Episodes
-
Journey back to the dawn of the internet age with "The Cuckoo's Egg," the true story of how an astronomer-turned-systems administrator accidentally stumbled upon one of history's first documented cases of computer espionage and launched a digital manhunt that would change cybersecurity forever.
This episode unravels the fascinating detective work of Clifford Stoll, who noticed a 75-cent accounting discrepancy that led him down a rabbit hole of intrigue. What began as simple curiosity evolved into a year-long pursuit of a phantom hacker infiltrating sensitive military and research networks across the United States—all in an era before firewalls, security teams, or even the concept of "cybersecurity" existed.
We'll explore the ingenious low-tech and high-tech methods Stoll improvised to track his adversary—from physical wiretaps and printouts to custom-built monitoring tools—all while navigating a bureaucratic maze of skeptical government agencies reluctant to acknowledge the threat. The investigation ultimately spans continents, revealing a complex web of international espionage that nobody was prepared to confront.
Perhaps most valuable are the timeless lessons this pioneering case offers about network vulnerabilities, the challenges of attribution in digital attacks, and the critical importance of cross-border collaboration in cybersecurity. Many of the fundamental principles of digital forensics that professionals use today were born from this single case.
Join us for this riveting exploration of the hunt that helped define an emerging field and forever changed how we think about security in our connected world.
-
Explore the fascinating world of unmanned aerial technology with our deep dive into "Mastering Drone Design and Programming" by Cybellium Ltd. This episode unravels the complex web of knowledge needed to create and control these revolutionary flying machines that are transforming industries across the globe.
We begin by tracing the remarkable evolution of drones from their military origins to their current ubiquitous presence in our skies—performing critical roles in healthcare delivery, cinematic storytelling, real estate marketing, and precision agriculture. You'll discover how these versatile machines have rapidly moved from specialized military technology to accessible tools driving innovation in countless sectors.
The technical heart of this episode breaks down the essential components of drone engineering: the principles of aerodynamics that keep them aloft, the critical hardware systems that power their flight, the sophisticated sensors that help them perceive their environment, and the propulsion mechanisms that drive their movement. We'll explore how artificial intelligence and machine learning are revolutionizing drone capabilities, enabling autonomous navigation and decision-making that seemed impossible just years ago.
Beyond the technical, we tackle the important ethical questions and regulatory challenges facing the drone industry. From privacy concerns to airspace management, these issues will shape the future of drone technology as much as engineering advancements. We'll also look ahead to how emerging technologies like quantum computing might transform drone simulation and development.
Whether you're an aspiring drone engineer, a technology enthusiast, or simply curious about the flying robots increasingly populating our skies, this episode offers a comprehensive roadmap to understanding one of today's most dynamic technological frontie
-
Missing episodes?
-
Dive into the near-future battleground of Mark M. Whelan's thrilling novella, "Synthetic Rising", on this episode! We're dissecting a world where 4D bio-printing has birthed synthetic humans – beings capable of the extraordinary. But what happens when one synth, known only as "1", evolves far beyond his creators?
This week, we explore:
The rise of "1", whose terrifying power to create mosquito-sized nano-drones makes him an unstoppable force.
The desperate struggle as "1" seizes control of governments and society itself.
The unlikely resistance: Hacker group "Zero", led by their brilliant namesake, using every digital trick to fight back against synthetic domination.
The heart-pounding action and suspense of a high-stakes battle for humanity's future.
Whelan's deep dive into themes of power, control, and technology's double-edged sword – how far is too far when creating life?
Join us as we unpack the ethical dilemmas, the relentless pace, and the thought-provoking core question: What are the consequences of creating beings more powerful than ourselves? Is "Synthetic Rising" a cautionary tale or a pulse-pounding glimpse of tomorrow? We break down the action, the ideas, and why this novella is a must-read for sci-fi and biotech thriller fans. Tune in now!
-
Army of None Autonomous Weapons and the Future of War.
-
Take to the skies with confidence as we explore "Drone Piloting For Dummies" by Curt Simmons, your complete guide to navigating the exciting world of unmanned aerial vehicles. Whether you're a weekend enthusiast or aspiring professional, this episode unlocks the essential knowledge you need to pilot drones safely, legally, and creatively.
We'll walk through the critical first steps every drone pilot must take, from properly registering your aircraft to understanding the complex web of FAA regulations that govern our shared airspace. Learn how to interpret sectional charts like a seasoned pilot, making sense of airspace classifications and restricted zones that could otherwise lead to costly violations or dangerous situations.
Beyond the legalities, discover practical flight skills that will transform you from nervous novice to confident controller. We'll cover techniques for flying in challenging weather conditions, troubleshooting common piloting problems, and executing those emergency procedures you hope you'll never need but must know how to perform.
