Podcast series covering various topics in security and technology
Episodes
Monday Apr 18, 2016
Illegal Arms Trading and the Use of Social Media in Sales
Monday Apr 18, 2016
Monday Apr 18, 2016
Nic Jenzen-Jones of Armament Research Services (ARES) discusses illegal arms trading and how social media is used for sales.
You can find all of ARES's reports here, including Research Report #5: A Tale of Two Rifles which was mentioned in the discussion.
You can read the New York Times article which features ARES work here: Facebook Groups Act as Weapons Bazaars for Militia.
Wednesday Dec 09, 2015
Countering Violent Extremism: a discussion with Seamus Hughes
Wednesday Dec 09, 2015
Wednesday Dec 09, 2015
Seamus Hughes discusses all things CVE (Countering Violent Extremism) with @cldaymon.
Don't forget to check out ISIS in America: From Retweets to Raqqa
Thursday Oct 15, 2015
Thursday Oct 15, 2015
Charlie Winter continues his research on Islamic State (IS/ISIS) propaganda and discusses his newest paper Documenting the Virtual 'Caliphate'.
Here's his recent BBC News article which was also mentioned in the show: Fishing and Ultraviolence
Wednesday Aug 19, 2015
Wildlife Trafficking
Wednesday Aug 19, 2015
Wednesday Aug 19, 2015
Alexander Olesker discusses wildlife trafficking, poaching and the issues involved in combating this illicit trade.
Wednesday Aug 05, 2015
The Virtual 'Caliphate': A Look at ISIS's propaganda strategy with Charlie Winter
Wednesday Aug 05, 2015
Wednesday Aug 05, 2015
Charlie Winter of the Quilliam Foundation discusses his paper The Virtual 'Caliphate': Understanding Islamic State's Propaganda Strategy
You can read more about Charlie and some of his publications here.
You can also view the #NotAnotherBrother video that Charlie refers to in our discussion, here.
Monday Jun 08, 2015
The Art of Open Source Intelligence (OSINT)
Monday Jun 08, 2015
Monday Jun 08, 2015
Justin Seitz discusses the art of open source intelligence (OSINT). With thoughts on: social media platforms, ISIS, law enforcement, and much, much more.
(He shares some thoughts on Python too!)
You can read more of Justin's thoughts on his blog.
To learn more about automating OSINT collection go to his website.
Monday May 11, 2015
Online Jihad 2001-2015: A History of Jihobbyism
Monday May 11, 2015
Monday May 11, 2015
Scot Terban discusses Online Jihad from 2001-2015: A History of Jihobbyism.
Read more of Scot's work on his blog.
Monday Apr 06, 2015
Is ISIS's Messaging More on Point Than al-Qaeda's for Potential Recruits?
Monday Apr 06, 2015
Monday Apr 06, 2015
J.M. Berger discusses: Is ISIS's Messaging More on Point Than al-Qaeda's for Potential Recruits?
Don't forget to check out J.M's new book co-authored with Jessica Stern:
ISIS: The State of Terror
Thursday Mar 05, 2015
A Discussion With Extreme Dialogue
Thursday Mar 05, 2015
Thursday Mar 05, 2015
We spoke with Rachel Briggs, Christianne Boudreau, and Daniel Gallant of Extreme Dialogue, about their campaign to reduce the appeal of extremism among young people and offer a
positive alternative to the increasing amounts of extremist material and
propaganda available on the Internet and social media platforms.
Please visit Extreme Dialogue's website to learn more, watch Christianne and Daniel's videos, or participate: http://extremedialogue.org/
You can learn more about Rachel and her work at: the Institute for Strategic Dialogue
Christianne is involved in:
Hayat Canada, a family counseling and outreach program for relatives and friends of
persons involved in radical Islamic groups or on the path of a violent
Islamic radicalization, including those traveling to Syria and other
civil war battlefields.
and
Mothers for Life, a unique global network of mothers who have experienced violent jihadist radicalization in their own families.
Learn more about Daniel and his work at his website. You can also read his blog here: scholarsfromtheunderground
Sunday Mar 01, 2015
Sunday Mar 01, 2015
Clint Watts looks at the recent White House summit and discusses countering violent extremism and potential steps for the future.
The talk is based on his recent article which can be found here:
The White House CVE Summit: What Should we expect? More of the same or a new direction to counter ISIS?