National Security δημόσια
[search 0]
Περισσότερα

Download the App!

show episodes
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
 
On August 13, 2018, Section 1051 of the Fiscal Year 2019 John S. McCain National Defense Authorization Act (P.L. 115-232) established the National Security Commission on Artificial Intelligence as an independent Commission "to consider the methods and means necessary to advance the development of artificial intelligence, machine learning, and associated technologies to comprehensively address the national security and defense needs of the United States."Learn more about the Commission's work ...
 
In this podcast we will discuss current affairs centered around national security, politics, religion, and social justice issues. Our goal is not to give our listeners the answers but rather to encourage them to discover their own authentic truth. My goal is to encourage people to think beyond their comfort zones. I want to encourage people to recognize their biases and challenge themselves to extend their thinking to consider different points of view. Incidentally, I do not see "bias" autom ...
 
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).Did you know that employees with security clearances make up to 15% more than their counterparts? But many people don't apply for security clearance jobs because they are worried about their past and others don't apply because they don't understand the process.Insider's Guide to Security Clearances answers your question ...
 
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
 
Loading …
show series
 
There is a major flaw in the international shipping industry: the determination of ultimate ownership. This secrecy leads to unfathomable corruption without consequence. This week, host Elisa is joined by award-winning reporter, Matthew Campbell, to discuss his new book, Dead in the Water: A True Story of Hijacking, Murder, and a Global Maritime Co…
 
In Why We Fight: The Roots of War and the Paths to Peace (Viking, 2022), Chris Blattman explains the five reasons why conflict (rarely) blooms into war, and how to interrupt that deadly process. It's easy to overlook the underlying strategic forces of war, to see it solely as a series of errors, accidents, and emotions gone awry. It's also easy to …
 
In this episode of the National Security Podcast, Kate Clayton and Dom Dwyer join Will Stoltz to discuss how young Australians are seeking to influence policymakers and what can be expected of the next generation of leaders. Young Australians in International Affairs (YAIA) and the Youth National Security Strategy (YNSS) are two organisations seeki…
 
Since the end of the Cold War, the threat of nuclear weapons has largely faded from popular consciousness. However, Russia’s invasion of Ukraine and President Vladimir Putin’s nuclear threats have brought the issue back into focus. In this episode of CNA Talks, we are discussing nuclear policy and strategy, and how things have shifted since Russia’…
 
This week, Jon Olson talks with U.S.-educated Uyghur-American lawyer, foreign policy expert, and noted human rights advocate Nury Turkel about Chinese human rights violations and related topics.
 
If you are a new FSO, there is no reason to travel your journey alone. You may recruit fellow employees to assist with the tasks. Additionally, there are many resources available to assist with FSO responsibilities to include DCSA, NISPOM, professional organizations, consultants, books and training are available just for this purpose. Lately, contr…
 
And…we’re back, and in less than a month, remarkably! Tune in as co-hosts Steve Vladeck and Bobby Chesney discuss (1) the latest seditious conspiracy indictment arising out of January 6th, (2) the Navarro contempt of Congress charge, (3) the latest developments in the lawsuits challenging the Texas and Florida social media content-moderation laws, …
 
Interview Links Follow Steve on Twitter, and give the SpiderFoot official account a follow while you’re at it. Check out the SpiderFoot website and GitHub page, and learn more about the SaaS version, SpiderFoot HX. Learn about the latest SpiderFoot 4.0 release with YAML correlation rules. Read Steve’s blog, especially his posts on the 10 years deve…
 
As the world nears 8 billion people, the countries that have led the global order since World War II are becoming the most aged societies in human history. At the same time, the world's poorest and least powerful countries are suffocating under an imbalance of population and resources. In 8 Billion and Counting, political demographer Jennifer D. Sc…
 
The status of Russia as a world power has been fiercely debated since the collapse of the Soviet Union. Although often ignored, Russia came back into the international limelight in 2014 with the annexation of Crimea and recently in 2022 with the war in Ukraine. However, what are the underlining precepts behind Russian behavior on the international …
 
Hitler, Stalin, and Mao ruled through violence, fear, and ideology. But in recent decades a new breed of media-savvy strongmen has been redesigning authoritarian rule for a more sophisticated, globally connected world. In place of overt, mass repression, rulers such as Vladimir Putin, Recep Tayyip Erdogan, and Viktor Orbán control their citizens by…
 
What is artificial intelligence (AI) with Chinese characteristics? Why is the Chinese Government labelling AI as a matter of security? How has AI been empowering China’s authoritarian governance? Jinghan Zeng, Professor of China and International Studies at Lancaster University, talks about his latest book Artificial Intelligence (AI) with Chinese …
 
