SORT BY Relevancy
Prolific author and investigative journalist Gordon Thomas joins Rick from the UK for a compelling broadcast dealing with espionage, ISIS, and Putin’s warnings to the West.
Secret Wars: An Espionage Story is a suspenseful glimpse into the shadowy world of the CIA, where deceivers become the deceived and the consequences are life or death. It's a clandestine world where intricate networks of people fight a complex battle to keep the world safe from terrorism.
When terrorists funded by the Libyan government strike airports in Rome and Vienna in 1985, the CIA enlists top propaganda expert Mike Garnett to help recruit a high-ranking Libyan official, Foreign Minister Abdallah Mukhtar, to work for the CIA. As violence escalates between the US military and terrorists based in Libya, Garnett utilizes CIA assets in Hollywood to produce a propaganda video designed to convince Mukhtar he was betrayed by his own regime. Garnett's plan works—but goes sideways when it motivates the Libyan official to do something Garnett didn’t even consider.
Sharp and insightful, Secret Wars: An Espionage Story is a thrilling tale of deception, betrayal, and patriotism—and Garnett soon learns they’re not as black and white as they seem when he’s forced to reevaluate the true nature of the business of deception.
For fans of Tom Clancy, David Ignatius, and Frederick Forsyth, Secret Wars is a fictional thriller set against the backdrop of historical events. Meticulously researched, it pulls from the author's personal experiences as a member of the CIA.
The January 18, 2014, episode of American Heroes Radio features a conversation with retired Special Agent Jim Christy, Air Force Office of Special Investigations.
Jim Christy left the government in July 2013 after 42 years of public service and now started his own consulting firm, The Christy Group, LLC. He has also partnered with eventPower to reincarnate the DoD Cyber Crime Conference into the U.S. Cyber Crime Conference. Jim is a retired special agent that has specialized in cyber crime investigations and digital forensics for over 27 years with the Air Force Office of Special Investigation and Department of Defense Cyber Crime Center (DC3). Jim retired in Nov 2006 as a Special Agent and immediately returned to the federal government and DC3 first as an IPA and later as an HQE (Highly Qualified Expert) senior appointed by the Secretary of the AF as the Director of Futures Exploration (FX) for the DC3. FX the DC3 innovation incubator was responsible for Communication outreach/marketing, cyber workforce development and strategic relationships with other government organizations, private sector, and academia.
Some of SA Christy’s notable firsts in Computer Crime Investigations:
1st civilian computer crime investigator in the U.S. Government
1st computer espionage investigation (Hanover Hacker Case), case agent
1st DoD investigator to go undercover on pedophile bulletin boards
1st to distribute wanted poster on the Internet (triple homicide case)
1st psychological profiling study of computer criminals program (Project Son-of-Slammer)
1st to create the Air Force Computer Forensics Lab
1st to create a DOD Computer Forensics Lab
1st Computer Forensics team to support Special Operations (Operation Iraqi Freedom)
1st Law Enforcement official to be awarded the AITP Distinguished Information
Join The Legendary Ginger Dawn Harman as she tackles the wold of Spies and Espionage - and has lots of fun doing so.
Ginger chats about meeting Tony and Joanna Mendez - former CIA agents and shares a reading by former CIA Michael Tabman called Who Started the Fire.
With music and special effects - she rolls into a review of Gang Spies by the talented Peter St. John. A great book - great series, by the way.
And brings the show in for landing with a blast back in time -- you'll be surprised. But with Ginger Dawn -- we are always a bit taken aback.
Join the fun!
Israel Gaza war, US espionage, Russia, Iraq Christians on Prophecy Headline News
The grinding away of civilized society, the world turns, and the rising of war and bloodshed engulf the present day world. Join us in our discussion of the news and the end times as we see the unfolding of the world structure into one preparing to meet the Son of Perdition
==================================|WIBR/WARN Site content disclaimer:
This show offers Biblical analysis, factual information, and viewpoints, which are intended to be useful in arriving at an understanding of the events of our Prophetic time period. This show also has other articles, from which we have gathered factual information and other viewpoints on matters of interest in helping you to gain further insight into the conditions in America and the world.
We have striven to find reliable and trustworthy information in gathering these articles and believe the sources quoted are such, but we cannot gaurantee this information is free of mistakes or errors.
WIBR/WARN Radio believe that the Bible serves as mankinds main source of all faith and practice which help prepare people for the coming of the Messiach, Yeshua to this earth.
WIBR/WARN Radio does not necessarily agree with all contributors, information, or sources quoted. As in all things, including scripture; we recommend fasting, praying, and studying scripture for yourself to verify biblical teachings.
Go to www.warn-radio.com www.warn-usa.com www.wingswatchman.org
WIBR/WARN Ministry sites: www.warn-radio.com www.warn-usa.com www.wingswatchman.org www.dday4america.com
Sites that point to us: www.warn-usa.org www.warn-usa.net www.warn-usa.us www.ddayforamerica.com
The Department of Defense reported that Chinese hackers gained access to our government’s designs for advanced weapons systems. According to the Washington Post, “U.S. officials say that senior Pentagon officials are frustrated by the scale of cybertheft from defense contractors, who routinely handle sensitive classified data.”
