<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Blogs of War]]></title><description><![CDATA[Conflict | Intelligence | Technology]]></description><link>https://blogsofwar.com/</link><image><url>https://blogsofwar.com/favicon.png</url><title>Blogs of War</title><link>https://blogsofwar.com/</link></image><generator>Ghost 2.31</generator><lastBuildDate>Wed, 11 Sep 2019 14:53:52 GMT</lastBuildDate><atom:link href="https://blogsofwar.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[The Poisoning of Sergei Skripal]]></title><description><![CDATA[Fred Burton joined me shortly after the attack on Sergei Skripal.  We look at the many implications of this brazen attack, security issues surrounding it, and the need for a serious response.]]></description><link>https://blogsofwar.com/the-poisoning-of-sergei-skripal/</link><guid isPermaLink="false">5ab37ca3fe9adb002dad2124</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Interviews]]></category><category><![CDATA[Fred Burton]]></category><category><![CDATA[Intelligence]]></category><category><![CDATA[Counterintelligence]]></category><category><![CDATA[Russia]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Thu, 22 Mar 2018 10:09:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1516711710545-37b374e7e452?ixlib=rb-0.3.5&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjExNzczfQ&amp;s=c03937d060a543fc12db733cc523d3cb" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/6395279/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://images.unsplash.com/photo-1516711710545-37b374e7e452?ixlib=rb-0.3.5&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjExNzczfQ&s=c03937d060a543fc12db733cc523d3cb" alt="The Poisoning of Sergei Skripal"><p>Fred Burton, former deputy chief of counterterrorism at the Diplomatic Security Service and the author of <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>, <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent’s Lifelong Hunt to Bring a Cold War Assassin to Justice</a>, and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a> joined me shortly after the <a href="https://www.rferl.org/a/russia-poisoning-denials-increasingly-absurd-johnson-u-k-skripal/29108745.html">attack on Sergei Skripal</a>. Skripal. a former Russian double agent now living in the UK, was poisoned with a <a href="hhttps://www.theguardian.com/uk-news/2018/mar/13/novichok-nerve-agents-russia-salisbury-spy">Russian novichok nerve agent</a> developed during the Soviet era. We look at the many implications of this brazen attack, security issues surrounding it, and the need for a serious response.</p>
]]></content:encoded></item><item><title><![CDATA[Team Leadership & Ethics]]></title><description><![CDATA[Dean Baratta reflects on leadership, lessons learned, team building, and the challenge of public service after serving as Chief of the Analysis Bureau at New Jersey’s Office of Homeland Security and Preparedness]]></description><link>https://blogsofwar.com/team-leadership-ethics/</link><guid isPermaLink="false">5a77dc8f9acf340022aa65e4</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Dean Baratta]]></category><category><![CDATA[Intelligence]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Mon, 05 Feb 2018 13:23:13 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2018/02/deanb.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/6225288/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2018/02/deanb.jpg" alt="Team Leadership & Ethics"><p>In his 3+ years as Chief of the Analysis Bureau at New Jersey’s Office of Homeland Security and Preparedness Dean Baratta led a very capable team of intelligence analysts. Dean was a critical part of a small team that was widely recognized for its innovative approaches. Now, as he moves on to another project, he reflects on leadership, lessons learned, team building, and the challenge of public service.</p>
<p>We've covered Dean's work, and management in the intelligence space in general, in three other episodes:</p>
<ul>
<li>Episode 66: <a href="https://blogsofwar.com/intelligence-analysis-feedback-bias-and-other-challenges/">Intelligence Analysis: Feedback, Bias, and Other Challenges</a></li>
<li>Episode 53: <a href="http://blogsofwar.com/building-an-intel-shop-from-the-ground-up/">Building an Intel Shop from the Ground Up</a></li>
<li>Episode 48: <a href="http://blogsofwar.com/intelligence-at-the-state-and-local-level/">Intelligence at the State and Local Level</a></li>
</ul>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
