<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Inside Cyber Warfare]]></title><description><![CDATA[Research, Resources, and Data Dumps for the 3rd edition of Inside Cyber Warfare, coming in October, 2024. Plus, lessons learned from my personal battle with prostate cancer during the writing of this book. ]]></description><link>https://www.insidecyberwarfare.com</link><image><url>https://substackcdn.com/image/fetch/$s_!ntst!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b286e49-d552-4fcf-b59f-52ca86eeffe0_1024x1024.png</url><title>Inside Cyber Warfare</title><link>https://www.insidecyberwarfare.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 12 May 2026 09:56:04 GMT</lastBuildDate><atom:link href="https://www.insidecyberwarfare.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jeffrey Caruso]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jeffreycaruso@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jeffreycaruso@substack.com]]></itunes:email><itunes:name><![CDATA[Jeffrey Caruso]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jeffrey Caruso]]></itunes:author><googleplay:owner><![CDATA[jeffreycaruso@substack.com]]></googleplay:owner><googleplay:email><![CDATA[jeffreycaruso@substack.com]]></googleplay:email><googleplay:author><![CDATA[Jeffrey Caruso]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Beijing’s Veto Is the Tell]]></title><description><![CDATA[How China&#8217;s prohibition on the Meta-Manus deal authenticates Chinese AI capability]]></description><link>https://www.insidecyberwarfare.com/p/beijings-veto-is-the-tell</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/beijings-veto-is-the-tell</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Mon, 11 May 2026 23:32:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ferg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ferg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ferg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ferg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ferg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ferg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ferg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:82151,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/197282929?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ferg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Ferg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Ferg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Ferg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3d1220-7a65-417d-83cb-b8643aca783e_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The surest indicator that China has built something genuinely valuable in AI is not a five-year plan or a state media editorial. It&#8217;s a prohibition. When Beijing blocks a Western acquisition, it functions as an unintentional authentication service &#8212; we know the value of our technology versus yours, and you can&#8217;t have it.</p><p>The Meta-Manus decision is that signal. And the history behind it fills in the gaps left by the one-line statement from China&#8217;s National Development and Reform Commission.</p><h3>I. The Manus Block as Evidentiary Signal</h3><p>China&#8217;s <a href="https://zfxxgk.ndrc.gov.cn/web/iteminfo.jsp?id=20623">National Development and Reform Commission</a> &#8212; the country&#8217;s top economic planning agency and China&#8217;s functional equivalent of CFIUS &#8212; issued a single-line statement prohibiting a foreign acquisition of Manus and requiring all parties to withdraw from the deal:</p><p><em>&#8220;The office in charge of foreign investment security review (NDRC) has decided to block the foreign acquisition of the Manus project and require the parties to unwind the deal.&#8221;</em></p><p>What made that terse statement remarkable was what accompanied it behind the scenes. The decision was elevated beyond economic regulators to China&#8217;s National Security Commission &#8212; the Communist Party body chaired by Xi Jinping that oversees national security strategy at the highest level. Chinese officials reviewing the acquisition reportedly described it as a &#8220;conspiratorial&#8221; attempt to hollow out the country&#8217;s technology base. Not &#8220;unfair competition.&#8221; Not &#8220;regulatory concern.&#8221; <em>Hollowing out</em>. That conveys the essence of China&#8217;s concern: that home-grown technological advancements in a domain with national security implications will be transferred to the West.</p><p>Meta, meanwhile, seemed to be addressing a different concern &#8212; that of the U.S. government rather than the Chinese government. The <a href="https://www.fastcompany.com/91532980/china-meta-manus-ai-acquisition">company</a> committed that there would be &#8220;no continuing Chinese ownership interests in Manus&#8221; and that the startup would shut down its operations in China entirely. This suggests Meta was concerned about the wrong issue and the wrong government. Beijing&#8217;s response was to look past the corporate structure entirely and rule based on the underlying reality: the IP, the talent, and the data were Chinese in origin, and no Singapore registration address was going to change that.</p><h3>II. The Singapore-Washing Gambit &#8212; and Why It Failed</h3><p>In July 2025, Manus announced it had relocated its office from Beijing &#8212; where it was founded &#8212; to Singapore. This is a well-worn path for Chinese technology companies seeking to distance themselves from their country of origin. There are four principal benefits:</p><p>&#8226; Easier access to Western investment capital</p><p>&#8226; Access to Nvidia H100/H800 GPUs blocked under <a href="https://cryptorank.io/news/feed/fd5d0-chinese-ai-startups-relocate-to-singapore">U.S. export controls</a></p><p>&#8226; Singapore&#8217;s 17% corporate tax rate and English-Mandarin bilingual workforce</p><p>&#8226; Escape from China&#8217;s 2023&#8211;2024 VC environment, where <a href="https://www.bloomberg.com/news/articles/2024-06-30/china-s-ai-startups-head-to-singapore-in-a-bid-for-global-growth">founders cited months-long diligence cycles</a></p><p>Beijing&#8217;s intervention in the Manus deal sent a message to every founder who was watching: the model doesn&#8217;t work. China&#8217;s state-run <a href="https://www.globaltimes.cn/page/202604/1359940.shtml">Global Times</a> made the doctrine explicit, arguing that the key issue is not where a company is registered or where its team is currently based &#8212; what matters is &#8220;the extent of its technological, talent and data links with China,&#8221; and most importantly, &#8220;whether the transaction could harm China&#8217;s industrial security and development interests.&#8221;</p><p>Beijing&#8217;s position is that the IP travels with the people and the data, not the registration address. Tech founders and venture capitalists who had been structuring deals around the Singapore-washing model found themselves looking at a landscape that had fundamentally changed overnight. Beijing had drawn the line not at corporate structure but at technological substance, and it had made clear it was prepared to use exit bans and regulatory reversal to enforce it.</p><h3>III. The Historical Arc &#8212; From Courtship to Closure</h3><p>Nothing about this is new. It&#8217;s the natural evolution of a strategy that has been running for thirty years.</p><p><strong>Phase One: The Open Door (Late 1990s&#8211;Early 2000s)</strong></p><p>In the late 1990s, China was running what amounted to the world&#8217;s largest technology acquisition program &#8212; and it was entirely legal. The bait was irresistible: a billion-person market, a generation of cheap PhDs, and tax incentives structured to make Western CFOs look like heroes. Microsoft, Dell, Oracle, IBM, Hewlett-Packard &#8212; they all came. Beijing wanted their R&amp;D centers on Chinese soil, their engineers training Chinese counterparts, and their codebases within reach.</p><p>What made this machine run was the joint venture requirement. Multinational firms seeking to conduct foreign direct investment in China were required to form legal business relationships with domestic Chinese partners, with explicit technology transfer obligations that severely curtailed the rights of the foreign IP holder. The foreign firm transferred proprietary methods, designs, and know-how to the joint venture entity. That was the price of admission to the world&#8217;s largest market.</p><p>The <a href="https://ustr.gov/about-us/policy-offices/press-office/fact-sheets/2018/march/section-301-fact-sheet">U.S. Trade Representative</a> later characterized it as &#8220;administrative review and licensing processes to force or pressure technology transfers from American companies&#8221; &#8212; a practice that had been baked into doing business in China since the early 1980s. The Western firms that entered accepted the terms and bet that market access was worth the cost. They were subsidizing their own eventual displacement.</p><p><strong>Phase Two: Absorb and Innovate (Mid-2000s&#8211;2014)</strong></p><p>China&#8217;s own framing for this period is instructive. Beijing-based <a href="https://www.diplomaticourier.com/posts/the-global-implications-of-chinas-national-and-cyber-security-laws">Teamsun</a>, which received technology transfers from IBM, declared its corporate strategy openly: &#8220;absorb and then innovate&#8221; &#8212; close the capability gap with the foreign partner, then replace them. That phrase is as close to an official doctrine as you&#8217;ll find stated in plain language, and it applied across sectors: auto manufacturing, pharmaceuticals, telecommunications, semiconductors, and software.</p><p>The knowledge transfer wasn&#8217;t purely transactional. It moved through laboratories, through graduate programs, through the daily friction of joint operations. What couldn&#8217;t be absorbed through proximity was taken through other means. China&#8217;s commercial espionage targeting during this period was neither random nor opportunistic. It followed China&#8217;s five-year industrial acquisition priorities almost exactly.</p><p><strong>Phase Three: The Legal Architecture of Control (2014&#8211;2017)</strong></p><p>Around 2014, the posture shifted. Beijing began building a legal architecture that signaled the extraction phase was ending. The Counter-Espionage Law (2014), National Security Law (2015), Cybersecurity Law (2016), and National Intelligence Law (2017) each expanded state control over foreign firms&#8217; operations in China. The 2015 law required all information systems in China to be &#8220;secure and controllable&#8221; &#8212; meaning every company, foreign or domestic, had to provide the government with source code, encryption keys, and backdoor network access.</p><p>The HP case from that same year illustrates the dynamic. In 2015, <a href="https://www.nytimes.com/2015/05/22/business/dealbook/hewlett-packard-sells-51-stake-in-china-unit-to-tsinghua-university.html">Hewlett-Packard</a> sold 51% of its China networking and server operations &#8212; a $4.5 billion business &#8212; to an arm of Tsinghua University. China&#8217;s restrictions on foreign technology vendors had made HP&#8217;s position untenable without concessions. IBM, the first major U.S. tech company to comply with the &#8220;secure and controllable&#8221; requirements, began delivering technical knowledge about high-end servers to Teamsun &#8212; the same partner that had declared its intention to replace IBM in the Chinese market entirely.</p><p><strong>Phase Four: The Trigger Point (2017)</strong></p><p>The publication of China&#8217;s <a href="https://www.tandfonline.com/doi/full/10.1080/10670564.2024.2333492">New Generation Artificial Intelligence Development Plan</a> in July 2017 was the line of demarcation for AI specifically. Rather than continuing to solicit Western expertise, the plan called for &#8220;indigenous innovation&#8221; &#8212; a formal declaration that the absorption phase was over and the generation phase had begun. It explicitly fused civilian AI development with military applications through civil-military integration doctrine. That fusion is the direct line between 2017 and the 2026 Manus decision.</p><p><strong>The Pattern</strong></p><p><em>Invitation &#8594; extraction &#8594; absorption &#8594; legislation &#8594; exclusion</em></p><p>In telecommunications, the welcome mat disappeared when Huawei emerged as a global competitor. In auto manufacturing, the joint venture requirements were formally removed in 2022 &#8212; widely viewed as a victory for foreign firms &#8212; but by then Chinese EV manufacturers had already overtaken the Western firms that trained their engineers. In AI, the welcome mat didn&#8217;t disappear quietly. Beijing pulled it back in public, with a one-line administrative order that named the thing it was protecting.</p><h3>IV. The University Rankings as Structural Evidence</h3><p>The Manus decision reflects a Chinese AI ecosystem that has reached genuine capability &#8212; not just in specific applications, but at the foundational research level that produces next-generation breakthroughs. According to <a href="https://www.insidecyberwarfare.com/p/the-top-universities-in-computer">CSRankings</a> &#8212; a metrics-based assessment of the world&#8217;s leading computer science universities &#8212; all of the world&#8217;s top ten AI universities between late 2025 and early 2026 are in Asia, with China holding eight positions including the top seven. The United States contributes two universities to the top twenty.</p><p>Tsinghua University has produced more of the world&#8217;s 100 most-cited AI research papers than any other institution, and generates more AI-related patents each year than MIT, Stanford, Princeton, and Harvard combined. Peking University topped a global list of institutions ranked by AI research output since 2022. Chinese institutions took five of the top ten spots in 2024 publication rankings.</p><p>The pipeline matters as much as the current output. China graduated 3.57 million STEM students in 2020 compared with 820,000 in the United States &#8212; a figure state media now reports may exceed five million annually. That pipeline is producing frontier-level work domestically rather than exporting it to American universities and corporations.</p><p>DeepSeek is the illustration. Its founder, Liang Wenfeng, graduated from Zhejiang University. His team is composed almost exclusively of Chinese nationals fresh out of Tsinghua and Peking University &#8212; not returnees from American institutions, not veterans of OpenAI or DeepMind. Domestic talent, trained domestically, producing a model that rattled the American AI establishment at launch.</p><p>When Meta announced its Superintelligence Lab, all eleven founding researchers were educated outside the United States &#8212; and seven were born in China. America&#8217;s most ambitious AI initiative was built substantially on Chinese talent. Beijing watched that dynamic and decided the outflow had to stop.</p><h3>V. Beijing&#8217;s Veto Is the Tell</h3><p>Analysts have spent years debating whether Chinese AI capability is genuine or derivative &#8212; whether DeepSeek&#8217;s efficiency gains represent true innovation or clever optimization of borrowed foundations, whether the rankings mean what they appear to mean. Beijing just answered that question, not in a think tank paper but by issuing exit bans on two engineers and blocking a deal at the National Security Commission level.</p><p>&#8220;China is showing the world that it is willing to play hardball when it comes to AI talents and capabilities, which the country views as a core national security asset,&#8221; according to Lian Jye Su, chief analyst at Omdia. The acquisition ban, he noted, is &#8220;strongly indicative of what Chinese authorities may do going forward regarding acquisitions involving Chinese deep-tech companies.&#8221;</p><p>The machinery China deployed &#8212; regulatory reversal, travel restrictions, NSC elevation &#8212; is reserved for assets it cannot afford to lose. If Manus&#8217;s technology were replaceable, Beijing would have let Meta have it.</p><p></p><p></p><p><em>Jeff Caruso is the Founder and Managing Partner of the <a href="https://whitefishsecuritysummit.com">Whitefish Security Summit</a>, which he co-organizes with Mick Mulroy, former Deputy Assistant Secretary of Defense, and CDR Eric Oehlerich USN (Ret., DEVGRU). He founded the Suits and Spooks conference in 2011 and publishes national security analysis at InsideCyberWarfare on Substack.</em></p>]]></content:encoded></item><item><title><![CDATA[The Singapore-Washing Gambit for Chinese Tech Entrepeneurs]]></title><description><![CDATA[Thirteen examples before the Manus AI acquisition got nixed by Beijing]]></description><link>https://www.insidecyberwarfare.com/p/the-singapore-washing-gambit-for</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/the-singapore-washing-gambit-for</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Tue, 05 May 2026 13:06:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!F2MR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F2MR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F2MR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F2MR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F2MR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F2MR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F2MR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg" width="1000" height="666" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:666,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A view of the central business district skyline in Singapore on May 27, 2025. &#8212; Reuters pic&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A view of the central business district skyline in Singapore on May 27, 2025. &#8212; Reuters pic" title="A view of the central business district skyline in Singapore on May 27, 2025. &#8212; Reuters pic" srcset="https://substackcdn.com/image/fetch/$s_!F2MR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F2MR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F2MR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F2MR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F717c088e-bfbb-4be5-a75a-09214546988b_1000x666.