Logo
    Search

    Podcast Summary

    • The dangerous and morally complex world of weapons trading, exposed.The story of Sam Cummings sheds light on the alarming lack of allegiance in the global weapons trade, posing risks to global security and emphasizing the far-reaching consequences of this industry.

      The story highlights the dangerous and ethically questionable nature of the global weapons trade. Sam Cummings, the biggest private military weapons dealer in the world, prioritized profits above all else, selling guns to anyone who would pay, even countries at war with his own. This demonstrates a lack of allegiance to any specific nation and highlights the moral complexity of such trade deals. Additionally, Cummings' connection to Russia during the Cold War raises concerns about the potential impact on global security. The story also briefly touches on the personal tragedy of Cummings' daughter, emphasizing the far-reaching consequences of the arms industry. This conversation serves as a cautionary tale regarding the proliferation and sale of weapons worldwide.

    • A Collaborative Effort in Surveillance TechnologyThe story highlights the collaboration between different individuals and organizations to develop advanced surveillance technology, showcasing the acquisition of Circles by NSO Group and the creation of a new surveillance tool.

      The story being discussed involves the collaboration of various individuals and teams, including reporters, journalists, and researchers from different organizations. The primary focus is on Tal Dilion, an Israeli entrepreneur with a background in the military, who created a surveillance company called Circles. Circles utilized SS7 attacks to gather data from targets and intercept messages and phone calls. NSO Group, a company known for producing spyware called Pegasus, acquired Circles for $140 million. Tal then relocated to Cyprus and partnered with Abraham Avni to develop a new surveillance tool. Tal demonstrated this technology in a jaw-dropping video, showcasing a van filled with computer equipment reminiscent of an FBI spy van.

    • The Consequences of Tal Dilion's Spy Van: Ethical Concerns and Government ActionThe exposure of illegal espionage and the sale of spy tools to unknown entities led to government raids and a damaged reputation for Tal Dilion.

      The actions of Tal Dilion and his spy van had significant consequences and raised ethical concerns. The video showcasing the advanced spy technology not only shocked the Cyprus government but also exposed the illegal nature of espionage and the potential danger of selling such tools to unknown entities. As a result, the government took action, conducting raids, arresting employees, and seizing the van and equipment. Tal Dilion was questioned but eventually released, leading him to relocate his business to Greece. The incident created tension between Dilion and the Cyprus government, with Dilion expressing his dissatisfaction through an angry op-ed. Ultimately, Dilion was exonerated, but the incident had lasting effects on his business and reputation.

    • Tal's involvement in selling spyware to Sudan's militia groups raises ethical concerns.Tal's actions of selling spyware to controversial figures in Sudan and evading restrictions highlight the potential lethal consequences and question his responsibility in aiding human rights abuses.

      Tal's involvement in selling spyware to Sudan's militia groups raises ethical concerns. The reporter, Crofton, discovered that Tal's flights were linked to the delivery of surveillance technology to Hemedti, a controversial figure in Sudan. The potential consequences of providing phone-hacking technology to someone like Hemedti, who is accused of human rights abuses, are considered to be lethal. Tal's responsibility in selling spyware that can be weaponized against innocent people is questioned, especially when it falls into the hands of militia groups involved in genocide and crimes against humanity. Despite this, Tal argues that he is not responsible for policing or judging the actions of his customers. Furthermore, Tal's desire to evade restrictions imposed on the NSO Group and reach forbidden customers led him to set up shop in Greece and consider purchasing other companies specializing in phone-hacking software.

    • Unveiling the geopolitical implications of the Predator spyware and the tangled corporate web behind it.The discovery of the Predator spyware exposes the concerning government surveillance of civil society and emphasizes the need to protect privacy and digital security.

      The discovery and analysis of the Predator spyware by Citizen Lab and Meta revealed concerning geopolitical implications. The spyware, capable of exfiltrating files, taking passwords, and even accessing the microphone, was found on the phones of an Egyptian politician and journalist in exile, suggesting government surveillance of civil society. The investigation led to the tangled corporate web behind Predator, involving companies like Cytrox, Intellexa, and Nexa (formerly known as Amesys, indicted for crimes against humanity). Tal Dilion, involved in these companies, formed alliances and potentially made deals, even with controversial partners. The report identified several governments, including Egypt, Saudi Arabia, and Germany, as potential buyers of this spyware. The troubling connections and use of spyware for surveillance purposes highlight the importance of safeguarding privacy and digital security.

    • The Predator Spyware: Targeting Journalists and Political Figures in GreeceThe discovery of the Predator spyware in Greece highlights the need for vigilance and cybersecurity measures to protect personal privacy against advanced spyware attacks.

      The Predator spyware was discovered in Greece, targeting individuals including journalists and political figures. It all started when a journalist, Thanasis Koukakis, became suspicious after reading a news report mentioning a person he had previously investigated. Koukakis contacted Citizen Lab, who confirmed that his phone had been hacked successfully with Predator. As the news broke, more cases of Predator were found, causing concern among Greek citizens. The investigative journalist community in Greece showed great tenacity in pursuing the truth and pushing the government for information. The use of phishing text messages was a common tactic to infect phones with Predator, exploiting the target's personal information and creating a sense of urgency to click on the message. It is evident that vigilance and cybersecurity measures are crucial in protecting personal privacy in the face of advanced spyware attacks.

