DiscoverThe Great Tech Game Podcast: Geopolitics, Technology, Business and Global Affairs, with Anirudh Suri
The Great Tech Game Podcast: Geopolitics, Technology, Business and Global Affairs, with Anirudh Suri
Claim Ownership

The Great Tech Game Podcast: Geopolitics, Technology, Business and Global Affairs, with Anirudh Suri

Author: Anirudh Suri

Subscribed: 10Played: 42
Share

Description

Interested in geopolitics, technology, business, entrepreneurship and global affairs?

The Great Tech Game Podcast is the perfect podcast for you. Host Anirudh Suri, a tech venture capitalist, policy advisor, and bestselling author of The Great Tech Game, brings you smart, insightful conversations at the intersection of tech and geopolitics.

Listen to the carefully curated line up of the world's best thinkers on these themes. They will help you see the big picture, and in the process, understand how to get ahead in a world thats constantly being upended by technology and geopolitics.
167 Episodes
Reverse
In this episode of The Great Tech Game, host Anirudh Suri sits down with Chris Kemp — Founder, Chairman, and CEO of Astra, and former CTO of NASA — to unpack how the commercial space race is reshaping technology, defense, and geopolitics.From drones and rockets to optical space internet, Kemp explains how a new generation of private space companies are breaking into this domain that was initially dominated by states, especially during the Cold War when the first Space Race was between the United States and the Soviet Union.🔑 Highlights from the episode:- Why space is becoming the ultimate geopolitical high ground.- Which companies and countries are leading in this space- How cheap, mobile rocket systems are redefining military deterrence.- The shift from billion-dollar satellites to swarms of small ones.- What Astra’s Rocket 4 and propulsion business reveal about the future of scalable space manufacturing.- Why optical communication (light-based data transfer) could spark a new, unjammable internet in space.Kemp also discusses his time at NASA, founding OpenStack, and how commercial satellite networks like Starlink and Planet Labs are already influencing modern conflicts — from Ukraine to beyond. The conversation traces how space tech is moving from elite national programs to a mass-produced, distributed ecosystem that could reshape both global security and the everyday internet.
In this episode of The Great Tech Game, host Anirudh Suri speaks with Michael Brown — Partner at Shield Capital, Visiting Scholar at Stanford’s Hoover Institution, and former Director of the Defense Innovation Unit — about the frontlines of the US–China technology competition and what the U.S. must do to stay ahead.Together they explore:– How China’s top-down innovation model is challenging U.S. leadership– The urgent reforms needed in R&D, budgeting, and industrial policy– How Silicon Valley and the Pentagon are reconnecting through defense tech– Why allies and partners remain America’s biggest asymmetric advantageBrown also unpacks the decline in federal R&D spending, the rise of defense-tech startups, and how conflicts like Ukraine reveal the power of commercial technology in modern warfare.Tune in for an insider’s look at the race shaping global innovation — and what it means for the future of defense, technology, and geopolitics.Follow The Great Tech Game for more conversations at the intersection of technology, strategy, and the global economy.
In this episode of the Great Tech Game podcast, host Anirudh Suri interviews Peter Singer, a strategist at New America and a renowned futurist in national security. Singer discusses the evolving landscape of warfare, highlighting the role of new technologies such as drones, AI, and cyber capabilities. He reflects on the lessons learned from recent conflicts, such as Ukraine and Gaza, and explores the rise of private military and defence tech firms. Singer also delves into the potential for future global conflicts, the implications of emerging technologies, and the inherent vulnerabilities within autocratic systems. From multi-domain operations and cognitive warfare to the game-changing power of synthetic biology, this conversation reveals how technology, geopolitics, and global affairs are colliding to redefine the future of conflict.00:00 Introduction to Future Warfare00:09 Peter Singer's Background and Contributions00:44 The Reality of Modern Warfare00:54 Technological Denial and Acceptance01:22 The Impact of Drones and Robotics02:01 Private Military Contractors and Defense Tech Firms02:20 Silicon Valley's Role in Defense03:43 The Future of Warfare