/ Covert Contact

Terrorists and Technology

Levi West, Director of Terrorism Studies at Charles Sturt University in Canberra, returns to look at how terrorists leverage (or don’t) emerging apps and platforms ranging from social media, to encryption, to cryptocurrencies. We do our best to cut through the hype and look at the very real limits and challenges terrorists face when they become early adopters or even sophisticated users of networks where states have a very real advantage.

This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir GHOST: Confessions of a Counterterrorism Agent. His other works include Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice and Under Fire: The Untold Story of the Attack in Benghazi.


Like what you're hearing on Covert Contact? Become a Patron to get insider access to special episodes and updates!



John W. Little

John W. Little

John W. Little is the creator of Blogs of War and the host of the Covert Contact national security podcast.

Read More