<p>You can follow NJOHSP on Twitter <a href="https://twitter.com/NJOHSP">@NJOHSP</a> and access their unclassified intelligence products at <a href="http://www.njhomelandsecurity.gov/">njhomelandsecurity.gov</a>. Their podcast, <a href="http://www.njhomelandsecurity.gov/podcast">Intelligence, Unclassified</a> is available on iTunes and other platforms.</p>
]]></content:encoded></item><item><title><![CDATA[The Jerry Chun Shing Lee Case]]></title><description><![CDATA[Jerry Chun Shing Lee, a former CIA case officer, is suspected by many to have compromised CIA activities in China but has only been charged with the less serious crime of unlawful retention of national defense information.]]></description><link>https://blogsofwar.com/the-jerry-chun-shing-lee-case/</link><guid isPermaLink="false">5a6678dc009473002262ed8b</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Interviews]]></category><category><![CDATA[William J. Tucker]]></category><category><![CDATA[Counterintelligence]]></category><category><![CDATA[Intelligence]]></category><category><![CDATA[China]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Tue, 23 Jan 2018 00:39:15 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2018/01/ep92.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/6178106/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2018/01/ep92.jpg" alt="The Jerry Chun Shing Lee Case"><p><a href="https://twitter.com/tuckerwj">William J. Tucker</a>, <a href="https://marcom.stratfor.com/people/285721">Stratfor Global Fellow</a>, and a regular contributor on counterintelligence and security topics for Blogs of War and Covert Contact, returns for a look at the Jerry Chun Shing Lee case. Jerry Chun Shing Lee, a former CIA case officer, is suspected by many to have compromised CIA activities in China but has only been charged with the less serious crime of unlawful retention of national defense information.</p>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
]]></content:encoded></item><item><title><![CDATA[North Korean Cryptocurrency Ops]]></title><description><![CDATA[In episode 91 security researcher and Stratfor Global Fellow Scot Terban (AKA Krypt3ia) joins me to discuss North Korea's sophisticated exploitation of cryptocurrency.]]></description><link>https://blogsofwar.com/north-korean-cryptocurrency-ops/</link><guid isPermaLink="false">5a559ef5cbc901002dc2be79</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[DPRK]]></category><category><![CDATA[Technology]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[Russia]]></category><category><![CDATA[Scot Terban]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Wed, 10 Jan 2018 05:36:55 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2018/01/north-korea-red-star-computer.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/6133820/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2018/01/north-korea-red-star-computer.jpg" alt="North Korean Cryptocurrency Ops"><p>In episode 91 security researcher and <a href="https://worldview.stratfor.com/people/285719">Stratfor Global Fellow</a> Scot Terban (AKA <a href="https://krypt3ia.wordpress.com/">Krypt3ia</a>) joins me to discuss North Korea's sophisticated exploitation of cryptocurrency.</p>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
]]></content:encoded></item><item><title><![CDATA[Combatting Misinformation]]></title><description><![CDATA[Andrew Trabulsi (entrepreneur, consultant, and co-editor of Warlords, Inc.: Black Markets, Broken States, and the Rise of the Warlord Entrepreneur) joins me to discuss misinformation, the technology and platforms facilitating it, and the challenges faced in combatting it.]]></description><link>https://blogsofwar.com/combatting-misinformation/</link><guid isPermaLink="false">5a4abacd1eab4c002de1dcad</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Andrew Trabulsi]]></category><category><![CDATA[Technology]]></category><category><![CDATA[Propaganda]]></category><category><![CDATA[Information Warfare]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Tue, 02 Jan 2018 01:55:37 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2018/01/prop.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/6104356/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2018/01/prop.jpg" alt="Combatting Misinformation"><p>Andrew Trabulsi (entrepreneur, consultant, and co-editor of <a href="https://www.amazon.com/Warlords-Inc-Markets-Warlord-Entrepreneur-ebook/dp/B00N6PBC2G/ref=sr_1_7?ie=UTF8&amp;qid=1512394801&amp;sr=8-7&amp;keywords=rise+of+the+warlord">Warlords, Inc.: Black Markets, Broken States, and the Rise of the Warlord Entrepreneur</a>) joins me to discuss misinformation, the technology and platforms facilitating it, and the challenges faced in combatting it.</p>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
