Covert Contact

About John Little

Covert Contact is hosted by Blogs of War creator John Little. His work and analysis has been featured on the BBC, CBC, ABC, PBS Newshour, Fast Company, CBS, CNN and other international media outlets. The Blogs of War Twitter feed, @Blogsofwar, was selected as one of the top Twitter accounts of 2014 by Time magazine.

Subscribe to Covert Contact

Google PodcastsAndroidby EmailRSSMore Subscribe Options
Home | About the Show | Blogs of War | Subscribe | Contact

Covert Contact Episodes

  • Shortwave Numbers Stations | Episode 118
  • Chinese Spies in US Law Enforcement – And Everywhere Else | Episode 117
  • The Threat of Fake Spies | Episode 116
  • Election Threats and Disrupting Chinese Espionage | Episode 115
  • French Officer Busted Spying on NATO for GRU & Other Espionage Cases | 114
  • Russians Targeted Tesla Gigafactory in Ransomware Plot | Episode 113
  • Texas A&M, NASA, and Chinese Espionage | Episode 112
  • Careers in Intelligence: Beyond the Three Letter Agencies |Episode 111
  • Spying for Russia: The Peter Debbins Case | Episode 110
  • Counterintelligence Chat: Alexei Navalny & Alexander Ma | Episode 109
  • Preparing for A Career in Intelligence: Thoughts on Personal Security and Behavior | Episode 108
  • Understanding the Israel-UAE Deal | Episode 107
  • A Pardon for Edward Snowden? | Episode 106
  • Washington Takes Aim at the Confucius Institute | Episode 105
  • Israel and The United States: Past, Present, and Future with Alon Pinkas | Episode 104
  • Australia’s Cyber Security Strategy | Episode 103
  • Chinese Spies and Russian Honey Traps | Episode 102
  • Quick Take: An Explosion in Beirut | Episode 101
  • Online Security: Avoiding a Personal October Surprise | Episode 100
  • Chinese Espionage in the United States | Episode 99
  • Shaping Intelligence Products for Maximum Impact | Episode 98
  • When You Can’t Obey | Episode 97
  • What’s Happening at the Chinese Consulate in Houston? | Episode 96
  • Covert Contact is Back | Episode 95
  • The Poisoning of Sergei Skripal | Episode 94
  • Team Leadership & Ethics | Episode 93
  • The Jerry Chun Shing Lee Case | Episode 92
  • North Korean Cryptocurrency Ops | Episode 91
  • Combatting Misinformation | Episode 90
  • Evaluating the North Korean Threat | Episode 89
  • Protecting the British Royal Family | Episode 88
  • Beyond Bitcoin: Cryptocurrency Investing | Episode 87
  • Bullets of Palestine | Episode 86
  • Terrorists and Technology | Episode 85
  • Economic Espionage: No One Is Immune | Episode 84
  • Iraq’s Consolidation and the Kurds | Episode 83
  • The Crypto Wars: Update from the Australian Front | Episode 82
  • From CIA Case Officer to Rookie Cop | Episode 81
  • The Kurdish Problem | Episode 80
  • Propaganda, Influence, and Disruption | Episode 79
  • Australian Cyber Policy | Episode 78
  • Australian Approaches to Counterterrorism | Episode 77
  • Australian Special Operations Forces | Episode 76
  • Understanding and Developing Resilience To Information Warfare | Episode 75
  • Deep State Conspiracies | Episode 74
  • Data, AI, and Ethics | Episode 73
  • Beyond Russia: Overlooked Counterintelligence Threats | Episode 72
  • System Failure: It Only Gets More Difficult from Here | Episode 71
  • Iran in the Age of Trump | Episode 70
  • Securing Data, Communications, and Identity with Keybase | Episode 69
  • Egyptian, Muslim, American | Episode 68
  • The Manchester Attack | Episode 67
  • Intelligence Analysis: Feedback, Bias, and Other Challenges | Episode 66
  • Counterintelligence in the Trump Era | Episode 65
  • Exploring Divergent Options | Episode 64
  • Understanding the Pace and Scope of Technology Driven Change | Episode 63
  • Russia, Trump, and Hillary | Episode 62
  • Hillary Clinton and Donald Trump – The First Debate | Episode 61
  • Putin’s Struggle for Relevancy and Power | Episode 60
  • Citizen Soldiers: Service and Sacrifice with Wendy R. Anderson | Episode 59
  • Inside the President’s Daily Brief with David Priess | Episode 58
  • Fragmented Realities – AV and VR Update | Episode 57
  • Russia, Donald Trump, and the 2016 Election | Episode 56
  • Journalism and Conflict in East Africa | Episode 55
  • The Nice, France Attack: How Can Counterterrorism Evolve with the Threat | Episode 54
  • Building an Intel Shop from the Ground Up | Episode 53
  • Russian Hackers Run Wild on the DNC | Episode 52
  • The Orlando Shooting and Our Struggle to Make Sense of the Senseless | Episode 51
  • Victor in The Rubble: Tackling Intelligence Community Bureaucracy Through Satire | Episode 50
  • Developing and Leveraging Strategic Foresight | Episode 49
  • Intelligence at the State and Local Level | Episode 48
  • Lockpicking 101 (And Why Your Locks Are Useless) | Episode 47
  • Cutting Through the Hybrid Warfare Hype | Episode 46
  • How Will ISIS Evolve and How Will Our Response Evolve with Them? | Episode 45
  • Navigating Massive Technological Change | Episode 44
  • Lieutenant Commander Edward Lin: Identity, Espionage, and Counterintelligence | Episode 43
  • The Rise and Challenge of Transnational Crime | Episode 42
  • What Did Russia Gain in Syria? | Episode 41
  • Are Ungoverned Spaces Inherently Dangerous? | Episode 40
  • Russian Strengths – and Weaknesses | Episode 39
  • Iran’s Quest for Regional Domination | Episode 38
  • LZ Grace: A Place for Warriors to Heal | Episode 37
  • Saudi Arabia vs. Iran and The Burns Oregon Militia Standoff | Episode 36
  • Closing Out 2015 and Looking Toward 2016 with William Tucker | Episode 35
  • Art in Diplomacy and Conflict | Episode 34
  • Understanding and Influencing Enemy Behavior | Episode 33
  • Video Games, Virtual Reality, and Conflict with Robert Rath | Episode 32
  • Understanding the Limits of Intelligence and Counterterrorism | Episode 31
  • The San Bernardino Attack, Small Scale Terrorism, and ISIS | Episode 30
  • Islamism and Democracy: Finding Models for the Middle East and Preserving Our Own | Episode 29
  • Thanksgiving | Episode 28
  • Turkey Shot Down a Russian Jet – Where Do We Go From Here? | Episode 27
  • What You Are Getting Wrong About ISIS | Episode 26
  • Catching Russian Spies with Former Double Agent Naveed Jamali | Episode 25
  • The Paris Attacks and Europe’s Security Challenges | Episode 24
  • War and the New Normal: Phil Walter on Life After War | Episode 23
  • Supporting Independent Art in Afghanistan: Francesca Recchia Updates from Kabul | Episode 22
  • The Damascus Cover and the Psychology of Spies with Howard Kaplan | Episode 21
  • Government Email Problems, Wikileaks, Russia, Drone Leaks, NASA Security and Other Counterintelligence Nightmares | Episode 20
  • Encryption as the New Norm: Discussing A Changing Internet with ProtonMail Co-Founder Andy Yen | Episode 19
  • The Battle Between Encryption and Mass Surveillance with Former FBI Agent David Gomez | Episode 18
  • Life, and Art, in Afghanistan with Francesca Recchia | Episode 17
  • Why Terrorism Fails: A Discussion with Max Abrahms | Episode 16
  • Hillary Clinton’s Email Server: Dissecting the Risks with William Tucker | Episode 15
  • Andy Priest on the Importance of Developing New International Crisis Policing Models | Episode 14
  • Scriven King on Balancing Security, Values, and Public Perception in Modern Policing | Episode 13
  • Counterintelligence: William J. Tucker Breaks Down the Challenges | Episode 12
  • Counterterrorism Challenges – Pondering Seemingly Unsolvable Problems with Phillip Smyth | Episode 11
  • The Senate Torture Report | Episode 10
  • Art in Afghanistan: Francesca Recchia Updates from Kabul | Episode 9
  • The Navy SEAL Who Killed Osama bin Laden and the Heroes You’ll Never Know | Episode 8
  • Why Daesh’s Social Media Campaign is a Massive Failure | Episode 7
  • Robots and the Future of Warfare: The Advantage Might Not Lie with the Inventors | Episode 6
  • Lone Wolf Terrorism and the Importance of Perspective | Episode 5
  • What the Attack in Ottawa Teaches Us About Terrorists – And Ourselves | Episode 4
  • Crypto Wars: Winners, Losers, and the Case for Compromise | Episode 3
  • The State of Twitter, the Struggle to Understand, and The Perils of Technology for Terrorists | Episode 2
  • Intelligence Failures, Agent Storm, and eDiplomacy Trolling | Episode 1