For those looking to capture stunning aerial imagery, this episode dives into the art of drone photography and videography. From optimal camera settings and composition techniques to video editing tips that will make your footage soar, you'll learn how to make the most of your drone's eye in the sky.
Finally, for those dreaming of turning their drone hobby into something more, we explore the growing career opportunities for qualified drone pilots and offer practical advice on establishing your own freelance drone business. Join us for this comprehensive flight plan to drone mastery that puts safety first while opening up a world of creative and professional possibilities.
-
Explore the secretive world of history's most notorious combat specialists. Each episode examines different assassination traditions - from the fortress-dwelling Assassins of Alamut to the shadows of feudal Japan. Through historical analysis, we'll investigate their weapons, techniques, and fortress designs, separating myth from documented fact. Perfect for military historians, martial artists, and anyone fascinated by these legendary warriors.
-
Discover how unmanned aerial vehicles are transforming the architecture, engineering, and construction industries in this comprehensive exploration of Daniel Tal and Jon Altschuld's strategic guide, "Drone Technology in Architecture, Engineering, and Construction."
This episode takes you above the construction site to reveal how drones have become essential tools for modern AEC professionals. From initial site surveys to progress monitoring and final documentation, we'll examine how these flying data-gathering platforms are creating unprecedented efficiencies and capabilities throughout the project lifecycle.
Learn the practical aspects of implementing drone technology, including how to select the right hardware and software for specific project needs, navigate the complex legal landscape of commercial drone operations, and develop best practices for safe and effective flights. We'll dive into the technical aspects of photogrammetry—the science of creating accurate measurements and 3D models from photographs—and how drone-captured data can be transformed into actionable insights for project teams.
Beyond the technical, we'll explore the business case for drone implementation, including cost-benefit analysis, risk assessment strategies, and methods for seamlessly integrating drone services into existing workflows. Whether you're considering adding drone capabilities to your firm or looking to maximize the value of current operations, this episode offers valuable guidance for AEC professionals at any stage of drone adoption.
Join us for this forward-looking examination of how the aerial perspective is creating new possibilities in design, construction monitoring, and project management—and get a glimpse of emerging trends that will shape the future of drone technology in the built environment.
-
This podcast delves into Michel Houellebecq's provocative work "Annihilation," examining his unflinching portrayal of modern spiritual emptiness and societal decay. Join us as we analyze Houellebecq's nihilistic vision of contemporary Western civilization, his critique of consumerism, and his controversial perspectives on sexuality, religion, and human connection. Through close readings and cultural context, we'll explore how Houellebecq diagnoses the malaise of modern life while offering few remedies—a literary approach that has made him one of France's most polarizing yet influential writers.
-
Security Hacking Incidents A Timeline of Cyber Breaches.
-
A Comprehensive List of Cyberattacks.
-
The Behavioral Table of Elements Reference
-
This collection of excerpts introduces the concept of LikeWar, a new form of conflict where social media blurs the lines between war and peace, making individuals potential targets and transforming online interactions into a new battlespace. The authors illustrate this through examples ranging from gang violence in Chicago and the Islamic State's viral marketing campaigns to Russian disinformation efforts and the manipulation of information during elections. The text explores the historical evolution of communication technologies, from the telegraph to the smartphone, and how the rise of social media has led to information inundation, the spread of fake news, and the potential for algorithmic manipulation. It also highlights the challenges faced by social media companies in moderating content and the importance of media literacy in navigating this new digital landscape.
-
This excerpt introduces the concept of classifying human behavior into four distinct colors: Red, Yellow, Green, and Blue, as outlined in the book Surrounded by Idiots. The author shares personal anecdotes and observations illustrating the characteristic traits, communication styles, and potential challenges associated with each color profile. The text also explores how to recognize these different behaviors in oneself and others, and offers strategies for adapting communication to better interact with each type. Ultimately, the goal is to foster understanding and reduce misunderstandings by recognizing that differences in behavior are not necessarily indicators of intelligence, but rather variations in innate temperament and patterns.
-
This excerpt introduces the concept of "energy vampires", individuals whose behaviors drain the energy of those around them. The author shares personal experiences from his time working in a bank, illustrating how different personality types, such as perfectionists and dramatic individuals, can negatively impact others. The text explores various types of these energy-draining personalities, including passive-aggressive individuals, whiners, and know-it-alls, outlining their characteristics and the difficulties they present. Ultimately, the excerpt emphasizes the importance of self-awareness and understanding these behaviors to effectively manage interactions and protect one's own energy, suggesting strategies for dealing with these challenging people.
keepSave to notecopy_alldocsAdd noteaudio_magic_eraserAudio OverviewflowchartMind map
-
In 2017 NotPetya cyberattack, which originated in Ukraine and rapidly spread worldwide, causing billions of dollars in damage. The source explains how the attack propagated through tax accounting software and leveraged stolen NSA exploits, disguising itself as ransomware while actually functioning as a wiper malware designed to destroy data.
