2020 Election pubblico
[search 0]
Altro

Scarica l'app!

show episodes
 
Here's a quick guide to your Bay Area ballot, covering all statewide propositions and county measures in digestible 2-minute summaries.This election season, we're focusing on areas with historically low-voter turnout. Residents of these neighborhoods — East Palo Alto, Fairfield, Richmond, West Oakland, and San Francisco's Bayview-Hunter’s Point — can find every measure on your ballot by clicking on your city below:East Palo Alto | Fairfield | Oakland | Richmond | San FranciscoYou can also se ...
 
In the fastest growing 2020 candidate podcast in the world, Paul Duddridge interviews as many of the candidates seeking office as possible. Senate, Congress and of course Presidential. As a foreign-born US citizen, he is not eligible to run for the Presidency, but he can talk to everyone who has exercised their right to run for the highest offices in the land.
 
The Land of Saints and Scholars is casting its eye over the Home of the Brave and Land of the Free! Yes, this is another podcast that will cover the ins and outs of American politics as they race towards the elections of 2020. But what makes this one different is; We're Irish! Well, most of the time.
 
D
Defense 2020

1
Defense 2020

Center for Strategic and International Studies

Unsubscribe
Unsubscribe
Ogni mese
 
Join Kathleen Hicks, senior vice president, Henry A. Kissinger Chair, and director of the International Security Program at the Center for Strategic and International Studies, as she speaks with experts on the most important defense debates in the 2020 U.S. election cycle.
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
V
Voices from my Bunker 2020

1
Voices from my Bunker 2020

Pat Coakley-Writer/Photographer/Mixed Media

Unsubscribe
Unsubscribe
Ogni mese
 
“Voices from my Bunker 2020” is a series of interviews with all ages of people of what 2020 has been like for them. This is a rebranded podcast that used to be named, "PODSNACKS/Art of the Diet" but the first six months of 2020 has shifted my preoccupations from five years of weight maintenance to minute by minute sanity maintenance. Attention must be paid to the issues before me. I'm 75, live in Massachusetts, and my doorbell hasn't rung in 3 months and probably won't until there's a vaccin ...
 
F
Faith 2020

1
Faith 2020

Michael Wear

Unsubscribe
Unsubscribe
Ogni mese+
 
As one of a handful of people to oversee religious outreach for a winning presidential campaign, Michael Wear guides you through the tumultuous waters of faith and politics this campaign season. Twice a month, Faith 2020 will host leading journalists, politicos, and religious leaders for in depth interviews that will help us to understand the ways faith is influencing this election. Along with Michael’s expert analysis, we'll make sense of how campaigns are engaging faith on the trail and ho ...
 
Bringing you unfiltered public documents that deserve to be more accessible. Dan Williams, the voice behind the Mueller Report Audio podcast, reads some of the most important government documents for those who want the information, but may be too busy to read or simply want to do other things while consuming the information.
 
This is an election year unlike any other in ways that are unsettling and dangerous. Unconventional Threat brings together exclusive interviews with newsmakers about everything that can happen between now and Inauguration Day, when it's possible we may still not have chosen a President. Journalist Peter Eisner and longtime State Department official Jonathan Winer will outline all the possibilities, including: the use of the military; uncounted ballots; and one scenario where the House of Rep ...
 
Loading …
show series
 
On this Very Special Episode, Matt Stephenson welcomes Elisa Costante, VP of Research and Ellen Sundra, Chief Customer Officer at Forescout for a discussion about the vulnerabilities that plague Operational Technology and Critical Infrastructure. With nearly 40 years of combined experience finding, understanding and solving the security issues that…
 
On this Very Special Episode, Matt Stephenson brings in ThreatGEN Founder/CEO and Hacking Exposed: Industrial Control Systems author Clint Bodungen alongside Forescout Technologies Inc. Principal OT Strategist Brian Proctor for a sit-down. We take a hard look at the state of security for Operational Technology, Blue and Red teaming for OT, the cybe…
 
Once upon a time, Gartner predicted that by 2020, more than 25 percent of cyberattacks in healthcare delivery organizations would involve some kind of IoT device. In medical terms, that means wirelessly connected and digitally monitored implantable medical devices like pacemakers, deep brain neurostimulators and insulin pumps. These aren’t the esot…
 
