Terrorists and Technology | Episode 85

Levi West, Director of Terrorism Studies at Charles Sturt University in Canberra, returns to look at how terrorists leverage (or don’t leverage) emerging apps and platforms ranging from social media, to encryption, to cryptocurrencies. We do our best to cut through the hype and look at the very real limits and challenges terrorists face when they become early adopters or even sophisticated users of networks where states have a very real advantage.

Economic Espionage: No One Is Immune | Episode 84

William J. Tucker, a regular contributor on counterintelligence and security topics for Blogs of War and Covert Contact, joins me for a deep dive on economic espionage. Organizations face far more risk from this threat than they realize, or want to realize, and most are no match for an interested foreign intelligence service. We discuss these threats, share some case studies, and look at what companies can do to better protect themselves.

You can follow William on Twitter @tuckerwj.

The Crypto Wars: Update from the Australian Front | Episode 82

Australian freelance journalist, commentator, and broadcaster Stilgherrian is back to discuss the battle over encryption and the seemingly irreconcilable differences between governments and privacy advocates. The Australian government has been particularly active in this space lately and Stil has a lot to say about their approach to the problem and how they could drive responses across the G20.

Stilgherrian’s work can be found at ZDNet Australia, Crikey, Technology Spectator, CSO Online, the ABC’s Drum Opinion, the Sydney Morning Herald, and beyond. He appears frequently on Australian television and radio and, of course, has a podcast of his own – The 9PM Edict.

This episode includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir GHOST: Confessions of a Counterterrorism Agent. His other works include Chasing Shadows: A Special Agent’s Lifelong Hunt to Bring a Cold War Assassin to Justice and Under Fire: The Untold Story of the Attack in Benghazi.

I kick off the show with a special announcement. Covert Contact now has a Patreon page. With your support I will be able to ramp up show production (eventually producing episodes daily) and release patron only episodes and updates. Reasonable, informed, and non-partisan discussion of critical issues has never been more important. I hope that you will help push Covert Contact to the next level.

From CIA Case Officer to Rookie Cop | Episode 81

Former CIA Case Officer Patrick Skinner has appeared on Covert Contact several times to discuss intelligence issues and break down significant terrorist attacks. Last year, driven by more than a little frustration and a desire to act locally, Patrick decided to make a fascinating career transition and become a local police officer. In episode 81 I catch up with Patrick, discuss the transition, and we dig into the many ways that what he is learning could inform policing, those in his former profession, and policymakers.

Propaganda, Influence, and Disruption | Episode 79

Andrew Trabulsi, a strategy, technology, and intelligence consultant and co-editor of Warlords, Inc.: Black Markets, Broken States, and the Rise of the Warlord Entrepreneur, joins me in episode 79 to look at recent developments in the social media space of the investigation into Russian meddling in the U.S. election and what the evidence says about our ability (or inability) to identify and address modern propaganda. The techniques used in the 2016 election are not new but the potential for disaster rises as awareness about how they can be leveraged and misused spreads and the technological and social changes that amplify their effects continue their rapid advance. Complete solutions will remain elusive so how do we, and the platforms we depend on, push back?

Australian Cyber Policy | Episode 78

Episode 78 wraps up a full month of focus on Australian defense perspectives with a look at cyber policy with the highly-regarded freelance journalist, commentator, and broadcaster Stilgherrian.

We tend to look at technology, and its impact on society, governance, and privacy, through a similar lens so I’ve always found the regional perspective he brings to those discussions to be very useful. If there’s an event in Australia related to technology, governance, security, or privacy Stil is almost certainly involved as an observer or speaker. His work can be found at ZDNet Australia, Crikey, Technology Spectator, CSO Online, the ABC’s Drum Opinion, the Sydney Morning Herald, and beyond. He appears frequently on Australian television and radio and, of course, has a podcast of his own – The 9PM Edict.

In this episode we dig into recent developments in Australian cyber policy and the role Australia plays in Five Eyes, and the region, from a cyber perspective. Along the way we take quite a few diversions into the Australian tech sector, military history, and unfortunate acronyms.

Australian Approaches to Counterterrorism | Episode 77

The third week of episodes focused on Australian security perspectives continues with a discussion about Australia’s approach to counterterrorism with Levi West. Levi is the Director of Terrorism Studies at Charles Sturt University in Canberra.

Our discussion is wide ranging and spans how the university’s terrorism program is structured, the legal framework governing security operations inside Australia, community engagement, and the nature of the threats facing Australia.

Understanding and Developing Resilience To Information Warfare | Episode 75

Dr. Clint Arizmendi, an Adjunct Senior Research Fellow for the Australian Graduate School of Policing & Security’s Terrorism Studies program at Charles Sturt University, joins me to discuss information warfare in episode 75.

Of course, we look at the subject primarily through the lens of current events. Russia is covered, as is the Trump administration, social media, and the role technology companies and their platforms play in facilitating propaganda networks and distribution.

This is an issue that, primarily thanks to technology, can feel a bit overwhelming at times. The volume of propaganda that can be directed at an adversary is unprecedented. The ways in which it can be finely tuned and targeted are new developments as well. But all is not lost and we offer reasons for hope. We also argue for slight changes in perspective that will help mitigate the impact of messaging that seeks only to create chaos and divide its targets.

Deep State Conspiracies | Episode 74


Alex Finley
, a former officer of the CIA’s Directorate of Operations, joined me to discuss the rise of deep state conspiracies that often feature a monolithic, highly partisan, intelligence community at their center.

Much of Alex’s work (see the hilarious Victor in the Rubble and The Intelligence Community: Smart People Looking at Computers) demystifies the work of the intelligence community by exposing the tedious realities of government work. It is a perfect contrast to conspiracy theorist fantasies.

We also take on the current administration’s view of the IC, Russia’s role in fueling these (ultimately damaging) views in the United States, and the unusually high media profile of former IC leaders during these turbulent times.

Data, AI, and Ethics | Episode 73

Entrepreneur Evanna Hu joins me to discuss our rapidly evolving relationship with data. The explosion of data streams and technologies that offload challenging analysis to machines are creating interesting national security challenges and opportunities at lightening speed. Evanna, and her company Omelas, seek to leverage these technologies to address hard national security problems (such as countering violent extremism) where metrics have been difficult to acquire or generate.

While opportunity abounds, so do potential ethical dilemmas. It’s impossible to discuss the potential of these technologies without considering the countless ways that they could be abused. Many people still fail to appreciate the amount of data they generate and how it can be used by actors both good and bad.