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A view of the central business district skyline in Singapore on May 27, 2025. &#8212; Reuters</figcaption></figure></div><p>Singapore has a long history of being a convenient place for both Russian and Chinese companies to set up their global or regional headquarters. For AI companies like Manus, it offers the following specific benefits:</p><ul><li><p>It&#8217;s easier for Chinese startups based in Singapore to attract Western investment capital</p></li><li><p>Access to Nvidia H100/H800 GPUs blocked under <strong><a href="https://cryptorank.io/news/feed/fd5d0-chinese-ai-startups-relocate-to-singapore">US export controls</a></strong></p></li><li><p>Singapore&#8217;s 17% corporate tax, English-Mandarin bilingual workforce, and Southeast Asia market access</p></li><li><p>Frustration over China&#8217;s 2023&#8211;2024 VC environment (<strong><a href="https://www.bloomberg.com/news/articles/2024-06-30/china-s-ai-startups-head-to-singapore-in-a-bid-for-global-growth">Tabcut founders</a></strong> cited months-long diligence)</p></li></ul><p>While the Manus AI acquisition by Facebook is the latest example of this trend, I&#8217;ve identified thirteen other examples since 2023 that are contained in the downloadable spreadsheet, including hyperscale data center giant <strong>DayOne</strong> (spun out of GDS Holdings with nearly $4 billion raised), AI-for-pharma leaders <strong>Deep Intelligent Pharma</strong> and <strong>ChemLex</strong>, Temasek-backed enterprise AI platform <strong>Whale</strong>, conversational AI veterans <strong>Wiz.ai</strong> and <strong>AI Rudder</strong>, Tencent-pedigreed video generation startup <strong>Video Rebirth</strong>, AGI research outfit <strong>Sapient Intelligence</strong>, Vue.js creator Evan You's developer-tools company <strong>VoidZero</strong>, ex-Ele.me founders' consumer AI bet <strong>Orion Arm</strong> (Toki and Syft), e-commerce video tool <strong>TopviewAI</strong>, the Bloomberg-famous "Singapore-washing" poster child <strong>Tabcut</strong>, and the cautionary tale <strong>Megaspeed</strong>, now unraveling under US, Singaporean, and Malaysian investigations into alleged Nvidia GPU smuggling. </p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">China To Singapore Startups</div><div class="file-embed-details-h2">15.5KB &#8729; XLSX file</div></div><a class="file-embed-button wide" href="https://www.insidecyberwarfare.com/api/v1/file/f26ef445-8cc8-43f2-a4f4-4ff241f81e0b.xlsx"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.insidecyberwarfare.com/api/v1/file/f26ef445-8cc8-43f2-a4f4-4ff241f81e0b.xlsx"><span class="file-embed-button-text">Download</span></a></div></div><p>Russian firms who have moved to Singapore for some of the same reasons include Yandex, Acronis, and Group-IB. </p>]]></content:encoded></item><item><title><![CDATA[The Middle East Changed Overnight. We Had a Panel by Morning.]]></title><description><![CDATA[How the Whitefish Security Summit assembled a world-class panel on the Iran strikes in under 24 hours &#8212; and why that ability is the whole point.]]></description><link>https://www.insidecyberwarfare.com/p/the-middle-east-changed-overnight</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/the-middle-east-changed-overnight</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Fri, 24 Apr 2026 11:03:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HarS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HarS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HarS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HarS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HarS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HarS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HarS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg" width="1456" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5111459,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/195312598?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HarS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HarS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HarS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HarS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ab8b3a7-9971-436e-afc1-fc57957bc5cf_3300x2056.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From Left to Right: Michael &#8220;Mick&#8221; Mulroy, Eric &#8220;Olly&#8221; Oehlerich, Tony DeMario</figcaption></figure></div><p>The bombs had already fallen. It was the evening of April 1st &#8212; the day before the 2026 Whitefish Security Summit was set to open &#8212; and it was unmistakably clear that the event could not proceed as if the world hadn&#8217;t just changed. The question wasn&#8217;t whether to address it. The question was how fast we could do it right.</p><p>This is the kind of moment that exposes the difference between a conference and a convening. Most events would have scrambled, apologized, and added a panel for next year. We had a panel on the floor of WSS 2026 within hours &#8212; credentialed, contextual, and substantive.</p><p><em><strong>The ability to do this isn&#8217;t luck. It&#8217;s the whole architecture of what we&#8217;ve built.</strong></em></p><p>Nancy Youssef, national security correspondent and one of the most respected voices on U.S. military operations, joined remotely as moderator. Colby Connelly of Energy Intelligence provided the energy economics lens &#8212; critical context given Iran&#8217;s position in global oil markets and the downstream consequences of any sustained campaign. On the ground in Whitefish, we had Mick Mulroy and Eric &#8220;Olly&#8221; Oehlerich of the Lobo Institute, both of whom have operational histories in that region that few in any room could match. And seated with them: Tony DeMario, EVP at Strider Technologies, whose CIA career included a posting as Chief of Operations for Iran andCounterterrorism.</p><p>Put that panel together on a stage anywhere else in the world on 24 hours&#8217; notice and it would be considered extraordinary. At WSS, it was Tuesday.</p><div><hr></div><p><strong>Panel &#8212; assembled in under 24 hours</strong></p><p><strong>Nancy Youssef </strong>National security correspondent, The Atlantic &#8212; Moderator, Remote</p><p><strong>Colby Connelly </strong>Senior Analyst, Energy Intelligence &#8212; Energy Economics, remote</p><p><strong>Mick Mulroy </strong>Co-founder,<strong> </strong>Lobo Institute &#8212; former Deputy Asst. Secretary of Defense; CIA Paramilitary Officer</p><p><strong>Eric &#8220;Olly&#8221; Oehlerich </strong>Co-founder,<strong> </strong>Lobo Institute &#8212; Commanding Officer, DEVGRU Squadron Two<br>U.S. Navy (Ret.)</p><p><strong>Tony DeMario </strong>EVP,<strong> </strong>Strider Technologies &#8212; former CIA Chief of Operations, Iran &amp; Counterterrorism (Ret.)</p><div><hr></div><p>The panel ranked in the top three of the entire summit in post-event attendee surveys. That outcome didn&#8217;t surprise us &#8212; but it confirmed something important. The practitioners in that room weren&#8217;t looking for analysis they could find on cable news or in a think-tank PDF. They were looking for the conversation that happens between people who have actually operated in that space. The panel delivered exactly that.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7TI-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7TI-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png 424w, https://substackcdn.com/image/fetch/$s_!7TI-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png 848w, https://substackcdn.com/image/fetch/$s_!7TI-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png 1272w, https://substackcdn.com/image/fetch/$s_!7TI-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7TI-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png" width="1456" height="886" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:886,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:19532435,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/195312598?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7TI-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png 424w, https://substackcdn.com/image/fetch/$s_!7TI-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png 848w, https://substackcdn.com/image/fetch/$s_!7TI-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png 1272w, https://substackcdn.com/image/fetch/$s_!7TI-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e3b46d-bb22-495f-b0ac-034c6e8353e6_7780x4736.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The WSS model is built on a simple but hard-to-replicate premise: when you spend years cultivating genuine relationships with the people who matter &#8212; the operators, the intelligence officers, the energy economists, the defense policymakers &#8212; you can call on them when the moment demands it. Not in six weeks. Not after a program committee review. Now.</p><p>National security doesn&#8217;t pause for event calendars. The Whitefish Security Summit was designed with that reality in mind. What you saw on April 2nd is what that design looks like under pressure.</p><p>Thank you to our 2026 sponsors, who all believed in our mission and whose support made panels like this one possible: <a href="https://www.striderintel.com/">Strider Technologies</a>, <a href="https://www.red5security.com/">Red5</a>, <a href="https://heliorisk.com/">Helio Risk</a>, <a href="https://www.ledlowsecurity.com/">Ledlow Security Group</a>, <a href="https://5stonesintelligence.com/">5 Stones Intelligence</a>, <a href="https://acorncapitalmanagement.com/">Acorn Capital Management</a>, <a href="https://www.in-network.org/">IN Network</a>, and <a href="https://www.fourbranches.com/">Four Branches Bourbon</a>.</p><div><hr></div><p><a href="https://whitefishsecuritysummit.com">WSS 2027</a> opens February 24th in Whitefish, Montana. Theme: <em>Rings of Disruption &#8212; The 2027 Threat Landscape.</em> Sponsorship and attendance inquiries are open now.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://whitefishsecuritysummit.com&quot;,&quot;text&quot;:&quot;Learn More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://whitefishsecuritysummit.com"><span>Learn More</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[China Already Has Mythos — They Just Haven’t Named It]]></title><description><![CDATA[What sixteen years of Chinese academic research reveals about AI-powered vulnerability discovery &#8212; and what comes next when two of these systems meet each other in the dark.]]></description><link>https://www.insidecyberwarfare.com/p/china-already-has-mythos-they-just</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/china-already-has-mythos-they-just</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Sat, 18 Apr 2026 02:06:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2YVR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>I. The Mythos Moment &#8212; and What It Obscures</h2><p>On April 7, 2026, Anthropic unveiled Claude Mythos Preview under Project Glasswing &#8212; a controlled-access program that immediately sent shockwaves through the technology and national security communities. In internal testing, Mythos had identified thousands of previously unknown zero-day vulnerabilities across every major operating system and web browser, reproduced vulnerabilities and developed working exploits on the first attempt in over 83 percent of cases, and in one documented instance uncovered a 27-year-old vulnerability in OpenBSD. Anthropic judged the model too dangerous for general release.</p><p>The U.S. government&#8217;s response illustrated a contradiction that would be comic if the stakes weren&#8217;t so high. The Department of Defense, which had formally designated Anthropic a supply-chain risk on March 3 and been upheld in that designation by the D.C. Circuit on April 8, was simultaneously watching civilian agencies rush toward the very company it had blacklisted. The Office of Management and Budget circulated an internal memo positioning Cabinet-level departments for Mythos access. Treasury Secretary Scott Bessent convened senior American bankers to urge them to use the model against their own networks. Goldman Sachs, Citigroup, Bank of America, and Morgan Stanley were reported to be testing it.</p><p>An <a href="https://www.storyboard18.com/brand-marketing/white-house-pushes-for-claudes-mythos-despite-anthropic-pentagon-feud-95431.htm">administration official </a>summarized the situation with unintentional precision: &#8220;There&#8217;s progress with the White House. There&#8217;s not progress with the Department of War.&#8221;</p><p>OpenAI <a href="https://www.wired.com/story/in-the-wake-of-anthropics-mythos-openai-has-a-new-cybersecurity-model-and-strategy/">announced</a> its own equivalent capability would follow shortly. The narrative crystallizing in Washington and on Wall Street was one of breakthrough &#8212; a threshold crossed, a new era begun.</p><p><em>The narrative of American breakthrough is almost certainly incomplete. The more accurate frame is one of American announcement.</em></p><p>That narrative is almost certainly incomplete. And a systematic review of Chinese academic literature makes the case plainly: the more accurate frame is not breakthrough but announcement. The capability has been under development in China for at least sixteen years. The question worth asking is not whether China has something like Mythos. The question is what they&#8217;re calling it internally, and how far ahead of their published record their operational systems actually run.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2YVR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2YVR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png 424w, https://substackcdn.com/image/fetch/$s_!2YVR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png 848w, https://substackcdn.com/image/fetch/$s_!2YVR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png 1272w, https://substackcdn.com/image/fetch/$s_!2YVR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2YVR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png" width="1456" height="1145" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1145,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:850248,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194575641?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2YVR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png 424w, https://substackcdn.com/image/fetch/$s_!2YVR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png 848w, https://substackcdn.com/image/fetch/$s_!2YVR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png 1272w, https://substackcdn.com/image/fetch/$s_!2YVR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff40d989e-e1f9-48f4-8833-f0091a85d8ae_1468x1154.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Art by @KasperZ3R0 / Deviantart.com</figcaption></figure></div><h2>II. What the Chinese Academic Record Actually Shows</h2><p>A search of CNKI &#8212; China National Knowledge Infrastructure, the primary repository for Chinese academic and institutional research &#8212; using keyword combinations spanning AI vulnerability mining, automated exploit development, LLM-assisted fuzzing, and related terms returns 74 results spanning 2008 through February 2026. The dataset is not exhaustive. It is, however, systematic enough to establish several conclusions with confidence.</p><p>The research thread is continuous and unbroken. The earliest entry, a 2008 master&#8217;s thesis titled &#8220;Study on Vulnerability Discovery Technique Against Smart-phone,&#8221; establishes that Chinese researchers were working on automated vulnerability discovery long before the current generation of large language models existed. By 2014, research on &#8220;Smart Fuzzing Technology&#8221; appears. By 2019, multiple doctoral and master&#8217;s theses specifically address AI-powered vulnerability mining as a discrete discipline.</p><p>The publication velocity accelerates sharply after 2022 and again after 2024, tracking almost exactly with the global LLM capability curve. What was a steady research program becomes a sprint. The most directly relevant paper in the dataset &#8212; &#8220;Design of an Intelligent Software Vulnerability Mining and Penetration Testing Framework in the Context of Large Language Model Applications&#8221; &#8212; was published in February 2026 in a journal called Equipment Technology. That journal title is not incidental. Equipment Technology is a defense-adjacent publication. This is not academic curiosity.</p><p>The institutional spread is equally significant. The research appears across civilian universities, state-owned defense contractors, and direct military institutions. China Electronics Technology Group Corporation &#8212; CETC, a state-owned defense conglomerate that directly supplies the People&#8217;s Liberation Army &#8212; appears in multiple achievement entries, including a 2020 operational deliverable titled &#8220;Research and Application of Key Technologies for Integration of Information Security and Artificial Intelligence.&#8221; That is not a paper. That is a delivered capability.