The Loopcast show

The Loopcast

Summary: Podcast series covering various topics in security and technology

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Sina Kashefipour and Chelsea Daymon
  • Copyright: Copyright 2012-2019 Sina Kashefipour and Chelsea Daymon All rights reserved.

Podcasts:

 Episode 75-Somalia and Somaliland | File Type: audio/mpeg | Duration: 00:42:22

Armin Rosen (@arminrosen) and I (@rejectionking) discuss Somalia and Somaliland.

 Episode 74-Afghanistan and Pakistan on the eve of the American pullout from the region | File Type: audio/mpeg | Duration: 00:57:57

Naheed Mustafa (@naheedmustafa) and I (@rejectionking) discuss Afghanistan and Pakistan on the eve of the US withdrawal of the region.

 Episode 74-Afghanistan and Pakistan on the eve of the American pullout from the region | File Type: audio/mpeg | Duration: 00:57:57

Naheed Mustafa (@naheedmustafa) and I (@rejectionking) discuss Afghanistan and Pakistan on the eve of the US withdrawal of the region.

 Episode 74-Afghanistan and Pakistan on the eve of the American pullout from the region | File Type: audio/mpeg | Duration: 00:57:57

Naheed Mustafa (@naheedmustafa) and I (@rejectionking) discuss Afghanistan and Pakistan on the eve of the US withdrawal of the region.

 Episode 73- Strategy and Information Security | File Type: audio/mpeg | Duration: 00:46:09

Dave Aitel (@daveaitel), CEO of Immunity, discusses strategy and information security with me (@rejectionking).  Our conversation covers describe the internet as a "strategic space", what actors are there in this space, the power of leaks, deletion and insertion strategies, the problems of SIGINT, and ending with the 0 day market and hacking back. Dave mentioned Immunity's Daniel Keys Moran Library which can be found here.

 Episode 73- Strategy and Information Security | File Type: audio/mpeg | Duration: 00:46:09

Dave Aitel (@daveaitel), CEO of Immunity, discusses strategy and information security with me (@rejectionking).  Our conversation covers describe the internet as a "strategic space", what actors are there in this space, the power of leaks, deletion and insertion strategies, the problems of SIGINT, and ending with the 0 day market and hacking back. Dave mentioned Immunity's Daniel Keys Moran Library which can be found here.

 Episode 73- Strategy and Information Security | File Type: audio/mpeg | Duration: 00:46:09

Dave Aitel (@daveaitel), CEO of Immunity, discusses strategy and information security with me (@rejectionking).  Our conversation covers describe the internet as a "strategic space", what actors are there in this space, the power of leaks, deletion and insertion strategies, the problems of SIGINT, and ending with the 0 day market and hacking back. Dave mentioned Immunity's Daniel Keys Moran Library which can be found here.

 Episode 72-The Sunni Jihad in Syria | File Type: audio/mpeg | Duration: 00:53:14

Thomas Hegghammer (@hegghammer), Aaron Zelin (@azelin), and I (@rejectionking) discuss the Sunni side of the Syrian Jihad. We discuss Qardawi's call to jihad and the theological underpinnings of that statement, foreign fighters in terms of numbers and motivations, the relationship of the Syrian jihad to the Sunni religious establishment in Saudi Arabia, and briefly comparing the jihad in Syria to previous contemporary jihads. Thomas and Aaron have a good article in Foreign Affairs: "How Syria's Civil War Became a Holy Crusade"

 Episode 72-The Sunni Jihad in Syria | File Type: audio/mpeg | Duration: 00:53:14

Thomas Hegghammer (@hegghammer), Aaron Zelin (@azelin), and I (@rejectionking) discuss the Sunni side of the Syrian Jihad. We discuss Qardawi's call to jihad and the theological underpinnings of that statement, foreign fighters in terms of numbers and motivations, the relationship of the Syrian jihad to the Sunni religious establishment in Saudi Arabia, and briefly comparing the jihad in Syria to previous contemporary jihads. Thomas and Aaron have a good article in Foreign Affairs: "How Syria's Civil War Became a Holy Crusade"

