Hillary Clinton’s Email Server: Dissecting the Risks with William J. Tucker

William J. Tucker joins me again to discuss Hillary Clinton’s decision to manage her own email services while Secretary of State. While this decision has angered political opponents and government transparency advocates (not to mention a few historians) we are bypassing the political and legal issues to zero in on the risks associated with her decision – and there are many. Join us as we walk through the information security and intelligence aspects of this story and examine the risks posed to Hillary Clinton, our government, and potentially anyone that maintained contact with her through this method. If you’re not concerned now, you will be.

You can follow William J. Tucker on Twitter and read his guest posts on Blogs of War:

Everybody Spies – and for Good Reason
Hawaii a Priority Target for Foreign Espionage
Would the U.S. Really Kill Edward Snowden?
Snowden’s Snowjob?

Subscribe to Covert Contact via iTunes
Subscribe to Covert Contact via RSS
Follow @CovertContact Twitter
Check out the Covert Contact blog

Tweet about this on TwitterShare on FacebookShare on TumblrShare on RedditShare on LinkedInDigg thisPrint this pageEmail this to someone

All Filler, No Killer: Robert Baer’s “The Perfect Kill: 21 Laws for Assassins”

Theodore W. WeaverTheodore W. Weaver is a former Intelligence Officer within the CIA’s National Clandestine Service and the Directorate of Science and Technology. He has close to a decade working as a Special Agent with several Federal agencies and has worked against counter proliferation, human trafficking/smuggling, child exploitation, Intellectual Property Rights violations and narcotics. You can follow him on Twitter or via the nascent Inglorious Amateurs website.

 

Tweet about this on TwitterShare on FacebookShare on TumblrShare on RedditShare on LinkedInDigg thisPrint this pageEmail this to someone

Counterintelligence: William J. Tucker Breaks Down the Challenges

In episode 12 of Covert Contact I’m talking to William J. Tucker about counterintelligence. It is a complex discipline that is often misunderstood – even by intelligence professionals. But it presents as many opportunities as it does challenges and this conversation hints at that. Like all intelligence disciplines, it is faced with a rapidly changing environment and overwhelming array of threats. The sheer number of threats, the scope of it all, will force the private sector and governments into far tighter partnerships as they struggle to protect intellectual capital and traditional intelligence targets.

You can follow William J. Tucker on Twitter and read his guest posts on Blogs of War:

Everybody Spies – and for Good Reason
Hawaii a Priority Target for Foreign Espionage
Would the U.S. Really Kill Edward Snowden?
Snowden’s Snowjob?

Subscribe to Covert Contact via iTunes
Subscribe to Covert Contact via RSS
Follow @CovertContact Twitter
Check out the Covert Contact blog

Tweet about this on TwitterShare on FacebookShare on TumblrShare on RedditShare on LinkedInDigg thisPrint this pageEmail this to someone

Counterterrorism Challenges – Pondering Seemingly Unsolvable Problems with Phillip Smyth

The first Covert Contact interview features University of Maryland Laboratory for Computational Cultural Dynamics researcher Phillip Smyth. Phillip is also well known for his Hizballah Cavalcade project on Jihadology

Phillip specializes in Shia militias, and we touch on that topic, but most of the interview is spent looking at the big challenges we face in countering terrorism and its sponsors. It’s an interesting conversation that illustrates the dynamic and difficult problems that we continue to face in places like Syria, Iran, Pakistan, Lebanon, Yemen, and Bahrain.

Subscribe to Covert Contact via iTunes
Subscribe to Covert Contact via RSS
Follow @CovertContact Twitter
Check out the Covert Contact blog

Tweet about this on TwitterShare on FacebookShare on TumblrShare on RedditShare on LinkedInDigg thisPrint this pageEmail this to someone