![The Loopcast show](/assets/missing_medium.png)
The Loopcast
Summary: Podcast series covering various topics in security and technology
- Visit Website
- RSS
- Artist: Sina Kashefipour and Chelsea Daymon
- Copyright: Copyright 2012-2019 Sina Kashefipour and Chelsea Daymon All rights reserved.
Podcasts:
Armin Rosen (@arminrosen) and I (@rejectionking) discuss Somalia and Somaliland.
Naheed Mustafa (@naheedmustafa) and I (@rejectionking) discuss Afghanistan and Pakistan on the eve of the US withdrawal of the region.
Naheed Mustafa (@naheedmustafa) and I (@rejectionking) discuss Afghanistan and Pakistan on the eve of the US withdrawal of the region.
Naheed Mustafa (@naheedmustafa) and I (@rejectionking) discuss Afghanistan and Pakistan on the eve of the US withdrawal of the region.
Dave Aitel (@daveaitel), CEO of Immunity, discusses strategy and information security with me (@rejectionking). Our conversation covers describe the internet as a "strategic space", what actors are there in this space, the power of leaks, deletion and insertion strategies, the problems of SIGINT, and ending with the 0 day market and hacking back. Dave mentioned Immunity's Daniel Keys Moran Library which can be found here.
Dave Aitel (@daveaitel), CEO of Immunity, discusses strategy and information security with me (@rejectionking). Our conversation covers describe the internet as a "strategic space", what actors are there in this space, the power of leaks, deletion and insertion strategies, the problems of SIGINT, and ending with the 0 day market and hacking back. Dave mentioned Immunity's Daniel Keys Moran Library which can be found here.
Dave Aitel (@daveaitel), CEO of Immunity, discusses strategy and information security with me (@rejectionking). Our conversation covers describe the internet as a "strategic space", what actors are there in this space, the power of leaks, deletion and insertion strategies, the problems of SIGINT, and ending with the 0 day market and hacking back. Dave mentioned Immunity's Daniel Keys Moran Library which can be found here.
Thomas Hegghammer (@hegghammer), Aaron Zelin (@azelin), and I (@rejectionking) discuss the Sunni side of the Syrian Jihad. We discuss Qardawi's call to jihad and the theological underpinnings of that statement, foreign fighters in terms of numbers and motivations, the relationship of the Syrian jihad to the Sunni religious establishment in Saudi Arabia, and briefly comparing the jihad in Syria to previous contemporary jihads. Thomas and Aaron have a good article in Foreign Affairs: "How Syria's Civil War Became a Holy Crusade"
Thomas Hegghammer (@hegghammer), Aaron Zelin (@azelin), and I (@rejectionking) discuss the Sunni side of the Syrian Jihad. We discuss Qardawi's call to jihad and the theological underpinnings of that statement, foreign fighters in terms of numbers and motivations, the relationship of the Syrian jihad to the Sunni religious establishment in Saudi Arabia, and briefly comparing the jihad in Syria to previous contemporary jihads. Thomas and Aaron have a good article in Foreign Affairs: "How Syria's Civil War Became a Holy Crusade"
Thomas Hegghammer (@hegghammer), Aaron Zelin (@azelin), and I (@rejectionking) discuss the Sunni side of the Syrian Jihad. We discuss Qardawi's call to jihad and the theological underpinnings of that statement, foreign fighters in terms of numbers and motivations, the relationship of the Syrian jihad to the Sunni religious establishment in Saudi Arabia, and briefly comparing the jihad in Syria to previous contemporary jihads. Thomas and Aaron have a good article in Foreign Affairs: "How Syria's Civil War Became a Holy Crusade"
Chris Valasek (@nudehaberdasher) talks to me (@rejectionking) about car hacking and Chris and Dr. Miller's (@0xcharlie) latest paper "Adventures in Automotive Networks and Control Units." My conversation with Chris begins with why car hacking and looking at automotive networks, followed by looking at methodology and attack surfaces, security features of cars, and then we end the conversation on thematic questions of could automotive hacks be widespread and the problems of a internet of everything. You can find the tools and data here. And if you're interested in reading about automotive security at length please check out the Center for Automotive Embedded Systems Security's website. Great work and research.
Chris Valasek (@nudehaberdasher) talks to me (@rejectionking) about car hacking and Chris and Dr. Miller's (@0xcharlie) latest paper "Adventures in Automotive Networks and Control Units." My conversation with Chris begins with why car hacking and looking at automotive networks, followed by looking at methodology and attack surfaces, security features of cars, and then we end the conversation on thematic questions of could automotive hacks be widespread and the problems of a internet of everything. You can find the tools and data here. And if you're interested in reading about automotive security at length please check out the Center for Automotive Embedded Systems Security's website. Great work and research.
Chris Valasek (@nudehaberdasher) talks to me (@rejectionking) about car hacking and Chris and Dr. Miller's (@0xcharlie) latest paper "Adventures in Automotive Networks and Control Units." My conversation with Chris begins with why car hacking and looking at automotive networks, followed by looking at methodology and attack surfaces, security features of cars, and then we end the conversation on thematic questions of could automotive hacks be widespread and the problems of a internet of everything. You can find the tools and data here. And if you're interested in reading about automotive security at length please check out the Center for Automotive Embedded Systems Security's website. Great work and research.
Jason Healey (@jason_healey) and I (@rejectionking) discuss Jason's book "A Fierce Domain: Conflict in Cyberspace, 1986-2012". We open up the discussion with a look at the organization and reasoning behind Jason's book, a look at how we understand state's cyber capabilities, how the United States' creates cyber policy and whether that policy is too militarized, NSA surveillance and the private sector, and we end the show with what would be the ideal cyber policy.
Jason Healey (@jason_healey) and I (@rejectionking) discuss Jason's book "A Fierce Domain: Conflict in Cyberspace, 1986-2012". We open up the discussion with a look at the organization and reasoning behind Jason's book, a look at how we understand state's cyber capabilities, how the United States' creates cyber policy and whether that policy is too militarized, NSA surveillance and the private sector, and we end the show with what would be the ideal cyber policy.