INFRA:HALT vulnerabilities impact the closed source TCP/IP stack NicheStack that is used in millions of Operational Technologies and Industrial Control Systems, especially in the discrete and process manufacturing industries. Among the vulnerabilities are DNS cache poisoning, TCP spoofing, Denial of Service and Remote Code Execution. Successful att…
 
Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away. -- Antoine de Saint-Exupéry; French writer, poet, aristocrat, journalist and pioneering aviator Me with nothing left to lose, plotting my big revenge in the spotlight. Give me violent revenge fantasies as a coping mechanism -- Chuck Palahniuk…
 
Coolness is an aesthetic of attitude, behavior, comportment, appearance and style which is generally admired. Because of the varied and changing connotations of cool, as well as its subjective nature, the word has no single meaning. It has associations of composure and self-control and often is used as an expression of admiration or approval. Altho…
 
“In the best conversations, you don't even remember what you talked about, only how it felt. It felt like we were in some place your body can't visit, some place with no ceiling and no walls and no floor and no instruments” ― John Green, Turtles All the Way Down For Episode Two of our Black Hat coverage, we sat down for a chat with two Founders to …
 
Elijah Snow: It's a strange world Jakita Wagner: Let's keep it that way" -- Planetary: Warren Ellis & John Cassaday Black Hat 2021 was unlike any other previous edition and likely will be unlike any that follow. The rise of the Delta Variant of COVID-19 put the world back on edge after we had been slowly creeping toward something that felt like nor…
 
-- Calvin and Hobbes courtesy of Bill Waterson None of us wants to be judged by our worst act on our worst day, and we consistently judge Burr for that. He was not a perfect man, but he's not a villain. He's a dude, just a guy. -- Leslie Odom, Jr. What if the worst day of your life ended up being just another Zoom meeting on someone else’s calendar…
 
In this special bonus episode, 2 very exciting things happen! 1) Karin announces her new podcast, What Can You Do? This commute length podcast brings on experts in some of the biggest issues facing the world today - polarisation, the housing crisis, inequality, climate change - to get a quick briefing on the issue and point you to some practical th…
 
-- Photo credit: Huss Harden When you lived on the wrong side of the law, information, however vague or apparently meaningless, was everything. It gave you leverage. And leverage was power -- Top Dog; 2014, written by Dougie Brimson Ransomware is the biggest buzzword in the news right now, and rightfully so. You can’t turn on a network police proce…
 
“The bad guys know they are bad guys—they are trying to pretend to be businesspeople… as long as you pretend with them that this is just a normal business transaction, it goes better.” -- Kurtis Minder; Fortune, 01 June 2021 If you have been reading about or watching news shows discussing ransomware, more than likely, you have seen Kurtis Minder. H…
 
How at Risk Are Our Healthcare Networks? Civilian hospitals organized to give care to the wounded and sick, the infirm and maternity cases, may in no circumstances be the object of attack, but shall at all times be respected and protected by the Parties to the conflict. -- Geneva Conventions; Article 18, Section 3, Fourth Geneva Convention Even at …
 
When the DarkSide hacking group attacked the Colonial Pipeline, they may have gotten a bit more than they bargained for. Colonial has acknowledged paying $4.4 million in ransom in order to bring their systems back online as quickly as possible. It was a decision they had to make quickly, but had to consider a myriad of variables in the process. Jos…
 
In this final episode of Democratically: 2020, Karin explains the medical dramas that kept her away from podcasting for the first couple months of the Biden era, and talks to Political Director of Data for Progress Marcella Mulholland and former Republican strategist Marshall Manson about the American Rescue Act, the prospects for improving our pol…
 
“I'm telling you a lie in a vicious effort that you will repeat my lie over and over until it becomes true” -- Lady Gaga “The point of modern propaganda isn't only to misinform or push an agenda. It is to exhaust your critical thinking, to annihilate truth.” -- Garry Kasparov In this week’s Very Special Episode, Matt Stephenson shares a LinkedIn LI…
 
