418 episodes

A calm, non-shouty, non-polemical, weekly news analysis podcast for folks of all stripes and leanings who want to know more about what's happening in the world around them. Hosted by analytic journalist Colin Wright since 2016.

letsknowthings.substack.com

Let's Know Things Understandary

    • News
    • 5.0 • 7 Ratings

A calm, non-shouty, non-polemical, weekly news analysis podcast for folks of all stripes and leanings who want to know more about what's happening in the world around them. Hosted by analytic journalist Colin Wright since 2016.

letsknowthings.substack.com

    La Niña 2024

    La Niña 2024

    This week we talk about ENSO, El Niño, and attribution science.
    We also discuss climate change, natural disasters, and the trade winds.
    Recommended Book: Titanium Noir by Nick Harkaway
    Transcript
    The field of attribution science, sometimes referred to as "extreme event attribution," focuses on figuring out whether and to what degree a particular weather event—especially rare weather disasters—are attributable to climate change.
    Severe floods and tornadoes and hurricanes all happen from time to time, which is why such events are sometimes referred to as once in a decade or once in a century disasters: the right natural variables align in the right way, and you have a disaster that is rare to the point that it's only likely to happen once every 10 or 100 years, but such rare events still happen, and sometimes more frequently than those numbers would imply; they're not impossible. And they're not necessarily the result of climate change.
    Folks working in this space, which is a blend of meteorology and the rapidly evolving field of climate science, do their best to figure out what causes what, and how those odds might have been impacted by the shifts we're seeing in global average temperatures in particular, and the knock-on effects of that warming, like shifts in the global water cycle; both of which influence all sorts of other planetary variables.
    The most common means of achieving this end is to run simulations based on historical climate data and extrapolating those trend-lines forward, allowing for natural variation, but otherwise sticking with the range of normal fluctuations that would have been expected, had we not started to churn so much CO2 and other greenhouse gases into the atmosphere beginning with the industrial revolution.
    So if we hadn't done the Industrial Revolution the way we did it, what would our global climate and weather systems look like? They have a bunch of models with different assumptions baked into them that they have running, and they can simulate conditions, today, based on those models, and compare them with the reality of how things actually are in the real world, a world in which we did start to burn fossil fuels at a frantic rate, with all the pros and cons of that decision aggregating into our current climactic circumstances.
    This comparison, between a baseline, non-climate-change-impacted Earth, and what we see happening on real Earth, allows us to gauge the different in likelihoods for various weather systems and increasingly even specific weather events, like massive floods or hurricanes.
    It also allows us to ascertain what elements of a disaster or system are more or less likely, or the same, compared to that baseline Earth; so maybe we look at a regional heat wave and discover that it was a rare event made more likely by climate change, but that the intensity of the heat wasn't impacted—as was the case with a heat wave in Russia in 2010; climate change made the heat wave more likely, but had such a heat wave occurred, despite its low likelihood, in that non-industrial revolution scenario, the heat would have been roughly the same intensity as it was in real life.
    Both components of this system, attributing events and patterns to climate change, and confirming that they were not impacted, that they were just run of the mill bad luck, the consequence of natural systems, are arguably important, as while the former provides data for folks wanting to predict future climate change-related outcomes, and provides some degree of ammunition for the argument that climate change is making these sorts of things worse, which helps put a price tag on not moving faster to shift away from fossil fuels, it's also vital that we understand how climate and weather systems work, in general, and that we are able to set proper expectations as to what will change and how, as the atmosphere's composition continues to change, while also understanding what will remain the same, what various regions around

