share SIGINT stories, life after the military, building a business, and much more. RESILIENT: Follow Us On Instagram: https://instagram.com/resilientshow Follow Us On Twitter: https://twitter.com/ResilientShow Follow Us On TikTok: https://www.tiktok.com/@resilientshow Follow Chad: https://www.instagram.com/chadrobo_official Follow Sean: https://www.instagram.com/seantopgunkennard Follow Bill Thompson: https://www.instagram.com/Billthompsonsft Follow Spartan Forge: https://www.instagram.com/spartan.forge/ https://spartanforge.ai/ ----------- SPONSORS: Smith & Wesson: https://www.smith-wesson.com/ Gatorz Eyewear: https://www.gatorz.com/ Midas Gold Group: https://www.midasgoldgroup.com BioPro+: https://www.bioproteintech.com/ ----------- All proceeds go to Mighty Oaks Foundation, a non-profit organization serving military & first responder communities. Learn more about Mighty Oaks at: https://www.mightyoaksprograms.org

S2 Underground
GhostNet Q&A - April 2024

S2 Underground

Play Episode Listen Later Apr 22, 2024 129:03


 00:00 - Introduction 03:52 - Using Linux? 10:15 - HFGCS 17:17 - Range Testing 22:07 - Building Community 26:40 - Determining Range 29:47 - Why not just 20m? 35:25 - Software Backdoors 39:23 - Vehicle TOC 41:15 - Long range HF 41:31 - Building Community 44:57 - VarAC 47:00 - Wire Reports 50:41 - Shortwave Use in Emergencies 57:20 - Drones 58:51 - Cheapest HF Radio 01:02:49 - Boofwang 01:03:24 - Radio and the Younger Generation 01:06:17 - Cheapest SDR 01:07:23 - The Wire 01:09:13 - EMP Protection 01:12:15 - Scanning 01:13:20 - Different Bands 01:14:50 - Antennas 01:18:56 - Bluetooth 01:20:35 - Best of the Best 01:22:20 - Antenna Concealment 01:23:10 - The Wire 01:23:47 - Backup Comms 01:26:10 - Encryption 01:28:10 - Building Community 01:28:36 - Budget HF 01:30:50 - Internet Comms 01:33:44 - WWIII and China 01:36:14 - Energy Needs 01:38:10 - VarAC 01:39:30 - SDRs and SIGINT 01:40:26 - Crypto 01:41:17 - Region-Specific Freqs 01:41:58 - Budget/Gear Categories 01:43:12 - "Buy This" Guide 01:44:37 - Radio Guide 01:45:04 - Apartment Antennas 01:46:09 - Buying Used 01:47:39 - NVIS 01:49:17 - Meshtastic 01:49:58 - Alternatives to Using Laptop 01:50:58 - Priorities 01:52:40 - Long Range Comms 01:56:33 - Tuning 01:57:35 - Livestreams 01:58:41 - Satellites 02:00:00 - Legalities 02:00:42 - Repeaters 02:02:09 - Your Own Repeaters 02:02:53 - Closing Thoughts Download the GhostNet Here: https://github.com/s2underground/GhostNet Receive-Only for Free: https://youtu.be/SsuzTPHcgDY Receive-Only, Off-Grid: https://youtu.be/P9sWFryImDo If you would like to support us, we're on Patreon! https://www.patreon.com/user?u=30479515 Disclaimer: No company sponsored this video. In fact, we have ZERO corporate sponsors. We are funded 100% by you, the viewer. All of our funding comes from direct support from platforms like Patreon, or from ad revenue on YouTube. Please note that even though it hurts our income, we still offer ad-free watching via alternative platforms like Odysee, Gab, and (for now) Rumble: Odysee: https://odysee.com/@S2Underground:7 Gab: https://gab.com/S2underground Rumble: https://rumble.com/c/theunderground BitChute: https://www.bitchute.com/channel/P2NMGFdt3gf3/ Playeur: https://playeur.com/c/S2Underground Our Reading List! https://www.goodreads.com/user/show/133747963-s2-actual The War Kitchen Channel! https://www.youtube.com/channel/UCYmtpjXT22tAWGIlg_xDDPA DISCLAIMER: This content is purely educational and does not advocate for violating any laws. Do not violate any laws or regulations. This is not legal advice. Consult with your attorney. Our Reading List! https://www.goodreads.com/user/show/133747963-s2-actual The War Kitchen Channel! https://www.youtube.com/channel/UCYmtpjXT22tAWGIlg_xDDPA Join us on GhostNet! Download the PDF here: https://github.com/s2underground/GhostNet 

The Moscow Murders and More
CJNG And Their Drone Counter Measures And The Kinahan Cartel Keeps Chugging Along (4/10/24)