    • Concealed malware traces and the challenges of identifying vulnerabilities and holding accountable those responsible.The erasure of infection tracks in the case of the Greek government's involvement with Spyware raises concerns about the reach of malware and the ethical responsibility of surveillance technology companies in monitoring product misuse.

      The use of malware with concealed traces poses a significant challenge in identifying vulnerabilities and holding accountable those responsible. In the case of the Greek government's involvement with the Predator spyware, Citizen Lab was unable to provide evidence to Apple for patching the vulnerability due to the erasure of infection tracks. This raises concerns about the extent of the malware's reach and the potential targets beyond the three individuals initially discovered. Despite public demands for answers, the Greek government denied any involvement, leading to speculation that the Greek intelligence agency, EYP, may be implicated. Furthermore, the presence of surveillance technology companies at conferences like ISS World highlights the ethical responsibility companies face in monitoring the misuse of their products once sold. Understanding the extent of involvement, be it hacking-as-a-service or government authorization, is crucial to determine accountability and protect individuals' privacy.

    • The dangers of Predator spyware and the quest for zero-click infectionThe availability of advanced spyware like Predator raises concerns about privacy and security, while the search for zero-click infection poses even greater threats to phone users. Increased surveillance and potential collusion between countries add to the complexity of the issue.

      The Predator spyware package, integrated with malware, was being sold for $8 million. This package allowed for easy, one-click infection of up to ten targets simultaneously. However, there is a desire for even more advanced spyware that can infect phones without any user interaction, known as zero-click infection. NSO, a company similar to Intellexa, already possesses this capability. Additionally, the investigation surrounding Tal's Cessna plane revealed that it made frequent trips to multiple countries, including Israel and Saudi Arabia. The presence of the plane in Saudi Arabia raises questions about potential collusion or intelligence cooperation between these countries. In Greece, the scandal of individuals being infected with Predator spyware continued to escalate, leading to resignations within the government and increasing pressure on the intelligence department.

    • The Global Proliferation of Spyware - A Growing Industry and Ethical ConcernsThe widespread availability of commercial spyware poses ethical challenges and highlights the need for governments to prevent misuse and regulate the transfer of cyber weapon technology.

      The global proliferation of mercenary spyware, or commercial spyware as some call it, has created an industry fueled by the transfer of technology and knowledge from developed cyber powers to the rest of the world. After governments learned about the advanced tools used by countries like the US, they sought to acquire similar capabilities, leading to the rise of companies developing and selling these cyber weapons. Israel's flourishing high-tech sector and lax export laws further contributed to the growth of this industry. Former government officials with expertise in exploitation tools also joined in, realizing they could make more money by starting their own companies. As a result, even less sophisticated companies can acquire these capabilities through purchasing them. The rampant proliferation of such digital weapons raises ethical concerns and puts the responsibility on governments to prevent their misuse.

    • The dangers of advanced spyware and the need for stronger privacy protections.Advanced spyware poses a significant threat to democracy and personal freedom, as autocrats and dictators can misuse it to maintain power. Stronger safeguards and accountability are necessary to protect individual privacy and prevent abuse.

      The availability and use of advanced spyware like Predator or Pegasus pose significant threats to democracy and personal freedom. These technologies, unlike commercially available spy tools, provide a total view into a person's private world without respecting existing laws or regulations. Autocrats and dictators around the world can misuse this technology to instill fear in their citizens and maintain power. The lack of oversight and legal protections surrounding the use of such spyware raises concerns about governments using it against their perceived enemies, even in violation of the social contract. Additionally, the revelation that big tech companies like Google and Facebook have access to vast amounts of personal data further underscores the need for stronger safeguards and accountability in order to protect individual privacy and prevent abuse.

    • Protecting Privacy: The Threat of Invasive TechnologiesInvasive technologies like spyware pose a significant threat to individual privacy and democratic freedoms, highlighting the need for proper oversight and legitimate reasons for accessing personal data.

      Protecting individual privacy from both governments and corporations is crucial. While companies like Google should make efforts to prevent wrong or poorly-formed data requests, the real concern lies in invasive technologies like spyware such as Pegasus and Predator. These technologies have the potential to secretly access personal data without warrants or oversight, leading to abuse of power and harm to individuals. It is essential to fight against the proliferation of such spyware, not only because it threatens dissidents in dictatorships but also because it poses a danger to the freedoms cherished in democracies. Retaliation or government intrusion into private lives could have a chilling effect on free speech and undermine the foundations of democracy. Proper authority and legitimate reasons should be required for accessing private information, rather than using fear-based justifications.

    • Combating the Threat of Uncontrolled Spyware TechnologyGovernments and societies must prioritize the protection of privacy and hold individuals accountable for misuse of spyware technology to prevent its unchecked proliferation and potential for abuse.

