با برنامه Player FM !
16-Concealing and Revealing Clandestine Military Capabilities
Manage episode 295569709 series 2606565
Guests:
Austin Long is Vice Deputy Director for Strategic Stability in the Joint Staff J5 at the U.S. Department of Defense.
Ernest J. Herold is Executive Director of the International Institute for Strategic Studies—Americas and a retired Colonel in the U.S. Army. He was previously the Deputy Assistant Secretary General for Defence Investment at NATO and Business Development Executive for NATO, U.S. European Command, and U.S. Africa Command at IBM.
International Security Article:
This podcast is based on Brendan Rittenhouse Greene and Austin Long, “Conceal or Reveal? Managing Clandestine Military Capabilities in Peacetime Competition,” International Security, Vol. 44, No. 3 (Winter 2019/20), pp. 48–83.
Related Readings:
- Robert C. Toth, “Change in Soviets’ Sub Tactics Tied to Spy Case: Material Reportedly Available to Walkers May Have Tipped Kremlin to Vessels’ Vulnerability,” Los Angeles Times, June 17, 1985.
- Erica D. Borghard, “Chinese Hackers are Stealing U.S. Defense Secrets: Here is How to Stop Them,” Net Politics blog, Council on Foreign Relations, March 11, 2019.
- Daniel Gonzales et al., “Unclassified and Secure: A Defense Industrial Base Cyber Protection Program for Unclassified Defense Networks” (Santa Monica, Calif.: RAND, 2020).
Originally released on June 22, 2021.
21 قسمت
Manage episode 295569709 series 2606565
Guests:
Austin Long is Vice Deputy Director for Strategic Stability in the Joint Staff J5 at the U.S. Department of Defense.
Ernest J. Herold is Executive Director of the International Institute for Strategic Studies—Americas and a retired Colonel in the U.S. Army. He was previously the Deputy Assistant Secretary General for Defence Investment at NATO and Business Development Executive for NATO, U.S. European Command, and U.S. Africa Command at IBM.
International Security Article:
This podcast is based on Brendan Rittenhouse Greene and Austin Long, “Conceal or Reveal? Managing Clandestine Military Capabilities in Peacetime Competition,” International Security, Vol. 44, No. 3 (Winter 2019/20), pp. 48–83.
Related Readings:
- Robert C. Toth, “Change in Soviets’ Sub Tactics Tied to Spy Case: Material Reportedly Available to Walkers May Have Tipped Kremlin to Vessels’ Vulnerability,” Los Angeles Times, June 17, 1985.
- Erica D. Borghard, “Chinese Hackers are Stealing U.S. Defense Secrets: Here is How to Stop Them,” Net Politics blog, Council on Foreign Relations, March 11, 2019.
- Daniel Gonzales et al., “Unclassified and Secure: A Defense Industrial Base Cyber Protection Program for Unclassified Defense Networks” (Santa Monica, Calif.: RAND, 2020).
Originally released on June 22, 2021.
21 قسمت
همه قسمت ها
×به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.