    • 17 min
    GPS Jamming

    GPS Jamming

    This week we talk about APT28, spoofing, and hybrid warfare.
    We also discuss the Baltics, Tartu airport, and hacking.
    Recommended Book: The Middle Passage by James Hollis
    Transcript
    In early May of 2024, the German government formally blamed a Russian hacking group called APT28 for hacking members of the governing German Social Democratic Party in 2023, and warned of unnamed consequences.
    Those consequences may apply just to APT28, which is also sometimes called "Fancy Bear," or they may apply to the Russian government, as like many Russia-based hacking groups, APT28 often operates hand-in-glove with the Russian military intelligence service, which allows the Russian government to deny involvement in all sorts of attacks on all sorts of targets, while covertly funding and directing the actions of these groups.
    APT28 reportedly also launched attacks against German defense, aerospace, and information technology companies, alongside other business entities and agencies involved, even tangentially, with Ukraine and its defense measures against Russia's invasion.
    This hacking effort allegedly began in early 2022, shortly after Russia began its full-scale invasion of Ukraine, and the head of the Russian embassy in Germany has been summoned to account for these accusations—though based on prior attacks and allegations related to them by Russia's intelligence agencies, and the hacking groups it uses as proxies, that summoning is unlikely to result in anything beyond a demonstration of anger on the part of the German government, formally registered with Russia's representative in Berlin.
    For its part, Russia's government has said that it was in no way involved in any incidents of the kind the German government describes, though Germany's government seems pretty confident in their assessment on this, at this point, having waited a fair while to make this accusation, and utilizing its partnerships with the US, UK, Canada, and New Zealand to confirm attribution.
    This accusation has been leveled amidst of wave of similar attacks, also allegedly by Russia and its proxies, against other targets in the EU and NATO—including but not limited to the Czech Republic, Lithuania, Poland, Slovakia, and Sweden.
    Many of these attacks have apparently made use of an at-the-time unknown security flaw in Microsoft software that gave them access to compromised email accounts for long periods of time, allowing them to, among other things, scoop up intelligence reports from folks in the know in these countries, sifting their messages for data that would help Russia's forces in Ukraine.
    This group, and other Russia GRU, their intelligence service, proxies, have reportedly targeted government and critical infrastructure targets in at least 10 NATO countries since the fourth quarter of 2023, alone, according to analysis by Palo Alto Networks, and experts in this space have said they're concerned these sorts of attacks, while often oriented toward intelligence-gleaning and at times embarrassing their targets, may also be part of a larger effort to weaken and even hobble intelligence, military, and critical infrastructure networks in regional nations, which could, over time, reduce stability in these countries, increase extremism, and possibly prevent them from defending themselves and their neighbors in the event of a more formal attack by Russian forces.
    What I'd like to talk about today is another sort of attack, allegedly also launched by Russia against their neighbors in this part of the world, but this one a little less well-reported-upon, at this point, despite it potentially being even more broadly impactful.

    The Global Positioning System, or GPS, was originally developed in 1973 by the US Department of Defense. Its first satellite was launched in 1978, and its initial, complete constellation of 24 satellites were in orbit and functional in 1993.
    This satellite network's full functionality was only available to the US military until 2000, when t

