Tom Drake
๐ค SpeakerAppearances Over Time
Podcast Appearances
They're sharing actual nuclear technology, even though it was quote-unquote flawed, as a way to get inside their program.
They're sharing actual nuclear technology, even though it was quote-unquote flawed, as a way to get inside their program.
They're sharing actual nuclear technology, even though it was quote-unquote flawed, as a way to get inside their program.
Yeah, kind of like that, but it was, this is sort of the arrogance, I'd say the arrogance is that we'll be able to get away with it. It backfires. So like if we give you the technology, we'll now understand the technology. Slip it in. That's right. And they'll think it's real and they'll take advantage of it because they have cutouts, right? There's cutouts. Yeah, right.
Yeah, kind of like that, but it was, this is sort of the arrogance, I'd say the arrogance is that we'll be able to get away with it. It backfires. So like if we give you the technology, we'll now understand the technology. Slip it in. That's right. And they'll think it's real and they'll take advantage of it because they have cutouts, right? There's cutouts. Yeah, right.
Yeah, kind of like that, but it was, this is sort of the arrogance, I'd say the arrogance is that we'll be able to get away with it. It backfires. So like if we give you the technology, we'll now understand the technology. Slip it in. That's right. And they'll think it's real and they'll take advantage of it because they have cutouts, right? There's cutouts. Yeah, right.
It's kind of the operational limited hangout. I mean, limited hangout can be used, but in this case, it was actually an operational cutout. Wow. Not a limited hangout. It was a cutout. Oh, yeah. Yeah. Oh, there's all kinds of programs like that. That's so crazy. Think about Switzerland, which is supposed to be a super secure system. Look that one up. That's a good one.
It's kind of the operational limited hangout. I mean, limited hangout can be used, but in this case, it was actually an operational cutout. Wow. Not a limited hangout. It was a cutout. Oh, yeah. Yeah. Oh, there's all kinds of programs like that. That's so crazy. Think about Switzerland, which is supposed to be a super secure system. Look that one up. That's a good one.
It's kind of the operational limited hangout. I mean, limited hangout can be used, but in this case, it was actually an operational cutout. Wow. Not a limited hangout. It was a cutout. Oh, yeah. Yeah. Oh, there's all kinds of programs like that. That's so crazy. Think about Switzerland, which is supposed to be a super secure system. Look that one up. That's a good one.
So this one has to do with certain types of encryption. These are devices that protect like the secrets of Switzerland. US had already managed to compromise that too. It's fascinating. I mean, the spy, I mean, this, you get into, you know, the combo of the technology of James Bond you see in movies and John LaCarre, which is a pen name, and just all the games people play, right? All the games.
So this one has to do with certain types of encryption. These are devices that protect like the secrets of Switzerland. US had already managed to compromise that too. It's fascinating. I mean, the spy, I mean, this, you get into, you know, the combo of the technology of James Bond you see in movies and John LaCarre, which is a pen name, and just all the games people play, right? All the games.
So this one has to do with certain types of encryption. These are devices that protect like the secrets of Switzerland. US had already managed to compromise that too. It's fascinating. I mean, the spy, I mean, this, you get into, you know, the combo of the technology of James Bond you see in movies and John LaCarre, which is a pen name, and just all the games people play, right? All the games.
Spy versus spy. Actually, a game I used to play on my Atari 8-bit. Oh, wow. Spy versus spy. There's a whole comic book series on spy versus spy, and it's hilarious. Sort of like Tom and Jerry or Wile E. Coyote and Roadrunner, right? It's just funny. It's funny, but it's real. It's real stuff, and it has consequences. Mm-hmm. Right?
Spy versus spy. Actually, a game I used to play on my Atari 8-bit. Oh, wow. Spy versus spy. There's a whole comic book series on spy versus spy, and it's hilarious. Sort of like Tom and Jerry or Wile E. Coyote and Roadrunner, right? It's just funny. It's funny, but it's real. It's real stuff, and it has consequences. Mm-hmm. Right?
Spy versus spy. Actually, a game I used to play on my Atari 8-bit. Oh, wow. Spy versus spy. There's a whole comic book series on spy versus spy, and it's hilarious. Sort of like Tom and Jerry or Wile E. Coyote and Roadrunner, right? It's just funny. It's funny, but it's real. It's real stuff, and it has consequences. Mm-hmm. Right?
People don't realize the extent, I mean, the games, the cutouts, the distractions, the misinformation, the propaganda. In my world, when I was in, you know, there's ways you can, what's called meekening, right? Meekening is a way to fake out somebody, you know, this electronically. They think it's a real signal, like a nav signal, but it's actually fake. Oh, wow.
People don't realize the extent, I mean, the games, the cutouts, the distractions, the misinformation, the propaganda. In my world, when I was in, you know, there's ways you can, what's called meekening, right? Meekening is a way to fake out somebody, you know, this electronically. They think it's a real signal, like a nav signal, but it's actually fake. Oh, wow.
People don't realize the extent, I mean, the games, the cutouts, the distractions, the misinformation, the propaganda. In my world, when I was in, you know, there's ways you can, what's called meekening, right? Meekening is a way to fake out somebody, you know, this electronically. They think it's a real signal, like a nav signal, but it's actually fake. Oh, wow.
Yeah, and it can obviously cause disruptions and... I wouldn't even get it. There's classified means by which I used to engage certain types of signals. Get inside the decision loop, literally, or the command stream. Fascinating stuff. But you've got to keep it all under wraps for obvious reasons. It was similar to what happened. We actually had Osama bin Laden's cell phone.
Yeah, and it can obviously cause disruptions and... I wouldn't even get it. There's classified means by which I used to engage certain types of signals. Get inside the decision loop, literally, or the command stream. Fascinating stuff. But you've got to keep it all under wraps for obvious reasons. It was similar to what happened. We actually had Osama bin Laden's cell phone.