National Security 公开
[search 0]
更多

Download the App!

show episodes
 
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
 
On August 13, 2018, Section 1051 of the Fiscal Year 2019 John S. McCain National Defense Authorization Act (P.L. 115-232) established the National Security Commission on Artificial Intelligence as an independent Commission "to consider the methods and means necessary to advance the development of artificial intelligence, machine learning, and associated technologies to comprehensively address the national security and defense needs of the United States."Learn more about the Commission's work ...
 
In this podcast we will discuss current affairs centered around national security, politics, religion, and social justice issues. Our goal is not to give our listeners the answers but rather to encourage them to discover their own authentic truth. My goal is to encourage people to think beyond their comfort zones. I want to encourage people to recognize their biases and challenge themselves to extend their thinking to consider different points of view. Incidentally, I do not see "bias" autom ...
 
S
Security Nation Podcast

1
Security Nation Podcast

Electronic Security Association - ESA

Unsubscribe
Unsubscribe
每天+
 
Security Nation Podcast is hosted by ESA, and it brings the voice of the electronic security and life safety industry to you! Host Hannah Boone brings on security pros to discuss best practices, real-life experiences, industry forecasts, and more on this bi-weekly podcast. It's the ever-present voice in an ever-changing industry.
 
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).Did you know that employees with security clearances make up to 15% more than their counterparts? But many people don't apply for security clearance jobs because they are worried about their past and others don't apply because they don't understand the process.Insider's Guide to Security Clearances answers your question ...
 
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
 
Loading …
show series
 
A critical look at how the US military is weaponizing technology and data for new kinds of warfare—and why we must resist. War Virtually: The Quest to Automate Conflict, Militarize Data, and Predict the Future (University of California Press, 2022) is the story of how scientists, programmers, and engineers are racing to develop data-driven technolo…
 
(Part 2 of 2) - There is a major flaw in the international shipping industry: the determination of ultimate ownership. This secrecy leads to unfathomable corruption without consequence. This week, host Elisa is joined by award-winning reporter, Matthew Campbell, to discuss his new book, Dead in the Water: A True Story of Hijacking, Murder, and a Gl…
 
In this episode of the National Security Podcast, we bring you the fifth instalment of the Women in National Security mini-series, produced in collaboration with Accenture. In this episode of the National Security Podcast, hosts Gai Brodtmann, National Security College Futures Council member, and Meg Tapia, Principal Director for Defence and Nation…
 
And we’re back, with yet another interminable window of extemporaneous frivolity at the front end of what otherwise is a somewhat serious show about the latest national security law developments and debates (seriously). Listen up as co-hosts Steve Vladeck and Bobby Chesney discuss Russia’s denial of combatant immunity to foreign fighters in Ukraine…
 
Since the end of the Cold War, the threat of nuclear weapons has largely faded from popular consciousness. However, Russia’s invasion of Ukraine and President Vladimir Putin’s nuclear threats have brought the issue back into focus. In this episode of CNA Talks, we are discussing nuclear policy and strategy, and how things have shifted since Russia’…
 
If you are a new FSO, there is no reason to travel your journey alone. You may recruit fellow employees to assist with the tasks. Additionally, there are many resources available to assist with FSO responsibilities to include DCSA, NISPOM, professional organizations, consultants, books and training are available just for this purpose. Lately, contr…
 
The COVID-19 pandemic, Brexit and the US-China trade dispute have heightened interest in the geopolitics and security of modern ports. Ports are where contemporary societal dilemmas converge: the (de)regulation of international flows; the (in)visible impact of globalization; the perennial tension between trade and security; and the thin line betwee…
 
In this episode, we sit down with John Loud, President of Loud Security Systems, and discuss his vision as ESA's new Chairman, the challenges our industry faces, and how we should address them John has served in many leadership roles within the industry and community including President of the Kennesaw Business Association, President of the Georgia…
 
In the Pulitzer Prize finalist book Home, Land, Security: Deradicalisation and the Journey Back from Extremism (One World, 2021), Carla Power explores: what are the roots of radicalism? Journalist Carla Power came to this question well before the January 6, 2021, attack in Washington, D.C., that turned the US’ attention to the problem of domestic r…
 
In Proscribing Peace: How Listing Armed Groups as Terrorists Hurts Negotiations (Manchester UP, 2021), Dr. Sophie Haspeslagh offers a systematic examination of the impact of proscription on peace negotiations. With rare access to actors during the Colombian negotiations with the Revolutionary Armed Forces of Colombia People's Army (FARC), Dr. Haspe…
 
