Podcast series covering various topics in security and technology
Episodes
Sunday Nov 12, 2017
Rebel Power with Peter Krause
Sunday Nov 12, 2017
Sunday Nov 12, 2017
Peter Krause discusses his new book "Rebel Power: Why National Movements Compete, Fight, and Win"
The interview today was conducted by Chelsea Daymon, and the show is produced by Chelsea Daymon and Sina Kashefipour.
If you have enjoyed listening to The Loopcast please consider making a donation to the show through our Patreon. We greatly appreciate it.
Sunday Oct 29, 2017
Strategy and the North Korea crisis
Sunday Oct 29, 2017
Sunday Oct 29, 2017
David Maxwell discusses strategy and the North Korea crisis. His blog can be found here, and his latest articles on North Korea can be found here: "Why We Are Where We Are With North Korea - And Where Do We Go From Here?" and "15 assumptions about the behavior of North Korea’s Kim Family Regime (KFR)."
The interview today was conducted by Chelsea Daymon, and the show is produced by Chelsea Daymon and Sina Kashefipour.
If you have enjoyed listening to The Loopcast please consider making a donation to the show through our Patreon. We greatly appreciate it.
Wednesday Nov 18, 2015
National Security and Assured U.S. Electrical Power
Wednesday Nov 18, 2015
Wednesday Nov 18, 2015
Vice Admiral Lee Gunn, USN (Ret.), Vice Chairman of CNA's Military Advisory Board discusses our national security and assured U.S. electrical power.
You can read the full CNA report here: National Security and Assured U.S. Electrical Power
Thursday Oct 15, 2015
Thursday Oct 15, 2015
Charlie Winter continues his research on Islamic State (IS/ISIS) propaganda and discusses his newest paper Documenting the Virtual 'Caliphate'.
Here's his recent BBC News article which was also mentioned in the show: Fishing and Ultraviolence
Monday Jun 08, 2015
The Art of Open Source Intelligence (OSINT)
Monday Jun 08, 2015
Monday Jun 08, 2015
Justin Seitz discusses the art of open source intelligence (OSINT). With thoughts on: social media platforms, ISIS, law enforcement, and much, much more.
(He shares some thoughts on Python too!)
You can read more of Justin's thoughts on his blog.
To learn more about automating OSINT collection go to his website.
Monday May 11, 2015
Online Jihad 2001-2015: A History of Jihobbyism
Monday May 11, 2015
Monday May 11, 2015
Scot Terban discusses Online Jihad from 2001-2015: A History of Jihobbyism.
Read more of Scot's work on his blog.
Monday Apr 06, 2015
Is ISIS's Messaging More on Point Than al-Qaeda's for Potential Recruits?
Monday Apr 06, 2015
Monday Apr 06, 2015
J.M. Berger discusses: Is ISIS's Messaging More on Point Than al-Qaeda's for Potential Recruits?
Don't forget to check out J.M's new book co-authored with Jessica Stern:
ISIS: The State of Terror
Wednesday Sep 24, 2014
Automotive Security, Society, and the Law.
Wednesday Sep 24, 2014
Wednesday Sep 24, 2014
Beau Woods and Joshua Corman discuss automotive security, society, and the law.
Please make sure to check out the "Five Star Automotive Cyber Safety Program"
Saturday Sep 13, 2014
The Legal Side of Exploit Research, Development, and Sales
Saturday Sep 13, 2014
Saturday Sep 13, 2014
Jim Denaro, infosec and intellectual property attorney, discusses the legal implications of exploit research, development, and sales.
You can check out Mr. Denaro's DEF CON presentations here: "How to Disclose or Sell an Exploit Without Getting in Trouble" and "How to Disclose an Exploit Without Getting into Trouble"
Sunday Aug 24, 2014
Jihadi OPSEC and use of encryption
Sunday Aug 24, 2014
Sunday Aug 24, 2014
Dr. Krypt3ia discusses how jihadis use encryption software and broader OPSEC methods.
You can read Krypt3ia's broader treatment of jihadi encryption here, here, and here.