The Moscow Murders and More

Play Episode Listen Later Apr 10, 2024 16:55


The Jalisco New Generation Cartel (Cartel Jalisco Nueva Generación or CJNG) is one of the most powerful and violent drug trafficking organizations operating in Mexico. It emerged in the early 2010s as a splinter group of the Milenio Cartel, another criminal organization based in Jalisco, Mexico.The roots of the CJNG can be traced back to the mid-2000s when the Milenio Cartel was headed by Ignacio "Nacho" Coronel Villarreal. After Coronel's death in a shootout with Mexican security forces in 2010, a power struggle erupted within the cartel. Nemesio Oseguera Cervantes, also known as "El Mencho," emerged as a prominent figure within the organization.Under El Mencho's leadership, the CJNG rapidly expanded its influence and territory, becoming one of the most dominant cartels in Mexico. They have been involved in drug trafficking, money laundering, extortion, and other criminal activities. The CJNG's primary operations involve the trafficking of cocaine, methamphetamine, heroin, and fentanyl into the United States.The CJNG has gained notoriety for its brutality and willingness to engage in violence to achieve its objectives. They have been responsible for numerous acts of violence, including assassinations, mass killings, and the use of explosives. The cartel has also targeted Mexican security forces, engaging in confrontations with police and military personnel.Despite efforts by Mexican and international law enforcement to dismantle the CJNG, the cartel has proven to be resilient and adaptable. They have a highly decentralized structure, with cells operating across Mexico and even extending into other countries. This makes it difficult for authorities to target the organization as a whole.The CJNG's influence extends beyond its criminal activities, as it also seeks to exert control over local communities through intimidation and coercion. They have been known to infiltrate local governments and law enforcement agencies, further complicating efforts to combat their operations.In recent years, the CJNG has increasingly clashed with rival cartels, particularly the Sinaloa Cartel, leading to widespread violence in parts of Mexico. The cartel's ability to maintain its dominance in the face of such challenges underscores its strength and resilience.It has been during this war that the use of Drones by both sides has accelerated.    The repurposing of commercial drones for military applications has become increasingly prevalent in the modern era, presenting both opportunities and challenges for military forces around the world. Here are some ways in which commercial drones have been adapted for military use:Surveillance and Reconnaissance: Commercial drones equipped with high-resolution cameras and sensors are being used for intelligence gathering, surveillance, and reconnaissance (ISR) missions. These drones can provide real-time imagery of enemy positions, movements, and terrain, allowing military forces to make informed decisions.Target Acquisition: Drones equipped with advanced sensors, such as infrared or electro-optical cameras, can identify and track potential targets on the battlefield. This information can be relayed to military command centers for further analysis and action.Communication Relays: Commercial drones can be outfitted with communication equipment to serve as mobile relays, extending the range and effectiveness of military communications networks. This is particularly useful in remote or rugged environments where traditional communication infrastructure is lacking.Cargo Delivery: Drones are being used to deliver essential supplies, ammunition, and medical equipment to troops in the field. This can help reduce the logistical burden on military convoys and reduce the risk to personnel from ground-based transportation.Electronic Warfare: Commercial drones can be modified to carry electronic warfare payloads, such as signal jammers or signal intelligence (SIGINT) equipment, to disrupt enemy communications and radar systems.Combat Operations: In some cases, commercial drones have been weaponized and used for offensive purposes on the battlefield. These drones may carry small arms, explosives, or other munitions to engage enemy targets.Mine Detection and Clearance: Drones equipped with specialized sensors can be used for mine detection and clearance operations, helping to reduce the risk to military personnel and civilians in conflict-affected areas.In our second article:The Kinahan Cartel is an organized crime group based in Dublin, Ireland, known for its involvement in drug trafficking, arms smuggling, money laundering, and other illicit activities. Led by Christy Kinahan Sr., the cartel rose to prominence in the early 2000s and has since established an extensive network across Europe, particularly in Spain, where they have significant operations.The cartel gained widespread notoriety for its violent turf wars with rival criminal gangs, most notably the Hutch gang, which escalated into a series of shootings and murders in Dublin. These conflicts have led to a significant number of casualties and have drawn considerable attention from law enforcement agencies in Ireland and abroad.The Kinahan Cartel has also been linked to high-profile international drug trafficking operations, often utilizing sophisticated methods to smuggle narcotics into Europe. They have been the focus of numerous police investigations and have faced significant legal scrutiny, resulting in arrests and convictions of several of its members.Despite law enforcement efforts to dismantle the organization, the Kinahan Cartel continues to operate, albeit under increased pressure and surveillance. The cartel's activities remain a major concern for authorities, as they continue to pose a significant threat to public safety and the stability of the region's criminal underworld. Despite all of the sanctions and the effort to bring the Kinahan cartel down, they not only remain elusive, but have even grown their wealth.(commercial at 10:20)to contact me:bobbycapucci@protonmai.comsource:Cartel thugs use monster 'GTA 5 guns' as enemies now 'terrorise villages' in drone blitz - Daily Starsource:Kinahan cartel is now worth a whopping $1.6 billion following 50 per cent rise - Irish Star

Beyond The Horizon
CJNG And Their Drone Counter Measures And The Kinahan Cartel Keeps Chugging Along (4/9/24)

Beyond The Horizon

Play Episode Listen Later Apr 9, 2024 16:55


The Jalisco New Generation Cartel (Cartel Jalisco Nueva Generación or CJNG) is one of the most powerful and violent drug trafficking organizations operating in Mexico. It emerged in the early 2010s as a splinter group of the Milenio Cartel, another criminal organization based in Jalisco, Mexico.The roots of the CJNG can be traced back to the mid-2000s when the Milenio Cartel was headed by Ignacio "Nacho" Coronel Villarreal. After Coronel's death in a shootout with Mexican security forces in 2010, a power struggle erupted within the cartel. Nemesio Oseguera Cervantes, also known as "El Mencho," emerged as a prominent figure within the organization.Under El Mencho's leadership, the CJNG rapidly expanded its influence and territory, becoming one of the most dominant cartels in Mexico. They have been involved in drug trafficking, money laundering, extortion, and other criminal activities. The CJNG's primary operations involve the trafficking of cocaine, methamphetamine, heroin, and fentanyl into the United States.The CJNG has gained notoriety for its brutality and willingness to engage in violence to achieve its objectives. They have been responsible for numerous acts of violence, including assassinations, mass killings, and the use of explosives. The cartel has also targeted Mexican security forces, engaging in confrontations with police and military personnel.Despite efforts by Mexican and international law enforcement to dismantle the CJNG, the cartel has proven to be resilient and adaptable. They have a highly decentralized structure, with cells operating across Mexico and even extending into other countries. This makes it difficult for authorities to target the organization as a whole.The CJNG's influence extends beyond its criminal activities, as it also seeks to exert control over local communities through intimidation and coercion. They have been known to infiltrate local governments and law enforcement agencies, further complicating efforts to combat their operations.In recent years, the CJNG has increasingly clashed with rival cartels, particularly the Sinaloa Cartel, leading to widespread violence in parts of Mexico. The cartel's ability to maintain its dominance in the face of such challenges underscores its strength and resilience.It has been during this war that the use of Drones by both sides has accelerated.    The repurposing of commercial drones for military applications has become increasingly prevalent in the modern era, presenting both opportunities and challenges for military forces around the world. Here are some ways in which commercial drones have been adapted for military use:Surveillance and Reconnaissance: Commercial drones equipped with high-resolution cameras and sensors are being used for intelligence gathering, surveillance, and reconnaissance (ISR) missions. These drones can provide real-time imagery of enemy positions, movements, and terrain, allowing military forces to make informed decisions.Target Acquisition: Drones equipped with advanced sensors, such as infrared or electro-optical cameras, can identify and track potential targets on the battlefield. This information can be relayed to military command centers for further analysis and action.Communication Relays: Commercial drones can be outfitted with communication equipment to serve as mobile relays, extending the range and effectiveness of military communications networks. This is particularly useful in remote or rugged environments where traditional communication infrastructure is lacking.Cargo Delivery: Drones are being used to deliver essential supplies, ammunition, and medical equipment to troops in the field. This can help reduce the logistical burden on military convoys and reduce the risk to personnel from ground-based transportation.Electronic Warfare: Commercial drones can be modified to carry electronic warfare payloads, such as signal jammers or signal intelligence (SIGINT) equipment, to disrupt enemy communications and radar systems.Combat Operations: In some cases, commercial drones have been weaponized and used for offensive purposes on the battlefield. These drones may carry small arms, explosives, or other munitions to engage enemy targets.Mine Detection and Clearance: Drones equipped with specialized sensors can be used for mine detection and clearance operations, helping to reduce the risk to military personnel and civilians in conflict-affected areas.In our second article:The Kinahan Cartel is an organized crime group based in Dublin, Ireland, known for its involvement in drug trafficking, arms smuggling, money laundering, and other illicit activities. Led by Christy Kinahan Sr., the cartel rose to prominence in the early 2000s and has since established an extensive network across Europe, particularly in Spain, where they have significant operations.The cartel gained widespread notoriety for its violent turf wars with rival criminal gangs, most notably the Hutch gang, which escalated into a series of shootings and murders in Dublin. These conflicts have led to a significant number of casualties and have drawn considerable attention from law enforcement agencies in Ireland and abroad.The Kinahan Cartel has also been linked to high-profile international drug trafficking operations, often utilizing sophisticated methods to smuggle narcotics into Europe. They have been the focus of numerous police investigations and have faced significant legal scrutiny, resulting in arrests and convictions of several of its members.Despite law enforcement efforts to dismantle the organization, the Kinahan Cartel continues to operate, albeit under increased pressure and surveillance. The cartel's activities remain a major concern for authorities, as they continue to pose a significant threat to public safety and the stability of the region's criminal underworld. Despite all of the sanctions and the effort to bring the Kinahan cartel down, they not only remain elusive, but have even grown their wealth.(commercial at 10:20)to contact me:bobbycapucci@protonmai.comsource:Cartel thugs use monster 'GTA 5 guns' as enemies now 'terrorise villages' in drone blitz - Daily Starsource:Kinahan cartel is now worth a whopping $1.6 billion following 50 per cent rise - Irish Star

