Scot Terban joined me to discuss the use of shortwave numbers stations, recently declassified KGB investigative techniques for identifying recipients of those broadcasts, how shortwave has changed with the introduction of the internet, and technologies such as software defined radio (SDR) that make capturing mysterious signals affordable (sometimes free) and easier than ever.
Australian freelance journalist, commentator, and broadcaster Stilgherrian is back to discuss the battle over encryption and the seemingly irreconcilable differences between governments and privacy advocates. The Australian government has been particularly active in this space lately and Stil has a lot to say about their approach to the problem and how they could drive responses across the G20.
Stilgherrian’s work can be found at ZDNet Australia, Crikey, Technology Spectator, CSO Online, the ABC’s Drum Opinion, the Sydney Morning Herald, and beyond. He appears frequently on Australian television and radio and, of course, has a podcast of his own – The 9PM Edict.
This episode includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir GHOST: Confessions of a Counterterrorism Agent. His other works include Chasing Shadows: A Special Agent’s Lifelong Hunt to Bring a Cold War Assassin to Justice and Under Fire: The Untold Story of the Attack in Benghazi.
I kick off the show with a special announcement. Covert Contact now has a Patreon page. With your support I will be able to ramp up show production (eventually producing episodes daily) and release patron only episodes and updates. Reasonable, informed, and non-partisan discussion of critical issues has never been more important. I hope that you will help push Covert Contact to the next level.
Keybase is a small but ambitious company that aims to make cyrpto available and virtually seamless for everyone. Their approach to this problem, a massively challenging one that hasn’t really been cracked to date, has been creative. However, the flexibility and scope of potential applications hasn’t always been obvious as they’ve slowly scaled up from an invitation only directory with basic functionality to the much more robust layer of services and platforms supported today. I have followed the development of Keybase (my profile and proofs) closely and was excited to talk with co-founder Max Krohn about the product, the company’s unique approach, and the potential to apply Keybase’s model to solve problems like we’ve seen recently with the Qatar News Agency hack.
In episode 31 I’m joined by Patrick Skinner, Director of Special Projects for The Soufan Group. Patrick is a former CIA case officer who specializes in counter-terrorism issues. Patrick’s background in both law enforcement (US Air Marshals and the US Capitol Police) and intelligence has positioned him to understand the full array of challenges we face in our intelligence and counterterrorism efforts and it is those challenges that we focus on in this podcast.
How dow we deal with unpreventable attacks? How do we attack root causes? How can an enormous bureaucracy like the U.S. government adapt to fight incredibly agile adversaries? Does consumer encryption really present a significant barrier? How do we find the balance between human intelligence and technology driven collection? We cover it all – and then some in this episode.
Over the past couple of weeks I’ve been evaluating ProtonMail. This service is part of a new generation of tools (most inspired by Edward Snowden) developed with the aim of delivering robust encrypted communications and file sharing to the widest possible audience.
Blogs of War readers know that I’m not an Edward Snowden fan, far from it in fact, but I do believe that we have to secure the applications and communication channels that now pervade our lives. Not because I’m worried about the NSA. Frankly I’m far more worried about every other threat. However, I’m also keenly aware of the terrorist and criminal threats we face and why law enforcement agencies and intelligence services (the friendly ones) are deeply concerned about bad actors having the ability to go dark.
There are well-intentioned people on both sides of the privacy debate (see episode 18 with retired FBI agent David Gomez for a law enforcement perspective) and Andy Yen, as a privacy advocate, makes a powerful case for making encrypted communication tools as widely available as possible.
For more from Andy I recommend his TED Talk “Think your email’s private? Think again“.
I emailed retired FBI agent David Gomez from my new ProtonMail account to propose a podcast about encryption and its effect on mass surveillance from a homeland security and law enforcement perspective. You’re reading this because he immediately accepted.
Encrypted communication has been available to consumers for decades but new tools are arriving that are actually making it an accessible and realistic option for the majority of users. Easy to use strong encryption is, in many ways, a wonderful thing. It means that good people in bad places might have more freedom to communicate. It means that people can trust that a point to point communication is just that. But it also means that a lot of people with bad intentions will find it easier to go dark, to plot, and to recruit – often across international borders. How are governments going to cope with this especially when they’ve enjoyed great success with the current collection models that allow them to intercept electronic communications on a massive scale?
Even if you support strong encryption and disagree with government interception of electronic communications you must acknowledge the impact that cutting them out of the loop could have on our security. That tradeoff is the topic we struggle with in this episode.
You can follow David on Twitter @AllThingsHLS.
This week I’m focusing on a single critical topic – the struggle between privacy advocates and governments over cryptography. This is a sensitive topic and there are a lot of extreme positions on the matter. I attempt to take a balanced look at both sides of the issue, offer my thoughts about who might win the war, and I explore what the eventual outcome might mean for intelligence professionals. However, I also argue that if either side “wins” the war without understanding and accommodating the positions of the other, we all stand to lose.
This is a slightly shorter and more focused episode but I’m exploring this format with the intention of releasing more than one episode per week. Please let me know what you think about the format change. You can do that on the Covert Contact Facebook Page or by connecting with me on Twitter @CovertContact.