]]></content:encoded></item><item><title><![CDATA[Evaluating the North Korean Threat]]></title><description><![CDATA[Phil Walter joins returns to the show to look at how the U.S. processes and evaluates the threat posed by North Korea. We try to separate the rhetoric and action to cut through the hype. Is war with North Korea likely? Is it justified?]]></description><link>https://blogsofwar.com/evaluating-the-north-korean-threat/</link><guid isPermaLink="false">5a38778b1eab4c002de1dc11</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[DPRK]]></category><category><![CDATA[Updates]]></category><category><![CDATA[North Korea]]></category><category><![CDATA[Diplomacy]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Tue, 19 Dec 2017 02:31:28 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2017/12/north-korea-1151137_1920.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/6059842/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2017/12/north-korea-1151137_1920.jpg" alt="Evaluating the North Korean Threat"><p>Phil Walter joins returns to the show to look at how the U.S. processes and evaluates the threat posed by North Korea. We try to separate the rhetoric and action to cut through the hype. We examine American concepts of security and risk and how emotional responses drive both. Is war with North Korea likely? Is it justified when weighing some of the worst possible outcomes?</p>
<p>Phil has served in the military, the intelligence community, and the inter-agency. He is also the found of <a href="https://divergentoptions.org/">Divergent Options</a>. His written works are catalogued on <a href="https://storify.com/philwalter1058/written-pieces">Storify</a> and archived at <a href="http://www.philwalter1058.com/">www.philwalter1058.com</a>. I highly recommend them if you are at all interested in national security issues. You can follow him on Twitter <a href="https://twitter.com/philwalter1058">@philwalter1058</a>.</p>
]]></content:encoded></item><item><title><![CDATA[Protecting the British Royal Family]]></title><description><![CDATA[Fred Burton, former deputy chief of counterterrorism at the Diplomatic Security Service and the author of GHOST: Confessions of a Counterterrorism Agent joins me to break down some of these security efforts and the challenges he faced on the job.]]></description><link>https://blogsofwar.com/protecting-the-british-royal-family/</link><guid isPermaLink="false">5a2f25780e26680021353754</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Interviews]]></category><category><![CDATA[Fred Burton]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Tue, 12 Dec 2017 00:48:58 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2017/12/15287881121_a27eda36ac_b.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/6034932/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2017/12/15287881121_a27eda36ac_b.jpg" alt="Protecting the British Royal Family"><p>Protecting the British royal family is incredibly difficult. <a href="https://twitter.com/fred_burton">Fred Burton</a>, former deputy chief of counterterrorism at the <a href="https://www.state.gov/m/ds/">Diplomatic Security Service</a> and the author of <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>, <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent’s Lifelong Hunt to Bring a Cold War Assassin to Justice</a>, and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a> joins me to break down some of these security efforts and the challenges he faced on the job.</p>
]]></content:encoded></item><item><title><![CDATA[Beyond Bitcoin: Cryptocurrency Investing]]></title><description><![CDATA[Andrew Trabulsi joins me to discuss Cryptocurrency investing. We look at how blockchain and cryptocurrency models have evolved since the introduction of Bitcoin. For those new to the technologies and markets we share the easiest way to get started and important things to consider before you do.]]></description><link>https://blogsofwar.com/beyond-bitcoin-cryptocurrency-investing/</link><guid isPermaLink="false">5a2484b91997d5002134d0c5</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Interviews]]></category><category><![CDATA[Technology]]></category><category><![CDATA[Andrew Trabulsi]]></category><category><![CDATA[Cryptocurrency]]></category><category><![CDATA[Blockchain]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Mon, 04 Dec 2017 13:46:41 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2017/12/bit0.