The Epstein Chronicles
CJNG And Their Drone Counter Measures And The Kinahan Cartel Keeps Chugging Along (4/9/24)

The Epstein Chronicles

Play Episode Listen Later Apr 9, 2024 16:55


The Jalisco New Generation Cartel (Cartel Jalisco Nueva Generación or CJNG) is one of the most powerful and violent drug trafficking organizations operating in Mexico. It emerged in the early 2010s as a splinter group of the Milenio Cartel, another criminal organization based in Jalisco, Mexico.The roots of the CJNG can be traced back to the mid-2000s when the Milenio Cartel was headed by Ignacio "Nacho" Coronel Villarreal. After Coronel's death in a shootout with Mexican security forces in 2010, a power struggle erupted within the cartel. Nemesio Oseguera Cervantes, also known as "El Mencho," emerged as a prominent figure within the organization.Under El Mencho's leadership, the CJNG rapidly expanded its influence and territory, becoming one of the most dominant cartels in Mexico. They have been involved in drug trafficking, money laundering, extortion, and other criminal activities. The CJNG's primary operations involve the trafficking of cocaine, methamphetamine, heroin, and fentanyl into the United States.The CJNG has gained notoriety for its brutality and willingness to engage in violence to achieve its objectives. They have been responsible for numerous acts of violence, including assassinations, mass killings, and the use of explosives. The cartel has also targeted Mexican security forces, engaging in confrontations with police and military personnel.Despite efforts by Mexican and international law enforcement to dismantle the CJNG, the cartel has proven to be resilient and adaptable. They have a highly decentralized structure, with cells operating across Mexico and even extending into other countries. This makes it difficult for authorities to target the organization as a whole.The CJNG's influence extends beyond its criminal activities, as it also seeks to exert control over local communities through intimidation and coercion. They have been known to infiltrate local governments and law enforcement agencies, further complicating efforts to combat their operations.In recent years, the CJNG has increasingly clashed with rival cartels, particularly the Sinaloa Cartel, leading to widespread violence in parts of Mexico. The cartel's ability to maintain its dominance in the face of such challenges underscores its strength and resilience.It has been during this war that the use of Drones by both sides has accelerated.    The repurposing of commercial drones for military applications has become increasingly prevalent in the modern era, presenting both opportunities and challenges for military forces around the world. Here are some ways in which commercial drones have been adapted for military use:Surveillance and Reconnaissance: Commercial drones equipped with high-resolution cameras and sensors are being used for intelligence gathering, surveillance, and reconnaissance (ISR) missions. These drones can provide real-time imagery of enemy positions, movements, and terrain, allowing military forces to make informed decisions.Target Acquisition: Drones equipped with advanced sensors, such as infrared or electro-optical cameras, can identify and track potential targets on the battlefield. This information can be relayed to military command centers for further analysis and action.Communication Relays: Commercial drones can be outfitted with communication equipment to serve as mobile relays, extending the range and effectiveness of military communications networks. This is particularly useful in remote or rugged environments where traditional communication infrastructure is lacking.Cargo Delivery: Drones are being used to deliver essential supplies, ammunition, and medical equipment to troops in the field. This can help reduce the logistical burden on military convoys and reduce the risk to personnel from ground-based transportation.Electronic Warfare: Commercial drones can be modified to carry electronic warfare payloads, such as signal jammers or signal intelligence (SIGINT) equipment, to disrupt enemy communications and radar systems.Combat Operations: In some cases, commercial drones have been weaponized and used for offensive purposes on the battlefield. These drones may carry small arms, explosives, or other munitions to engage enemy targets.Mine Detection and Clearance: Drones equipped with specialized sensors can be used for mine detection and clearance operations, helping to reduce the risk to military personnel and civilians in conflict-affected areas.In our second article:The Kinahan Cartel is an organized crime group based in Dublin, Ireland, known for its involvement in drug trafficking, arms smuggling, money laundering, and other illicit activities. Led by Christy Kinahan Sr., the cartel rose to prominence in the early 2000s and has since established an extensive network across Europe, particularly in Spain, where they have significant operations.The cartel gained widespread notoriety for its violent turf wars with rival criminal gangs, most notably the Hutch gang, which escalated into a series of shootings and murders in Dublin. These conflicts have led to a significant number of casualties and have drawn considerable attention from law enforcement agencies in Ireland and abroad.The Kinahan Cartel has also been linked to high-profile international drug trafficking operations, often utilizing sophisticated methods to smuggle narcotics into Europe. They have been the focus of numerous police investigations and have faced significant legal scrutiny, resulting in arrests and convictions of several of its members.Despite law enforcement efforts to dismantle the organization, the Kinahan Cartel continues to operate, albeit under increased pressure and surveillance. The cartel's activities remain a major concern for authorities, as they continue to pose a significant threat to public safety and the stability of the region's criminal underworld. Despite all of the sanctions and the effort to bring the Kinahan cartel down, they not only remain elusive, but have even grown their wealth.(commercial at 10:20)to contact me:bobbycapucci@protonmai.comsource:Cartel thugs use monster 'GTA 5 guns' as enemies now 'terrorise villages' in drone blitz - Daily Starsource:Kinahan cartel is now worth a whopping $1.6 billion following 50 per cent rise - Irish StarBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.

