The Loopcast show

The Loopcast

Summary: Podcast series covering various topics in security and technology

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Sina Kashefipour and Chelsea Daymon
  • Copyright: Copyright 2012-2019 Sina Kashefipour and Chelsea Daymon All rights reserved.

Podcasts:

 Episode 80- Iran in Syria Update | File Type: audio/mpeg | Duration: 00:28:00

Will Fulton (@fultonwill) gives the Loopcast an update on Iran's involvement in Syria. You can find Will's work at AEI's Iran Tracker including a long post on the various Iranian official's reactions to the use of chemical weapons in Syria.You can listen to Will's previous interviews on the Loopcast including a discussion of IRGC's political influence in Iran and Iran's strategy in Syria: here and here.

 Episode 79 - Iran’s interests in Afghanistan | File Type: audio/mpeg | Duration: 00:50:00

Thomas Ruttig (@aantru) discusses Iran's historic, political and economic interests in Afghanistan with the Loopcast. You can check out Thomas' latest at the Afghan Analysts Network: "Can Kabul Carry Two Melons in One Hand? Afghanistan and Iran sign strategic cooperation document." 

 Episode 79 - Iran’s interests in Afghanistan | File Type: audio/mpeg | Duration: 00:50:00

Thomas Ruttig (@aantru) discusses Iran's historic, political and economic interests in Afghanistan with the Loopcast. You can check out Thomas' latest at the Afghan Analysts Network: "Can Kabul Carry Two Melons in One Hand? Afghanistan and Iran sign strategic cooperation document." 

 Episode 79 - Iran’s interests in Afghanistan | File Type: audio/mpeg | Duration: 00:50:00

Thomas Ruttig (@aantru) discusses Iran's historic, political and economic interests in Afghanistan with the Loopcast. You can check out Thomas' latest at the Afghan Analysts Network: "Can Kabul Carry Two Melons in One Hand? Afghanistan and Iran sign strategic cooperation document." 

 Episode 78- “The Last Refuge: Yemen, Al-Qaeda, and America’s war in Arabia” | File Type: audio/mpeg | Duration: 00:24:32

Gregory D Johnsen (@gregorydjohnsen) talks to Chelsea Daymon (@cldaymon) about Gregory's book "The Last Refuge: Yemen, Al-Qaeda, and America's war in Arabia." Make sure to check out more of Gregory's work: "How We Lost Yemen" "Did a 8 yr old spy for America?"

 Episode 78- “The Last Refuge: Yemen, Al-Qaeda, and America’s war in Arabia” | File Type: audio/mpeg | Duration: 00:24:32

Gregory D Johnsen (@gregorydjohnsen) talks to Chelsea Daymon (@cldaymon) about Gregory's book "The Last Refuge: Yemen, Al-Qaeda, and America's war in Arabia." Make sure to check out more of Gregory's work: "How We Lost Yemen" "Did a 8 yr old spy for America?"

 Episode 78- “The Last Refuge: Yemen, Al-Qaeda, and America’s war in Arabia” | File Type: audio/mpeg | Duration: 00:24:32

Gregory D Johnsen (@gregorydjohnsen) talks to Chelsea Daymon (@cldaymon) about Gregory's book "The Last Refuge: Yemen, Al-Qaeda, and America's war in Arabia."Make sure to check out more of Gregory's work:"How We Lost Yemen" "Did a 8 yr old spy for America?"

 Episode 77- Malware and hacking techniques used in Syria | File Type: audio/mpeg | Duration: 00:24:48

Eva (@evacide) discusses the malware and hacking techniques used in Syria. We began our conversation with a look at what groups are doing the phishing and the ones that are distributing/using malware, then we discussed the types of malware being used and the programs and people being targeted, and we end our conversation with how can activists and opposition members can protect themselves from these types of attacks and what the infosec and hacker communities can do in terms of collection and analysis of Syrian malware. If you are interested in helping EFF's project of collecting and analyzing the malware being used in Syria please contact Eva at EFF either through email or twitter. Your technical skills and insights would be a great help to an incredible project. Thank you! If you're interested in the research already done, feel free to poke through the links listed below. The Internet is Back in Syria and So is Malware Targeting Syrian Activists Pro-Syrian Government Hackers Target Activists With Fake Anti-Hacking Tool Fake Skype Encryption Tool Targeted at Syrian Activists Promises Security, Delivers Spyware Campaign Targeting Syrian Activists Escalates with New Surveillance Malware Fake YouTube Site Targets Syrian Activists With Malware Syrian Activists Targeted with Facebook Phishing Attack How to Find and Protect Yourself Against the Pro-Syrian Government Malware on Your Computer Long Read: A Call to Harm: New Malware Attacks Target the Syrian Opposition Binary samples: Syrian Malware Samples  