    • 18 min
    TikTok Ban

    TikTok Ban

    This week we talk about Huawei, DJI, and ByteDance.
    We also discuss 5G infrastructure, black-box algorithms, and Congressional bundles.
    Recommended Book: The Spare Man by Mary Robinette Kowal
    Note: my new book, How To Turn 39, is now available as an ebook, audiobook, and paperback wherever you get your books :)
    Transcript
    In January of 2024, Chinese tech giant Huawei brought an end to its years-long US lobbying effort, meant to help mend fences with western politicians.
    In mid-2019, then US President Trump had blacklisted the company using an executive order that, in practice, prevented Chinese telecommunications companies from selling specialized equipment in the US, as part of a larger effort to clamp-down on the sale of Chinese 5g and similar infrastructure throughout the US.
    Around the same time, a Huawei executive was jailed in Canada for allegedly violating sanctions on Iran, and several other western nations were making noises about their own bans, worrying—as Trump's administration said they were worried—that Huawei and similar Chinese tech companies would sell their goods at a loss or at cost, significantly undercutting their foreign competition, and as a consequence would both lock down the burgeoning 5g market, including all the infrastructure that was in the process of being invested in and deployed, while also giving the Chinese government a tool that could allow them to tap all the communications running through this hardware, and potentially even allow them to shut it all down, if they wanted, at some point in the future—if China invaded Taiwan and wanted to keep the West from getting involved, for instance.
    So while part of this ban on Huawei—for which the President made use of the International Emergency Economic Powers Act and declared a national emergency—was undoubtedly political (part of the trade war Trump started as part of the "China is the enemy" platform he was running on leading up to the 2020 election), there were also real-deal concern about China insinuating itself into the world's infrastructure, beginning with the rollout of the next phase of communications technologies; making themselves indispensable, disallowing foreign competition, and yes, possibly even creating a bunch of backdoors they could use at some point in the future to tip the scales in their favor during a conflict.
    This ban also ensured that Huawei's then quite popular line of smartphones wouldn't be available in the US, or many other Western countries. The company sold off its Honor brand of phones in a scramble to try to protect that line of products from these new blocks on its offerings, which among other things disallowed them from accessing the chips necessary to make competitive smartphone products, but the legislation just kept coming after that initial salvo, the US Federal Communications Commission banning the sale or import of anything made by Huawei in late-2022, and a bunch of fundamental US allies, especially those with which the US collaborates on military and intelligence matters, have likewise banned Huawei products on their shelves and in their communications networks; the idea being that even one Huawei transmitter or modem could tap into the whole of these networks—at least in theory—which is considered a big enough security concern to justify that blanket ban.
    Huawei has managed to survive, though it didn't scale the way its owners seemed to think it would back before all these bans.
    Now it exists as a primarily regional outfit, still making billions in revenue each year, though down to about half the revenue it was earning before 2019.
    Another popular Chinese tech company, DJI, is now scrambling to deploy its lobbyists and circle the wagons, as there's word that it's on a shortlist of potential Chinese security threats, in this case because the company makes very popular consumer and professional grade drones, which have successfully outcompeted many western brands of the same, and which hav

    • 25 min
    Section 702

    Section 702

    This week we talk about STELLARWIND, 9/11, and the NSA.
    We also discuss warrantless surveillance, intelligence agencies, and FISA.
    Recommended Book: Period: The Real Story of Menstruation by Kate Clancy
    Transcript
    Immediately after the terrorist attacks in the US on September 11, 2001, then President George W. Bush gave his approval for the National Security Agency, the NSA, to run a portfolio of significant and ever-evolving cross-agency efforts aimed at preventing future attacks of that kind, scale, and scope.
    The thinking behind this collection of authorizations to various US intelligence agencies, which would operate in tandem with the NSA, was that we somehow didn't see this well-orchestrated, complex plan coming, and though revelations in later years suggested we kind of did, we just didn't act on the intelligence we had, in those early, post-attack days, everyone at the top was scrambling to reassure the country that things would be okay, while also worrying that more attacks from someone, somewhere, might be impending.
    So the President signed a bunch of go-aheads that typically wouldn't have been signed, and the government gave a lot of power to the NSA to amalgamate the resulting intelligence data in ways that also wouldn't have previously been okay'd, but that, in those unusual circumstances, were considered to be not just acceptable, but desirable and necessary.
    This jumble of intelligence service activities, approved by the president and delegated to the NSA, became known as the President's Surveillance Program, and they were kept secret, in part because of how unprecedented they were, and in part because those in charge didn't want to risk their opposition—those they knew about, like Al Qaeda, but also those that might be waiting in the wings to attack the US while it was perceptually weakened and vulnerable—they didn't want to risk those entities knowing what they were doing, what they knew about, how they were collecting data, and so on.
    The info that was gleaned via these programs was compiled and stored in an SCI, which stands for Sensitive Compartment Information, and which refers to a type of document control system, a bit like Top Secret or Classified, in that it allows those running it to set what level of access people must have to view, process, use, or even discuss its contents, and this particular SCI was codenamed STELLARWIND.
    Among other activities, the programs feeding data into the Stellarwind SCI mined huge databases of email and phone communications, alongside web-browsing and financial activities; all sorts of tracking information that's collected by various components of intelligence, law enforcement, and other government and government-adjacent services were tapped and harvested.
    All of this data was then funneled into this one program, and though the degree to which this much information is useful up for debate, because having a slew of data doesn't mean that data is organized in useful ways, in 2004 the US Justice Department discovered that the NSA was not just collecting this sort of data when it was connected to foreign entities or entities that have been connected to terrorism, it was also collecting it from sources and people, including just average everyday Americans and small businesses that were doing no terrorism at all, and which had no links to terrorism, and it was doing so on American soil.
    After this discovery, then-President Bush said, well, the NSA is allowed to do that, that's fine, but they can only look at collected metadata related to terrorism—so they can collect whatever they want, sweep up gobs of information, file-away whatever drifts into their expansive and undifferentiating nets, but they're not allowed to look at and use anything not related to terrorism; and with that clarification to keep the Justice Department from doing anything that might hinder the program, the president reauthorized it that same year, 2004.
    There was disagreement within the governme