The Institute of World Politics
Book Lecture: Revealing Secrets

The Institute of World Politics

Play Episode Listen Later Mar 13, 2024 64:36


***This lecture is sponsored by the IAFIE Washington DC Chapter and the IWP IAFIE Alpha Student Chapter*** About the Lecture: For a long time, the Australian Signals intelligence (or Sigint) story has been kept secret. Until now… Why does Australia have a national signals intelligence agency? What does it do and why is it controversial? And how significant are its ties with key partners, the United States, the United Kingdom, Canada and New Zealand, to this arrangement? Revealing Secrets is a compelling account of Australian Signals intelligence, its efforts at revealing the secrets of other nations, and keeping ours safe. It brings to light those clever Australians whose efforts were for so long entirely unknown or overlooked. Blaxland and Birgin traverse the royal commissions and reviews that shaped Australia's intelligence community in the 20th century and consider the advent and the impact of cyber. In unearthing this integral, if hidden and little understood, part of Australian statecraft, this book increases our understanding of the past, present and what lies ahead. About the Speakers: John Blaxland is Professor of International Security and Intelligence Studies in the Strategic and Defence Studies Centre (SDSC), Coral Bell School of Asia Pacific Affairs at the Australian National University (ANU). He is a Senior Fellow of the Higher Education Academy and a Fellow of the Royal Society of New South Wales. He was also formerly a military intelligence officer, Head of SDSC and Director of the ANU Southeast Asia Institute. He is the author and editor of several publications on military history, intelligence and international security affairs. Clare Birgin's career in the Department of Foreign Affairs and Trade (DFAT) spanned 30 years, with a focus on national security and intelligence. She had postings in Warsaw, Moscow, Geneva, and Washington DC as the Liaison Officer of the Office of National Assessments, followed by postings as Ambassador in Hungary, Serbia, Kosovo, Romania, North Macedonia and Montenegro. Subsequently she was a Visiting Fellow at the ANU before joining John Blaxland's history writing team. She has been awarded the Polish Government's Knight's Cross Medal and the Bene Merito Medal by the former Polish Foreign Minister.

From the Crows' Nest
The Evolution and Current State of small Unmanned Aerial Systems (sUAS)

From the Crows' Nest

Play Episode Listen Later Feb 28, 2024 50:40 Transcription Available


In this episode of From the Crows' Nest, host Ken Miller sits down with Dr. David Thirtyacre, Assistant Professor in the College of Aeronautics at the Embry-Riddle Aeronautical University. David is the Chair and Chief Pilot for the Department of Flight and currently instructs at the undergraduate and graduate levels in Flight Operations, Aerodynamics, Aircraft Performance, Unmanned Systems, Airborne Robotics, and Aviation and Aerospace Simulation Systems. He retired from the USAF with 27 years of duty in the fighter community with over 3500 hours piloting fighter aircraft and was a pioneer in the use of unmanned systems. They discuss how sUAS are used in current conflicts around the world and the capabilities they offer, including signals intelligence (SIGINT), tactical communications and networking, and as a weapons system. David also shares his thoughts on how artificial intelligence is rapidly evolving the use of sUAS and what the future holds for this advanced technology. To learn more about today's topics or to stay updated on EMSO and EW developments, visit our homepage.

SpyCast
CIA Director, Defense Secretary, Gentleman with Leon Panetta

SpyCast

Play Episode Listen Later Feb 13, 2024 79:57


Summary Leon Panetta (Panetta Institute) joins Andrew (X; LinkedIn) to discuss his lifetime of American public service. Secretary Panetta was the 2023 recipient of SPY's William H. Webster Award.  What You'll Learn Intelligence Directing the Central Intelligence Agency Intelligence & the Abbottabad Raid Working within the Clinton Administration  A life's dedication to the safety of the American public Reflections The power of patience and the ability to listen Handing immense pressure and responsibility And much, much more … Resources  SURFACE SKIM *SpyCasts* My Life in American Intelligence with Barry Zulauf (2023) David Petraeus on Ukraine & Intelligence with the former CIA Director & 4* General (2023) Intelligence, Special Operations, and Strategy with Michael Vickers (2023) The 75th Anniversary of the CIA with former Director Robert Gates (2022) *Beginner Resources* What Does the Secretary of Defense Do? MasterClass (2022) [Short article] How did the US find and kill Osama bin Laden? 60 Minutes Australia, YouTube (2018) [4 min. video] Leon E. Panetta, Panetta Institute for Public Policy (n.d.) [Short biography] DEEPER DIVE Books The Spymasters: How the CIA Directors Shape History and the Future, C. Whipple (Scribner, 2021) The Gatekeepers: How the White House Chiefs of Staff Define Every Presidency, C. Whipple (Crown, 2018)  Worthy Fights: A Memoir of Leadership in War and Peace, L. Panetta & J. Newton (Penguin Books, 2014) SECDEF: The Nearly Impossible Job of Secretary of Defense, C. A. Stevenson (Potomac Books, 2007)  Primary Sources  Statement on Syria before the Senate Armed Services Committee (2012) Nomination of Hon. Leon E. Panetta to be Secretary of Defense (2011)  Statement to Employees by CIA Director Leon Panetta on the Death of Usama Bin Ladin (2011)  Nomination of Leon Panetta to be Director, Central Intelligence Agency (2009) Memorandum for Leon Panetta on POTUS' Time Investment (1996) Letter from Brown to Panetta Regarding Fiscal Year 1994-1997 (1993) Letter to the Honorable Leon E. Panetta from George Bush (1977) *Wildcard Resource* Secretary Panetta now lives on a lovely vineyard in sunny California. Speaking of wine and spies, check out Vint Hill Winery in Warrenton, Virginia.  In 1942 the US Army set up top-secret SIGINT operations at the now-vineyard after the farm's owner, a Ham Radio enthusiast, set up a wire on the roof of the barn that could reach signals from Berlin. The farm was the site of The Signal Corps cryptographic school, which famously intercepted messages from Hiroshi Oshima in 1943. 