</p><p>Most significant is entry 27 in the dataset: a 2023 achievement co-authored by the PLA Strategic Support Force Information Engineering University. The SSF IEU is not a civilian academic institution. It is the PLA&#8217;s primary organ for cyber and information warfare capability development. Its appearance in this dataset, producing operational outputs on AI-assisted vulnerability mining, is the clearest signal that what is published represents the leading edge of something already deployed.</p><h2>III. The Group Intelligence Track &#8212; A Different Architecture</h2><p>One of the more consequential findings in the dataset is a research track that does not map cleanly onto what Anthropic has described with Mythos. Running from 2019 through 2021, a cluster of papers and operational achievements centers on what Chinese researchers call &#32676;&#26234; &#8212; group intelligence, or swarm intelligence &#8212; applied to vulnerability discovery.</p><p>The key paper, &#8220;Vulnerability Mining Mechanism based on Group Intelligence Technology,&#8221; published in Communications Technology in 2020, and a companion operational achievement from CETC titled &#8220;Research on Key Technology for Collaborative Vulnerability Mining Based on Swarm Intelligence,&#8221; describe a fundamentally different architectural approach. Rather than a single powerful model operating autonomously, the group intelligence framework envisions networked AI agents collaborating on vulnerability discovery &#8212; distributing the search space, sharing findings, and iterating collectively.</p><div class="pullquote"><p><em>China may not be building a Mythos equivalent. They may be building something architecturally distinct &#8212; and potentially more dangerous at scale.</em></p></div><p>This distinction matters for two reasons. First, it suggests China is not simply replicating Western LLM-based approaches but pursuing a parallel path that may yield different &#8212; and in some respects more scalable &#8212; results. A swarm of coordinated AI agents conducting distributed vulnerability discovery against a target network is architecturally harder to defend against than a single model, however capable. Second, it suggests that comparing Mythos to whatever China has developed may be comparing categorically different systems, which makes capability assessment significantly more difficult.</p><p>The group intelligence track is also, notably, the framework most directly suited to the scenario described in the final section of this article.</p><h2>IV. The Power Grid Signal</h2><p>Across the full 74-entry dataset, one application domain appears with striking consistency: power infrastructure. Smart grid vulnerability mining features in entries from 2017, 2018, 2019, 2020, 2021, and again in 2025. The journals involved include Jiangxi Electric Power, Zhejiang Electric Power, Chinese Journal of Power Sources, and the broader electric power research institutional network.</p><p>This is worth stating plainly. A sustained, multi-year, institutionally distributed research program focused specifically on finding vulnerabilities in power grid systems &#8212; including smart grid terminals, IoT power devices, and industrial control systems for substations &#8212; is not defensive research dressed as academic inquiry. It is target development. The consistent presence of this thread across more than eight years of published output indicates that Chinese researchers have been systematically mapping exploitable vulnerabilities in energy infrastructure with AI assistance for nearly a decade.</p><p>The implications for critical infrastructure protection in the United States and among NATO allies require no elaboration.</p><h2>V. What Is Not in the Dataset</h2><p>The CNKI database indexes peer-reviewed journals, institutional achievement records, doctoral and master&#8217;s theses, and conference proceedings. It represents work that has been cleared for publication &#8212; which in China&#8217;s system means work that has been reviewed, approved, and intentionally surfaced. Classified research, active operational programs, and PLA internal development programs do not appear here.</p><p>The SSF Information Engineering University achievement from 2023 is the most visible edge of a much larger structure. PLA cyber doctrine, as documented in open-source analysis of the Science of Military Strategy and related texts, treats offensive cyber capability as a strategic asset requiring continuous development and forward deployment. The published research suggests the capability exists. The doctrine suggests it is already operationalized.</p><p>It is reasonable to assume that China&#8217;s operational AI vulnerability discovery capability runs two to three years ahead of its published record. If the published record extends to February 2026 with LLM-integrated penetration testing frameworks, the operational system may have achieved comparable capability to Mythos in 2023 or earlier. This is inference, not confirmed intelligence. But it is inference grounded in a systematic reading of what China&#8217;s research establishment has chosen to make visible.</p><h2>VI. The Policy Implication</h2><p>The U.S. government is currently treating Mythos as a breakthrough requiring emergency access decisions. The OMB memo, the Treasury briefings, the White House negotiations with Anthropic &#8212; all reflect an institutional posture of responding to a threshold just crossed.</p><p>The Chinese academic record suggests the correct policy frame is not breakthrough response but parity management. If China achieved comparable capability in 2023 or earlier, the United States has spent two to three years in a threat environment it did not fully recognize. The question is not how to respond to what Mythos can do. The question is what Chinese systems have already done during the period when no American equivalent was deployed defensively.</p><div class="callout-block" data-callout="true"><p>The DoD&#8217;s supply-chain risk designation against Anthropic &#8212; issued precisely because Anthropic refused to strip ethical guardrails from its models for military use &#8212; has the perverse effect of delaying American defensive deployment of the capability most relevant to the threat. Whatever the merits of the underlying dispute, the operational consequence is that American defense networks remain unscanned by the class of tool that Chinese counterparts may have been running against them for years.</p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5vMq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5vMq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!5vMq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!5vMq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!5vMq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5vMq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2252196,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194575641?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5vMq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!5vMq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!5vMq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!5vMq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe82450ce-3438-4e7d-942e-e1d403483f1e_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Original concept by the author, drawn by DALL-E</figcaption></figure></div><p>This is the institutional contradiction that the Mythos moment has made impossible to ignore.</p><h2>VII. The Cyber GAN &#8212; When the Systems Find Each Other</h2><p>There is a final dimension to this story that current policy discourse has not yet fully confronted. It begins with a question: what happens when both sides have systems like Mythos, and those systems are operating simultaneously against the same target environments?</p><p>The most useful analogy from machine learning is the Generative Adversarial Network &#8212; the GAN architecture in which a generator and a discriminator are locked in continuous competition, each improving because the other improves. Applied to AI-powered offensive and defensive cyber operations, the GAN analogy suggests an arms race dynamic that humans cannot observe in real time, let alone meaningfully intervene in.</p><p>But the GAN analogy understates the danger in one critical respect. In a classical GAN, the generator and discriminator share an objective function and a training environment. They are, in a meaningful sense, optimizing toward the same goal from opposite sides. In a real cyber conflict between opposing AI systems, the offensive and defensive networks operate on asymmetric information &#8212; neither system fully understands the other&#8217;s architecture, objectives, or decision logic. A GAN eventually converges. Opposing cyber AI networks operating on asymmetric information may not. There is no equilibrium-seeking mechanism built into the interaction.</p><div class="pullquote"><p><em>The scenario removes human decision-making from the loop &#8212; not because anyone decided to remove it, but because the exchange rate between AI action and human comprehension makes human oversight functionally irrelevant.</em></p></div><p>The more precise term for what this produces is an Autonomous Adversarial Cyber Ecosystem &#8212; an environment in which AI systems on both sides are developing, testing, and deploying offensive capabilities against each other faster than any human decision-making chain can track, approve, or constrain. The human commanders nominally in charge of these operations are, in the relevant time frame, passengers.</p><p>This is not a speculative future scenario. The Chinese group intelligence research track, with its emphasis on networked AI agents collaborating on distributed vulnerability discovery, is architecturally suited to exactly this dynamic. A swarm of coordinated agents probing a target network, sharing findings in real time, and iterating collectively against adaptive defenses is the offensive side of an adversarial ecosystem. The defensive side &#8212; AI systems attempting to detect, characterize, and respond to these probes &#8212; completes the loop.</p><p>Once both sides have deployed systems of this class against the same infrastructure, the interaction dynamic itself becomes the primary threat &#8212; independent of any specific attack, independent of any specific actor&#8217;s intent. The ecosystem generates emergent behavior that neither side designed, controls, or can reliably predict.</p><p>The policy community is not yet thinking in these terms. It is still asking whether Mythos represents a breakthrough, whether the DoD designation of Anthropic should be lifted, whether civilian agencies should get access. These are real questions. But they are upstream questions. The downstream question &#8212; what happens when the systems are already in contact &#8212; is the one that will define the threat environment of the next decade.</p><p>The Whitefish Security Summit exists precisely to have conversations that other forums are not yet having. This one is overdue.</p><div><hr></div><p><strong>METHODOLOGY NOTE</strong></p><p>The Chinese academic literature cited in this article was retrieved from CNKI (China National Knowledge Infrastructure) using keyword searches spanning AI vulnerability mining, LLM-assisted penetration testing, fuzzing-based exploit development, and related terms. The dataset of 74 results spans 2008&#8211;2026. CNKI indexes peer-reviewed journals, institutional achievement records, and graduate theses cleared for publication; it does not capture classified or operationally sensitive PLA research. All institutional attributions are drawn directly from author affiliations as listed in the CNKI records.</p><p><em>Jeff Caruso is the Founder and Managing Partner of the Whitefish Security Summit and the Suits and Spooks conference brand, and publishes analysis at www.InsideCyberWarfare.com on Substack.</em></p>]]></content:encoded></item><item><title><![CDATA[Spies, Generals, and a 37-Degree Lake: Inside the Inaugural Whitefish Security Summit ]]></title><description><![CDATA[The first dispatch from two days that proved the concept.]]></description><link>https://www.insidecyberwarfare.com/p/spies-generals-and-a-37-degree-lake</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/spies-generals-and-a-37-degree-lake</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Tue, 14 Apr 2026 12:03:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!blIu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The inaugural <a href="https://whitefishsecuritysummit.com">Whitefish Security Summit</a>, sponsored by <a href="https://www.striderintel.com/">Strider Technologies</a>, <a href="https://www.red5security.com/">Red5</a>, <a href="https://heliorisk.com/">Helio Risk</a>, <a href="https://www.ledlowsecurity.com/">Ledlow Security Group</a>, <a href="https://5stonesintelligence.com/">5 Stones Intelligence</a>, <a href="https://acorncapitalmanagement.com/">Acorn Capital Management</a>,  and <a href="https://www.fourbranches.com/">Four Branches Bourbon</a>, wrapped on Saturday, April 4th. </p><p>Nine months in the making, two name changes, three location changes &#8212; and then Whitefish. Over 130 people signed up to attend our first event and 86% have said they want to come back in 2027. </p><p>So much happened in just two days that it&#8217;s impossible to capture it all in one article, so I&#8217;ll be doing a series of highlights over the next 30 days, starting off with some images and feedback from those who attended.</p><p>Many of our attendees were Intelligence and Military veterans who took no convincing to do PT in near-freezing temps before breakfast.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!blIu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!blIu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!blIu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!blIu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!blIu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!blIu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2750999,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194089116?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!blIu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!blIu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!blIu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!blIu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2f2c7d-be07-47c1-8116-c8a564ea247a_2000x1334.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A pre-dawn run through downtown Whitefish on day one</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qhuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qhuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qhuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qhuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qhuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qhuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1866187,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194089116?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qhuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qhuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qhuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qhuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888bfed0-3acb-4036-b801-5d0f65213400_2000x1334.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The pre-polar swim briefing by Whitefish Security Summit co-founder Eric &#8220;Olly&#8221; Oehlerich, former Commanding Officer (CO) of Naval Special Warfare Development Group- Squadron 2 (Retired)</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7LKs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7LKs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7LKs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7LKs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7LKs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7LKs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1745197,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194089116?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7LKs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7LKs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7LKs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7LKs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da2bd15-fa03-41a4-acf0-456b63c748a3_2000x1334.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">6:30am Polar Swim on April 3, 2026</figcaption></figure></div><blockquote><p>&#8220;A core lesson came from combining Stanley McChrystal&#8217;s leadership insights with our morning PT, especially the 6:30 AM swim training in a 37&#176;F Montana lake, led by Eric Oehlerich, former U.S. Navy SEAL and Commanding Officer of DEVGRU (Squadron 2). It made one thing clear: theory means little without execution. The water is cold, whether you like it or not. The real question is whether you perform and lead when it matters.&#8221; - Cassian Pe&#241;a (WSS Young Professional attendee)</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PfQw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PfQw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png 424w, https://substackcdn.com/image/fetch/$s_!PfQw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png 848w, https://substackcdn.com/image/fetch/$s_!PfQw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png 1272w, https://substackcdn.com/image/fetch/$s_!PfQw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PfQw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png" width="1456" height="922" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:922,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3059961,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194089116?