    • 17 min
    Presidential Immunity

    Presidential Immunity

    This week we talk about diplomatic immunity, Trump’s court cases, and the Supreme Court.
    We also discuss Nixon, Clinton, and the US Constitution.
    Recommended Book: My upcoming book, How To Turn 39 (https://books2read.com/htt39), which is available for pre-order today :)
    Transcript
    There's a concept in international law—diplomatic immunity—that says, in essence, certain government officials should be immune from the laws of foreign countries, including those within which they're operating.
    This is a very old concept, based on similar rights that were granted to envoys and messengers back in the oldest documented periods of human civilizations.
    The idea is that if different cultures, whether organized into tribes or kingdoms or nation states, are going to be able to deal with each other, they need to maintain open and reliable means of communication. Thus, the folks tasked with carrying messages between leaders of these different groups would need to be fairly confident that they wouldn't be hassled or attacked or prosecuted by the people they were bringing those messages to, and whose messages they were bringing back to their own leaders.
    Such representatives have at times been imprisoned or killed by their hosts, but this is relatively rare, because any governing body that treated ambassadors from other cultures in this way would have trouble dealing with anyone outside their current legal sway, and that would in turn mean less trade, less reliable peace, and less opportunity to generally cross-pollinate with cultures they might benefit from cross-pollinating with.
    As a general rule, at least in the modern iteration of diplomatic immunity, folks operating under the auspices of this policy can still be punished for their misdeeds, it's just that they'll generally be declared persona non grata, expelled from the country where they did something wrong, rather than punished under that country's laws.
    In some rare instances a country hosting a misbehaving or criminal ambassador or other diplomat might ask that person's home country to waive their immunity, basically saying, look, this person killed someone or got drunk and drove recklessly through our capitol city's downtown, we'd like to try them in our courts, and it may be that the government running that misbehaving person's home country says, okay, yeah, that's messed up, you go ahead; but usually—even if that person has done something truly reprehensible—they'll instead say, no, sorry, we'll pull them back and they won't be allowed to return to your country or serve as an ambassador anywhere else, because they've shown themselves to be unreliable, and we might even try them in a court here, in their home country, but we can't allow our people, no matter what they do, to fall under the legal jurisdiction of some other nation, because that would set a bad precedent, and it may make people wary of working for us in this capacity in the future—surely you understand.
    There are tiers of diplomatic immunity, depending on the seniority of the diplomat or other representative in question, and the Congress of Vienna of the early 1800s charted out the basis for how these things work, in much detail, formalizing a lot of what was already in the ether back then, and creating an outline that was then further formalized in 1961's Vienna Convention on Diplomatic Relations, which has been almost universally ratified and respected, though of course there's been a lot of grey area in terms of what harassment of a representative, which is a no-no according to this convention, entails, and to what degree it can be proven, and thus punished, if violated.
    We saw a lot of grey area utility during the height of the Cold War in particular, in part because many diplomats were moonlighting as spies, which is still true today, though it was even more overt and worrisome to their host countries, back then, so harassment, kidnappings, even assassinations of diplomats were more common then, t