Grey Dynamics
Electronic Warfare, SIGINT and Corporate Intelligence with Michael Blicher Soerensen

Grey Dynamics

Play Episode Listen Later Jan 12, 2024 72:10


Welcome back to the Grey Dynamics Podcast! This week we are talking to Michael Blicher Soerensen. Michael is a veteran of the Danish army, specialising in electronic warfare and SIGINT. He is currently a global security site lead at Meta. We discussed what makes a good analyst, deploying to Iraq, corporate intelligence and much more. Enjoy!Find MichaelLinkedInWe spoke about:2:40 - Michael's background5:15 - Opportunities after working in SIGINT and Electronic Warfare9:17 - Killings your darlings10:40 - Adjusting to work outside of the army14:09 - Learning to build rapport with collegues in the workplace16:22 - What makes a good intelligence analyst20:21 - Discovering new career opportunities and staying open minded24:49 - Michael's experience on deployment28:17 - Michael's experience working with allied intelligence counterparts32:07 - Commentary on how training and background can heavily influence analyst's perspectives36:32 - Tailoring intelligence to the consumers needs and creating valuable products38:08 - Issues in the field of OSINT48:30 - Intelligence professionals being able to educate consumers on intelligence can and cannot do51:30 - Competing with other internal and external intelligence professionals in the corporate world1:01:50 - Lack of Tactical intelligence in the private sector1:03:24 - Intelligence products currently consumed by in the corporate world1:05:47 - Cultural RecommendationsAdvance Your Intelligence Career Today!Sign up to the Grey Dynamics Intelligence School (GDIS) for Top Instructors, Practical Skills, and Real-World Application.We are the first fully online intelligence school helping professionals to achieve their long term goals. Our school with tons of new material is currently under construction and will be out there very soon. Meanwhile, you can sign up and be the first to know when we launch, plus get exclusive tips and offers.Get access to exclusive Grey Dynamics ReportsWith security clearance, you can take a crucial role in our intelligence community. As a cleared member, you get access to secret & top secret grade publications. If you are a Top Secret holder you also get access to our community area, where you can interact with other members and with our analysts! Subscribe today! Hosted on Acast. See acast.com/privacy for more information.

Down Range
Translating War: Kayla Williams [6]

Down Range

Play Episode Listen Later Dec 7, 2023 43:45


Currently working as a United States government official, Kayla Williams was an Arabic linguist/interpreter and SIGINT operations specialist in the Army. Although she did not support the Invasion of Iraq, she took part in one of the earliest invasions using her skills to help with interrogations. Explore more at https://downrangepod.com/. Subscribe to Tenderfoot+ for ad-free listening and early episodes at https://tenderfoot.tv/plus/. Follow the show at @downrangepodcast. Learn more about your ad choices. Visit megaphone.fm/adchoices

S2 Underground
The Wire - December 1, 2023

S2 Underground

Play Episode Listen Later Dec 1, 2023 2:29


RR The Wire 2130Z December 1, 2023PRECEDENCE: ROUTINE RRDTG: 213001Z DEC 23ICOD: 200001Z DEC 23CONTROLS: Public ReleaseQQQQBLUF: GAZA CEASEFIRE HAS BROKEN. TENSIONS REMAIN IN NORTHERN BRAZIL. -----BEGIN TEARLINE------International Events-Middle East: In Gaza, the ceasefire between Israel and Hamas has been broken. It is unclear as which side began hostilities first (or if the deadline was reached), as both sides launched nearly simultaneous attacks. Hamas has conducted substantial rocket attacks in the North, with Israel conducting substantial airstrikes IVO the Rafah border crossing. Attacks from Hezbollah in Lebanon continue as well. Due to the intensity of the conflict, humanitarian aid shipments into Gaza via the Rafah crossing have stopped for the time being.Europe: In Russia, Vladimir Putin signs decree increasing the total size of the AFRF by 170,000. AC: This is not a deployment or mobilization, but rather an increase in the standing size of the Russian military. Currently Russia's military is comprised of roughly 1.3 million service members. This move comes three weeks after Russia's (and NATO's) formal withdrawal from the Treaty on Conventional Armed Forces in Europe (CFE), the treaty intended to limit the numbers of troops in Europe at the height of the Cold War.South America: Brazil continues to bolster defenses along the border with Venezuela amid high tensions in the region. AC: Limited reports on social media indicate Brazil has moved forces into a salient north of Boa Vista. Due to terrain limitations and the access of roads, a Venezuelan land-based invasion of Guyana (if it were to happen) could be conducted via Brazil's territory.-Homefront-GA: Local reporting indicates a woman has possibly attempted to self-immolate outside the Israeli Consulate in Atlanta. NFI ATT. AC: Though a currently developing event, initial reports indicate the woman was wearing/holding a Palestinian flag, suggesting the motive for the incident as being linked to the current conflict in the Middle East.-Analyst Comments-In the Middle East, Israel has almost certainly made good use of the ceasefire to continue SIGINT collection efforts within Gaza. However, it is unclear as to how effective this intelligence gathering would have been as Hamas militants clearly understand Israel's superior technical intelligence capability. As a result, airstrikes are likely to be intense as targeting efforts catch up to the intelligence picture.-----END TEARLINE-----Analyst: S2AEND REPORTNNNN

Dubious
Breaking the Iron Wall: How Israel's Feared Intelligence Services Missed the Hamas Attack

Dubious

Play Episode Listen Later Nov 1, 2023 869115:55


We discuss Israel's use of white phosphorus incendiary bombs in Gaza and how Hamas planned the attack in plain sight, posting a training video in which they broke through a full-scale replica of the Israeli border wall just 2 weeks before Oct 7.Visit betterhelp.com/DUBIOUS today to get 10% off your first month of therapy. If you like our content, please become a patron to get all our episodes ad-free. First, we look at the humanitarian situation in Gaza, the communications blackout and Israel's use of white phosphorus, violating international humanitarian law. Human Rights Watch verified videos “taken in Lebanon and Gaza on October 10 and 11, 2023, respectively, showing multiple airbursts of artillery-fired white phosphorus over the Gaza City port and two rural locations along the Israel-Lebanon border, and interviewed people who described an attack in Gaza. (…) Upon contact, white phosphorus can burn people, thermally and chemically, down to the bone as it is highly soluble in fat and therefore in human flesh. White phosphorus fragments can exacerbate wounds even after treatment, entering the bloodstream and causing multiple organ failure. Already dressed wounds can reignite when dressings are removed, and the wounds are re-exposed to oxygen. Even relatively minor burns are often fatal.” 1 Then we address the multiple and catastrophic security failures by Israel's intelligence community and military. We look at SIGINT, HUMINT and IMINT failures. How did Shin Bet, the Mossad and the IDF miss this attack? Here are the main points: Intelligence officers failed to monitor certain communication channels used by Palestinian attackers. Military personnel and intelligence officers over relied on border surveillance equipment that was easily shut down by attackers. The commanders were all in one place, clustered in a single border base, that was overrun in the initial phase of the incursion, preventing communication with the rest of the armed forces. Intelligence officers accepted at face value assertions by Hamas military leaders, made on private channels, that they were not preparing for battle. The officers were aware that Hamas knew these phone calls were being monitored by Israel. 2 Another issue we address is Israeli reservists' criticism for Yair Netanyahu, Benjamin Netanyahu's son, who remains in Miami rather than joining the fight against Hamas. The 32-year-old is currently living in Florida, where he moved in April 2023, after he was sued for defamation in Israel over social media posts against a political activist. 3 We also discuss Israel's ground invasion (land incursion) in Gaza and the regional ripple effects: as Israel pushes ahead, regional players are preparing their next moves. Hezbollah might attack from the north, and Iran has hinted at getting involved directly. Egypt, Lebanon, Syria, and Turkey might play crucial roles in the coming weeks. While Qatar is trying to negotiate with Hamas, Saudi Arabia is staying out of the mix. Also included: the Gaza tunnels, the hostages, similarities to 9/11 from an intelligence perspective, Benjamin Netanyahu's stance on a two-state solution and his policies which ensured Hamas is not eradicated, and what might come next. 1. Human Rights Watch Israel: White Phosphorus Used in Gaza, Lebanon Human Rights Watch, October 2023 ⇤2. Ronen Bergman and Patrick Kingsley How Israel's Feared Security Services Failed to Stop Hamas's Attack The New York Times, October 2023 ⇤3. Graeme Massie Israeli reservists question absence of Netanyahu's son who remains in Miami Independent, October 2023 ⇤