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/6005691/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2017/12/bit0.jpg" alt="Beyond Bitcoin: Cryptocurrency Investing"><p><a href="https://www.andrewtrabulsi.com/">Andrew Trabulsi</a> (entrepreneur, consultant, and co-editor of <a href="https://www.amazon.com/Warlords-Inc-Markets-Warlord-Entrepreneur-ebook/dp/B00N6PBC2G/ref=sr_1_7?ie=UTF8&amp;qid=1512394801&amp;sr=8-7&amp;keywords=rise+of+the+warlord">Warlords, Inc.: Black Markets, Broken States, and the Rise of the Warlord Entrepreneur</a>) joins me to discuss Cryptocurrency investing. We look at how blockchain and cryptocurrency models have evolved since the introduction of Bitcoin. For those new to the technologies and markets we share the easiest way to get started, important things to consider before you do (<a href="https://www.wired.com/story/how-to-keep-bitcoin-safe-and-secure/">security</a>, <a href="http://fortune.com/2017/12/03/heres-what-bitcoins-smartest-skeptics-are-telling-investors/">risk</a>, etc), and how we evaluate cryptocurrencies and the organizations behind them. We haven’t covered everything you need to know in this episode but it’s a good place to start if you want to learn more about a fascinating, volatile, and transformational space.</p>
<p>Some of the projects and companies mentioned include <a href="https://www.coinbase.com/join/518d1de4b18c2cb7b4000005">Coinbase</a>. <a href="https://www.stellar.org/">Stellar</a>, <a href="https://www.ethereum.org/">Ethereum</a>, <a href="https://litecoin.org/">Litecoin</a>, <a href="https://ripple.com/">Ripple</a>, <a href="https://bitcoinfoundation.org/">Bitcoin</a>, and <a href="https://coinmarketcap.com/">CoinMarketCap</a>.</p>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
]]></content:encoded></item><item><title><![CDATA[Bullets of Palestine]]></title><description><![CDATA[Author Howard Kaplan returns to Covert Contact to discuss Bullets of Palestine (the second novel in his Jerusalem Spy Series), chronic tensions in the Middle East, the prospect for reconciliation, Abu Nidal, and his approach to writing.]]></description><link>https://blogsofwar.com/bullets-of-palestine/</link><guid isPermaLink="false">5a1e60fc25cb69002d3c60b4</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Interviews]]></category><category><![CDATA[Howard Kaplan]]></category><category><![CDATA[Espionage]]></category><category><![CDATA[Books]]></category><category><![CDATA[Israel]]></category><category><![CDATA[Terrorism]]></category><category><![CDATA[Intelligence]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Wed, 29 Nov 2017 07:39:17 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2017/11/bw920.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/5990503/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2017/11/bw920.jpg" alt="Bullets of Palestine"><p>Author <a href="http://howardkaplanauthor.com/">Howard Kaplan</a> returns to Covert Contact to discuss <a href="https://www.amazon.com/Bullets-Palestine-Jerusalem-Spy-Book-ebook/dp/B00OYA0R3C/ref=sr_1_2?ie=UTF8&amp;qid=1503589111&amp;sr=8-2&amp;keywords=howard+kaplan">Bullets of Palestine</a> (the second novel in his Jerusalem Spy Series), chronic tensions in the Middle East, the prospect for reconciliation, Abu Nidal, and his approach to writing.</p>
<p>Longtime listeners will recognize Howard from <a href="https://blogsofwar.com/the-damascus-cover-and-the-psychology-of-spies-with-howard-kaplan/">episode 21</a> where we discussed the first novel in the series.</p>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
]]></content:encoded></item><item><title><![CDATA[Terrorists and Technology]]></title><description><![CDATA[Levi West, Director of Terrorism Studies at Charles Sturt University in Canberra, returns to look at how terrorists leverage (or don’t) emerging apps and platforms ranging from social media, to encryption, to cryptocurrencies. ]]></description><link>https://blogsofwar.com/terrorists-and-technology/</link><guid isPermaLink="false">5a1393208fc48000228366e9</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Technology]]></category><category><![CDATA[Levi West]]></category><category><![CDATA[Interviews]]></category><category><![CDATA[Terrorism]]></category><category><![CDATA[Counterterrorism]]></category><category><![CDATA[Australia]]></category><category><![CDATA[Law Enforcement]]></category><category><![CDATA[Social Media]]></category><category><![CDATA[Crypto]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Tue, 21 Nov 2017 03:05:37 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2017/11/android.jpg" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/5965405/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://blogsofwar.com/content/images/2017/11/android.jpg" alt="Terrorists and Technology"><p><a href="https://twitter.com/levijwest">Levi West</a>, <a href="http://terrorismstudies.csu.edu.au/">Director of Terrorism Studies</a> at Charles Sturt University in Canberra, returns to look at how terrorists leverage (or don’t) emerging apps and platforms ranging from social media, to encryption, to cryptocurrencies. We do our best to cut through the hype and look at the very real limits and challenges terrorists face when they become early adopters or even sophisticated users of networks where states have a very real advantage.</p>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