    • 20 min
    XZ Utils Hack

    XZ Utils Hack

    This week we talk about Linux, backdoors, and the Open Source community.
    We also discuss CPU usage, state-backed hackers, and SSH.
    Recommended Book: The Underworld by Susan Casey
    Transcript
    In the world of computers, a "backdoor" is a means of accessing a device or piece of software via an alternative entry point that allows one to bypass typical security measures and often, though not always, to do so in a subtle, undetected and maybe even undetectable manner.
    While backdoors can be built into hardware and software systems by the companies that make those devices and apps and bits of internet architecture, and while some governments and agencies, including the Chinese government, and allegedly folks at the NSA, have at times installed backdoors in relevant hardware and software for surveillance purposes, backdoors are generally the domain of tech-oriented criminals of various stripes, most of whom make use of vulnerabilities that are baked into their targets in order to gain access, and then while inside the administration components of a system, they write some code or find some kind of management lever meant to give the company or other entity behind the target access for non-criminal, repair and security purposes, and that then allows them to continue to gain access in the future; like using a rock to prop open a door.
    Concerns over a backdoor being installed in vital systems is fundamental to why the US and European governments have been so hesitant to allow Chinese-made 5G hardware into their wireless communication systems: there's a chance that, with the aid, or perhaps just at the prodding of the Chinese government, such hardware, or the software it utilizes, could contain a Trojan or other packet of code, hidden from view and hardcoded into the devices in some covert manner; these devices could also harbor even smaller devices, indistinguishable from hardware that's meat to be there, that would allow them to do the same via more tangible means.
    Though there were almost certainly other economic and technology-dominance reasons for the clampdown on products made by Chinese tech company Huawei beginning in earnest in 2012, and escalating rapidly during the US Trump administration, that process was at least ostensibly tied to worries that a Chinese company, prone to spying and stealing foreign tech, already, might incorporate itself into fundamental global communication infrastructure.
    It was underpricing everybody else, offering whizbang new high-end 5G technology at a discount, and supposedly, if the accusations are true, at least, doing so as part of a bigger plan to tap into all sorts of vital aspects of these systems, giving them unparalleled access to all communications, basically, but also giving them the ability, supposedly, to shut down those systems with the press of a button in the event that China wants or needs to do so at some point, if they ever decide to invade Taiwan, for instance, and want to distract the Western world until that invasion is complete, or just make rallying a defense a lot more difficult.
    Other, confirmed and successfully deployed backdoors have been found in all sorts of products, ranging from counterfeit Cisco network products, like routers and modems, some of which were installed in military and government facilities back in 2008 before they were recognized for what they were, to Microsoft software, Wordpress plugins, and a brand of terminals that manage the data sent along fiber-optic cables, mostly for high-speed internet purposes.
    Again, in some cases, the entities making these products sometimes do install what are literally or essentially backdoors in their hardware and software because it allows them to, for instance, help their customers retrieve lost passwords, fix issues, install security updates, and so on.
    But backdoors of any shape or size are considered to be major security vulnerabilities, as stealing a password or getting access to a vital terminal could then grant so

    • 19 min

Customer Reviews

5.0 out of 5
7 Ratings

7 Ratings

я_люблю_слушать_подкачт ,

Absolute favorite

I love walking the interesting routes that Colin decides to take, even the initially scary and potentially life-changing ones. His voice silences the other one in my head, the one that sounds so depressed and anxious. Let’s know things is my safe place and a happy harbour; one that I can trust to take me in previously unexplored, wild and always fascinating scenes of human culture.

LeilaKay79 ,

Incredibly thoughtful and interesting

I love listening to Colin. His voice is amazing and I love his point of view. So much food for thought!!!

Jarskilerski ,

For everyone who likes to know

Interesting facts and ponderings on variety of subjects, delivered with great articulation and pleasanta voice. Recomended to everyone who wants to use their brain.

Top Podcasts In News

Politiikan puskaradio
Iltalehti
Uutisraportti podcast
Helsingin Sanomat
Lauantaikerho
Helsingin Sanomat
Global News Podcast
BBC World Service
The Daily
The New York Times
Politbyroo
Politbyroo

You Might Also Like

One Sentence News
Colin Wright
Marketplace All-in-One
Marketplace
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Brain Lenses
Colin Wright
a16z Podcast
Andreessen Horowitz
Motley Fool Money
The Motley Fool