On February 18, 2013, Mandiant released a report exposing one of China’s cyber espionage units. The group, which Mandiant calls APT1, is one of the most prolific we track in terms of the sheer quantity of information it has stolen. The scale and impact of APT1′s operations compelled Mandiant to write the report and release more than 3,000 indicators to help organizations defend against APT1’s tactics. The report linked APT1 to a unit within China’s People’s Liberation Army and received widespread attention from the media and from the U.S. government.
TODAY WE FEATURE-Black Conservative-Chris Arps; Ron Kessler-FBI & Espionage; 9/11 & the World Trade Center-destroyed by controlled government demolition? Richard Gage tells the story.
Welcome to Bill Martinez Live, hosted by an unapologetic AMERICAN U.S. Marine of Mexican descent who knows why people come to America but demands that immigrants come through the front door and that the rule of law is respected. Bill Martinez Live waves just one flag and has no use for hyphenated hearts torn between the 4th of July and some other foreign flag. We put the United States over party politics and broadcasting our unstinting praise of this great land to 250 American cities through CRN, BML syndication and the ever popular Blog Talk Radio platform. The best answers come when we are all engaged, involved and united for everyone’s higher good.
Stifled by the endless partisan wrangling in our country? Open up a window to get sunshine and a BREATH OF FRESH AIR in Bill´s News Talk & Entertainment Radio format with great guests. The Republicans & Democrats have lost a grasp on life, liberty and pursuit of happiness for ALL Americans. Bill Martinez Live helps us regain it. Listen in to the show to hear every facet of the issues but keep your eye on God and the exceptionalism to which he has urged on America and its people. Our nation is at a crossroads but remember your solemn birthright fellow Americans as "We the People". See more at: http://billmartinezlive.com/about-the-program/#sthash.tooJ0atj.dpuf
Last week, Brian Contos, CISO of the Advanced Threat Protection Group at Blue Coat Systems, discussed how cyberwar has become a great equalizer between nation states. While our understanding of cyberwar and states’ ability to execute a cyberwar strategy are in their infancy, Contos directs our attention to how attacks have shifted from creative mischief to stealing intellectual property, intercepting military communications and the destruction of computer systems. The recent news about Chinese hackers stealing designs for advanced weapons systems from the Department of Defense and the extent of frustration among agency officials about the scale of cyberthefts is just the latest example.
In this guest podcast, Richard Bejtlich, Mandiant’s Chief Security Officer, discusses the latest cyber challenges including cyberwar and China’s cyber espionage units, which were exposed earlier this year in the Mandiant APT1 report. Bejtlich’s podcast appears on Federal Blue Print courtesy of Bloomberg Government.
Honoring the veterans and civilians who risked their lives serving in clandestine operations and secret intelligence gathering during the Cold War (1945-91)
March 7, 2014 at 2:00 pm PST
LPresentation held at:
6755 Newlin Avenue
Whittier, CA 90601
Admission is free
Armando F Sanchez presents an entertaining and in depth three-part visual presentation on historical secretive military activity and individuals who actively participated, as veterans and civilians, in highly classified programs of the 45-year Cold War.
Each presentations presents his worldwide travels, 35-years of scholarly research and actual interviews with persons who held high security clearance and had access to classified information and participated in events that affected the outcome of the Cold War.
Part I. (Presentation on March 7, 2014 at Whittier Museum at 2:00 pm)
* Spying and espionage
* The birth of the nuclear age
* Beginning of the Cold War
* Code breakers and intelligence gathering
Part II. Date and time to be determined
* The spread of weapons of mass destruction
* Spies in the sky
* The Cuban Missile Crisis
Part III. Date and time to be determined
* Special naval intelligence gathering operations
* Women in the clandestine services
* The world's espionage agencies
UNREDACTED with Rachel Marsden: Lifting the black ink to reveal the covert information and intelligence around global events.
Details about today's guests: www.unredactedshow.com/vault.html
Show website: www.unredactedshow.com
The quintessential "Who Done It" is never more evident than in a spy thriller. In many cases, there are so many spies, you can't tell the good ones from the bad ones; which government is the righteous one or which one isn't. Who do you trust, the rogue agent. the double agent or the spy you know...or think you know. I don't know if we have the answer (...no sercets here), but we do have a few films to share with you, that are definitely worth your attention...spy to spy and all!
A Discussion of Libertarian Politics in Delaware and Across the Nation, with a Little Bit of Music Thrown In, Just for Fun.
Petraeus Double Standard
DOJ Findings re Michael Brown Shooting
Incoherent US Foreign Policy
FBI Entraps Brooklyn Jihadis
Married Man Blues
by Freeky Cleen
We Go Down Fighting
by Suicide Denial
Podsafe music courtesy of Music Alley
Holder Press Conference
DOJ Report on Michael Brown Shooting Pg 80-83 esp.