Covert Contact

By John W. Little

Covert Contact covers complex national security, intelligence, and technology discussions that are relevant for insiders while remaining accessible to casual observers. The show is hosted by Blogs of War creator John Little. His work and analysis has been featured on the BBC, CBC, ABC, PBS Newshour, Fast Company, CBS, CNN and other international media outlets.

  1. 1.
    Shortwave Numbers Stations | Episode 118
    32:01
  2. 2.
    Chinese Spies in US Law Enforcement - And Everywhere Else | Episode 117
    31:24
  3. 3.
    The Threat of Fake Spies | Episode 116
    24:19
  4. 4.
    Election Threats and Disrupting Chinese Espionage | Episode 115
    25:17
  5. 5.
    French Officer Busted Spying on NATO for GRU & Other Espionage Cases | 114
    23:33
  6. 6.
    Russians Targeted Tesla Gigafactory in Ransomware Plot | Episode 113
    10:59
  7. 7.
    Intelligence Failures, Agent Storm, and eDiplomacy Trolling | Episode 1
    16:08
  8. 8.
    Texas A&M, NASA, and Chinese Espionage | Episode 112
    26:25
  1. 9.
    Careers in Intelligence: Beyond the Three Letter Agencies | Episode 111
    35:41
  2. 10.
    Spying for Russia: The Peter Debbins Case | Episode 110
    21:56
  3. 11.
    Counterintelligence Chat: Alexei Navalny & Alexander Ma | Episode 109
    24:45
  4. 12.
    Preparing for A Career in Intelligence: Thoughts on Personal Security and Behavior | Episode 108
    37:28
  5. 13.
    Understanding the Israel-UAE Deal | Episode 107
    17:08
  6. 14.
    A Pardon for Edward Snowden? | Episode 106
    25:03
  7. 15.
    Washington Takes Aim at the Confucius Institute | Episode 105
    24:22
  8. 16.
    Israel and The United States: Past, Present, and Future with Alon Pinkas | Episode 104
    34:44
  9. 17.
    Australia’s Cyber Security Strategy | Episode 103
    40:53
  10. 18.
    Chinese Spies and Russian Honey Traps | Episode 102
    35:44
  11. 19.
    Quick Take: An Explosion in Beirut | Episode 101
    6:44
  12. 20.
    What's Happening at the Chinese Consulate in Houston? | Episode 96
    12:34
  13. 21.
    Online Security: Avoiding a Personal October Surprise | Episode 100
    46:33
  14. 22.
    Chinese Espionage in the United States | Episode 99
    24:23
  15. 23.
    Shaping Intelligence Products for Maximum Impact | Episode 98
    58:27
  16. 24.
    When You Can't Obey | Episode 97
    50:19
  17. 25.
    Covert Contact is Back | Episode 95
    30:31
  18. 26.
    The Poisoning of Sergei Skripal | Episode 94
    30:17
  19. 27.
    Team Leadership & Ethics | Episode 93
    39:04
  20. 28.
    The Jerry Chun Shing Lee Case | Episode 92
    32:40
  21. 29.
    North Korean Cryptocurrency Ops | Episode 91
    30:18
  22. 30.
    Combatting Misinformation | Episode 90
    31:41
  23. 31.
    Evaluating the North Korean Threat | Episode 89
    31:41
  24. 32.
    Protecting the British Royal Family | Episode 88
    28:22
  25. 33.
    Beyond Bitcoin: Cryptocurrency Investing | Episode 87
    41:11
  26. 34.
    Bullets of Palestine | Episode 86
    32:35
  27. 35.
    Terrorists and Technology | Episode 85
    46:00
  28. 36.
    Economic Espionage: No One Is Immune | Episode 84
    31:26
  29. 37.
    Iraq’s Consolidation and the Kurds | Episode 83
    36:22
  30. 38.
    The Crypto Wars: Update from the Australian Front | Episode 82
    31:47
  31. 39.
    Egyptian, Muslim, American | Episode 68
    29:42
  32. 40.
    From CIA Case Officer to Rookie Cop | Episode 81
    40:21
  33. 41.
    The Kurdish Problem | Episode 80
    32:29
  34. 42.
    Propaganda, Influence, and Disruption | Episode 79
    25:49
  35. 43.
    Australian Cyber Policy | Episode 78
    41:36
  36. 44.
    Australian Approaches to Counterterrorism | Episode 77
    37:57
  37. 45.
    Australian Special Operations Forces | Episode 76
    32:39
  38. 46.
    Understanding and Developing Resilience To Information Warfare | Episode 75
    30:20
  39. 47.
    Deep State Conspiracies | Episode 74
    28:53
  40. 48.
    Data, AI, and Ethics | Episode 73
    27:24
  41. 49.
    Beyond Russia: Overlooked Counterintelligence Threats | Episode 72
    28:50
  42. 50.
    System Failure: It Only Gets More Difficult from Here | Episode 71
    25:14

Listen to Covert Contact now.

Listen to Covert Contact in full in the Spotify app