 Episode 77- Malware and hacking techniques used in Syria | File Type: audio/mpeg | Duration: 00:24:48

Eva (@evacide) discusses the malware and hacking techniques used in Syria. We began our conversation with a look at what groups are doing the phishing and the ones that are distributing/using malware, then we discussed the types of malware being used and the programs and people being targeted, and we end our conversation with how can activists and opposition members can protect themselves from these types of attacks and what the infosec and hacker communities can do in terms of collection and analysis of Syrian malware. If you are interested in helping EFF's project of collecting and analyzing the malware being used in Syria please contact Eva at EFF either through email or twitter. Your technical skills and insights would be a great help to an incredible project. Thank you! If you're interested in the research already done, feel free to poke through the links listed below. The Internet is Back in Syria and So is Malware Targeting Syrian Activists Pro-Syrian Government Hackers Target Activists With Fake Anti-Hacking Tool Fake Skype Encryption Tool Targeted at Syrian Activists Promises Security, Delivers Spyware Campaign Targeting Syrian Activists Escalates with New Surveillance Malware Fake YouTube Site Targets Syrian Activists With Malware Syrian Activists Targeted with Facebook Phishing Attack How to Find and Protect Yourself Against the Pro-Syrian Government Malware on Your Computer Long Read: A Call to Harm: New Malware Attacks Target the Syrian Opposition Binary samples: Syrian Malware Samples  

 Episode 77- Malware and hacking techniques used in Syria | File Type: audio/mpeg | Duration: 00:24:48

Eva (@evacide) discusses the malware and hacking techniques used in Syria. We began our conversation with a look at what groups are doing the phishing and the ones that are distributing/using malware, then we discussed the types of malware being used and the programs and people being targeted, and we end our conversation with how can activists and opposition members can protect themselves from these types of attacks and what the infosec and hacker communities can do in terms of collection and analysis of Syrian malware. If you are interested in helping EFF's project of collecting and analyzing the malware being used in Syria please contact Eva at EFF either through email or twitter. Your technical skills and insights would be a great help to an incredible project. Thank you! If you're interested in the research already done, feel free to poke through the links listed below. The Internet is Back in Syria and So is Malware Targeting Syrian Activists Pro-Syrian Government Hackers Target Activists With Fake Anti-Hacking Tool Fake Skype Encryption Tool Targeted at Syrian Activists Promises Security, Delivers Spyware Campaign Targeting Syrian Activists Escalates with New Surveillance Malware Fake YouTube Site Targets Syrian Activists With Malware Syrian Activists Targeted with Facebook Phishing Attack How to Find and Protect Yourself Against the Pro-Syrian Government Malware on Your Computer Long Read: A Call to Harm: New Malware Attacks Target the Syrian Opposition Binary samples: Syrian Malware Samples  

 Episode 76- Al Qaeda and jihadi movements post 2008 | File Type: audio/mpeg | Duration: 1:01:45

Daveed Gartenstein-Ross (@daveedGR) and J.M. Berger (@intelwire) discuss Al Qaeda post 2008 in terms of organization, leadership, and goals.

 Episode 76- Al Qaeda and jihadi movements post 2008 | File Type: audio/mpeg | Duration: 1:01:45

Daveed Gartenstein-Ross (@daveedGR) and J.M. Berger (@intelwire) discuss Al Qaeda post 2008 in terms of organization, leadership, and goals.

 Episode 76- Al Qaeda and jihadi movements post 2008 | File Type: audio/mpeg | Duration: 1:01:45

Daveed Gartenstein-Ross (@daveedGR) and J.M. Berger (@intelwire) discuss Al Qaeda post 2008 in terms of organization, leadership, and goals.

 Episode 75-Somalia and Somaliland | File Type: audio/mpeg | Duration: 00:42:22

Armin Rosen (@arminrosen) and I (@rejectionking) discuss Somalia and Somaliland.

 Episode 75-Somalia and Somaliland | File Type: audio/mpeg | Duration: 00:42:22

Armin Rosen (@arminrosen) and I (@rejectionking) discuss Somalia and Somaliland.

Comments

Login or signup comment.