Subscribe to Covert Contact

Get More on Blogs of War

Recent Episodes

  • Shortwave Numbers Stations | Episode 118 October 1, 2020
  • Chinese Spies in US Law Enforcement – And Everywhere Else | Episode 117 September 25, 2020
  • The Threat of Fake Spies | Episode 116 September 17, 2020
  • Election Threats and Disrupting Chinese Espionage | Episode 115 September 10, 2020
  • French Officer Busted Spying on NATO for GRU & Other Espionage Cases | 114 September 3, 2020
  • Russians Targeted Tesla Gigafactory in Ransomware Plot | Episode 113 September 1, 2020
  • Texas A&M, NASA, and Chinese Espionage | Episode 112 August 27, 2020
  • Careers in Intelligence: Beyond the Three Letter Agencies |Episode 111 August 23, 2020
  • Spying for Russia: The Peter Debbins Case | Episode 110 August 22, 2020
  • Counterintelligence Chat: Alexei Navalny & Alexander Ma | Episode 109 August 20, 2020

Show Archive

List All Episodes

Topics

Afghanistan Andrew Trabulsi Art Australia Authors Books China CIA Counterintelligence Counterterrorism Dean Baratta Diplomacy Donald Trump Encryption Espionage Francesca Recchia Hillary Clinton InfoSec Intelligence Internet Interview Interviews Iran Iraq ISIS Israel Law Enforcement Media Middle East Military Patrick Skinner Phillip Smyth Phil Walter Politics Russia Scot Terban Security Social Media Strategy Syria Technology Terrorism Virtual Reality Vladimir Putin William Tucker

Thanks To

Announcer: Ben Lewis Sperling

Search

© John W. Little 2014 | Follow @BlogsofWar on Twitter | Privacy Policy