and Global Conflict05:29 The Role of Non-State Actors in Modern Warfare34:30 The Complexity of Multi-Domain Warfare38:33 Emerging Technologies in Space41:39 Cyber Warfare Insights47:20 AI and Robotics Revolution57:30 Future Technologies and Their Impact01:04:27 Rapid Fire Questions and RecommendationsAbout Peter W. Singer:Peter Warren Singer is a strategist at New America, Professor of Practice at Arizona State University, and Founder & Managing Partner at Useful Fiction LLC, a firm that specializes in strategic narrative. A New York Times bestselling author, Singer has been hailed by the Wall Street Journal as “the premier futurist in the national-security environment” and by the Washington Post as “an all-around smart guy.” He has been recognized by the Smithsonian as one of America’s 100 leading innovators, by Defense News as one of the 100 most influential voices in defense, and by Foreign Policy on its Top 100 Global Thinkers list. The U.S. Army has even designated him an official “Mad Scientist.” Notably, no other author, has more books featured on professional U.S. military reading lists.Links to Peter Singer's books:Burn-In: A Novel of the Real Robotic Revolution - https://www.amazon.in/Burn-Novel-Real-Robotic-Revolution-ebook/dp/B07T4KLT74LikeWar: The Weaponization of Social Media - https://www.amazon.in/LikeWar-Weaponization-P-W-Singer/dp/1328695743Ghost Fleet: A Novel of the Next World War - https://www.amazon.in/Ghost-Fleet-P-W-Singer/dp/054470505XCybersecurity and Cyberwar: What Everyone Needs to Know - https://www.amazon.in/Cybersecurity-Cyberwar-What-Everyone-Needs/dp/0199918112Wired for War: The Robotics Revolution and 21st Century Conflict - https://www.amazon.in/Wired-War-Robotics-Revolution-Conflict/dp/0143116843Corporate Warriors: The Rise of the Privatized Military Industry - https://www.amazon.in/Corporate-Warriors-Privatized-Military-Industry/dp/0801489156Children at war - https://www.amazon.in/Children-at-War-P-W-Singer/dp/0375423494Host of the Podcast, Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: (http://www.anirudhsuri.com/) Book and Podcast: [www.greattechgame.com]🎥 Clip Credit 1:PackBot® 510 | Unmanned Ground Systems -- Teledyne FLIRWatch here: https://youtu.be/kV0GwG269xQ?si=avvlSRnkqf4VqyKq#anirudhsuri #futurewarfare #futureofwar #privatemilitary #cyberwarfare #thegreattechgame #tgtgpodcast #anirudhsuri #petersinger #pwsinger #geopolitics #podcast #defenseanalysis #defensetech #cognitivewarfare #warfare #war
In this episode of The Great Tech Game podcast, Professor Jason Furman -- the Aetna Professor of the Practice of Economic Policy at Harvard Kennedy School and former 28th Chairman of the Council of Economic Advisors under President Barack Obama -- offers a rare peek behind the curtain of President Trump's tariff strategy and their far-reaching impacts. We explore the surprising realities of who truly wins and loses in this global economic upheaval, both within the US and across the world, and why the aggregate picture might not be what you expect.Professor Furman critically examines India's unique and challenging position in this tariff landscape, facing a potentially "unfair" deal with a projected 50% tariff rate. Could this be India's pivotal "1991 moment" for significant domestic reforms? What strategic choices lie ahead for its booming economy?The discussion also delves into:• Why countries have largely opted for "personalistic" bilateral deals rather than forming a united front against US tariffs, and what this reveals about global negotiation dynamics.• The one country that has successfully pushed back against US tariffs, and the unique leverage that allowed it to do so.• The potential long-term shifts in global trade patterns and whether the "most favored nation" principle is truly a thing of the past.• The profound implications of AI for global productivity and the future of jobs. Will AI be a "massively positive" force, and how might its benefits be distributed across different nations?• The critical role of immigration in fuelling the US tech and AI industries, and why its future is a key concern.Professor Furman also provides candid rapid-fire answers on pressing questions like whether Trump's trade war protects American jobs (his answer may surprise you!) and who ultimately pays the price for high tariffs, and whether Trump will finally strike a deal with India eventually or not.Tune in to gain a deeper understanding of the forces shaping today's global economy and what lies ahead for nations caught in the "Tariff Roulette."Subscribe for more insightful discussions on geopolitics, technology, and economics!