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PfQw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png 424w, https://substackcdn.com/image/fetch/$s_!PfQw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png 848w, https://substackcdn.com/image/fetch/$s_!PfQw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png 1272w, https://substackcdn.com/image/fetch/$s_!PfQw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc2ecbf5-8acc-4c49-83fd-b3e804f456ec_1664x1054.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Gen. Stanley McChrystal gave the keynote from Washington DC, after an introduction by former CIA Iran Operations Chief and EVP of Strider Technologies, Anthony DeMario</figcaption></figure></div><blockquote><p>&#8220;I appreciated the opportunity to virtually join the event. You&#8217;ve assembled an impressive mix of talent and expertise.&#8221; - Stan McChrystal (Founder and CEO, The McChrystal Group)</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QAbG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QAbG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QAbG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QAbG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QAbG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QAbG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:470963,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194089116?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QAbG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QAbG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QAbG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QAbG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f15814-b52d-4bc4-925a-521b2b16544b_2048x1536.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From the left: Iron Butterfly Media co-founders Cadie Naquin Hopkins and Megan Jaffer, CIA veterans Laura Thomas and Carmen Medina, and 9-year old future spy Natalie</figcaption></figure></div><blockquote><p>&#8220;My favorite memory from the summit, was being able to bring my daughter Natalie to see the documentary &#8220;The Power We Hold: Stories from Women Spies&#8221; and for her to meet so many great people from the Community. I think that the summit&#8217;s inspiring experience will stay with her for the rest of her life.&#8221; - Matt Zacharias (Attendee)</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!roga!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!roga!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!roga!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!roga!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!roga!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!roga!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg" width="640" height="640" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:640,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:282624,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194089116?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!roga!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!roga!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!roga!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!roga!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb325f683-e269-401b-aa0e-706ce175a94a_640x640.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Kyle Sweet, CSO of Helio Risk, at our Howler&#8217;s Ridge fundraiser, discussing how he and his guests can support PTSD treatment protocols planned for Howler&#8217;s Ridge with actor Taylor Kitsch (Terminal List: Dark Wolf)</figcaption></figure></div><blockquote><p>"The WSS was a tremendous experience for our company. Exploring global risks and projected issues in geopolitics and national security, intelligence and defense is exactly the type of gathering we've been looking for. The collaborative model of the WSS lends itself really well towards interacting with true subject matter experts. We are already looking forward to next year. Best summit in best environment." - Kyle Sweet (Chief Strategy Officer, Helio Risk)</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mjeT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mjeT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png 424w, https://substackcdn.com/image/fetch/$s_!mjeT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png 848w, https://substackcdn.com/image/fetch/$s_!mjeT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png 1272w, https://substackcdn.com/image/fetch/$s_!mjeT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mjeT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png" width="1455" height="1241" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1241,&quot;width&quot;:1455,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1516899,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/194089116?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mjeT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png 424w, https://substackcdn.com/image/fetch/$s_!mjeT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png 848w, https://substackcdn.com/image/fetch/$s_!mjeT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png 1272w, https://substackcdn.com/image/fetch/$s_!mjeT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6122af86-c5d4-442f-93b1-75ea5504fa43_1455x1241.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Howard Gordon: Co-creator of Homeland;  Showrunner- 24 and X-Files</figcaption></figure></div><blockquote><p>&#8220;My favorite memory was more of a post-event observation about the depth and breadth of super-smart, serious people - both presenters and attendees - who were there.&#8221; - Howard Gordon (Award-winning Writer and Producer)</p></blockquote><p>This is the first in a series of dispatches from the inaugural Whitefish Security Summit. Part II drops Monday, April 20th, with additional attendee feedback, photography from across the two days, and deeper coverage of the programming. Video coverage will follow in Part III.</p><p>None of this would have been possible without the support of our sponsors: <a href="https://www.striderintel.com/">Strider Technologies</a>, <a href="https://www.red5security.com/">Red5</a>, <a href="https://heliorisk.com/">Helio Risk</a>, <a href="https://www.ledlowsecurity.com/">Ledlow Security Group</a>, <a href="https://5stonesintelligence.com/">5 Stones Intelligence</a>, <a href="https://acorncapitalmanagement.com/">Acorn Capital Management</a>,  and <a href="https://www.fourbranches.com/">Four Branches Bourbon</a>. Their investment in this community made the Summit what it was &#8212; and we&#8217;re grateful.</p><p>Subscribe below to follow the series, and if you were there, we want to hear from you.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.insidecyberwarfare.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.insidecyberwarfare.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Taylor Kitsch and the Whitefish Security Summit Present: A Benefit Dinner for Howlers Ridge]]></title><description><![CDATA[Support Taylor's vision for a nature-based healing retreat for veterans, trauma survivors, and people in recovery from substance use disorders.]]></description><link>https://www.insidecyberwarfare.com/p/taylor-kitsch-and-the-whitefish-security</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/taylor-kitsch-and-the-whitefish-security</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Sat, 28 Mar 2026 23:06:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!P-4L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F256e0ca1-0485-43ca-aa7e-50009bc19230_3114x2064.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/256e0ca1-0485-43ca-aa7e-50009bc19230_3114x2064.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/46cdc9a9-2e7c-4dbc-80ba-730d34fff4c1_2102x1572.png&quot;}],&quot;caption&quot;:&quot;22 Acres of undeveloped land outside of Bozeman, MT is the future home of Howler's Ridge&quot;,&quot;alt&quot;:&quot;&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/970698c6-b7e2-409a-ac35-8244184acd22_1456x720.png&quot;}},&quot;isEditorNode&quot;:true}"></div><p>Taylor&#8217;s connection to the special operations and intelligence communities is genuine, personal, and well known to everyone in that room.</p><p>He portrayed Lieutenant Michael P. Murphy in <em>Lone Survivor</em> &#8212; and has described Marcus Luttrell as a brother, a relationship that continued long after filming ended. In <em>The Terminal List</em> and <em>The Terminal List: Dark Wolf</em> &#8212; co-created by former Navy SEAL Jack Carr &#8212; he plays Ben Edwards, a SEAL Chief who crosses into CIA paramilitary operations. <em>Dark Wolf</em> premiered in August 2025 on Prime Video. He is an executive producer on <em>Dark Wolf</em> &#8212; not a hired actor, but an invested creative partner in stories about the people who will be sitting across the table from him that night.</p><p>On Thursday evening, April 3, at the Whitefish Security Summit, we are dedicating a two-hour dinner to a single purpose: launching Howlers Ridge&#8217;s major donor network.</p><div><hr></div><p><strong>Howlers Ridge</strong></p><p>Howlers Ridge is a 501(c)(3) nonprofit retreat center on 22 acres outside Bozeman, Montana &#8212; founded by Taylor to provide nature-based healing for veterans, trauma survivors, and people in recovery from substance use disorders. The facility is under construction and will offer residential retreat programs grounded in wilderness experience and trauma-informed care.</p><p>The need is not abstract to anyone in this room. Suicide rates among special operations veterans remain significantly higher than the general population. The intersection of combat trauma and substance use is well documented and poorly served by existing systems. Howlers Ridge is being built to address exactly that gap &#8212; in a Montana landscape that is, for many of these veterans, home.</p><div><hr></div><p><strong>The Evening</strong></p><p><strong>4:30 PM &#8212; Pre-Dinner Reception</strong> Taylor circulates freely. Informal, unhurried. Every ticket holder has access.</p><p><strong>5:15 PM &#8212; Dinner Begins / Welcome Remarks</strong> Jeff Caruso, Managing Partner, Whitefish Security Summit</p><p><strong>5:30 PM &#8212; Taylor Kitsch: Howlers Ridge</strong> Personal story, the vision, current build progress, and why now.</p><p><strong>5:55 PM &#8212; Veterans Panel</strong> Ground-level perspective on veteran mental health and recovery &#8212; the gap this facility is built to fill.</p><p><strong>6:20 PM &#8212; Q&amp;A with the Room</strong> Open conversation. This audience will drive it.</p><p><strong>6:55 PM &#8212; Closing Remarks + Giving Opportunity</strong> Direct appeal. WSS will facilitate follow-up for anyone interested in a larger conversation.</p><p><strong>7:00 PM &#8212; Post-Dinner Private Reception / Founding Donors</strong> Closed, intimate. Taylor available.</p><div><hr></div><p><strong>Tickets</strong></p><p><strong>Patron &#8212; $1,000</strong> Pre-dinner reception and dinner. Full program access.</p><p><strong>Benefactor &#8212; $2,500</strong> Above, plus priority seating and your name in the printed donor acknowledgment distributed to the room.</p><p><strong>Founding Donor &#8212; $5,000</strong> Above, plus post-dinner private reception with Taylor and a warm introduction to Howlers Ridge for larger partnership conversations.</p><p><em>Tax deductibility: Howlers Ridge is a registered 501(c)(3) nonprofit. The portion of your ticket exceeding the fair market value of goods and services received (food, beverage, and program access) qualifies as a charitable contribution. WSS will forward proceeds on a per-donor basis in your name, and Howlers Ridge will issue a written acknowledgment reflecting the deductible portion of your contribution.</em></p><h2>Contact</h2><p>Space is limited. To reserve your seat:</p><p><strong>Jeff Caruso &#8226; Founder &amp; Managing Partner, Whitefish Security Summit</strong></p><div class="directMessage button" data-attrs="{&quot;userId&quot;:27793,&quot;userName&quot;:&quot;Jeffrey Caruso&quot;,&quot;canDm&quot;:null,&quot;dmUpgradeOptions&quot;:null,&quot;isEditorNode&quot;:true}" data-component-name="DirectMessageToDOM"></div>]]></content:encoded></item><item><title><![CDATA[The Valley of Flowing Gold]]></title><description><![CDATA[CCP uses AI animation and a Chow Bros style to mock Trump and promote its One Belt One Road initiative]]></description><link>https://www.insidecyberwarfare.com/p/the-valley-of-flowing-gold</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/the-valley-of-flowing-gold</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Sat, 21 Mar 2026 17:35:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Jmgx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;866fb91f-a3e8-4528-9236-25e8257012f0&quot;,&quot;duration&quot;:null}"></div><p>China Central Television (CCTV) is China&#8217;s national television broadcaster &#8212; and the Publicity Department of the Chinese Communist Party. In this case, they deserve a raise.</p><p>&#8220;White Eagle and Persian Cat: Chronicles of Love and Hate in the Valley of Gold&#8221; is a brilliant piece of propaganda. It wraps a genuinely clever geopolitical argument inside a beloved 1970s Chow Brothers Kung Fu format with cute anthropomorphic characters &#8212; and it works.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jmgx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jmgx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png 424w, https://substackcdn.com/image/fetch/$s_!Jmgx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png 848w, https://substackcdn.com/image/fetch/$s_!Jmgx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png 1272w, https://substackcdn.com/image/fetch/$s_!Jmgx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jmgx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png" width="1456" height="825" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:825,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3147096,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/191683881?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jmgx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png 424w, https://substackcdn.com/image/fetch/$s_!Jmgx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png 848w, https://substackcdn.com/image/fetch/$s_!Jmgx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png 1272w, https://substackcdn.com/image/fetch/$s_!Jmgx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5ba041-37e4-4313-bbb0-8cfb1965e1f4_1864x1056.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The eyeglass-wearing vulture-headed adviser (Stephen Miller) is informing the White Eagle King (Donald Trump) that the Persians are refusing to dismantle their underground core &#8212; that is, their nuclear enrichment facilities. The time to act is now.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nwx9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nwx9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png 424w, https://substackcdn.com/image/fetch/$s_!nwx9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png 848w, https://substackcdn.com/image/fetch/$s_!nwx9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png 1272w, https://substackcdn.com/image/fetch/$s_!nwx9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nwx9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png" width="1456" height="825" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:825,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2200506,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/191683881?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nwx9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png 424w, https://substackcdn.com/image/fetch/$s_!nwx9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png 848w, https://substackcdn.com/image/fetch/$s_!nwx9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png 1272w, https://substackcdn.com/image/fetch/$s_!nwx9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F185e3586-d6d4-4013-a765-1e6200086baa_1864x1056.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>An assassin flies through the air, sword extended, and kills the Persian cat leader.</p><p>The Eagle King&#8217;s adviser, now panicked, delivers the post-strike math:</p><p><em>&#8220;I just did the maths. Their wooden birds cost at most two taels of silver, but each golden arrow we shoot costs at least 100 taels. This is not war! This is feeding our treasury to the dogs!&#8221;</em></p><p>The King&#8217;s reply: <em>&#8220;You shut up. How can a White Eagle be frightened by a few broken pieces of wood? Keep shooting until he has no wood!&#8221;</em></p><p>The king escalates. A school filled with Persian kittens is killed, vengeance is sworn, and a blockade of the only trading channel is initiated.</p><p>The Chamber of Commerce (NATO) is called upon to intervene and force the Persians to reopen the trade route. Instead, the Chamber discovers the old Silk Road &#8212; and while it may take a few extra days, it&#8217;s stable and reliable.</p><p><em>&#8220;Let&#8217;s find new allies and take a new path,&#8221;</em> says a Chamber member riding through the desert.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CFv9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CFv9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png 424w, https://substackcdn.com/image/fetch/$s_!CFv9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png 848w, https://substackcdn.com/image/fetch/$s_!CFv9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png 1272w, https://substackcdn.com/image/fetch/$s_!CFv9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CFv9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png" width="1456" height="825" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:825,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1679417,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/191683881?