]]></content:encoded></item><item><title><![CDATA[U.S. Objections to the Afghan Taliban:  Ends, Ways, or Means?]]></title><description><![CDATA[With reconciliation between the Afghan Taliban and the Afghan Government being the goal, it is clear that the U.S. does not object to Afghan Taliban ends, but instead its ways and means.]]></description><link>https://blogsofwar.com/u-s-objections-to-the-afghan-taliban-ends-ways-or-means/</link><guid isPermaLink="false">5a0dcd9810e70a00227db67f</guid><category><![CDATA[Guest Posts]]></category><category><![CDATA[Phil Walter]]></category><category><![CDATA[Afghanistan]]></category><category><![CDATA[Terrorism]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Thu, 16 Nov 2017 17:56:51 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2017/11/marines-60540_1920.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blogsofwar.com/content/images/2017/11/marines-60540_1920.jpg" alt="U.S. Objections to the Afghan Taliban:  Ends, Ways, or Means?"><p>On December 5, 2001, prominent Afghans met under the auspices of the United Nations (UN) in Bonn, Germany.  The purpose of <a href="http://www.un.org/News/dh/latest/afghan/afghan-agree.htm">this meeting</a> was to come to an agreement regarding the provisional arrangements in Afghanistan pending the re-establishment of permanent government institutions.  The Bonn Agreement as it is known, was followed by a <a href="https://www.nato.int/cps/en/natohq/official_texts_50575.htm">Declaration by the North Atlantic Treaty Organization (NATO) and the Islamic Republic of Afghanistan</a> on September 6, 2006, a <a href="https://www.nato.int/cps/ua/natohq/official_texts_68724.htm">Declaration by NATO and the Government of the Islamic Republic of Afghanistan on an Enduring Partnership</a> on November 20, 2010, and the NATO-led International Security Assistance Force (ISAF) <a href="https://www.nato.int/cps/en/natohq/official_texts_87595.htm">Chicago Summit Declaration</a> on Afghanistan on May 21, 2012.  Of note is that none of these foundational documents mention the Afghan Taliban and all of them speak to the pursuit of a democratic Afghanistan.</p>
<p>With the U.S. and its Allies and Partners assisting the Afghan Government, the Afghan Taliban cannot achieve victory militarily.  Simultaneously the Afghan Government, with assistance provided by the U.S. and its Allies and Partners, have been unable to militarily defeat the Afghan Taliban despite over 16 years of effort.  With both sides lacking the will and capability to achieve a military victory, <a href="http://www.cnn.com/2017/08/22/politics/tillerson-afghanistan-state-dept/index.html">reconciliation between the Afghan Government and the Afghan Taliban</a> is the only solution.  What this reconciliation consists of is a point of debate.</p>
<p>Reconciliation between the Afghan Government and the Afghan Taliban requires the Afghan Taliban believing they can successfully achieve their desired ends using other ways and means.  In essence, the Afghan Taliban must value the <a href="http://www.nyulawglobal.org/globalex/Afghanistan.html">Afghan Government</a> and its presidential system, with a strong executive, a bicameral legislature, and a judiciary, as the way to change Afghanistan, instead of fighting.  If the Afghan Taliban changed their value system to Afghan Government processes instead of fighting, reconciliation would likely involve positioning members of the Afghan Taliban somewhere within the Afghan Government.</p>
<p>As of this writing, <a href="https://www.longwarjournal.org/archives/2017/09/lwj-map-assessment-taliban-controls-or-contests-45-of-afghan-districts.php">the Afghan Taliban controls or contests 45% of Afghan districts</a>.  Based upon this level of Afghan Taliban control, it is unknown how many positions reconciled Afghan Taliban members would receive within the Afghan Government.  However, it is from these Afghan Government positions that the Afghan Taliban could influence the political process to achieve their desired ends.  <a href="https://www.brookings.edu/wp-content/uploads/2016/06/0128_taliban_felbabbrown.pdf">Afghan Taliban ends</a> have included the desire to drive foreign forces from Afghanistan, topple the Afghan Government, reinstitute a political system based upon a highly doctrinaire version of Islam, and support for violent extremist organizations like Al-Qaeda.</p>