Russia's invasion of Ukraine has changed the world in under 4 months, and it's still far from over. This week we feature special commentary by John Erath, the Senior Policy Director for the Center for Arms Control and Non-Proliferation. John discusses how an early end to the violence may be elusive, and what's next on Putin's agenda. How can this w…
 
What impact has two decades' worth of policing and counterterrorism had on the state of mind of Muslims in Britain? In The Suspect: Counterterrorism, Islam, and the Security State (Pluto Press, 2022), Rizwaan Sabir writes compellingly about his own experiences of wrongful arrest, detention and subsequent surveillance, placing these in the broader c…
 
In this episode of the National Security Podcast, Samuel Bashfield and Anthony Bergin join William Stoltz to discuss the importance and vulnerabilities of submarine cables. In the Indo-Pacific, submarine cables carry over 95 per cent of international data traffic, including telephone and data communications. But they are vulnerable to a variety of …
 
In the late eighties and early nineties, driven by the post–Cold War environment and lessons learned during military operations, United States policy makers made intelligence support to the military the Intelligence Community's top priority. In response to this demand, the CIA and DoD instituted policy and organizational changes that altered their …
 
Machine Learning for Criminology and Crime Research: At the Crossroads (Routledge, 2022) reviews the roots of the intersection between machine learning, artificial intelligence (AI), and research on crime; examines the current state of the art in this area of scholarly inquiry; and discusses future perspectives that may emerge from this relationshi…
 
By 1990 the Berlin Wall had fallen and the East German state security service folded. For forty years, they had amassed more than a billion pages in manila files detailing the lives of their citizens. Almost a hundred thousand Stasi employees, many of them experienced officers with access to highly personal information, found themselves unemployed …
 
In this episode of the National Security Podcast, Bridi Rice from the Development Intelligence Lab and Erol Yayboke from the Center for Strategic and International Studies join Will Stoltz to discuss the intersection of security and development issues in the Pacific region. Recent events in the Pacific, including the signing of the new Solomon Isla…
 
Recent advances in deepfake technology have made it harder to distinguish between real and fabricated content, posing substantial threats to public figures, organizations and our national security. This week, host Elisa is joined by Matthew Ferraro of WilmerHale to discuss the threat of synthetic media and how this technology amplifies the spread o…
 
Most existing literature regarding civil-military relations in the United States references either the Cold War or post-Cold War era, leaving a significant gap in understanding as our political landscape rapidly changes. Reconsidering American Civil-Military Relations: The Military, Society, Politics, and Modern War (Oxford UP, 2020) builds upon ou…
 
Since the start of the global war on terror in 2001, U.S. Special Operations Forces (SOF) have been laser-focused on counterterrorism. But as the Department of Defense shifts its priorities to great-power competition Special Operations Command (SOCOM), is adapting to fit this new mission. In this episode of CNA Talks, experts on Special Operations …
 
Interview Links Check out the latest on HoneyDB. Interested in participating in the project? Head to the HoneyDB Agent Docs. Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.Από τον jen ellis, tod beardsley, phillip maddux, jennifer carson
 
This episode originally aired on September 3, 2020. Sometimes truth is more interesting than fiction. Christine Fox was a CNA analyst working at the Navy's legendary fighter school in Miramar, California when a Hollywood producer decided she'd be the perfect inspiration for Tom Cruise's love interest in the 1986 blockbuster "Top Gun." But that was …
 
War is ever changing. Just within the last decade or so, new domains have opened up as potential battlefields of the present and the future. These range from traditional land battles to space as well as social media, among other domains. Combined this with the recent resurgence of great power competition on the world stage, the challenges being fac…
 
In Chemical Heroes: Pharmacological Supersoldiers in the US Military (Duke UP, 2021), Andrew Bickford analyzes the US military's attempts to design performance enhancement technologies and create pharmacological "supersoldiers" capable of withstanding extreme trauma. Bickford traces the deep history of efforts to biologically fortify and extend the…
 
Part 2 of 2 – In the struggle for transparency and accountability, whistleblowers play an invaluable role. This week, host Elisa is joined by Michael Atkinson, former Inspector General of the U.S. Intelligence Community, who, during his tenure, oversaw the investigation of the Ukraine whistleblower complaint that resulted ultimately in the first im…
 
In this episode of the National Security Podcast, Emily Hitchman and Dr William Stoltz join Professor Rory Medcalf to unpack what ‘secret statecraft’ means in the Australian context and why it should be studied more. Call it intelligence, spying, or covert action, a whole realm of ‘secret’ statecraft operates out of the public eye in Australia, hid…
 
Loading …

Οδηγός γρήγορης αναφοράς

Google login Twitter login Classic login