10 Percent True - Tales from the Cockpit
F-15 Eagle Driver, "Disco" Dildy (Part 4)

10 Percent True - Tales from the Cockpit

Play Episode Listen Later Oct 30, 2023 143:19


Buy a tee! https://www.10percenttrue.com/product-page/magnum-classic-teeSupport me with a coffee! https://www.buymeacoffee.com/10percenttrue Discussion on Discord: https://discord.gg/9vJ3hPYFQh0:00 intro1:16 Bodo - why F-15s were there6:20 intercepting Bear/Badger/Coot without a radar lock and why12:05 interesting intercepts 15:55 Naval Badgers a different challenge 16:44 “KGB Coot”18:00 Velocity Search vs TWS?20:10 SIGINT 25:25 levels of “co-operation” of the intercepted 31:25 no IRST, no loss?38:00 continued but a hostile witness!45:35 HOBS and associated tactics 54:40 MATRA story1:01:10 “Eagle Eye”1:10:15 defensive shortcomings1:15:20 Light Grey Aloofness/Ego-jet/Stratification of the community 1:35:05 AMRAAM the great equaliser1:38:30 to share the secrets of employment or not?1:45:15 Jekyll & Hyde?1:48:10 loose ends and YT comments questions including VMAX, can you trust the books? 2:04:00 callsign storySupport the show

REDACTED Culture Cast
145: The OPSEC Leviathan

REDACTED Culture Cast

Play Episode Listen Later Oct 20, 2023 38:34


OPSEC, short for Operation Security is Military Jargon for keeping information vital to the security and success of an operation out out the hands of those who would use open source intelligence gathering tools to gain leverage against one's unit, people, or community. Maintaining a clear control of OPSEC is difficult to measure unless you are actively capable of discerning what an opposing force knows about you and your plans. Traditional and cultural references includes spy novels, thrillers, and a news broadcast that's a little to revealing about what is really going on behind the curtain. A double edged sword for any society which claims to be free, OPSEC includes governments actively taking steps to compartmentalize information and restrict its spread across even its own population. We start by comparing OPSEC to the board game STRATEGO, which helps build the concept. However, in our world where terms like "5th Generation Warfare" regularly appear in political discourse, the idea of Operation Security runs the risk of inciting paranoia. Support the REDACTED Culture Cast at redactedculture.locals.comSSP and boutique products at redactedllc.comFollow us on Instagram at @redactedllc

Alien Conspiracy Podcast

Come along as we discuss Australia's most secret location! All of our wonderful links can be found here:  https://linktr.ee/allts   Pine Gap is a highly secretive and strategically important facility located near Alice Springs in the Northern Territory of Australia. Officially known as the Joint Defence Facility Pine Gap, it is operated by both the United States and Australia and primarily serves as a ground station for several satellite communication and intelligence-gathering activities. While much of the base's operations are classified, its publicly acknowledged functions include signals intelligence (SIGINT) collection, satellite tracking, and missile early warning. Here's an overview of Pine Gap and some conspiracy theories associated with it: Official Purpose: Pine Gap was established in 1966 and has been officially described as a satellite tracking station and a key part of the U.S. global intelligence network. Its primary functions include monitoring and tracking satellites, collecting signals intelligence, and providing support for U.S. military and intelligence activities worldwide. Conspiracy Theories: Alien and UFO Activity: Some conspiracy theories suggest that Pine Gap is involved in the study and reverse engineering of extraterrestrial technology or even contact with aliens. These claims often tie the base to UFO sightings and alleged government cover-ups. Weather Modification: There have been allegations that Pine Gap is involved in weather modification or control experiments. These claims usually link the facility to natural disasters or extreme weather events. Mind Control: Some conspiracy theorists believe that Pine Gap is involved in mind control experiments, including the development of technologies like HAARP (High-Frequency Active Auroral Research Program). They argue that the base has the capability to manipulate human thoughts and behaviors. Global Surveillance: Concerns about mass surveillance and data collection have led to speculation that Pine Gap plays a significant role in global surveillance programs. Edward Snowden's revelations about NSA activities have fueled these suspicions. Nuclear Weapons: Some theories suggest that Pine Gap is involved in the management and control of nuclear weapons, potentially as part of a broader global defense network. Security and Secrecy: Pine Gap is known for its extreme security measures and the presence of both Australian and American personnel. The secrecy surrounding its activities has contributed to the proliferation of conspiracy theories. Government Denials: Both the Australian and U.S. governments have consistently denied many of the conspiracy theories associated with Pine Gap. They maintain that the facility's functions are consistent with its official descriptions and that it operates within the bounds of international law. In summary, Pine Gap is a real and strategically important facility with confirmed intelligence-gathering functions. While conspiracy theories persist, they often lack substantial evidence and are strongly refuted by official sources. As with many secretive government installations, Pine Gap continues to be a subject of intrigue and speculation.