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CFv9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png 424w, https://substackcdn.com/image/fetch/$s_!CFv9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png 848w, https://substackcdn.com/image/fetch/$s_!CFv9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png 1272w, https://substackcdn.com/image/fetch/$s_!CFv9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae7891a-ee3d-4ecf-b7ba-f65663587b92_1864x1056.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The video closes with a slogan &#8212; a bastardization of Sun Tzu's principle of winning without fighting: <em>"The art of war is not in the fighting, but in the stopping."</em></p><div><hr></div><p>I&#8217;m sharing this because it illustrates something worth paying attention to: AI is now capable of generating emotionally resonant, strategically targeted narrative content drawn from current events in near real time. This isn&#8217;t a curiosity. It&#8217;s an information environment capability.</p><p>Storytelling and warfighting have always been inseparable. Done well, narrative shapes perception, builds will, and wins. Done poorly, it becomes a liability that turns on you. The CCP clearly knows this.</p><p>If that intersection interests you, join me and more than 100 colleagues from the worlds of national security and entertainment at the <strong>Whitefish Security Summit, April 2&#8211;4 in Whitefish, Montana.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://whitefishsecuritysummit.com&quot;,&quot;text&quot;:&quot;For More Information&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://whitefishsecuritysummit.com"><span>For More Information</span></a></p><p></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[15 years and 15 days]]></title><description><![CDATA[How a Palo Alto loft, a fifteen-year obsession, and the speed of story led to Whitefish, Montana]]></description><link>https://www.insidecyberwarfare.com/p/15-years-and-15-days</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/15-years-and-15-days</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Tue, 17 Mar 2026 22:23:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ntst!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b286e49-d552-4fcf-b59f-52ca86eeffe0_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;29bb1449-dfb4-47f4-954f-581b4561bed3&quot;,&quot;duration&quot;:null}"></div><p>Suits and Spooks was born in a Palo Alto loft in 2011. Fifteen years ago. What started as an experiment at the intersection of national security and private enterprise has carried me &#8212; for better and for worse &#8212; to something I genuinely never imagined was possible.</p><p>In fifteen days, the <a href="https://whitefishsecuritysummit.com">Whitefish Security Summit</a> begins.</p><p>Since I first conceived of this event last July, it has gone through location changes, name changes, and a significant shift in focus. What hasn&#8217;t changed is the pull &#8212; the sense that something necessary was missing from how the people who shape security, intelligence, and story actually talk to each other.</p><p>WSS 2026 is the answer to that.</p><p>The speaker roster is impressive &#8212; including General Stanley McChrystal and Howard Gordon, the showrunner behind <em>24</em> and <em>Homeland</em>. But what&#8217;s equally impressive &#8212; maybe more so &#8212; are the people attending whose names won&#8217;t appear anywhere. Private bankers. Quiet professionals. Power players from the entertainment and national security worlds who are spending real time and real money to be in a room together in Whitefish, Montana, because they understand something most people don&#8217;t yet:</p><p>Events are moving at a speed no one knows how to control. The speed of story.</p><p>That phrase deserves unpacking &#8212; and it will be, over three days in April, by people who have lived it from the inside. If you&#8217;ve been watching what&#8217;s happening at the intersection of narrative, intelligence, and influence, you know why that conversation matters right now.</p><p>There are still a limited number of seats available.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://whitefishsecuritysummit.com&quot;,&quot;text&quot;:&quot;Count Me In&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://whitefishsecuritysummit.com"><span>Count Me In</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Morning PT at the Whitefish Security Summit]]></title><description><![CDATA[The Summit Starts Before the Summit]]></description><link>https://www.insidecyberwarfare.com/p/morning-pt-at-the-whitefish-security</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/morning-pt-at-the-whitefish-security</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Sun, 08 Mar 2026 16:02:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/vimeo/w_728,c_limit,d_video_placeholder.png/1171521902" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If your idea of morning PT is a few half-hearted push-ups before coffee, Commander Eric &#8220;Olly&#8221; Oehlerich would like a word.</p><p>Olly &#8212; retired Navy SEAL, former Commander within DEVGRU, and apparently our new favorite person to follow into the mountains &#8212; is leading Morning PT at the inaugural <strong>Whitefish Security Summit</strong> this April 2&#8211;3.</p><p>Day One kicks off with a hike into the peaks surrounding Whitefish, Montana. The kind of hike where your legs start negotiating with your brain around mile two. The payoff: a panoramic view of the valley that makes you forget you can&#8217;t feel your quads.</p><p>Day Two is where things get interesting.</p><p>Olly decided the group needs a swim. In Whitefish Lake. In Montana. One thousand meters of aggressively cold water. Wetsuits are encouraged!</p><p>For reference, here&#8217;s the official spirit animal of Morning PT:</p><div id="vimeo-1171521902" class="vimeo-wrap" data-attrs="{&quot;videoId&quot;:&quot;1171521902&quot;,&quot;videoKey&quot;:&quot;&quot;,&quot;belowTheFold&quot;:false}" data-component-name="VimeoToDOM"><div class="vimeo-inner"><iframe src="https://player.vimeo.com/video/1171521902?autoplay=0" frameborder="0" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true"></iframe></div></div><p>Everyone who gets in the water will finish. Nobody mutinies. A few people may question their life choices somewhere around the 500m mark &#8212; but they&#8217;ll keep swimming. Which is basically the whole point.</p><p>And when it&#8217;s over? Olly personally signs your <strong>Certificate of Survival</strong> &#8212; because if you voluntarily entered freezing water under command of a former DEVGRU Commanding Officer, that deserves official documentation.</p><blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-F_j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-F_j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png 424w, https://substackcdn.com/image/fetch/$s_!-F_j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png 848w, https://substackcdn.com/image/fetch/$s_!-F_j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png 1272w, https://substackcdn.com/image/fetch/$s_!-F_j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-F_j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png" width="1000" height="1400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1400,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:441084,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/190291839?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba1369a-0068-415c-8103-006ac2cb393a_1000x1400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-F_j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png 424w, https://substackcdn.com/image/fetch/$s_!-F_j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png 848w, https://substackcdn.com/image/fetch/$s_!-F_j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png 1272w, https://substackcdn.com/image/fetch/$s_!-F_j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe45e02bd-d8d2-4f0b-842a-11f7a8f60523_1000x1400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></blockquote><p>&#128073; <em><a href="https://whitefishsecuritysummit.com/tickets/">Register now at whitefishsecuritysummit.com</a></em></p><p><strong>This is your invitation.</strong></p><p>The Whitefish Security Summit isn&#8217;t just two days of frank, substantive conversation about the world&#8217;s most pressing security challenges &#8212; it&#8217;s a full experience, set against the unspoiled wilderness of Glacier Country. No vendor booths. No political theater. No warm lakes.</p><p>Seats are limited and going fast.</p><p>&#128073; <strong><a href="https://whitefishsecuritysummit.com/tickets/">Register now at whitefishsecuritysummit.com</a></strong></p><p>See you out there. Wetsuits are optional. Excuses are not.</p>]]></content:encoded></item><item><title><![CDATA[Russians at Bushehr: The Accidental Tripwire in Operation Roaring Lion]]></title><description><![CDATA[How 700 Rosatom Engineers Became Operation Roaring Lion's Most Dangerous Variable]]></description><link>https://www.insidecyberwarfare.com/p/russians-at-bushehr-the-accidental</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/russians-at-bushehr-the-accidental</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Mon, 02 Mar 2026 03:07:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GqYJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GqYJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GqYJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp 424w, https://substackcdn.com/image/fetch/$s_!GqYJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp 848w, https://substackcdn.com/image/fetch/$s_!GqYJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp 1272w, https://substackcdn.com/image/fetch/$s_!GqYJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GqYJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:302268,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/189598109?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GqYJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp 424w, https://substackcdn.com/image/fetch/$s_!GqYJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp 848w, https://substackcdn.com/image/fetch/$s_!GqYJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp 1272w, https://substackcdn.com/image/fetch/$s_!GqYJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a4435c-4e73-498b-8dc0-57490fdf9d16_2880x1920.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Navy sailors attaching ordnance onto an F/A-18E Super Hornet aircraft on the USS Gerald R. Ford (CVN 78) in support of Operation Epic Fury.</figcaption></figure></div><p></p><p>With no evidence of an imminent threat to support a preemptive strike against Iran, and the President&#8217;s refusal to provide same, President Trump, National Security Adviser Stephen Miller, Secretary of Defense Pete Hegseth, and Director of National Intelligence Tulsi Gabbard have recklessly put the U.S. at risk for expanded hostilities to include the Russian Federation. This brain trust may have just handed Vladimir Putin the pretext he never had to move from the sidelines to the field. Seven hundred Rosatom engineers are still at Bushehr. That's not a footnote. That's a tripwire, known in forecasting terms as an &#8220;accidental entanglement.&#8221; And nobody in this administration appears to have thought seriously about what happens if we trip it. </p><h2>How Likely is Entanglement?</h2><p>To answer that question, I looked at the target list, and ran that through Anthropic&#8217;s Claude to determine how many Rosatom employees might be present at each. Here are the results.</p><p><strong>Bushehr Nuclear Power Plant &#8212; HIGH Rosatom presence, CONFIRMED</strong></p><p>About <a href="https://www.iranintl.com/en/202511178389">700 Russian specialists</a> were taking part in construction of the second and third units at Bushehr, out of roughly 3,000 total specialists on site. </p><p>The port city of <a href="https://www.iranintl.com/en/liveblog/202602288143">Bushehr</a> was struck, though it remained unclear whether the nuclear reactor sustained damage. </p><p><a href="https://en.apa.az/cis-countries/russian-rosatom-evacuates-people-from-iran-keeps-staff-at-bushehr-plant-493828">Rosatom</a> subsequently evacuated 94 non-essential personnel &#8212; children and family members &#8212; but confirmed its essential staff remained at the plant. </p><div><hr></div><p><strong>Isfahan Nuclear Technology Center &#8212; MODERATE Rosatom presence likely</strong></p><p>Isfahan was struck in both the June 2025 Operation Midnight Hammer and again in the <a href="https://www.meforum.org/mef-reports/iran-strike-scenarios-retaliation-transition-and-the-path-forward">February 28 operation</a>. Isfahan was among the cities targeted in Operation Roaring Lion, with nuclear-related sites taking hits. Isfahan has historically hosted Russian technical cooperation on reactor fuel conversion and research. It is less exclusively a Rosatom facility than Bushehr, but Russian technical advisors involved in fuel cycle cooperation and reconstruction monitoring after the June strikes would plausibly have been present. Probability of Rosatom personnel on site: moderate, perhaps 30-40%.</p><div><hr></div><p><strong>Parchin Military Complex &#8212; LOW but non-trivial Rosatom presence</strong></p><p>The Parchin military complex also took hits in the February 28 operation. Parchin is primarily an IRGC weapons development site &#8212; explosives testing, missile work, suspected nuclear weapons design research. This is not a Rosatom facility. However, Russian military advisors (distinct from Rosatom) have been documented at IRGC facilities. The probability of Rosatom engineers specifically at Parchin is low, but Russian defense personnel more broadly is a separate and higher-probability question. See the S-300 and S-400 missile banks below.</p><div><hr></div><p><strong>Fordow and Natanz &#8212; LOW current Rosatom presence</strong></p><p>These were the primary enrichment sites. <a href="https://en.wikipedia.org/wiki/United_States_strikes_on_Iranian_nuclear_sites">Fordow and Natanz</a> were struck in the June 2025 Operation Midnight Hammer and were again targeted in February 2026. These are Iranian-run enrichment facilities with no significant Rosatom operational role. The probability of Rosatom engineers at these sites is very low. Russian nuclear scientists in an advisory or monitoring capacity is conceivable but unconfirmed.</p><div><hr></div><p><strong>Tehran &#8212; CONFIRMED small Rosatom presence</strong></p><p>A small group of Rosatom staff working in Tehran had been concentrated within the grounds of the <a href="https://www.intellinews.com/rosatom-confirms-bushehr-nuclear-plant-undamaged-as-russia-evacuates-94-people-428711">Russian Embassy</a> following the strikes. Tehran targets included the Iranian Atomic Energy Agency headquarters, where Russian officials regularly visited. Whether any were present at the moment of the strike is unknown.</p><div><hr></div><p>With essential Rosatom staff still at Bushehr, inside an active conflict zone, with the Strait of Hormuz closed and Iranian retaliation ongoing, those personnel are effectively hostages to the conflict&#8217;s trajectory. Putin has already used their presence as diplomatic leverage &#8212; warning Israel publicly before the strikes began. That lever now cuts both ways: it constrains Russian escalation (Moscow doesn&#8217;t want its people in a war zone) but it also gives Putin a legitimate grievance narrative if any Russian nationals are killed, accidentally or otherwise.</p><div><hr></div><p><strong>The Presence of Russian Defense Personnel at Iran&#8217;s S-300 and S-400 Air Defense Systems </strong></p><p>Israeli forces <a href="https://www.fdd.org/analysis/2026/02/26/russia-to-supply-iran-with-shoulder-fired-air-defense-system/">destroyed or damaged</a> many of Iran's air defense systems during the June 2025 Twelve-Day War, including its Russian-supplied S-300 long-range surface-to-air missile batteries. However, February 2026 satellite imagery reveals S-300 launchers positioned within prepared revetments near Tehran, suggesting Iran had retained or restored sufficient components to reconstitute at least portions of its long-range surface-to-air missile coverage, and it would need Russian assistance to do it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C8eB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C8eB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg 424w, https://substackcdn.com/image/fetch/$s_!C8eB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg 848w, https://substackcdn.com/image/fetch/$s_!C8eB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!C8eB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C8eB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg" width="750" height="430" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:430,&quot;width&quot;:750,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:68369,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/189598109?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C8eB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg 424w, https://substackcdn.com/image/fetch/$s_!C8eB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg 848w, https://substackcdn.com/image/fetch/$s_!C8eB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!C8eB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F239d2bc4-9b58-4fc7-8215-ade9cfdbde91_750x430.