In this episode of The Great Tech Game podcast, host Anirudh Suri sits down with Dr. John Klein—space strategist, military theorist, and author of Fight for the Final Frontier—as part of our Future of War and Tech series. This episode marks our first deep dive into the space domain.Dr. Klein explains why “space is not special, just wonderfully different,” urging a strategic and historical lens to understand the shifting nature of space power. The conversation explores how commercial firms—now responsible for over 90% of spacecraft in orbit—are transforming the global space landscape, and what that means for governments, warfighting, and deterrence.From anti-satellite tests and cyber attacks on satellite infrastructure to the critical role of geospatial intelligence in the Russia-Ukraine war, the episode highlights how space is already shaping today’s conflicts. Reflecting on maritime analogies, the risks of “mirror imaging,” and India’s evolving posture in this domain, this is a must-watch episode for anyone interested in space strategy and geopolitics.CHAPTERS00:00 Trailer04:06 Key Technological Advancements in Space in Recent Years10:56 Who Are the Key Nations in the Space Power Club?14:21 Key Private Space Entities and their Relationship with Governments31:36 How Commercial Companies are Governed by International Space Treaties36:38 Drone Warfare and GPS Jamming in the India-Pak Conflict40:15 Geospatial Intelligence and OSINT in Recent Conflicts50:31 India's Space Capabilities and Strategic Advice for Indian Startups57:20 How Should Countries Navigate Space Geopolitics?01:00:42 Book Recommendations and Final ThoughtsAbout Dr. John Klein:Dr. John J. Klein is a Senior Fellow and Strategist at Falcon Research, Inc., and Adjunct Professor at George Washington University’s Space Policy Institute and Georgetown University’s Strategic Studies Program. He frequently writes on space strategy, deterrence, and the Law of Armed Conflict. He is the author of the books Understanding Space Strategy: The Art of War in Space (2019), Space Warfare: Strategy, Principles and Policy (2006) and the recently released Fight for the Final Frontier: Irregular Warfare in Space (2023), along with a score of other book chapters and articles. He is a retired Commander of US Navy, where he served as a Naval Flight Officer from 22 years. He also supported combat operations in Iraq and Afghanistan. Links to Dr. Klein's books:Understanding Space Strategy: The Art of War in Space - https://www.amazon.in/Understanding-Space-Strategy-Power-Politics/dp/1138354627Space Warfare: Strategy, Principles and Policy - https://www.amazon.in/Space-Warfare-Strategy-Principles-Politics/dp/0415407966Fight for the Final Frontier: Irregular Warfare in Space - https://www.amazon.in/Fight-Final-Frontier-Irregular-Warfare/dp/155750735XHost of the Podcast, Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: [www.anirudhsuri.com](http://www.anirudhsuri.com/) Book and Podcast: [www.greattechgame.com](http://www.greattechgame.com/)🎥 Clip Credit 1:“2021 Russian Satellite Intercept” – Ansys Government Initiatives (AGI)Watch here: https://youtu.be/b52F9R9ByOY?si=vp1uc224HqiYJZE6🎥 Clip Credit 2:“Geostationary, Molniya, Tundra, Polar & Sun Synchronous Orbits Explained” – Scott ManleyWatch here: https://youtu.be/PZAkiXNJIqc?si=d7S8mNKstsYLbXEc🎬 Clip Credit 3:“Northrop Grumman’s MEV-1 docked with the Intelsat 901 satellite” – SciNewsWatch here: https://youtu.be/pHrxDGafnV4?si=q_MLCT9UDbhpI1iJ🎬 Clip Credit 4:“Low Earth orbit is littered with human-made space junk” – RAZOR Science ShowWatch here: https://youtu.be/QTXUbW77WZE?si=dZZr4NzR61DcrFFT
In this week's episode, we sit down with Lieutenant General Jack Shanahan, the first director of the Pentagon’s Joint Artificial Intelligence Center (JAIC) and former head of Project Maven, to unpack how AI is transforming the battlefield.Project Maven (officially called the Algorithmic Warfare Cross Functional Team) is a project undertaken by the Pentagon starting in 2017, involving using machine learning and data from multiple sources with the aim of identifying potential targets, among other things. The Maven Smart System has been used, among other situations, in the Russia - Ukraine context by the US to help Ukrainian forces.Gen. Shanahan shares what it took to bring AI into the Department of Defense, from fighting bureaucratic inertia to handling mountains of battlefield data. We dive into the Pentagon’s collaboration—and tensions—with private tech firms, the high-stakes AI race between the US and China, and the lessons emerging from Ukraine. We also explore how AI could change cyber warfare forever—and what these shifts mean for the future of global power.If you’re curious about how technology is reshaping war, strategy, and geopolitics, this conversation is for you.Chapters:00:00 The Evolution of the Department of Defense00:52 The Rise