There is a major flaw in the international shipping industry: the determination of ultimate ownership. This secrecy leads to unfathomable corruption without consequence. This week, host Elisa is joined by award-winning reporter, Matthew Campbell, to discuss his new book, Dead in the Water: A True Story of Hijacking, Murder, and a Global Maritime Co…
 
In Why We Fight: The Roots of War and the Paths to Peace (Viking, 2022), Chris Blattman explains the five reasons why conflict (rarely) blooms into war, and how to interrupt that deadly process. It's easy to overlook the underlying strategic forces of war, to see it solely as a series of errors, accidents, and emotions gone awry. It's also easy to …
 
In this episode of the National Security Podcast, Kate Clayton and Dom Dwyer join Will Stoltz to discuss how young Australians are seeking to influence policymakers and what can be expected of the next generation of leaders. Young Australians in International Affairs (YAIA) and the Youth National Security Strategy (YNSS) are two organisations seeki…
 
Interview Links Follow Steve on Twitter, and give the SpiderFoot official account a follow while you’re at it. Check out the SpiderFoot website and GitHub page, and learn more about the SaaS version, SpiderFoot HX. Learn about the latest SpiderFoot 4.0 release with YAML correlation rules. Read Steve’s blog, especially his posts on the 10 years deve…
 
As the world nears 8 billion people, the countries that have led the global order since World War II are becoming the most aged societies in human history. At the same time, the world's poorest and least powerful countries are suffocating under an imbalance of population and resources. In 8 Billion and Counting, political demographer Jennifer D. Sc…
 
The status of Russia as a world power has been fiercely debated since the collapse of the Soviet Union. Although often ignored, Russia came back into the international limelight in 2014 with the annexation of Crimea and recently in 2022 with the war in Ukraine. However, what are the underlining precepts behind Russian behavior on the international …
 
Hitler, Stalin, and Mao ruled through violence, fear, and ideology. But in recent decades a new breed of media-savvy strongmen has been redesigning authoritarian rule for a more sophisticated, globally connected world. In place of overt, mass repression, rulers such as Vladimir Putin, Recep Tayyip Erdogan, and Viktor Orbán control their citizens by…
 
What is artificial intelligence (AI) with Chinese characteristics? Why is the Chinese Government labelling AI as a matter of security? How has AI been empowering China’s authoritarian governance? Jinghan Zeng, Professor of China and International Studies at Lancaster University, talks about his latest book Artificial Intelligence (AI) with Chinese …
 
In this episode, we sit down with Jamie Vos and take look at his two years as Chairman of ESA from 2020-2022 and some thoughts on the industry's outlook moving forward. Jamie has been in the industry 25 years and owns and operates Security Solutions NW in Washington State. He started in the physical security world of locksmithing then moving in the…
 
Russia's invasion of Ukraine has changed the world in under 4 months, and it's still far from over. This week we feature special commentary by John Erath, the Senior Policy Director for the Center for Arms Control and Non-Proliferation. John discusses how an early end to the violence may be elusive, and what's next on Putin's agenda. How can this w…
 
What impact has two decades' worth of policing and counterterrorism had on the state of mind of Muslims in Britain? In The Suspect: Counterterrorism, Islam, and the Security State (Pluto Press, 2022), Rizwaan Sabir writes compellingly about his own experiences of wrongful arrest, detention and subsequent surveillance, placing these in the broader c…
 
In this episode of the National Security Podcast, Samuel Bashfield and Anthony Bergin join William Stoltz to discuss the importance and vulnerabilities of submarine cables. In the Indo-Pacific, submarine cables carry over 95 per cent of international data traffic, including telephone and data communications. But they are vulnerable to a variety of …
 
Machine Learning for Criminology and Crime Research: At the Crossroads (Routledge, 2022) reviews the roots of the intersection between machine learning, artificial intelligence (AI), and research on crime; examines the current state of the art in this area of scholarly inquiry; and discusses future perspectives that may emerge from this relationshi…
 
In the late eighties and early nineties, driven by the post–Cold War environment and lessons learned during military operations, United States policy makers made intelligence support to the military the Intelligence Community's top priority. In response to this demand, the CIA and DoD instituted policy and organizational changes that altered their …
 
By 1990 the Berlin Wall had fallen and the East German state security service folded. For forty years, they had amassed more than a billion pages in manila files detailing the lives of their citizens. Almost a hundred thousand Stasi employees, many of them experienced officers with access to highly personal information, found themselves unemployed …
 
In this episode of the National Security Podcast, Bridi Rice from the Development Intelligence Lab and Erol Yayboke from the Center for Strategic and International Studies join Will Stoltz to discuss the intersection of security and development issues in the Pacific region. Recent events in the Pacific, including the signing of the new Solomon Isla…
 
Loading …

快速参考指南

Google login Twitter login Classic login