 Episode 72-The Sunni Jihad in Syria | File Type: audio/mpeg | Duration: 00:53:14

Thomas Hegghammer (@hegghammer), Aaron Zelin (@azelin), and I (@rejectionking) discuss the Sunni side of the Syrian Jihad. We discuss Qardawi's call to jihad and the theological underpinnings of that statement, foreign fighters in terms of numbers and motivations, the relationship of the Syrian jihad to the Sunni religious establishment in Saudi Arabia, and briefly comparing the jihad in Syria to previous contemporary jihads. Thomas and Aaron have a good article in Foreign Affairs: "How Syria's Civil War Became a Holy Crusade"

 Episode 71- Car Hacking | File Type: audio/mpeg | Duration: 00:23:11

Chris Valasek (@nudehaberdasher) talks to me (@rejectionking) about car hacking and Chris and Dr. Miller's (@0xcharlie) latest paper "Adventures in Automotive Networks and Control Units." My conversation with Chris begins with why car hacking and looking at automotive networks, followed by looking at methodology and attack surfaces, security features of cars, and then we end the conversation on thematic questions of could automotive hacks be widespread and the problems of a internet of everything. You can find the tools and data here. And if you're interested in reading about automotive security at length please check out the Center for Automotive Embedded Systems Security's website. Great work and research. 

 Episode 71- Car Hacking | File Type: audio/mpeg | Duration: 00:23:11

Chris Valasek (@nudehaberdasher) talks to me (@rejectionking) about car hacking and Chris and Dr. Miller's (@0xcharlie) latest paper "Adventures in Automotive Networks and Control Units." My conversation with Chris begins with why car hacking and looking at automotive networks, followed by looking at methodology and attack surfaces, security features of cars, and then we end the conversation on thematic questions of could automotive hacks be widespread and the problems of a internet of everything. You can find the tools and data here. And if you're interested in reading about automotive security at length please check out the Center for Automotive Embedded Systems Security's website. Great work and research. 

 Episode 71- Car Hacking | File Type: audio/mpeg | Duration: 00:23:11

Chris Valasek (@nudehaberdasher) talks to me (@rejectionking) about car hacking and Chris and Dr. Miller's (@0xcharlie) latest paper "Adventures in Automotive Networks and Control Units." My conversation with Chris begins with why car hacking and looking at automotive networks, followed by looking at methodology and attack surfaces, security features of cars, and then we end the conversation on thematic questions of could automotive hacks be widespread and the problems of a internet of everything. You can find the tools and data here. And if you're interested in reading about automotive security at length please check out the Center for Automotive Embedded Systems Security's website. Great work and research. 

 Episode 70- Jason Healey discusses his book “A Fierce Domain: Conflict in Cyberspace, 1986-2012″ | File Type: audio/mpeg | Duration: 1:13:20

Jason Healey (@jason_healey) and I (@rejectionking) discuss Jason's book "A Fierce Domain: Conflict in Cyberspace, 1986-2012". We open up the discussion with a look at the organization and reasoning behind Jason's book, a look at how we understand state's cyber capabilities, how the United States' creates cyber policy and whether that policy is too militarized, NSA surveillance and the private sector, and we end the show with what would be the ideal cyber policy.   

 Episode 70- Jason Healey discusses his book “A Fierce Domain: Conflict in Cyberspace, 1986-2012″ | File Type: audio/mpeg | Duration: 1:13:20

Jason Healey (@jason_healey) and I (@rejectionking) discuss Jason's book "A Fierce Domain: Conflict in Cyberspace, 1986-2012". We open up the discussion with a look at the organization and reasoning behind Jason's book, a look at how we understand state's cyber capabilities, how the United States' creates cyber policy and whether that policy is too militarized, NSA surveillance and the private sector, and we end the show with what would be the ideal cyber policy.   

Comments

Login or signup comment.