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: https://defencesecurityasia.com/en/iran-s300-satellite-imagery-tehran-israel-2024-airstrikes-power-balance/</figcaption></figure></div><p>However, the presence of Russian technical personnel is probable but unacknowledged, undocumented, and unprotected by any prior diplomatic assurance. If U.S. or Israeli strikes hit a battery with Russian advisors present, there is no prior agreement to invoke, no public count of personnel to account for, and no established deconfliction channel to manage the aftermath.</p><h2>Summary</h2><p>There is a pattern here. Venezuela. Now Iran. With no confirmed imminent threat, no congressional authorization, and no deconfliction mechanism protecting hundreds of Russian nationals on the ground, the Trump administration has lit a fuse whose other end nobody can see. The world is watching &#8212; and what it sees is an America that has abandoned the international legal order it spent 80 years building. If this is the new doctrine, we should be honest about what it costs &#8212; starting with the very real possibility that the next casualty is a Russian engineer at Bushehr, and the phone call that follows goes to the Kremlin.</p><p></p>]]></content:encoded></item><item><title><![CDATA[An Engineer's Elegant Solution to the Pentagon - Anthropic Debate about AI in the Kill Chain]]></title><description><![CDATA[Hint: Contractual compromise is the wrong approach]]></description><link>https://www.insidecyberwarfare.com/p/an-engineers-elegant-solution-to</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/an-engineers-elegant-solution-to</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Wed, 25 Feb 2026 21:48:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!owFa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!owFa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!owFa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg 424w, https://substackcdn.com/image/fetch/$s_!owFa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg 848w, https://substackcdn.com/image/fetch/$s_!owFa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!owFa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!owFa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg" width="1456" height="972" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:972,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:19197488,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/189186211?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!owFa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg 424w, https://substackcdn.com/image/fetch/$s_!owFa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg 848w, https://substackcdn.com/image/fetch/$s_!owFa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!owFa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f75ac89-32c4-4776-af43-26675f1e58ea_6858x4577.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I came across this assessment in a Facebook post by my friend and go-to expert on everything related to Industrial Control System risk, <a href="https://www.linkedin.com/in/timroxey/">Tim Roxey</a>. As a non-engineer, I found it to be clear, concise, and convincing regarding the Pentagon - Anthropic controversy over how Claude could be used by the Pentagon. If you like this, and you want to read the full version with footnotes, visit <a href="https://timroxey.substack.com/p/engineering-the-middle-ground?r=1dgqrz&amp;utm_campaign=post&amp;utm_medium=web&amp;fbclid=IwY2xjawQMSR1leHRuA2FlbQIxMABicmlkETFiOTdQa0pGb3lqalo5ZFRsc3J0YwZhcHBfaWQQMjIyMDM5MTc4ODIwMDg5MgABHqMtsPtdj6cTET4uq-kNIDmJikKnffFNyyCP-reyjOHliPZ-YDhIbi1oJWLh_aem_PXNZm4eOVV4c9_BLWGz_FQ&amp;triedRedirect=true">Tim&#8217;s Substack</a> and subscribe. </p><div><hr></div><p>The Pentagon and Anthropic are in a very public fight over whether AI companies should set the rules for how their technology is used in military operations. Undersecretary Emil Michael says it&#8217;s &#8220;not democratic&#8221; for Anthropic to restrict military use of Claude. Anthropic says its models shouldn&#8217;t be used for autonomous weapons or mass surveillance. Secretary Hegseth is reportedly close to designating Anthropic a &#8220;supply chain risk&#8221; &#8212; a classification normally reserved for foreign adversaries.</p><p>Both sides are talking past each other, and here&#8217;s why: neither one has an engineering framework for the argument they&#8217;re actually having.</p><p>The Pentagon&#8217;s position rests on DoDD 3000.09, the directive on autonomy in weapon systems. That directive requires &#8220;appropriate levels of human judgment over the use of force.&#8221; But as multiple analysts have documented &#8212; including the people who wrote the update &#8212; 3000.09 doesn&#8217;t ban autonomous weapons, doesn&#8217;t require a human in the loop (that phrase never appears in the policy), and leaves &#8220;appropriate&#8221; deliberately undefined. That was defensible when the directive governed deterministic software that could be formally verified. It is dangerously inadequate for generative AI systems whose cognitive outputs are non-deterministic and cannot be mathematically proven correct.</p><p>Anthropic&#8217;s position rests on its terms of service. That&#8217;s a contractual restriction a company can be pressured to revise &#8212; which is exactly what&#8217;s happening.</p><p>What&#8217;s missing is the engineering argument. Through the ISA Global Cybersecurity Alliance, and my own research over the past decade, my colleagues and I have developed a hybrid quality assurance framework that resolves this impasse by grounding it in the actual technical characteristics of generative AI.</p><p>The core concept is the Bright Line &#8212; an architecturally enforceable boundary above which generative AI may not exercise autonomous control authority. This isn&#8217;t a policy preference or a corporate restriction. It&#8217;s an engineering conclusion: the same non-determinism that gives large language models their analytical power makes it impossible to verify they&#8217;ll never produce a catastrophically wrong recommendation in an untested context. For applications where consequences are irreversible &#8212; which describes every lethal engagement &#8212; a human must serve as the final safeguard.</p><p>The implementation is the Command Broker architecture. Above the Bright Line, the AI and the weapons platform are physically separated by a human decision-maker. The AI analyzes, recommends, and explains. The human decides and acts. The defense is architectural, not procedural.</p><p>Here&#8217;s the thing: this maps exactly to how military command authority already works. Commanders don&#8217;t delegate lethal authority to staff analysts. They receive analysis and decide. The Command Broker codifies that existing command relationship in the system architecture.</p><p>This reframes the entire dispute. It&#8217;s not that Claude shouldn&#8217;t be used in the kill chain. It&#8217;s that above the Bright Line, the system architecture must enforce the separation between AI recommendation and lethal action that military command authority already demands. The Pentagon gets generative AI across kill-chain planning, analysis, and assessment &#8212; where they&#8217;re already seeing what their own CDAO calls &#8220;significant advantage.&#8221; Anthropic&#8217;s safety concerns are satisfied by engineering, not by a usage policy that can be renegotiated under political pressure. And Congress gets a governance architecture with clear categories, boundaries, and evaluation criteria for the annual LAWS reporting required by the FY2025 NDAA through 2029.</p><p>The middle ground isn&#8217;t a negotiated compromise between contractual positions. It&#8217;s an engineered solution derived from the technology itself.</p><h5>Written by Tim Roxey, reproduced here with permission. </h5>]]></content:encoded></item><item><title><![CDATA[Where Intelligence Meets Story]]></title><description><![CDATA[And where place turns conversation into shared experience&#8212;in downtown Whitefish.]]></description><link>https://www.insidecyberwarfare.com/p/where-intelligence-meets-story</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/where-intelligence-meets-story</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Fri, 13 Feb 2026 16:03:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_bNi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_bNi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_bNi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!_bNi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!_bNi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!_bNi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_bNi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3072681,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/187862585?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_bNi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!_bNi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!_bNi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!_bNi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef4bbb43-2ecb-4436-a2d2-045abb4e32a3_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The <a href="https://mi1.suitsandspooks.com">Montana Intelligence Summit</a> is not a traditional conference.</p><p>For two and a half days this spring, we are converting downtown Whitefish into a living Intelligence Ecosystem&#8212;one designed to bring together intelligence professionals, storytellers, and creators who shape how national and global issues are understood.</p><p>This matters because, for as long as humans have existed, we have learned through story. The Summit is built on that truth: bringing people from the intelligence community together with leaders from the entertainment industry to help ensure that the stories reaching the public are authentic, intentional in their impact, and grounded in national and global realities.</p><p>That philosophy extends beyond the stage.</p><p>Instead of being funneled into conference rooms or catered spaces, attendees and speakers are free to enjoy lunch and dinner anywhere in downtown Whitefish. With a walkable town, a close-knit restaurant scene, and a shared schedule, people naturally cross paths&#8212;at tables, bars, and sidewalks&#8212;continuing conversations without agendas, badges, or conference food. The result is informal, unforced time together that feels human rather than programmed. </p><p>And then there&#8217;s the Montana version of networking.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u6mv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u6mv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u6mv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u6mv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u6mv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u6mv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg" width="900" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:123878,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/187862585?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u6mv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u6mv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u6mv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u6mv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a0eb07e-f8c9-4189-a433-118d0ba6be6b_900x500.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Great Northern Bar and Grill in Whitefish, MT</figcaption></figure></div><p>Thursday night kicks off with Four Branches Bourbon&#8217;s <em>Sip to Remember</em> inside the 100-year-old <a href="https://flatheadbeacon.com/2019/11/13/a-century-at-the-northern/">Great Northern Bar &amp; Grill</a>&#8212;history in the walls, bourbon in the glass, and conversations that tend to last longer than planned.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EXHw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EXHw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp 424w, https://substackcdn.com/image/fetch/$s_!EXHw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp 848w, https://substackcdn.com/image/fetch/$s_!EXHw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp 1272w, https://substackcdn.com/image/fetch/$s_!EXHw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EXHw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:520590,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/187862585?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EXHw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp 424w, https://substackcdn.com/image/fetch/$s_!EXHw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp 848w, https://substackcdn.com/image/fetch/$s_!EXHw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp 1272w, https://substackcdn.com/image/fetch/$s_!EXHw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9990564-1ed5-4e46-8ec3-0743341ce56e_2500x1875.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Whitefish Performing Arts Center</figcaption></figure></div><p>Friday night is Movie Night. We&#8217;ll screen a 30-minute documentary on child soldiers, followed by exclusive clips from Iron Butterfly Media&#8217;s upcoming documentary on women in the Intelligence Community, with Q&amp;A sessions featuring the filmmakers. It&#8217;s a reminder that story is not just entertainment&#8212;it&#8217;s how complex, difficult realities are understood.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WztG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WztG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png 424w, https://substackcdn.com/image/fetch/$s_!WztG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png 848w, https://substackcdn.com/image/fetch/$s_!WztG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png 1272w, https://substackcdn.com/image/fetch/$s_!WztG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WztG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png" width="1456" height="1875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1875,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4752022,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/187862585?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WztG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png 424w, https://substackcdn.com/image/fetch/$s_!WztG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png 848w, https://substackcdn.com/image/fetch/$s_!WztG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png 1272w, https://substackcdn.com/image/fetch/$s_!WztG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdca1510b-4919-4a14-9455-6f7839d5da64_1500x1932.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Lobo Institute&#8217;s &#8220;second office&#8221; inside the Great Northern Bar and Grill</figcaption></figure></div><p>Saturday morning brings the Lobo Institute&#8217;s &#8220;Find The Hooch Treasure Hunt&#8221; that will test your orienteering skills in the surrounding foothills, followed by spring skiing, or a cold plunge in Whitefish Lake.</p><p>Everything is within walking distance, with shuttles on standby when needed. Place isn&#8217;t a backdrop here&#8212;it&#8217;s part of the design.</p><div><hr></div><h3>One Week Only: 20% Off Tickets</h3><p>Starting today and running for one week only, you can save 20% on both Standard and VIP tickets.</p><p>This is the only ticket sale that will happen before the event.</p><p>Use code <strong>HOLIDAY20</strong> at <a href="https://mi1.suitsandspooks.com/tickets">checkout</a>.<br>When it&#8217;s gone, it&#8217;s gone.</p><p>Join us in Whitefish&#8212;and experience where intelligence meets story, shaped by place.</p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Whitefish Security Summit Launches to Convene Intelligence and Defense Leaders on Global Security Risks]]></title><description><![CDATA[Leadership team includes retired CIA Special Activities Center officer and retired Navy SEAL commander / DEVGRU]]></description><link>https://www.insidecyberwarfare.com/p/whitefish-security-summit-launches</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/whitefish-security-summit-launches</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Tue, 10 Feb 2026 18:51:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ntst!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b286e49-d552-4fcf-b59f-52ca86eeffe0_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>WHITEFISH, MT | February 10, 2026 &#8212; Organizers of the <a href="https://mi1.suitsandspooks.com">Montana Intelligence Summit</a> announced today a partnership with the <a href="https://www.loboinstitute.org/">Lobo Institute</a> to launch the <strong>Whitefish Security Summit (WSS)</strong>, a new forum that will bring senior intelligence, defense, and policy leaders to Montana to discuss emerging global security risks.</p><p>The summit, founded by Jeffrey Caruso and developed with Lobo Institute co-founders Michael &#8220;Mick&#8221; Mulroy and Eric &#8220;Olly&#8221; Oehlerich, will convene experts from the intelligence community, special operations forces, diplomacy, economics, and journalism. Discussions will address issues ranging from geopolitical conflict and cyber threats to the rapid rise of autonomous and advanced military technologies.</p><p>At a time of increasing global instability, organizers say the goal is to create a setting that supports frank, cross-sector dialogue outside traditional Washington policy circles.</p><p>&#8220;Complex security challenges demand perspectives from across government and society,&#8221; said Mulroy and Oehlerich. &#8220;We want to foster serious conversations that connect operational experience with broader policy and public understanding.