Blogs of War

Blogs of War by John Little has covered the toughest national security, intelligence, and related technology problems since 2002. Get live updates on Twitter @blogsofwar

Contributing to Blogs of War

A Short Guide for Potential Contributors

I haven't accepted unsolicited guest posts for several years. I've preferred to work primarily with trusted contacts. The same goes for interviews. I tend to ignore pitches and reach out to people that I'm personally interested in. However, I'm shifting course a bit and am now encouraging you to submit pitches or complete . . .

Read More

June 19, 2015

Letters from Operation Desert Shield

I was digging through some old boxes this evening and found some letters that have been stashed away for twenty-five years. The letters themselves don't reveal much but it struck me how that time, the lead-up to the first Gulf War, was just so different.

That war had its detractors, large numbers of them in fact, but an increasing number . . .

Read More

June 08, 2015

Less is More

Tweaking the Tweets

sb_float If you've followed @blogsofwar on Twitter for long you know that it's not uncommon for me to experiment with content and the way that it's delivered. At times the feed has been fully human, at others almost fully driven by aggregation tools that I use on the backend, and lately it's been a little bit of both.

About two years . . .

Read More

April 23, 2015

Encryption as the New Norm: Discussing A Changing Internet with ProtonMail Co-Founder Andy Yen

Covert Contact Episode 19

Over the past couple of weeks I’ve been evaluating ProtonMail. This service is part of a new generation of tools (most inspired by Edward Snowden) developed with the aim of delivering robust encrypted communications and file sharing to the widest possible audience.

Blogs of War readers know that I’m not an Edward Snowden fan, far from it in . . .

Read More

March 27, 2015

Espionage Among Allies

Guest Post by William Tucker

William Tucker William serves as a senior security representative to a major government contractor where he acts as the Counterintelligence Officer, advises on counterterrorism issues, and prepares personnel for overseas travel. His additional duties include advising his superiors in matters concerning emergency management and business continuity planning. . . .

Read More

March 26, 2015

The Battle Between Encryption and Mass Surveillance with Former FBI Agent David Gomez

Covert Contact Episode 18

I emailed retired FBI agent David Gomez from my new ProtonMail account to propose a podcast about encryption and its effect on mass surveillance from a homeland security and law enforcement perspective. You’re reading this because he immediately accepted.

Encrypted communication has been available to consumers for decades but new tools are . . .

Read More

March 22, 2015

Life, and Art, in Afghanistan with Francesca Recchia

Covert Contact Episode 17

In this episode I catch up with Francesca Recchia to get an update on life in Kabul, Afghanistan where, mostly thanks to the weather, life has been even more difficult than usual. But the conversation also shifts quickly to the subject of art, and artists, in the country. Francesca is working hard to develop cultural programs there and she . . .

Read More

March 18, 2015