of Silicon Valley and the Tech Boom01:33 Challenges in Integrating Tech with Defense02:48 Introduction to the Great Tech Game Podcast05:18 The Big Picture: Post-Cold War Shifts11:18 Project Maven: The AI Revolution in Defense21:33 Data Management Challenges in AI Projects27:32 Collaborating with Private Tech Firms36:08 Purpose and Challenges of AI in Defense36:55 Corporate Collaboration and Ethical Considerations37:52 Impact of Ukraine Conflict on AI Adoption38:22 Emergence of New Defense Primes39:17 Partnerships Between Big and Small Companies40:20 Transforming Government with Silicon Valley Talent44:24 Project Maven's Strategic Impact45:31 Algorithmic Warfare and Human-Machine Integration49:40 Global Use and Future of Project Maven54:58 US-China AI Military Competition01:03:41 China's AI Development and Civil-Military Fusion01:10:05 China's Manufacturing and Technology Growth01:10:48 Autonomous Systems and AI Integration01:11:07 China's Government and Tech Companies01:13:53 India's AI and Military Technology01:15:31 Challenges and Opportunities in India01:19:15 AI in Cyber Defense and Offense01:22:42 Private Tech Firms vs. Nation States01:31:08 Future of Industrial Policy and National Security01:36:08 Book and Podcast Recommendations#thegreattechgame #tgtgpodcast #anirudhsuri #jackshanahan #militarytechnology #projectmaven #dod #departmentofdefense #military #geopolitics #defenseinnovation #siliconvalley #uschina #indiaai #usmilitary #thegreattechgamepodcast
In this video, Geoff White, host of BBC Podcast 'Lazarus Heist', explores the hidden world of cyber defense and uncover how governments, private companies, and security agencies work together to track down some of the world’s most sophisticated hackers. While we often hear about massive cyberattacks and stolen millions, this conversation dives deep into the lesser-known side of the story — how these criminals are traced, caught, and exposed.From the SolarWinds hack, allegedly orchestrated by Russian hackers, to state-sponsored cyberattacks targeting private companies, he discusses how the lines between government operations and private tech firms are increasingly blurring. Today, big tech companies like Microsoft and Starlink often play roles as significant as governments themselves, supporting global defense strategies — similar to how they assisted Ukraine during the ongoing Russia-Ukraine conflict.We also discuss the covert battles happening behind the scenes, where espionage, counter-hacks, and intelligence operations unfold beyond public visibility. While countries like the US, UK, India, and Russia constantly engage in cyber warfare, most of these operations remain classified and never reach the headlines. Even in high-profile cases like North Korea’s alleged hacks, accusations rarely make it to court, leaving many questions unanswered about how these investigations actually unfold.This video unpacks the methods, partnerships, and challenges behind cyber defense, revealing how public and private forces combine to protect digital infrastructure in a world where attacks are constant, global, and evolving.If you’re interested in cybersecurity, digital warfare, or the secretive world of global hacking, this is a must-watch.
In this video, Geoff White, host of BBC Podcast 'Lazarus Heist', explains the turbulent world of crypto tech firms, government crackdowns, and the growing clash between regulation, freedom, and financial innovation. He explores why some of the biggest names in the crypto industry — from FTX’s Sam Bankman-Fried, sentenced to 25 years in prison, to Binance founder CZ, facing legal troubles — have come under intense global scrutiny, while traditional tech giants like Microsoft, Google, and Amazon continue to thrive with government support.The conversation looks at why crypto companies operate differently from established big tech firms. While traditional companies have decades of regulatory integration, government ties, and lobbying power, many crypto startups are new, disruptive, and anti-establishment. Built on the idea of financial freedom, privacy, and decentralization, these firms have positioned themselves outside traditional power structures, rejecting government control over money. But this independence has also made them prime targets for regulators cracking down on fraud, tax evasion, and money laundering.We also discuss the controversial role of crypto mixers like Tornado Cash, which was accused of laundering over $500 million stolen in the Axie Infinity hack by North Korean cybercriminals. While governments see these services as enablers of illegal activity, many in the crypto community defend them as vital tools for privacy, free speech, and financial liberty — sparking a deep philosophical divide about the future of money.If you’re interested in cryptocurrency, cybersecurity, or the tussle over financial freedom, this is a must-watch.