<p>With reconciliation between the Afghan Taliban and the Afghan Government being the goal, it is clear that the U.S. does not object to Afghan Taliban ends, but instead its ways and means.  As the foundational UN and NATO documents governing efforts in Afghanistan do not mention the Afghan Taliban, but do speak to pursuit of a democratic Afghanistan, the Afghan Taliban should feel as though it is free to pursue its ends as long as it does so through the ways and means of the Afghan Government political process instead of through fighting.  While Afghan Taliban reconciliation may be <a href="https://www.nato.int/cps/en/natohq/official_texts_87595.htm">the best path</a> to achieve a sovereign, secure and democratic Afghanistan, this does not ease the burden of a military casualty assistance officer who may have to tell the family of a military member killed in Afghanistan that their son or daughter didn’t die fighting the ideas the Afghan Taliban stand for, but instead died trying to convince the Afghan Taliban to use a political process instead of a gun.</p>
<hr>
<p><em>Phil Walter has served in the military, the intelligence community, and the inter-agency. The views expressed here are those of the author alone and do not contain information of an official nature. His website is <a href="http://www.philwalter1058.com">philwalter1058.com</a>.</em></p>
]]></content:encoded></item><item><title><![CDATA[Economic Espionage: No One Is Immune]]></title><description><![CDATA[William J. Tucker, a regular contributor on counterintelligence and security topics for Blogs of War and Covert Contact, joins me for a deep dive on economic espionage. ]]></description><link>https://blogsofwar.com/economic-espionage-no-one-is-immune/</link><guid isPermaLink="false">5a0a46c3e4a57a002de69e9c</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Interviews]]></category><category><![CDATA[Intelligence]]></category><category><![CDATA[Counterintelligence]]></category><category><![CDATA[William J. Tucker]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Tue, 14 Nov 2017 01:39:04 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1483287255325-84beb42e3078?ixlib=rb-0.3.5&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;s=32d54c54db10403be460d1e15632ab44" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/5942099/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://images.unsplash.com/photo-1483287255325-84beb42e3078?ixlib=rb-0.3.5&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&s=32d54c54db10403be460d1e15632ab44" alt="Economic Espionage: No One Is Immune"><p><a href="https://twitter.com/tuckerwj">William J. Tucker</a>, a regular contributor on counterintelligence and security topics for Blogs of War and Covert Contact, joins me for a deep dive on economic espionage. Organizations face far more risk from this threat than they realize, or want to realize, and most are no match for an interested foreign intelligence service. We discuss these threats, share some case studies, and look at what companies can do to better protect themselves.</p>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
<p><a href="https://www.patreon.com/covertcontact">Covert Contact now has a Patreon page</a>. With your <a href="https://www.patreon.com/covertcontact">support</a> I will be able to ramp up show production (eventually producing episodes daily) and release patron only episodes and updates. Reasonable, informed, and non-partisan discussion of critical issues has never been more important. I hope that you will help push Covert Contact to the next level.</p>