Cold War Conversations History Podcast
Uncovering Cold War Soviet secrets with the USAF and NSA (310)

Cold War Conversations History Podcast

Play Episode Listen Later Sep 22, 2023 101:08


Tim served in the USAF and the NSA from 1975 to 1988 during some of the most tense periods of the Cold War. This included stints at the US Air Force Electronic Warfare Center at Kelly AFB, Texas, and RAF Chicksands, in the UK working on SIGINT collection of USSR/Warsaw Pact/Other targets. He also served as part of the Cryptologic Support Group, Strategic Air Command HQ, Offutt AFB, Nebraska providing SIGINT briefings to SAC leadership on worldwide events In 1983 he transferred to the NSA and later GCHQ, Cheltenham, Glos 1984-1988. We hear about how the first indications that something was amiss the morning Chernobyl reactor exploded in 1986, the day the cleaners answered the secure phone at SAC HQ, and how at GCHQ the US and British intelligence share information as part of the UKUSA Agreement. 0:00 Introduction and Tim's background in the US Air Force 5:12 Understanding electronic warfare and data gathering at Kelly Air Force Base 16:58 Posting at RAF Chicksands in Bedford, UK, and monitoring for changes in regular patterns 25:52 The Soviet invasion of Afghanistan and the Iranian hostage crisis 36:19 Able Archer alerts and other instances of signals intelligence at Strategic Air Command, Nebraska 44:16 Incident of the KAL007 Korean airliner and US Navy exercise incidents 57:08 Misinterpretation during a briefing on a recon flight of TU-95 bear bombers and gathering intel on the Soviet Union 1:01:18 Constant pressure to provide intel on Soviet leadership and missile alerts during Soviet drills 1:05:34 Transition from Air Force to NSA and role at the NSA 1:14:08 Tracking Chinese air defense and transition to GCHQ 1:22:08 U.S. stance during the Falkland conflict and witnessing the Chernobyl reactor explosion 1:30:59 Anecdote about NSA bureaucracy and language proficiency test 1:34:21 Closing and thanks to supporters Table of contents powered by PodcastAI✨ Extra episode info here https://coldwarconversations.com/episode310/ The fight to preserve Cold War history continues and via a simple monthly donation, you will give me the ammunition to continue to preserve Cold War history. You'll become part of our community, get ad-free episodes, and get a sought-after CWC coaster as a thank you and you'll bask in the warm glow of knowing you are helping to preserve Cold War history. Just go to https://coldwarconversations.com/donate/ If a monthly contribution is not your cup of tea, We also welcome one-off donations via the same link. Find the ideal gift for the Cold War enthusiast in your life! Just go to https://coldwarconversations.com/store/ Thanks to listener Phil Curme for introducing me to Tim. You can read his blog here walkingthebattlefields.com Follow us on Twitter https://twitter.com/ColdWarPod Facebook https://www.facebook.com/groups/coldwarpod/ Instagram https://www.instagram.com/coldwarconversations/ Youtube https://youtube.com/@ColdWarConversations Love history? Check out Into History at this link https://intohistory.com/coldwarpod Learn more about your ad choices. Visit megaphone.fm/adchoices

Brass & Unity
PT.2 Intelligence, Human Trafficking and Service with Kara Smith | #179

Brass & Unity

Play Episode Listen Later Sep 19, 2023 93:41


Kara, with a remarkable 18-year career, has dedicated herself to the pursuit of hunting criminals worldwide. Her expertise in intelligence began serving in the United States Air Force deploying to both Iraq and Afghanistan. This is where she honed her expertise in various fields, including SIGINT and AllSource Analysis. Kara honed her skills in open source and social media intelligence while actively pursuing human traffickers.  @kara_the_huntress https://karasmithconsulting.com Watch on YouTube: https://bit.ly/3opNURn  PATREON: patreon.com/brassandunity  - - - - - - - - - - - - SUPPORT OUR SPONSORS H.V.M.N - 20% off with code BRASS20 - https://hvmn.com/pages/home Mindful Meds - 15% off with code BRASS - https://mindfulmeds.io Brass & Unity - 20% off with code UNITY - http://brassandunity.com  Three Horses Hat Co - 15% off with code BRASS - ⁠https://threehorseshatco.com/⁠ Combat Flip Flops - 25% off with code UNITY - https://combatflipflops.com - - - - - - - - - - - - - SHOP B&U Jewelry & Eyewear: https://brassandunity.com  - - - - - - - - - - - - - Follow #brassandunity - - - - - - - - - - - - - CHARITY Honour House - https://www.honourhouse.ca Vet Solutions - https://vetsolutions.org  Heroic Hearts - https://www.heroicheartsproject.org Warrior Angels Foundation - https://warriorangelsfoundation.org All Secure Foundation - http://allsecurefoundation.org Defenders of Freedom - http://defendersoffreedom.us The Boot Campaign - https://bootcampaign.org The Overwatch Foundation  - http://overwatchfoundationusa.org

Brass & Unity
Intelligence, Human Trafficking and Service with Kara Smith | #178

Brass & Unity

Play Episode Listen Later Sep 12, 2023 90:36


Kara, with a remarkable 18-year career, has dedicated herself to the pursuit of hunting criminals worldwide. Her expertise in intelligence began serving in the United States Air Force deploying to both Iraq and Afghanistan. This is where she honed her expertise in various fields, including SIGINT and AllSource Analysis. Kara honed her skills in open source and social media intelligence while actively pursuing human traffickers.  @kara_the_huntress https://karasmithconsulting.com Watch on YouTube: https://bit.ly/3opNURn  PATREON: patreon.com/brassandunity  - - - - - - - - - - - - SUPPORT OUR SPONSORS H.V.M.N - 20% off with code BRASS20 - https://hvmn.com/pages/home Mindful Meds - 15% off with code BRASS - https://mindfulmeds.io Brass & Unity - 20% off with code UNITY - http://brassandunity.com  Three Horses Hat Co - 15% off with code BRASS - ⁠https://threehorseshatco.com/⁠ Combat Flip Flops - 25% off with code UNITY - https://combatflipflops.com - - - - - - - - - - - - - SHOP B&U Jewelry & Eyewear: https://brassandunity.com  - - - - - - - - - - - - - Follow #brassandunity - - - - - - - - - - - - - CHARITY Honour House - https://www.honourhouse.ca Vet Solutions - https://vetsolutions.org  Heroic Hearts - https://www.heroicheartsproject.org Warrior Angels Foundation - https://warriorangelsfoundation.org All Secure Foundation - http://allsecurefoundation.org Defenders of Freedom - http://defendersoffreedom.us The Boot Campaign - https://bootcampaign.org The Overwatch Foundation  - http://overwatchfoundationusa.org

Strange Recon Podcast
Strange Recon - The Five Guys 21JUN23

Strange Recon Podcast

Play Episode Listen Later Jun 21, 2023 120:33


Chatting about the five eyes and some of their responsibilities and also a bit of history on SIGINT gathering methods. #usa #airforce #navy #army #sigint #marines #history #engineering #aviation #science #avgeeksSources https://www.newscientist.com/article/mg21729071-900-glow-planes-plasmas-take-the-drag-out-of-air-travel/ https://giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices https://www.l3harris.com/all-capabilities/signals-intelligence-sigint-systems https://macdonaldlaurier.ca/canada-evolve-five-eyes-report/ https://www.theguardian.com/world/2010/jun/24/intelligence-sharing-codebreakers-agreement-ukusa https://www.fiveeyesconnect.com/Please Support Strange Recon! Paypal - https://www.paypal.com/paypalme/strangerecon Google - strangerecon@gmail.com Patreon - https://www.patreon.com/strangerecon Buy Strange Recon merch! https://www.strangereconpodcast.com/