In this video, Geoff White, host of BBC Podcast 'Lazarus Heist', explores how the booming online gaming industry has become one of the newest battlegrounds for cybercrime, crypto theft, and money laundering. He explains how hackers — including North Korea’s state-backed Lazarus Group — are exploiting gaming platforms and digital ecosystems to steal millions and move illicit funds undetected.We dive into the shocking Axie Infinity hack of 2022, where North Korean hackers allegedly stole $625 million by exploiting blockchain vulnerabilities within the Vietnamese gaming platform. With the gaming industry now valued in billions, gaming companies have become high-value targets for hackers, while unsuspecting gamers are also at risk. From stolen digital assets like skins, avatars, and in-game currencies to compromised wallets, the threat extends far beyond corporate systems.With the rapid rise of crypto-based gaming, NFTs, and digital in-game assets, cybercriminals now see gaming as one of the most lucrative and low-risk frontiers. This clip unpacks the methods, motives, and scale of these operations, exposing how the gaming world has become a new playground for hackers, scammers, and money launderers.If you’re interested in cybersecurity, gaming, cryptocurrency, or digital finance, this is a must-watch.
In this video, Geoff White, host of BBC Podcast 'Lazarus Heist', delves into the hidden world of cartels, hackers, and crypto laundering, revealing how technology is being used to move billions of dollars through secretive financial networks. He uncovers the shocking alliances between cybercriminals, money launderers, and organized crime syndicates, exposing how the tech industry has inadvertently become a tool for the world’s deadliest crooks.From North Korean hackers breaching banks and crypto firms to sophisticated laundering networks built to bypass regulations, this conversation unpacks how these shadow economies operate. Hackers may know how to break into financial systems, but when it comes to moving the stolen money, they rely on powerful laundering specialists who set up shell companies, recruit money mules, and exploit digital loopholes to clean illicit funds without detection.The rise of digital finance, instant payments, and cryptocurrency has made the problem even more alarming, giving global criminals faster and smarter ways to hide their tracks. Whether it’s drug cartels, fraud syndicates, or state-backed hacking groups, these networks leverage advanced technology to launder billions and outpace international regulators. Geoff unpacks the motives, methods, and global impact of these digital laundering systems, showing how technology has transformed the way crime moves money around the world.
In this video, Geoff White, host of BBC Podcast 'Lazarus Heist', exposes the hidden world of Southeast Asian cybercrime networks, where romance scams, pig butchering schemes, and crypto-driven fraud have evolved into a multi-billion-dollar global industry. These scams use emotional manipulation to trap victims, convincing them to invest in fake opportunities — only to be drained of their savings.Countries like Laos, Cambodia, the Philippines, and Thailand have become hotbeds for organized cybercrime, fueled by underground casinos, crypto laundering, and poorly regulated financial systems. Many of these networks operate with little government oversight, and in some cases, authorities appear complicit in allowing these fraudulent operations to thrive.Adding another disturbing layer, thousands of people are trafficked into these regions and forced into scam operations under harsh, exploitative conditions. What seems like an online fraud problem is, in reality, a deeply rooted crisis tied to human trafficking, illegal gambling, and financial exploitation — powered by modern technology.Geoff explains how Southeast Asia became the global hub for organized scams, why these operations are growing so fast, and the devastating human cost behind them. If you are interested in the full story,watch Full Episode here: https://youtu.be/66u1zeJVKLI
In this video, Geoff White, host of BBC Podcast 'Lazarus Heist', dives into the shocking story of the Lazarus Heist — one of the most infamous cybercrime operations in the world. North Korea’s state-backed hackers have allegedly stolen billions of dollars through highly sophisticated attacks on banks, cryptocurrency firms, gaming platforms, and financial institutions worldwide.From the infamous 2016 Bangladesh Bank hack, where hackers attempted to steal $1 billion and successfully got away with $80 million, to the Cosmos Cooperative Bank ATM heist in India, which led to a $12 million loss, these operations reveal just how advanced and calculated North Korea’s cyber strategies are.The conversation also explores how the Lazarus Group shifted focus toward cryptocurrency and gaming platforms, leading to one of the biggest hacks in history — the Axie Infinity breach in 2022, where $625 million was stolen through blockchain vulnerabilities. With the rise of digital finance, crypto exchanges and gaming ecosystems have become prime targets for global cybercriminals.We also discuss how these hackers launder stolen money through underground networks, shell companies, and poorly regulated sectors, making their financial trails nearly impossible to track. This video unpacks the motives, methods, and global impact of North Korea’s state-sponsored cybercrime machine.If you’re interested in cybersecurity, cryptocurrency, or digital warfare, this is a must-watch.Watch Full Episode: https://youtu.be/66u1zeJVKLI