]]></content:encoded></item><item><title><![CDATA[Iraq’s Consolidation and the Kurds]]></title><description><![CDATA[Iraq has made surprising gains in its effort to undermine or eliminate Kurdish autonomy since mid-October when we first visited this issue. Phillip Smyth joins me again to look at recent developments and the potential implications.]]></description><link>https://blogsofwar.com/iraqs-consolidation-and-the-kurds/</link><guid isPermaLink="false">5a005be4f65a1d0022ae120a</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Iraq]]></category><category><![CDATA[Iran]]></category><category><![CDATA[Syria]]></category><category><![CDATA[ISIS]]></category><category><![CDATA[Kurdistan]]></category><category><![CDATA[Interviews]]></category><category><![CDATA[Phillip Smyth]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Mon, 06 Nov 2017 13:00:43 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2017/11/2syria-1034467_1920.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blogsofwar.com/content/images/2017/11/2syria-1034467_1920.jpg" alt="Iraq’s Consolidation and the Kurds"><p>Iraq has made surprising gains in its effort to undermine or eliminate Kurdish autonomy since mid-October when we first visited this issue. Phillip Smyth joins me again to look at recent developments and the potential implications.</p>
<p><a href="https://twitter.com/PhillipSmyth">Phillip Smyth</a> is a researcher at the University of Maryland who focuses on Iran-backed Shiite proxy groups. He is also widely known for his <a href="http://jihadology.net/hizballah-cavalcade">Hizballah Cavalcade</a> project on <a href="http://jihadology.net/">Jihadology</a>.</p>
<p>This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
<p><a href="https://www.patreon.com/covertcontact">Covert Contact now has a Patreon page</a>. With your support I will be able to ramp up show production (eventually producing episodes daily) and release patron only episodes and updates. Reasonable, informed, and non-partisan discussion of critical issues has never been more important. I hope that you will help push Covert Contact to the next level.</p>
]]></content:encoded></item><item><title><![CDATA[Rise of the Politibots]]></title><description><![CDATA[In June (which seems far more distant than it really is) I spent some time at Jigsaw (The Google-formed incubator focused on tackling tough global security issues) contibuting to critical discussions about bots.]]></description><link>https://blogsofwar.com/rise-of-the-politibots/</link><guid isPermaLink="false">59fcabf9f65a1d0022ae11f8</guid><category><![CDATA[Information Warfare]]></category><category><![CDATA[Social Media]]></category><category><![CDATA[Technology]]></category><category><![CDATA[Politics]]></category><category><![CDATA[Intelligence]]></category><category><![CDATA[Computational Propaganda]]></category><category><![CDATA[Propaganda]]></category><category><![CDATA[Bots]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Fri, 03 Nov 2017 18:26:35 GMT</pubDate><media:content url="https://blogsofwar.com/content/images/2017/11/world-1264062_1920.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blogsofwar.com/content/images/2017/11/world-1264062_1920.jpg" alt="Rise of the Politibots"><p>In June (which seems far more distant than it really is) I spent some time at <a href="https://jigsaw.google.com/">Jigsaw</a> (The Google incubator focused on tackling tough global security issues) contributing to critical discussions about bots. Our small group looked at them from several different perspectives but I was part of an even smaller team (listed below) that focused on how these tools are leveraged to acheive political aims. I don't think that I need to explain <a href="http://www.cnn.com/specials/politics/trump-russia-ties">why</a> this issue is important at this time.</p>
<p>I've discussed aspects of this problem on <a href="https://twitter.com/blogsofwar">Twitter</a> and on <a href="https://blogsofwar.com/tag/covert-contact/">Covert Contact</a> for quite some time - mostly from the perspective of how it was, and is, impacting the United States politically and socially. The work with Jigsaw grew out of my fellowship at <a href="http://www.iftf.org/johnwlittle/">IFTF</a> and discussions with IFTF co-fellow Samuel Woolley (who now leads the <a href="http://www.iftf.org/digintel/">Digital Intelligence Lab</a> there) about specific findings from my own monitoring in 2015 and later.</p>
<p>Six-ish months later, some of our work is now surfacing at Motherboard in '<a href="https://motherboard.vice.com/en_us/article/mb37k4/twitter-facebook-google-bots-misinformation-changing-politics">The Bots That Are Changing Politics</a>'. It is a foundational piece, rather than a deep data-driven dive into bot activity, but it has become increasingly clear that wrapping an evolving taxonomy around political bots  is an essential first step if we hope to develop successful strategies aimed at mitigating their impact over the long-term.</p>
<p>If you want to stay on top of this problem I can't recommend the work of my co-authors on this piece enough. Follow them to stay on the bleeding edge of developments in computational propaganda and efforts to counter it:</p>
<ul>