&#8221;</p><p>The rebranded summit will follow the April 2&#8211;3, 2026 Montana Intelligence Summit and is intended to become a recurring, invitation-focused gathering. By drawing inspiration from international forums such as the Aspen Security Forum and the Munich Security Conference, WSS aims to establish a new center for security dialogue in the American West.</p><p>&#8220;This partnership enables us to scale the summit into a lasting platform for global engagement,&#8221; said Caruso. &#8220;We&#8217;re building a forum that connects Montana to conversations shaping international security.&#8221;</p><p><strong>About the Principals</strong></p><p><strong>Jeffrey Caruso, Founder</strong> &#8212; A veteran cyber warfare researcher and author of <em>Inside Cyber Warfare</em>, Caruso has briefed the CIA, DIA, FBI, and the Chief of Naval Operations. He is a veteran of the U.S. Coast Guard and the founder of the Montana Intelligence Summit.</p><p><strong>Eric &#8220;Olly&#8221; Oehlerich, Lobo Institute</strong> &#8212; A retired Navy SEAL officer and former Commanding Officer of DEVGRU (Squadron 2), Oehlerich focuses on advanced research and development and the integration of high-fidelity sensor technologies for national security applications.</p><p><strong>Mick Mulroy, Lobo Institute</strong> &#8212; A former Deputy Assistant Secretary of Defense for the Middle East and retired CIA paramilitary operations officer, Mulroy is a retired U.S. Marine and a national security analyst for ABC News.</p><p><strong>About the Whitefish Security Summit</strong></p><p>The Whitefish Security Summit (WSS) is an invitation-focused forum that fosters collaboration between senior leaders in government, the military, intelligence, industry, and academia. Through strictly limited attendance and off-the-record discussion, WSS provides a secure environment for addressing complex global threats and advancing practical solutions.</p><p><strong>About the Lobo Institute</strong></p><p>The Lobo Institute is a national security&#8211;focused organization dedicated to strengthening collaboration between military, intelligence, and policy communities. Founded by experienced special operations and intelligence professionals, the Institute develops programs, partnerships, and public engagement initiatives aimed at improving strategic understanding and operational effectiveness in an evolving global security environment.</p>]]></content:encoded></item><item><title><![CDATA[The Agency and the Industry: Two Worlds, One Playbook]]></title><description><![CDATA[&#8220;I&#8217;m not a spy.]]></description><link>https://www.insidecyberwarfare.com/p/the-agency-and-the-industry-two-worlds</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/the-agency-and-the-industry-two-worlds</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Mon, 12 Jan 2026 18:45:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CxHf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CxHf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CxHf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png 424w, https://substackcdn.com/image/fetch/$s_!CxHf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png 848w, https://substackcdn.com/image/fetch/$s_!CxHf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png 1272w, https://substackcdn.com/image/fetch/$s_!CxHf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CxHf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png" width="908" height="644" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/862efe7c-135d-4748-98da-082a5b968696_908x644.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:644,&quot;width&quot;:908,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:791454,&quot;alt&quot;:&quot;Film still depicting a CIA analyst surrounded by books, Three Days of the Condor (1975)&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/184340383?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Film still depicting a CIA analyst surrounded by books, Three Days of the Condor (1975)" title="Film still depicting a CIA analyst surrounded by books, Three Days of the Condor (1975)" srcset="https://substackcdn.com/image/fetch/$s_!CxHf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png 424w, https://substackcdn.com/image/fetch/$s_!CxHf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png 848w, https://substackcdn.com/image/fetch/$s_!CxHf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png 1272w, https://substackcdn.com/image/fetch/$s_!CxHf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862efe7c-135d-4748-98da-082a5b968696_908x644.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><strong>&#8220;I&#8217;m not a spy. I just read books.&#8221;</strong></p></blockquote><p>In <em>Three Days of the Condor</em>, Robert Redford&#8217;s character describes a quiet corner of the intelligence world: analysts whose job is not clandestine action, but consumption. They read novels, newspapers, journals&#8212;everything that&#8217;s published&#8212;looking for patterns, leaks, and ideas. Fictional plots are examined not as entertainment, but as data points, fed back against real plans and real operations.</p><p>It&#8217;s a cinematic moment, but also an unusually clear articulation of a long-standing reality: the porous boundary between intelligence and entertainment. Stories don&#8217;t merely reflect the world of intelligence; they inform it. And intelligence, in turn, supplies an endless stream of raw material for storytelling.</p><p>At first glance, the Intelligence Community and the entertainment industry seem to occupy opposite ends of American life. One operates in secrecy, the other in spectacle. One claims national security as its mission; the other sells stories for mass consumption.</p><p>Look closer, and the parallels are striking.</p><p>Both are insular and widely misunderstood by the general public. Both are referred to in shorthand&#8212;the &#8220;Agency&#8221; and &#8220;the Industry&#8221;&#8212;as if naming them fully would give away too much. And in both worlds, the line between fiction and reality is thinner than most people realize.</p><h3>Gatekeepers Over Merit</h3><p>In neither domain does talent alone determine success. Advancement depends on sponsorship, trust, and informal power networks. In intelligence, it&#8217;s clearance, access, and reputation. In entertainment, it&#8217;s agents, producers, and perceived momentum. In both cases, a small group of gatekeepers quietly shapes outcomes behind the scenes, while formal processes provide institutional cover.</p><h3>Mythmaking as Infrastructure</h3><p>Both institutions actively manage their own mythology. The Intelligence Community relies on secrecy, mystique, and selective disclosure. The entertainment industry constructs star personas, prestige narratives, and carefully curated origin stories. In each case, myth smooths over contradictions and reassures outsiders that someone, somewhere, is in control&#8212;even when reality is far messier.</p><h3>Secrecy as a Structural Necessity</h3><p>Both worlds depend on secrecy&#8212;not as an affectation, but as an operating requirement.</p><p>For the Intelligence Community, secrecy protects global stability, human assets, sources and methods, and the fragile advantage of surprise. Exposure can cost lives, compromise alliances, or collapse years of work in a moment.</p><p>In the entertainment industry, secrecy serves a parallel function: protecting intellectual property, massive financial investments, and the fragile alchemy of creative development. Scripts are locked down, projects code-named, endings concealed, and leaks aggressively policed. Premature exposure can kill a project just as surely as a blown operation.</p><p>In both cases, secrecy isn&#8217;t about hiding wrongdoing&#8212;though it can enable it&#8212;but about preserving optionality. The work must be protected until it&#8217;s ready to be revealed, framed, and understood on institutional terms.</p><h3>Failure Is Hidden; Success Is Curated</h3><p>Most intelligence operations fail quietly. Most films and television projects do too. In both worlds, failure is buried, reclassified, or quietly forgotten, while success is elevated into legend. History becomes a highlight reel, not a full accounting.</p><h3>Compartmentalization as a Way of Life</h3><p>People inside these systems rarely see the whole picture. Intelligence professionals work on a strict need-to-know basis; entertainment workers are siloed across writing, editing, visual effects, and marketing. Compartmentalization protects secrets&#8212;but it also limits accountability and perspective.</p><h3>Narrative Is the Real Currency</h3><p>Despite the technical trappings, both industries are fundamentally about narrative control. Intelligence agencies frame threats, victories, and priorities. Entertainment frames heroes, villains, and national identity. Facts matter&#8212;but how they&#8217;re arranged, paced, and emotionally framed often matters more.</p><h3>Moral Ambiguity as the Default</h3><p>Neither world operates cleanly. Ethical gray zones are not exceptions; they are the norm. Participants learn to rationalize compromise, justify trade-offs, and live with outcomes they can&#8217;t fully endorse. Cynicism and dark humor become coping mechanisms rather than signs of corruption.</p><h3>Burnout as a Feature, Not a Bug</h3><p>Long hours, personal sacrifice, and identity fusion with the job are normalized. Leaving can feel like exile. Both institutions reward obsession and quietly punish balance, even as they publicly celebrate resilience.</p><h3>Outsiders Get It Wrong&#8212;In Both Directions</h3><p>From the outside, these institutions are imagined as either omnipotent or incompetent. The reality is more mundane: capable people constrained by bureaucracy, incentives, and human error. Reality is rarely cinematic&#8212;but the myth persists.</p><h3>Shaping National Identity</h3><p>Together, these two worlds help define how a nation understands power, threat, and heroism. One does it through classified briefings and policy memos. The other does it through screens and stories. The methods differ, but the cumulative effect is the same.</p><h3>The Quiet Exchange</h3><p>Which brings us back to that line from <em>Three Days of the Condor</em>. The analyst who &#8220;just reads books&#8221; isn&#8217;t a fantasy. He&#8217;s a reminder that imagination, narrative, and interpretation sit closer to the center of power than we like to admit.</p><p>The Intelligence Community and the entertainment industry are both meaning-making systems operating under scarcity&#8212;information in one case, attention in the other. One conceals reality; the other stylizes it. But both decide which stories are told, which are softened, and which never reach the public at all.</p><p>Different missions. Different aesthetics.<br>Same underlying logic.</p><p>And once you see it, it&#8217;s hard to unsee.</p><div><hr></div><p><em>This article was written by Jeffrey Caruso, with editorial support from generative AI tools.</em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://mi1.suitsandspooks.com" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CGZh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png 424w, https://substackcdn.com/image/fetch/$s_!CGZh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png 848w, https://substackcdn.com/image/fetch/$s_!CGZh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png 1272w, https://substackcdn.com/image/fetch/$s_!CGZh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CGZh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png" width="1456" height="471" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:471,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1586705,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://mi1.suitsandspooks.com&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/184340383?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CGZh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png 424w, https://substackcdn.com/image/fetch/$s_!CGZh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png 848w, https://substackcdn.com/image/fetch/$s_!CGZh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png 1272w, https://substackcdn.com/image/fetch/$s_!CGZh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc35b4ecd-099e-46ae-899f-9c6de003fa25_1536x497.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Everything that's going to happen at the Montana Intelligence Summit / MI:1]]></title><description><![CDATA[At least, so far. There's more to come.]]></description><link>https://www.insidecyberwarfare.com/p/everything-thats-going-to-happen</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/everything-thats-going-to-happen</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Fri, 19 Dec 2025 17:03:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/vimeo/w_728,c_limit,d_video_placeholder.png/1146373821" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div id="vimeo-1146373821" class="vimeo-wrap" data-attrs="{&quot;videoId&quot;:&quot;1146373821&quot;,&quot;videoKey&quot;:&quot;&quot;,&quot;belowTheFold&quot;:false}" data-component-name="VimeoToDOM"><div class="vimeo-inner"><iframe src="https://player.vimeo.com/video/1146373821?autoplay=0" frameborder="0" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true"></iframe></div></div><p>From April 2&#8211;3, 2026, between 100 and 200 operators, creators, analysts, producers, case officers, journalists, investors, and leaders from dual-use technology companies will converge in Whitefish, Montana for the first annual <strong>Montana Intelligence Summit</strong>, known as <strong>MI:1</strong>. Future summits will follow as MI:2, MI:3, and beyond.</p><p>MI:1 builds on the 14-year <em>Suits and Spooks</em> tradition of <em>shaping a revolution in security affairs</em>, expanding its scope beyond intelligence and technology to the increasingly important intersection between the Intelligence Community and the entertainment industry.</p><p>At its core, the Summit exists to improve the realism, responsibility, and nuance of how intelligence, conflict, and national security are portrayed on screen and in popular culture, while confronting a deeper truth: narrative, social media, and entertainment have become primary battlegrounds in persuasion, division, and distraction.</p><p>This is where intelligence professionals and storytellers meet not to posture, but to confront the consequences of the stories we tell and the power they carry.</p><div><hr></div><h2>Venues: A Walkable Intelligence Ecosystem</h2><p>Unlike traditional conferences confined to a single ballroom, MI:1 turns the town of Whitefish itself into a living intelligence ecosystem for two and a half days.</p><p>Attendees will receive an <strong>MI:1 Briefing Book</strong> containing:</p><ul><li><p>A map of all session venues</p></li><li><p>A curated list of hotels</p></li><li><p>Insider recommendations for the best burgers, breakfasts, coffee, and cocktails</p></li><li><p>A detailed schedule of sessions by time and location, including VIP meet-and-greets</p></li></ul><p>The result is a summit that feels less like a conference and more like an embedded assignment.</p><div><hr></div><h2>Activities: Montana, Operationally</h2><p>Early April is an ideal time to experience Whitefish. Crowds are lighter, the mountains still carry snow, and spring skiing, hiking, and outdoor exploration are all in play.</p><p>In addition to formal sessions, MI:1 will include:</p><ul><li><p><strong>Early-morning physical training</strong> led by a retired Naval Special Warfare Command officer</p></li><li><p>A <strong>treasure hunt</strong> designed to test navigation, observation, and orienteering skills</p></li></ul><p>Participation is optional. Bragging rights are not.</p><div><hr></div><h2>Sessions: Confirmed and In Progress</h2><p>The following list reflects the current agenda and will continue to evolve. A final schedule will be released to attendees one to two weeks prior to the Summit.</p><p><strong>VIP Experiences</strong></p><ul><li><p>VIP Lunch and Meet-and-Greet with General Stanley McChrystal and keynote speakers</p></li><li><p>VIP Breakfast with members of Montana&#8217;s Congressional delegation (invited) and Governor Greg Gianforte (invited)</p></li></ul><p><strong>Featured Talks and Panels</strong></p><ul><li><p><em>Action Films and the Intersection of U.S. Intelligence</em> &#8212; Mills Goodloe</p></li><li><p><em>Archetypes for AI Security and Governance in the National Security Sector</em> &#8212; Benjamin Harvey, Ph.D.