Join us in this episode of The Great Tech Game Podcast as we delve into the murky world of cybercrime with investigative journalist and author, Geoff White. We discuss why few states succeed in building effective military cyber forces, the evolution of ransomware into a national security crisis, and the actors behind major cybercrime networks. Geoff maps out where these networks function geographically and in cyberspace, and identifies both state and non-state cyber actors, including Russia's ransomware economy, North Korea's Lazarus group, and fraud networks in Southeast Asia and West Africa. We also explore how technology has revolutionized money laundering for the world's deadliest crooks, as seen in Geoff latest book, 'Rinsed,' and touch on key geopolitical impacts, defense strategies, and the intersection of gaming and cybercrime.Key Chapters00:00 Introduction and Recap of Previous Episode02:28: Introducing Today's Guest: Geoff White03:51 The Evolution of Cyber Espionage Post-Snowden Leaks07:45 Mapping the Global Cyber Landscape11:35 Non-State Cyber Actors: A Closer Look17:18 The Infamous Lazarus Group and North Korean Cyber Operations20:08 The Rise of Cryptocurrency in Cybercrime23:44 The Black Axe Group: A Global Threat29:24 Money Laundering in the Digital Age32:20 The Din sisters Double Life33:28 Bitcoin as a Money Laundering Tool34:06 The Arrest and Aftermath35:23 Gaming and Cybercrime37:43 How Cybercriminals Get Caught41:10 Crypto Tech Firms Under Scrutiny52:10 Global Responses to Crypto Crime55:21 Geopolitics and Crypto58:07 Conclusion and RecommendationsBook Links:by Geoff White:Rinsed: From Cartels to Crypto: : https://amzn.in/d/48PaZjNThe Lazarus Heist: https://amzn.in/d/f0xbAofBy Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: http://www.anirudhsuri.com/Book and Podcast: http://www.greattechgame.com/
In this clip, Max Smeets unpacks the global ransomware threat landscape—mapping out where the major cybercriminal groups operate from, who they target, and how geopolitics plays into it all.While Russia remains the epicenter of many ransomware operations, these groups often have multinational member bases across Belarus, Ukraine, and beyond, operating with a tacit agreement not to target Russian allies.We also explore how English-speaking countries like the U.S. are primary targets, not only for ideological reasons, but also because of language familiarity and financial payoff.This conversation dives into groups like Conti, the fragmentation of ransomware gangs, and the shift in targets toward Latin America, as attackers evolve both strategically and politically.If you’re curious about cybercrime, digital geopolitics, or how language shapes attack strategies, this is a must-watch.Watch Full Episode: https://youtu.be/XXSIa5-exTI
In this clip, Max Smeets explores how governments—despite lacking the power of agencies like the FBI or NSA—are still finding smart, effective ways to push back against ransomware attacks.Whether it’s disrupting the cybercriminal ecosystem, targeting crypto wallets, or damaging the reputations of ransomware gangs, governments are learning to fight smarter, not just harder.This conversation dives deep into how international cooperation, public pressure, and infrastructure disruption are becoming powerful tools in this digital arms race.If you're interested in cybersecurity, ransomware policy, or global digital threats, this clip will give you fresh insights into what’s really happening behind the scenes.Watch Full Episode: https://youtu.be/XXSIa5-exTI
In this clip, Max Smeets walks us through a real-world example of how a ransomware attack unfolds — from the initial phishing email to the final ransom negotiations.It usually starts with a simple hook, like a fake Amazon gift card email, designed to get someone inside the organization to click. Once inside, attackers move laterally, using everyday tools already in the system — a tactic known as living off the land. Their goal is to reach critical systems and backups, staying hidden as long as possible.Eventually, they reveal themselves with a ransom note — not just demanding money, but proposing a business-like conversation. Discounts, cryptocurrency preferences, and even “customer service” come into play. But behind the scenes, it’s rarely the victim negotiating directly. Professional ransomware negotiators often step in, and in many cases, they’ve dealt with the attackers before.This clip offers a rare look at the detailed anatomy of a ransomware operation.Watch Full Episode: https://youtu.be/XXSIa5-exTI