Radio Contra
230.The Image America Projects To Her Enemies, with Madman Actual

Radio Contra

Play Episode Listen Later May 25, 2023 131:44


Episode 230. I'm joined by former Army and NSA SIGINT analyst "Madman Actual" to talk the outward degradation of America's military and the message that's sending the world. National security begins with the image we put forth. We also dive into SIGINT tasks, why you need to train in many domains, and the role civilians may play in the standing in the gap. Tactical Signals Exploitation: 5-6 August Get the Merch: Brushbeater Store The Guerilla's Guide to the Baofeng Radio is a #1 Bestseller!  Knightsbridge Research discount code: SCOUT Nehemiah Strong discount code: SCOUT1 Radio Contra Sponsors: Civil Defense Manual Tactical Wisdom Blacksmith Publishing Radio Contra Patron Program Brushbeater Training Calendar Brushbeater Forum Palmetto State Armory Primary Arms

The Peter Zeihan Podcast Series
The United States Dominates Signal Intelligence || Peter Zeihan

The Peter Zeihan Podcast Series

Play Episode Listen Later May 5, 2023 4:57


We've poked holes in the US system and talked about Russian intelligence declining, so today, let's look at what the US dominates: signal intelligence (SIGINT). Full Newsletter: https://mailchi.mp/zeihan/the-united-states-dominates-signal-intelligence

Podcast UFO
537. John Ramirez, CIA [ret] PART 2

Podcast UFO

Play Episode Listen Later Dec 21, 2022 88:19


A follow-up with guest, John Ramirez who reveals fascinating information that he uncovered over the years and some interesting perspectives. John Ramirez served from 1984 to 2009 in the CIA Directorate of Science and Technology, Directorate of Intelligence, and the ODNI National Counterproliferation Center (NCPC). At CIA he was an intelligence analyst and Chief, ELINT Analysis Branch specializing in ballistic missile defense, weapons systems radars, and technical collection operations. At the NCPC he was the SIGINT specialist and the multi-discipline collection requirements strategist. John is a US Navy veteran, 1973 to 1979, in the Electronics Warfare Technician field on board surface ships. John majored in political science and graduated in 1983 from the George Washington University, Washington, DC. John is a member of the Association of Former Intelligence Officers and the Central Intelligence Retirees Association.

Rational Security
The “It's Short for Scottrick” Edition

Rational Security

Play Episode Listen Later Oct 19, 2022 64:09


This week, Alan, Quinta, and Scott flew solo to talk through some of the week's big national security news stories, including:“Jake, Mr. Sullivan if You're NSSty.” The Biden administration finally unveiled its long awaited (and overdue) National Security Strategy last week, through a high-profile event at Georgetown University featuring National Security Advisor Jake Sullivan. Does it hit the mark? Does it even matter? “Big Subpoena Energy.” The Jan. 6 committee confidently closed its last live session with a bang last week, in the form of a unanimous vote to subpoena former President Trump for his testimony. Trump responded with a 14-page rant a few days later that repeated many of his grievances over the 2020 election but did not address whether he would comply. Why did the committee take this step? Is there any way to compel Trump to cooperate? Will it need to?“Is it SIGINT or SIJINT?” The Biden administration has issued a new Executive Order limiting its collection of signals intelligence, as part of an effort to come to agreement with the European Union's legal system and its stringent privacy protections. Will these new arrangements be invalidated by European courts like their two predecessors? Or could they finally be up to snuff?For object lessons, Alan recommended the impressive (if highly depressing) new European sci-fi film "Vesper." Quinta seconded Carlos Lozada's takedown of one of the Senate's most milquetoast members. And Scott celebrated the 90th birthday of a real legal legend and all around phenomenal human, Judge Guido Calabresi. Hosted on Acast. See acast.com/privacy for more information.

The CyberWire
Malicious Chrome extensions. BEC in Kentucky. Dispatches from a hybrid war, including state-directed, partisan, and criminal action. ICS advisories. “Cosplaying” hardware.

The CyberWire

Play Episode Listen Later Aug 31, 2022 26:16


Chrome extensions steal browser data. A business email compromise attack is under investigation in Kentucky. Belarusian Cyber Partisans claim to have a complete Belarusian passport database. Organizing a cyber militia. CISA releases twelve ICS security advisories. Our guest is Asaf Kochan of Sentra on overemphasizing “the big one.” Carole Theriault cautions against getting ahead of yourself in the cryptocurrency supply chain. Cosplaying" hardware. And Canada welcomes a new SIGINT boss. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/168 Selected reading. Chrome extensions with 1.4 million installs steal browsing data (BleepingComputer)  Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users (McAfee Blog)  Police investigate electronic theft of federal funds (City of Lexington)  FBI, Secret Service join Kentucky investigation into $4 million cybercrime theft (The Record by Recorded Future) Russian hackers blamed for ongoing Montenegro cyberattack (Tech Monitor) “For the 1st time in human history a #hacktivist collective obtained passport info of the ALL country's citizens.” (Cyber Partisans) Inside the IT Army of Ukraine, ‘A Hub for Digital Resistance' (The Record by Recorded Future)  Ukraine takes down cybercrime group hitting crypto fraud victims (BleepingComputer)  Hitachi Energy FACTS Control Platform (FCP) Product (CISA) Hitachi Energy Gateway Station (GWS) Product (CISA) Hitachi Energy MSM Product (CISA). Hitachi Energy RTU500 series (CISA) Fuji Electric D300win (CISA) Honeywell ControlEdge (CISA) Honeywell Experion LX (CISA) Honeywell Trend Controls Inter-Controller Protocol (CISA) Omron CX-Programmer (CISA) PTC Kepware KEPServerEX (CISA) Sensormatic Electronics iSTAR (CISA) Mitsubishi Electric GT SoftGOT2000 (CISA) Walmart Sells Fake 30TB Hard Drive That's Actually Two Small SD Cards in a Trench Coat (Vice)

T.Rex Talk
Common Sense Radio Control

T.Rex Talk

Play Episode Listen Later Jul 11, 2022 44:28


The ongoing demand for gun confiscations, body armor bans, and night vision limits now includes calls for... handheld radio controls! Isaac dissects a recent Slate article lamenting the ability of far-right extremists to use handheld radios to communicate after they have been de-platformed from Twitter.   Original Article: Far-Right Extremists Are Using Personal Radios to Plan Violence  To be honest, this only barely scratches the surface of all the preposterous assumptions the article is built on, but hey, it's a start. We specifically ignored the technical errors with this journalism like all the pre-existing SIGINT capabilities that exist, the fact that all spectrum around DC is monitored and recorded by a host of three-letter agencies, the wide proliferation of SDRs, and more - just because that would be an endless list of infinite rabbit trails.  Keep in touch with us here: https://trex-arms.com/newsletter/