This is a reading of the first volume from the five-volume Report of the Select Committee on Intelligence United States Senate on Russian Active Measures Campaigns and Interference in the 2016 U.S. Election. This document focuses specifically on Russian efforts to attack our election infrastructure. It explains security concerns with various U.S. v…
 
I believe that we should be teaching our kids, students and employees when and how to lie -- Maurice Schweitzer; professor, Wharton School at the University of Pennsylvania And, after all, what is a lie? 'Tis but The truth in masquerade. -- Lord Byron; Don Juan, Canto 11 This week, Matt Stephenson welcomes Attivo Networks CTO Tony Cole to InSecurit…
 
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy. -- James Comey I'm a hacker, but I'm the good…
 
“You got ninety percent of the American public out there with little or no net worth. I create nothing. I own. We make the rules, pal. The news, war, peace, famine, upheaval, the price per paper clip. We pick that rabbit out of the hat while everybody sits out there wondering how the hell we did it. Now you're not naive enough to think we're living…
 
Securing embedded systems presents unique and complex challenges when it comes to organizing and assessing software assets during assurance activities. The closed source nature of the supply chain and volume of differing components has made this a onerous and costly activity -- IIOT World On this Very Special Episode of InSecurity, Matt Stephenson …
 
Together we stand, divided we fall Come on now people, let's get on the ball and work together Come on, come on let's work together, now now people Because together we will stand, every boy every girl and a man -- Let’s Work Together, Canned Heat A truly rollicking episode of InSecurity finds Matt Stephenson trying to keep up with National Security…
 
The diversity of the global supply chain that makes it critical to modern society also makes it very difficult to know where all of the components of a device came from. Who designed each part, who made it, who put it into a device, who sold it, and who bought it? Inside the sheet metal or plastic shells of our personal and business equipment is a …
 
On January 25, 2021, the House of Representatives delivered a single Article of Impeachment against President Trump to the United States Senate. On January 12, 2021, the majority staff of the House Judiciary Committee released the first public staff report detailing the events of January 6, 2021, when insurrectionists broke into the U.S. Capitol. T…
 
“It's just a straight sequence, which is mind-numbing to me… This is like a Computer Science 101 bad homework assignment, the kind of stuff that you would do when you're first learning how web servers work. I wouldn't even call it a rookie mistake because, as a professional, you would never write something like this." -- Kenneth White, codirector o…
 
Karin speaks again to Matthew McGregor of Hope Not Hate to follow up their earlier conversation about the rise of the far right and discuss the President's complicity in directly inciting the mob that broke into the Capitol building. We discuss the second impeachment of Trump and how we are all living as victims of domestic terrorism. They also loo…
 
ABC "A", always "B", be "C", closing ALWAYS BE CLOSING Always be closing. -- Blake; GlenGarry GlenRoss, David Mamet, 1992 Now we are taking some liberties there with that bit… but apply that philosophy to secure code development… now swap in Integrating or Developing for Closing… ABD… "A", always. "B", be. “D” Developing… or… well you get the point…
 
In this very special episode of Unconventional Threat, Executive Producer Paul Woodhull joins hosts Jonathan Winer and Peter Eisner to discuss the ransacking of the Capitol Building by American terrorists. The discussion centers on Donald Trump's complicity in the insurrection that resulted in multiple deaths. See Privacy Policy at https://art19.co…
 
This week, Karin speaks to Julie Norman, a Lecturer in US Politics at University College London about the insurrection that led to Trump supporters taking over the Capitol Building on Wednesday night, and also about the Democrats winning two Senate seats in Georgia following Tuesday's election. --- Send in a voice message: https://anchor.fm/democra…
 
In a special Christmas themed episode of the podcast, Karin talks to Friend of the Pod Emma Burnell about what politically themed Christmas gifts they would both wish to give to the current President, the President-Elect, and the major players in the Democratic Primary. Happy holidays to you and yours! --- Send in a voice message: https://anchor.fm…
 
I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones -- Albert Einstein If we wish to fight, the enemy can be forced to an engagement even though he be sheltered behind a high rampart and a deep ditch. All we need do is attack some other place that he will be obliged to relieve. If we do …
 
