Regular Blogs of War and Covert Contact contributor William J. Tucker joins me to discuss the apparent Russian state-sponsored hack of the DNC. We also spend quite a bit of time discussing the sorry state of security. We’re talking about cyber issues constantly but the intrusions, threats, and vulnerabilities
In episode 51 I’m joined once again by Patrick Skinner, Director of Special Projects for The Soufan Group [http://soufangroup.com/]. Patrick is a former CIA Case Officer, with a background in federal law enforcement, who specializes in counterterrorism issues. You can follow Patrick on Twitter @SkinnerPM [https://twitter.
I recently ran into Daniel Crowley [https://twitter.com/dan_crowley] at the BSides San Antonio [https://twitter.com/BSidesSATX] security conference. He, and other members of Longhorn Lockpicking Club [http://www.meetup.com/li-austin/], had several tables covered with what could have easily been two hundred or more locks
In episode 45 I’m joined again by Patrick Skinner, Director of Special Projects for The Soufan Group [http://soufangroup.com/]. Patrick is a former CIA Case Officer, with a background in federal law enforcement, who specializes in counterterrorism issues. In this episode we discuss the danger of an Islamic
Matthias Pfau [https://twitter.com/matthiaspfau] is co-founder and developer of the encrypted email service Tutanota [https://tutanota.com/]. Tutanota is part of what can be considered a post-Snowden development movement that aims to short-circuit government mass surveillance capabilities. I spoke to Matthias to discuss his project and where he
The Covert Contact podcast kicks off again with an admittedly rambling, but hopefully entertaining, start as I review a number of high profile security issues with counterintelligence pro William J. Tucker. We look at the hack of DCIA John Brennan’s AOL account [http://www.slate.com/blogs/future_tense/
Konstantin Ryabitsev’s high-level security recommendations for Linux Foundations systems administrators [https://github.com/lfit/itpol/blob/master/linux-workstation-security.md]is probably not the kind of document that most of you would read. In fact, I’ve known a shocking number of SysAdmins who wouldn’t take the time to
Over the past couple of weeks I’ve been evaluating ProtonMail [http://protonmail.ch/]. This service is part of a new generation of tools (most inspired by Edward Snowden) developed with the aim of delivering robust encrypted communications and file sharing to the widest possible audience. Blogs of War readers
William J. Tucker joins me again to discuss Hillary Clinton’s decision to manage her own email services while Secretary of State. While this decision has angered political opponents and government transparency advocates (not to mention a few historians) we are bypassing the political and legal issues to zero in
In episode 3 of the Covert Contact podcast [https://blogsofwar.com/tag/podcast/] I’m focusing on a single critical topic – the struggle between privacy advocates and governments overcryptography [https://en.wikipedia.org/wiki/Cryptography]. This is a sensitive topic and there are a lot of extreme positions on the
Nextgov has a rundown of Sonia Brindi’s (Globo) interview with Edward Snowden [http://www.nextgov.com/cloud-computing/2014/06/edward-snowden-i-had-more-access-almost-any-other-official-intelligence-community/85744/] . His narcissism is, once again, on full display: > The public’s bewilderment is misplaced, Snowden replied. “There’s sort of been a misinformation occurring in the U.S.