      The proliferation of uncontrolled and unchecked spyware technology poses a significant threat to privacy and abuse of power by governments. Without proper laws and regulations in place, the potential for misuse and abuse is immense. It is crucial for societies and governmental offices to have mechanisms in place to prevent such abuse and hold individuals accountable for any misuse of power. Slowing down the rate of proliferation of spyware technology is seen as the best approach to limit its global harm. The recent blacklisting and sanctioning of Intellexa by the US Commerce Department highlights the need for action against companies involved in this industry. Governments must recognize the importance of protecting their citizens' privacy and take decisive action to prevent further abuse.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    February 10th, 2023. Biden Blames His Staff For The Classified Documents Found in His Homes

    February 10th, 2023. Biden Blames His Staff For The Classified Documents Found in His Homes
    It’s February 10th. You’re listening to the President’s Daily Brief. Your morning intel starts now. ------ A good day to you, ladies and gentlemen. I’ve got four briefs for you this morning that are shaping America — and the world. First, Joe Biden says it’s not his fault that he had classified material at his home and office. No no. I’ll tell you though who is. Second, an update to the China Balloon Saga this morning, with an assessment by a Democrat Senator from Montana that is spot on. Third, some updates on the War in Ukraine, with mostly bad news for Kiev. Finally, American taxpayers will be funding a new wind farm. But this one it’s not in America. It’s in Mexico. Later, we close out the podcast with an observation I had on a recent report about Afghanistan and it says that the Taliban won’t be bought off by Western money. Apparently that came as a shock to some folks in DC. Which only proves that The Smart People aren’t very smart at all.  ----- Please remember to subscribe if you enjoyed this episode of the President's Daily Brief. Email: PDB@TheFirstTV.com Learn more about your ad choices. Visit megaphone.fm/adchoices

    Putin hails "meaningful and frank" talks with Xi & we interview former US National Security Adviser John Bolton

    Putin hails "meaningful and frank" talks with Xi & we interview former US National Security Adviser John Bolton

    Day 390.

    Today, we continue to analyse Xi Jinping’s visit to Moscow, bring you the latest from the front lines & Dom Nicholls interviews former US ambassador to the UN & former National security Advisor John Bolton.

      

    Contributors:

    David Knowles (Host). @djknowles22 on Twitter.

    Dominic Nicholls (Associate Editor, Defence). @DomNicholls on Twitter.

    Francis Dearnley (Assistant Comment Editor). @FrancisDearnley on Twitter.

    Roland Oliphant (Senior Foreign Correspondent).


    Subscribe to The Telegraph: telegraph.co.uk/ukrainethelatest

    Email: ukrainepod@telegraph.co.uk

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.



    Hosted on Acast. See acast.com/privacy for more information.


    The Israel war is a "global terror risk"

    The Israel war is a "global terror risk"

    "We're in a very dangerous and unstable situation"


    Bruce Hoffman has been observing and studying global terrorism for over 50 years. In this episode he speaks to the New Statesman's Katie Stallard about how the war between Israel and Hamas places the world in danger.


    They discuss the threat from Hezbollah in Lebanon and the risk of escalation within the Middle East, as well as why terror organisations like ISIS and Islamic Jihad could be motivated to launch attacks on the United States, Europe and the United Kingdom.


    Read on the New Statesman: Warnings that the escalating Israel-Hamas conflict could become a genocide should be heeded https://www.newstatesman.com/world/middle-east/2023/10/deadly-logic-existential-war-israel-hamas


    Subscribers get ad-free access to all our podcasts via the New Statesman app. Download it in the iOS app store or the Google Play store.


    Download the app:

    iOS: https://apps.apple.com/gb/app/new-statesman-magazine/id610498525

    Android: https://play.google.com/store/apps/details?id=com.progressivemediagroup.newstatesman&hl=en_GB&gl=US


    Subscribe to the New Statesman from £1 per week:

    https://newstatesman.com/podcastoffer


    Sign up to our daily politics email:

    https://morningcall.substack.com/



    Hosted on Acast. See acast.com/privacy for more information.


    View From Tehran: Piers vs Mohammad Marandi

    View From Tehran: Piers vs Mohammad Marandi

    The general view in the West is that Iran’s attack on Israel was an abject failure.

    Whether or not it was a genuine attempt to wound the Israeli state or just a billion-dollar fireworks display, it didn’t work.

    Ninety-nine per cent of the drones and missiles were shot down by Israel’s allies and its Iron Dome.

    Israel looks tough again. Iran looks weak.


    With a view from Tehran, Professor Mohammad Marandi joins Piers to give his perspective.


    That's followed by a debate with the Current Deputy Mayor for Jerusalem and Special Envoy for the Foreign Ministry for Israel, Fleur Hassan-Nahoum.

    Founder and Leader of the Palestinian National Initiative, Mustafa Barghouti 

    And for a US perspective, commentator and podcast host, Francesca Fiorentini.


    YouTube: @PiersMorganUncensored

    X: @PiersUncensored

    TikTok: @piersmorganuncensored

    Insta: @piersmorganuncensored




    Hosted on Acast. See acast.com/privacy for more information.