The video suggests that the attack was carried out by the Russian hacker group Sandworm and may have had dual objectives: not only inflicting damage but also covering up traces of prior cyber-espionage operations. It also discusses the lack of global accountability for such cyberattacks, despite their devastating consequences.
Attack Vector: Spread via compromised tax software (MEDoc) and repurposed NSA exploits (EternalBlue).
Disguise: Masqueraded as ransomware (demanding payment) but was data-destructive wiper malware.
Attribution: Strongly linked to Sandworm (Russian GRU-linked hackers).
Possible Motive: Beyond disruption, may have aimed to erase evidence of earlier espionage.
Aftermath: Highlights the absence of international consequences for state-sponsored cyberattacks.
-
An interview with "Occupy the Web" by David Bombal, discussing the Pegasus spyware. The speakers explain that Pegasus, initially for iOS but now on Android, is a powerful surveillance tool used by governments globally. They highlight its capability to infiltrate phones with zero or minimal user interaction, allowing access to messages, contacts, and device functions, raising significant privacy and human rights concerns. The conversation also touches on the zero-day exploit industry and the difficulty in detecting and preventing such sophisticated malware.
-
Este excerto do livro "Cyber War: The Next Threat to National Security and What to Do About It" de Richard A. Clarke e Robert K. Knake discute a evolução e as vulnerabilidades da guerra cibernética. Os autores exploram exemplos históricos de ataques cibernéticos, incluindo incidentes na Estónia, Geórgia e contra a Coreia do Norte, destacando a dificuldade de atribuição e as falhas de segurança existentes. A discussão aborda a falta de regulamentação, a necessidade de uma defesa robusta da infraestrutura crítica e a possibilidade de acordos internacionais para limitar a guerra cibernética, comparando a situação atual com o desenvolvimento da estratégia nuclear na Guerra Fria.
-
Journey back to the dawn of personal computing and discover the radical vision of Ted Nelson's "Computer Lib/Dream Machines" – a counterculture manifesto that challenged the tech establishment and imagined a future where computers would serve human creativity rather than corporate interests.
This episode explores how Nelson's groundbreaking 1974 work sought to democratize computing knowledge by stripping away technical jargon and empowering ordinary people to understand and control these powerful new tools. With the rallying cry "You can and must understand computers NOW," Nelson fought against what he called "cybercrud" – the deliberate mystification of technology by experts to maintain their power and status.
We'll examine Nelson's expansive vision that went far beyond technical instruction to encompass everything from hardware fundamentals to artificial intelligence, from computer graphics to the social implications of widespread computing. Most importantly, we'll explore his revolutionary concept of computers as tools for individual liberation, creative expression, and grassroots revitalization of society – ideas that would later influence developments like hypertext and the World Wide Web.
Nelson's prescient warnings about technology's potential for control and manipulation feel eerily relevant in today's digital landscape. His insistence that computers should serve humanity rather than reshape humans to serve technological systems offers a compelling alternative to the path that computing has often taken since.
Join us for this fascinating look at a visionary thinker who, decades before Silicon Valley's rise, imagined a more humane and empowering relationship between people and their machines.
-
Explore the shadowy world of global finance and manipulation in Confessions of Power: The Hidden Economics of Control. Inspired by John Perkins’ The New Confessions of an Economic Hit Man, this podcast uncovers the tactics used to entrap developing nations in crippling debt, serving the interests of powerful corporations and governments. Each episode examines case studies from Indonesia to Iran, revealing the “death economy” fueled by fear, exploitation, and resource control. Join us as we contrast this predatory system with a hopeful vision of a “life economy” and discuss how individuals and nations can resist and create a sustainable, equitable future.
-
This extensive text from L. Ron Hubbard's Dianetics 55! outlines fundamental concepts within Dianetics and Scientology, emphasizing the critical role of communication in mental and physical well-being. Key terms are defined, including Affinity, Reality, and Communication, which together constitute understanding and are considered vital to life. The text introduces the Eight Dynamics as the urges toward survival and proposes Pan-determinism, a willingness to control across all dynamics, as a mark of sanity and ability. Various auditing processes, particularly the Six Basic Processes and techniques like the Remedy of Havingness and Remedy of the Barrier of Time, are presented as tools to improve communication, address past traumas (engrams), and facilitate exteriorization (the separation of the "awareness of awareness unit" from the body), leading to greater freedom and ability
- Show more