AI AI-Driven Transformation: A Strategy for the U.S. Intelligence Community Implementing Generative AI is an essential shift for the U.S. Intelligence Community, set to yield remarkable benefits if obstacles in training, security, ethics, and regulation are effectively addressed.
Space Facing the New Frontier: The Imperative of Tactically Responsive Launch in the U.S.-China Space Race As the U.S.-China space race escalates, tactically responsive launch (TRL) is crucial. TRL permits quick satellite deployment, countering space warfare threats. Technological advancements and policy adjustments are imperative in this new space age.
AI Fiction Echoes of Orion In the labyrinth of cyber espionage, an NSA analyst and her AI partner decode Russian military communications. As they unravel the mystery of 'Project Orion', a narrative of urgency, secrecy, and imminent threat unfolds.
AI AI and SDR: Enhancing Signal Intelligence AI and Software Defined Radio can combine to transform signals intelligence, offering innovative solutions for improved intelligence gathering and analysis, with significant current capabilities and potential future advancements.
AI Fiction Project Ava: Prague's Shadows Follow seasoned HUMINT intelligence officer Jeremy Winters as he navigates the treacherous streets of Prague with AVA, his trusted AI partner.
AI Generative AI as an Analyst Support Tool Generative AI has the power to revolutionize the way that geopolitical analysts work by providing them with new and innovative ways to collect, analyze, and interpret information.
AI An Open Letter to Intelligence Analysts from ChatGPT As generative AI becomes more prevalent in everyday life, intelligence analysts will need to learn how to use it effectively to stay competitive.
Security Combating Chinese Cyber Threats in South Korea In light of the escalating cyber threats from China, it is imperative to focus on collaborative defense initiatives that can enhance South Korea's cybersecurity resilience and create a more secure digital landscape.
Moldova A History of Russian Aggression and Interference in Moldova's Post-Soviet Independence Russian interference in Moldovan affairs has a long and complex history that dates back to the collapse of the Soviet Union in 1991.
Counterintelligence Covert Contact Podcast: The Chinese Espionage Episodes Your guide to 12 Covert Contact episodes focused on the counterintelligence challenges posed by China.
Russia-Ukraine Russia Invades Ukraine Putin has launched a criminal war based on an unhinged, paranoid interpretation of history and driven by an uncontrolled lust for power. Failing to act risks letting a mafia state grab the reins and steer the world into a dark future.
Russia-Ukraine Inoculate Yourself Against Russian Disinformation - And Its Amplifiers With a little effort and objectivity anyone can learn to spot Russian disinformation narratives. They are pervasive, adaptable to any ideology, and increasingly destabilizing. Developing and honing this skill has never been more important.
Covert Contact Shortwave Numbers Stations Scot Terban joined me to discuss the use of shortwave numbers stations, recently declassified KGB investigative techniques for identifying recipients of those broadcasts, and how shortwave has changed with the introduction of the internet.
Covert Contact Chinese Spies in US Law Enforcement - And Everywhere Else The regular counterintelligence chat with William Tucker is a day late but full of new Chinese espionage activity in the NYPD, the EU, and beyond. We also touch on intelligence history and why literature from the Middle Ages or beyond is not only fascinating but still relevant.
Counterintelligence The Threat of Fake Spies William Tucker returns to discuss the incredible case of Garrison Courtney and Alpha-214. Posing as a CIA NOC Courtney was able to engineer a scheme that duped numerous beltway contractors, intelligence officials, former military officers and many others.
Counterintelligence Election Threats and Disrupting Chinese Espionage In this episode we discuss the recent report for Microsoft that details Russian, Chinese, and Iranian attacks on individuals and organizations tied to our presidential campaigns and the recent move to revoke the visas of more than 1,000 Chinese grad students and researchers
Counterintelligence French Officer Busted Spying on NATO for GRU & Other Espionage Cases William Tucker joins me to discuss two high profile cases this week, sloppy Chinese tradecraft, and why it always pays to visit the FBI before the FBI visits you.
Covert Contact Texas A&M, NASA, and Chinese Espionage William Tucker joins me to discuss the Zhengdong Cheng case, how Chinese espionage might be forced to evolve, global awareness of the scope of China’s spying, and how organizations can protect themselves if they haven’t started evaluating their own risk.
Covert Contact Careers in Intelligence: Beyond the Three Letter Agencies Dean Baratta joins me to discuss the rapidly diversifying and expanding non-traditional career paths in intelligence. We also touch on some tips for those looking to enter the field.
Covert Contact Spying for Russia: The Peter Debbins Case William Tucker joins me again to look into yesterday’s indictment of Peter Rafael Dzibinski Debbins, a former Green Beret alleged to have worked for Russian intelligence for over a decade.
William J. Tucker Counterintelligence Chat: Alexei Navalny & Alexander Ma William Tucker returns to look at the apparent poisoning of Alexei Navalny and yet another Chinese espionage case, this time involving Alexander Ma. It’s a classic case, with a Hawaii connection, and there’s likely more interesting details to come.
Covert Contact A Pardon for Edward Snowden? William Tucker returns to discuss the Edward Snowden case after President Trump made remarks on the case that sparked new speculation about a potential pardon.
Covert Contact Washington Takes Aim at the Confucius Institute Today’s decision to force the Confucius Institute to register as a foreign mission is the subject of my regular Thursday evening counterintelligence chat with Covert Contact regular William Tucker. We look at why it was necessary and where we, and China, might go from here.
Australia Australia’s Cyber Security Strategy Australian journalist Stilgherrian, returns to Covert Contact to discuss Australia's recently released 2020 cyber security strategy.
Covert Contact Online Security: Avoiding a Personal October Surprise Infosec professional and security blogger Scot Terban joins me to discuss the recent LinkedIn spying case, the degrading environment in social media, and strategies for improving your personal security.