ELLIE: How do you know you’re not deluding yourself? As for me, I’d need proof. PALMER: Proof. Did you love your father? ELLIE: Huh? PALMER: Your Dad, did you love him? ELLIE: Yes, very much. PALMER: Prove it. That is, of course, Jodie Foster as Ellie Arroway and Matthew McConaughey as Palmer Joss in Robert Zemeckis’s 1997 adaptation of Carl Sagan’…
 
Karin speaks to Friend of the Pod Khary Penebaker, who was one of the 306 Electoral College members who cast their ballots for Joe Biden this week. He tells us about what the vibe was like in the room, how he drew a little heart over Kamala Harris' name, how he has dealt with death threats and "twisted logic" from Trump supporters, and much more. -…
 
“Diversity and independence are important because the best collective decisions are the product of disagreement and contest, not consensus or compromise.” -- The Wisdom of Crowds; James Surowiecki, On this week’s InSecurity, Matt Stephenson has a chat with Pulsedive co-founders Grace Chi and Dan Sherry about the joy and pain of security startup lif…
 
Guest host Beverly Kirk hosts a discussion on recent developments in the Department of Defense and early national security challenges the Biden administration will face after taking office. She is joined by Seth Jones, director of the Transnational Threats Project and Harold Brown Chair at CSIS; Todd Harrison, director of Defense Budget Analysis an…
 
Karin catches up with writer and Friend of the Pod Skylar Baker Jordan to talk about Biden's cabinet nominees, including: * the controversial appointment of recently retired 4-star General Lloyd Austin as Defence Secretary, and why this presents a threat to the principle of a civilian-led military* Skylar's enthusiasm for Secretary of State nominee…
 
The final subsection of Volume 2 is merely one paragraph on page 182 from the report and restates what was in the Introduction and Executive Summary, "While this report does not conclude that the President committed a crime, it also does not exonerate him." The podcast closes out with thanks to our Executive Producers and Associate Producers who in…
 
Part A of this subsection of Volume 2 provides legal background of the obstruction-of-justice statute most readily applicable to the Special Counsel's investigation: Section 1512(c)(2) of 18 U.S.C. Part B explores how constitutional tension is reconciled through separation-of-powers analysis when the President's official actions come into conflict …
 
DevSecOps? SecDevOps? Jeff… Kevin? Wait… what? On this episode of InSecurity, Matt Stephenson has a chat with Refactr co-founder & CEO Mike Fraser about the World of DevSecOps and the role it plays in contemporary Cybersecurity ecosphere. We dig into the relevance of low-code/no-code and FINALLY get handle on Conway’s Law as it applies to security.…
 
This episode covers Section II. Factual Results of the Obstruction Investigation, pages 15 to 158 of Volume 2 of the "Report on the Investigation into Russian Interference in the 2016 Presidential Election." This section of the report details the evidence obtained. Beginning with an overview of how Russia became an issue in the 2016 presidential ca…
 
Karin speaks to comedian and American Exchange podcast host Erich McElroy about the very different goings on in Trump's universe and Biden's universe. In Trump's world, long-shot hearings continue in a certainly futile attempt to overturn the results of the election, while general pardons are being considered for Trumps kids (and possibly Trump him…
 
On "Can He Do That?" The president is reportedly considering pardoning himself and his family for potential future Justice Department charges. And where does recent news of a “bribery-for-pardon” scheme fit into a president's limitations on pardon power?Di The Washington Post
 
This recording captures the live online event that took place on Saturday, November 28th and features:* Stand up (or rather, sit-down) comedy from Erich McElroy* A presentation by Karin digging into the turnout and persuasion performance of Democrats in Georgia this year* A conversation between Emma and Karin about the major themes of (and future f…
 
In this very special bonus episode of Unconventional Threat. hosts Jonathan Winer and Peter Eisner sit down with Senate Judiciary Committee member Sheldon Whitehouse. Sen. Whitehouse discusses the corrosive effects of Dark Money on the integrity of our elections, the effect of the tilt in the makeup of the Supreme Court, and the dangers of misinfor…
 
Loading …

Guida rapida

Google login Twitter login Classic login