Counterterrorism Zeroing in on Domestic Extremism A collection of useful resources for those tracking domestic extremism including a number of new deep dives on extremist orgs, their TTPs, and strategies for countering them.
Encryption The Future of Signal and Other Stories in Encryption Once information leaves your head it is at risk. There is always some level of risk when traversing other people's hardware, software, and networks. Always.
Covert Contact Terrorists and Technology Levi West, Director of Terrorism Studies at Charles Sturt University in Canberra, returns to look at how terrorists leverage (or don’t) emerging apps and platforms ranging from social media, to encryption, to cryptocurrencies.
Covert Contact The Crypto Wars: Update from the Australian Front Australian freelance journalist, commentator, and broadcaster Stilgherrian is back to discuss the battle over encryption and the seemingly irreconcilable differences between governments and privacy advocates.
Covert Contact From CIA Case Officer to Rookie Cop Former Air Marshall and CIA Case Officer Patrick Skinner has become a become a police officer in his community in an effort to drive change. We discuss the transition and what he is learning in episode 81.
Covert Contact Australian Approaches to Counterterrorism Levi West, the Director of Terrorism Studies at Charles Sturt University in Canberra, joins me for a wide ranging discussion on Australian counterterrorism programs.
Hacking Blogs of Law: United States v. Matish I’ve found mentions of my work in the strangest places but this has to be one of the strangest. A federal judge has ruled that the FBI can gain access to a suspect’s computer without a warrant and he has citied one of my blog posts in support
Technology Crikey: How the FBI Hacked users of Tor – with a Blogs of War mention I wrote a short piece, Tor and the Illusion of Anonymity, that got a lot more attention than I expected it to – including being referenced in a federal case on the subject.