<li>Renee DiResta (<a href="http://www.twitter.com/noUpside">@noupside</a>) Founding member of Haven, 2017 Presidential Leadership Scholar.</li>
<li>Jonathon Morgan (<a href="https://twitter.com/jonathonmorgan">@jonathanmorgan</a>) Founder and CEO, NewKnowledge.io</li>
<li>Lisa Maria Neudert (<a href="https://twitter.com/lmneudert">@lmneudert</a> Researcher, Computational Propaganda Project, University of Oxford</li>
<li>Ben Nimmo (<a href="https://twitter.com/benimmo">@benimmo</a>) Information defense fellow, the Digital Forensic Research Lab, Future Europe Initiative, Atlantic Council</li>
<li>Samuel Woolley (<a href="https://twitter.com/samuelwoolley">@samuelwoolley</a>) Research director, DigIntel Lab, Institute for the Future, researcher, Computational Propaganda Project, University of Oxford</li>
</ul>
<p>And if you appreciate the work I do here, and on Covert Contact, <a href="https://www.patreon.com/covertcontact">please consider supporting me on Patreon</a>.</p>
]]></content:encoded></item><item><title><![CDATA[The Crypto Wars: Update from the Australian Front]]></title><description><![CDATA[Australian freelance journalist, commentator, and broadcaster Stilgherrian is back to discuss the battle over encryption and the seemingly irreconcilable differences between governments and privacy advocates.]]></description><link>https://blogsofwar.com/the-crypto-wars-update-from-the-australian-front/</link><guid isPermaLink="false">59f66a7e6fa6860023ab4aa9</guid><category><![CDATA[Covert Contact]]></category><category><![CDATA[Stilgherrian]]></category><category><![CDATA[Australia]]></category><category><![CDATA[Technology]]></category><category><![CDATA[Crypto]]></category><category><![CDATA[Intelligence]]></category><category><![CDATA[Law Enforcement]]></category><category><![CDATA[Fred Burton]]></category><category><![CDATA[AusDef Podcast Series]]></category><dc:creator><![CDATA[John W. Little]]></dc:creator><pubDate>Mon, 30 Oct 2017 11:29:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1423784346385-c1d4dac9893a?ixlib=rb-0.3.5&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;s=d60d527cb347746ab3abf5fccecf0271" medium="image"/><content:encoded><![CDATA[<iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/5887859/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/0d88e4/" height="100%" width="100%" scrolling="no" allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe>
<img src="https://images.unsplash.com/photo-1423784346385-c1d4dac9893a?ixlib=rb-0.3.5&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&s=d60d527cb347746ab3abf5fccecf0271" alt="The Crypto Wars: Update from the Australian Front"><p>Australian freelance journalist, commentator, and broadcaster <a href="https://stilgherrian.com/about_stilgherrian/">Stilgherrian</a> is back to discuss the battle over encryption and the seemingly irreconcilable differences between governments and privacy advocates. The Australian government has been particularly active in this space lately and Stil has a lot to say about their approach to the problem and how they could drive responses across the G20.</p>
<p>Stilgherrian’s work can be found at ZDNet Australia, Crikey, Technology Spectator, CSO Online, the ABC’s Drum Opinion, the Sydney Morning Herald, and beyond. He appears frequently on Australian television and radio and, of course, has a podcast of his own – <a href="https://stilgherrian.com/the_9pm_edict/">The 9PM Edict</a>.</p>
<p>This episode includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir <a href="https://www.amazon.com/Ghost-Confessions-Counterterrorism-Fred-Burton-ebook/dp/B00139VURE/ref=sr_1_1?ie=UTF8&amp;qid=1509321671&amp;sr=8-1&amp;keywords=ghost+confessions+of+a+counterterrorism+agent">GHOST: Confessions of a Counterterrorism Agent</a>. His other works include <a href="https://www.amazon.com/Chasing-Shadows-Special-Lifelong-Assassin/dp/0230620558/ref=asap_bc?ie=UTF8">Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice</a> and <a href="https://www.amazon.com/Under-Fire-Untold-Attack-Benghazi/dp/1250041104/ref=asap_bc?ie=UTF8">Under Fire: The Untold Story of the Attack in Benghazi</a>.</p>
<p>I kick off the show with a special announcement. <a href="https://www.patreon.com/covertcontact">Covert Contact now has a Patreon page</a>. With your support I will be able to ramp up show production (eventually producing episodes daily) and release patron only episodes and updates. Reasonable, informed, and non-partisan discussion of critical issues has never been more important. I hope that you will help push Covert Contact to the next level.</p>
]]></content:encoded></item></channel></rss>