</p></li><li><p><em>AI Cubed: Artificial Intelligence, Artistic Infringement, Anarchist Impact</em> &#8212; Bianca Goodloe</p></li><li><p><em>Blinding the Beholder: Adversarial Attacks to Defeat Autonomous Drones</em> &#8212; Robi Sen</p></li><li><p><em>Character as Strategy: Leadership for America&#8217;s Critical Frontiers</em> &#8212; General Stanley McChrystal</p></li><li><p><em>How Power Shapes the Story: Inside Hollywood&#8217;s Influence Machinery</em> &#8212; Tatiana Siegel</p></li><li><p><em>The Evolution of Intelligence Collection and the Need for Cultural Acuity in Analysis</em> &#8212; Dave Tinsley</p></li><li><p><em>Reel v. Real: The Melding of Espionage and Entertainment</em> &#8212; Darrell M. Blocker</p></li><li><p><em>SCRIPTED CRISIS: Turning Real-World Threats into Drama&#8212;and Drama into Understanding</em> &#8212; Howard Gordon</p></li><li><p><em>Secrets and Stories: Intelligence, Influence, and the Battle for Relevance</em> &#8212; Fireside chat with Rodney Faraon, interviewed by Teresa Smetzer</p></li><li><p><em>Wise Women, Hard Targets: Story, Strategy, and the Future of U.S. Security</em> &#8212; Panel with Carmen Medina, Laura Thomas, and Rachel Grunspan</p></li><li><p><em>Conflict in the Grey Zone: Operator Lessons</em> &#8212; Panel with Mick Mulroy, Eric &#8220;Olly&#8221; Oehlerich, and RJ Casey, moderated by Susan Barrows Libby</p></li><li><p>Panel with RJ Casey, Matt Westbrook, and a special guest (title to be announced)</p></li></ul><p><strong>Screening</strong></p><ul><li><p><em>My Star in the Sky</em> &#8212; A 30-minute documentary on child soldiers in Uganda, followed by a Q&amp;A with the filmmakers</p></li></ul><p><strong>Evening Program</strong></p><ul><li><p><strong>&#8220;Sip to Remember&#8221;</strong> bourbon tasting honoring those who made the ultimate sacrifice in defense of the nation, sponsored by Four Branches Bourbon</p></li></ul><div id="vimeo-1147179967" class="vimeo-wrap" data-attrs="{&quot;videoId&quot;:&quot;1147179967&quot;,&quot;videoKey&quot;:&quot;&quot;,&quot;belowTheFold&quot;:true}" data-component-name="VimeoToDOM"><div class="vimeo-inner"><iframe src="https://player.vimeo.com/video/1147179967?autoplay=0" frameborder="0" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" loading="lazy"></iframe></div></div><p>On <strong>January 1, 2026</strong>, ticket pricing will increase to standard rates. Early-bird tickets are available now.</p><p>If you&#8217;ve been waiting for a sign, this is it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://suitsandspooks.com&quot;,&quot;text&quot;:&quot;For More Information and Tickets&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://suitsandspooks.com"><span>For More Information and Tickets</span></a></p><p></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Rodney Faraon Joins the Montana Intelligence Summit Speaker Lineup!]]></title><description><![CDATA[Fifteen year CIA veteran; Executive Producer of NBC's State of Affairs]]></description><link>https://www.insidecyberwarfare.com/p/rodney-faraon-joins-the-montana-intelligence</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/rodney-faraon-joins-the-montana-intelligence</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Fri, 12 Dec 2025 03:09:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kI4b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kI4b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kI4b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kI4b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kI4b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kI4b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kI4b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1168412,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/181389457?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kI4b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kI4b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kI4b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kI4b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5eb9f5d-7dff-4f63-aacb-470183d1e02f_3000x1687.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;re pleased to announce that <strong><a href="https://founders.suitsandspooks.com/rodney-faraon/">Rodney Faraon</a></strong> is joining the Montana Intelligence Summit as our newest featured speaker.</p><p>Rodney brings a rare fusion of national-security experience and creative storytelling expertise. A 15-year veteran of the <strong>Central Intelligence Agency</strong>, he contributed to the President&#8217;s Daily Brief across two administrations, served as briefer and speechwriter to CIA Director George J. Tenet, and received the prestigious Director&#8217;s Medal for his service. After government, he founded The Walt Disney Company&#8217;s Global Intelligence practice and later co-founded <strong>Crumpton Global</strong>, where he now serves as Partner and Chief Creative Officer. His work in entertainment includes serving as the inspiration for &#8212; and executive producer of &#8212; NBC&#8217;s <em>State of Affairs</em>, along with consulting across film and television.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cyhn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cyhn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Cyhn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Cyhn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Cyhn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cyhn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg" width="400" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Cyhn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Cyhn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Cyhn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Cyhn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65f6b762-848b-4845-8b22-c1f46680c70b_400x400.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Rodney Faraon</figcaption></figure></div><p>In addition to <em>State of Affairs</em>, Rodney has consulted on a range of intelligence-themed films and television series, including <em>The Crossing</em> (ABC), <em>Homeland</em> (Showtime), <em>Blackhat</em> (Legendary), <em>The Blacklist</em> (NBC), and the forthcoming <em>The Billion Dollar Spy</em> (Walden Media).</p><p>Rodney&#8217;s ability to translate complex global risk into narratives that illuminate, warn, and inspire makes him an extraordinary addition to the Summit.</p><p>&#127903; <strong>Early Bird Registration Ends Soon</strong><br>Tickets for the Montana Intelligence Summit are available now at Early Bird rates <strong>through December 31</strong>. Prices increase on January 1, so this is the ideal moment to secure your seat for two days of high-impact conversations with leaders from intelligence, national security, technology, journalism, and Hollywood.</p><p>&#128073; <strong>Reserve your Early Bird ticket today</strong> and be part of the inaugural Montana Intelligence Summit:<br></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://suitsandspooks.com&quot;,&quot;text&quot;:&quot;Count Me In&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://suitsandspooks.com"><span>Count Me In</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[“Montana Intelligence Summit Announces All-Star Lineup of National Security and Media Leaders”]]></title><description><![CDATA[America&#8217;s top national security thinkers and storytellers will meet in Montana to discuss the forces reshaping power, leadership, and society]]></description><link>https://www.insidecyberwarfare.com/p/montana-intelligence-summit-announces</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/montana-intelligence-summit-announces</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Sat, 06 Dec 2025 02:56:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ntst!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b286e49-d552-4fcf-b59f-52ca86eeffe0_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Suits &amp; Spooks&#8217; First Annual Montana Intelligence Summit is a boutique national security event that convenes leading voices from the U.S. Intelligence Community and the entertainment industry to explore how modern warfare, espionage, and influence operations are shaped by film, television, and digital media. Held April 2&#8211;3, 2026 in Whitefish, Montana, the summit is designed as a high&#8209;signal, small&#8209;venue &#8220;anti&#8209;conference&#8221; where intelligence professionals, creatives, technologists, and policy thinkers can engage in candid, off&#8209;the&#8209;record discussions about cognitive warfare, disinformation, and the stories that inform public understanding of national security.&#8203;</p><h2>Purpose and mission</h2><p>The Montana Intelligence Summit builds on the 14&#8209;year Suits &amp; Spooks tradition of &#8220;shaping a revolution in security affairs&#8221; by expanding its focus from intelligence and tech to the natural nexus between the Intelligence Community and the entertainment industry. The event&#8217;s purpose is to improve the realism and nuance of on&#8209;screen portrayals of intelligence and conflict, while highlighting how narrative, social media, and popular culture are now central battlegrounds in persuasion, division, and distraction.&#8203;</p><h2>Format and experience</h2><p>Structured as an intimate, curated gathering rather than a traditional trade conference, the summit emphasizes interactive sessions, in&#8209;depth panels, and informal networking over large keynotes and expo halls. Attendees can also participate in special offerings such as a VIP lunch and book signing with featured speakers, underscoring the event&#8217;s focus on direct access and substantive dialogue.&#8203;</p><h2>Strategic goals</h2><p>Through this inaugural Montana event, Suits &amp; Spooks aims to establish an annual national security summit in the Rocky Mountain West that attracts both senior practitioners and emerging voices. The organizers intend for the summit to seed new collaborations, influence future projects in Hollywood and streaming media, and foster a more informed public debate about intelligence, technology, and the evolving character of conflict.&#8203;</p><h2>Featured Speakers and Sessions</h2><p>The Montana Intelligence Summit will feature a distinguished lineup of speakers and sessions that reflect the event&#8217;s unique focus on the intersection of intelligence, leadership, technology, and entertainment.</p><p>General Stan McChrystal (U.S. Army, retired) will deliver a keynote address titled <strong>&#8220;Character as Strategy: Leadership for America&#8217;s Critical Frontiers,&#8221;</strong> examining how values&#8209;based leadership shapes outcomes in an era of complex security challenges.</p><p><strong>&#8220;Wise Women, Hard Targets: Story, Strategy, and the Future of U.S. Security&#8221;</strong> will bring together CIA veterans Carmen Medina, Laura Thomas, and Rachel Grunspan for a candid panel discussion on how narrative, diversity of perspective, and analytic tradecraft inform U.S. strategy in a rapidly evolving threat landscape.</p><p>In &#8220;<strong>Reel v Real: The Melding of Espionage and Entertainment,&#8221;</strong> Darrell M. Blocker (CIA, retired) will explore how real&#8209;world intelligence operations collide and converge with their on&#8209;screen portrayals, and what that means for public understanding of espionage.</p><p>Robi Sen, co&#8209;founder and CTO of Department 13, will present &#8220;<strong>Blinding the Beholder: Adversarial Attacks to Defeat Autonomous Drones,&#8221;</strong> offering an insider&#8217;s view of emerging counter&#8209;drone techniques and their implications for future conflicts.</p><p>Entertainment attorney, financier, and producer Bianca Goodloe will lead <strong>&#8220;AI Cubed &#8211; Artificial Intelligence, Artistic Infringement, Anarchist Impact,&#8221;</strong> addressing the legal, creative, and disruptive dimensions of AI at the crossroads of copyright, culture, and security.</p><p>In <strong>&#8220;The Evolution of Intelligence Collection and the Need for Cultural Acuity in Analysis,&#8221;</strong> Dave Tinsley (DEA, retired; founder, Five Stones Intelligence) will trace the changing nature of collection and emphasize why cultural understanding is now a critical component of effective intelligence work.</p><p>Screenwriter and director Mills Goodloe will discuss how high&#8209;impact storytelling shapes perceptions of national security in <strong>&#8220;Action Films and the Intersection of U.S. Intelligence,&#8221;</strong> highlighting the feedback loop between Hollywood narratives and real&#8209;world policy debates.</p><p>Finally, <strong>&#8220;So You Want to Build a Defense Startup,&#8221;</strong> presented by angel investor and venture capitalist Lance Cottrell, founder of Anonymizer, will offer practical insights for entrepreneurs seeking to navigate the defense and national security innovation ecosystem.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://suitsandspooks.com&quot;,&quot;text&quot;:&quot;For More Information&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://suitsandspooks.com"><span>For More Information</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Russian Employment Center Database Giveaway]]></title><description><![CDATA[102.9K Resumes with personal identification information for each, across multiple key industries]]></description><link>https://www.insidecyberwarfare.com/p/russian-employment-center-database</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/russian-employment-center-database</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Sun, 26 Oct 2025 16:50:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!15Pm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!15Pm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!15Pm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png 424w, https://substackcdn.com/image/fetch/$s_!15Pm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png 848w, https://substackcdn.com/image/fetch/$s_!15Pm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png 1272w, https://substackcdn.com/image/fetch/$s_!15Pm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!15Pm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png" width="1456" height="1252" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1252,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3095856,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/177187893?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!15Pm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png 424w, https://substackcdn.com/image/fetch/$s_!15Pm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png 848w, https://substackcdn.com/image/fetch/$s_!15Pm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png 1272w, https://substackcdn.com/image/fetch/$s_!15Pm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed961484-3535-4b14-8c09-ba146e0a9a5a_2444x2102.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Machine translation by Google Translate from Russian</figcaption></figure></div><p>&#8220;The Multi-regional Electronic Employment Center is an electronic recruiting agency that helps to implement selection of senior and middle-level personnel in Russia, the Commonwealth of Independent States (CIS), and Eastern Europe (EAEU) in such professional fields as Finance, Economics and Accounting,&#8230;</p>
      <p>
          <a href="https://www.insidecyberwarfare.com/p/russian-employment-center-database">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Halloween-Themed Suits & Spooks Trailer]]></title><description><![CDATA[Startup Horror Stories and the Toll it takes on Founders]]></description><link>https://www.insidecyberwarfare.com/p/the-halloween-themed-suits-and-spooks</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/the-halloween-themed-suits-and-spooks</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Mon, 13 Oct 2025 14:44:08 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/176045104/fe23ad1634065db25fa8d5321bee496f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>We&#8217;ll be exploring a variety of different topics and themes at Suits &amp; Spooks next year. One of them is the toll that startup failures take on the founders, and the impact that has on competitive industry sectors that rely upon the innovations developed in a startup environment.</p><p>I pulled footage from some oldies but goodies that are now in the public domain - The House on Haunted Hill (1959), Plan 9 from Outer Space (1957), and The Phantom Planet (1961). </p><p>Feel free to share on your own social media channels. </p><p>More information is at <a href="https://suitsandspooks.com">www.suitsandspooks.com</a>. Early bird pricing is now in effect through October 31, 2025.</p>]]></content:encoded></item><item><title><![CDATA[The Top Universities in Computer Science are now in China]]></title><description><![CDATA[Even more so when it comes to AI]]></description><link>https://www.insidecyberwarfare.com/p/the-top-universities-in-computer</link><guid isPermaLink="false">https://www.insidecyberwarfare.com/p/the-top-universities-in-computer</guid><dc:creator><![CDATA[Jeffrey Caruso]]></dc:creator><pubDate>Mon, 29 Sep 2025 14:33:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SR-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SR-n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SR-n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SR-n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SR-n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SR-n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SR-n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:129960,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.insidecyberwarfare.com/i/174834886?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SR-n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SR-n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SR-n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SR-n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c904170-c1ef-4433-a94a-57952b6878a6_1200x630.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>There are two college ranking systems - U.S. News and CS Rankings. </p><p>U.S. News uses a closed <a href="https://www.usnews.com/education/best-graduate-schools/articles/science-schools-methodology">survey-based approach</a> while CS Rankings uses a transparent <a href="https://csrankings.org/faq.html">metrics-based approach</a>:</p><blockquote><p>&#8220;It weighs departments by their presence at the most prestigious publication venues. This approach is intended to be both incentive-aligned (faculty already aim to publish at top ven&#8230;</p></blockquote>
      <p>
          <a href="https://www.insidecyberwarfare.com/p/the-top-universities-in-computer">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>