In this clip, Max Smeets explains his PETIO framework — a practical model for how countries can build effective cyber capabilities.PETIO stands for People, Exploits, Tools, Infrastructure, and Organization, but as the guest emphasizes, it all starts with People — recruiting, training, and retaining the right talent, both technical and non-technical.Surprisingly, the most discussed element, exploits, might actually be the least essential. As NSA’s Rob Joyce once said, success in cyber operations often comes not from flashy zero-days, but from knowing your adversary’s network better than they do.This clip is a must-watch for anyone curious about how cyber power is really built behind the scenes.Watch Full Episode: https://youtu.be/XXSIa5-exTI
In this clip, Max Smeets explores two lesser-known but highly significant players in the cyber domain — Cyber Partisans and Predatory Sparrow — who are reshaping the boundaries of cyber conflict beyond traditional nation-states.Cyber Partisans is a Belarusian resistance group that has conducted multiple disruptive cyberattacks against the Belarusian government. Their operations have included halting railway networks, exposing passport scans of top officials including President Lukashenko, and leaking sensitive personal details of officers. Remarkably, the group is attempting to build a responsible framework around its actions, deciding what to target, whom to notify, and where not to operate — setting a precedent for organized digital resistance.Predatory Sparrow, on the other hand, is an elusive actor claiming to be hacktivist-led, though signs suggest a likely connection to a state actor. They are known for highly sophisticated attacks on Iranian infrastructure, including a steel mill and energy facilities. In a rare move, they notified emergency services before launching attacks to minimize civilian harm, raising deep questions about ethics, attribution, and the rules of engagement in cyber operations.In both cases, these groups deserve more analytical attention for how they blur the lines between activism, cyberwarfare, and covert state action in a rapidly evolving digital battlefield.Watch Full Episode: https://youtu.be/XXSIa5-exTI
In this clip, Max Smeets unpacks the contrasting cyber strategies of two global superpowers: the United States and China. The U.S. operates with a centralized and aggressive approach, led by U.S. Cyber Command and the NSA. Through a strategy known as persistent engagement, it actively disrupts adversaries, even across foreign networks, demonstrating a global mindset in cyber operations. Historical cases like Stuxnet reveal the extent to which the U.S. has been willing to conduct destructive and disruptive cyber activities.China, on the other hand, adopts a more decentralized and evolving model, involving a wide range of actors from PLA-affiliated units to universities and independent hacker groups. Much of China’s known activity revolves around IP theft and espionage, with increasing emphasis on Operational Preparation of the Environment (OPE) — quietly infiltrating systems and holding them at risk for potential future attacks.This conversation explores not only their strategic differences but also the structural contrasts between a tightly coordinated U.S. system and China’s more complex, layered cyber ecosystem. It also looks ahead to how both countries may continue to evolve, especially as China moves toward more centralized coordination of its cyber capabilities.Watch Full Episode: https://youtu.be/XXSIa5-exTI
In the latest episode of The Great Tech Game podcast, cyber conflict expert Max Smeets—senior researcher at ETH Zurich and co-director of Virtual Routes—draws on his books “No Shortcuts” and “Ransom War” to explore why most states struggle to build effective cyber forces and how ransomware has become a major national security threat. He breaks down the contrasting cyber strategies of the US, China, and Russia, the rise of professionalized ransomware groups like Conti, and what it takes for governments to build capable cyber commands. A must-watch for anyone seeking to understand the evolving frontlines of cyber conflict.Chapters00:00 Trailer03:37 Introduction to the Great Tech Game Podcast03:51 Meet Max Smeets: Cybersecurity Expert06:04 Max's Journey from Finance to Cyber Warfare08:22 Discussing No Shortcuts: Challenges in Cyber Command17:11 Global Cyber Strategies: US vs China27:09 Building Cyber Capacity: The PETIO Framework46:38 Ransomware: A Growing National Security Threat52:03 Evolution of Ransomware53:30 The Rise of Conti55:03 Global Ransomware Landscape59:14 Ransomware Trust Paradox1:02:48 Conti Group and the MOB Framework1:09:45 Ransomware Attack Lifecycle1:19:36 Government Responses to Ransomware1:25:25 Comparing Ransomware to APTs and Terrorist Groups1:29:14 Book Recommendations and Final ThoughtsBook Links:By Max SmeetsNo Shortcuts: Why States Struggle to Develop a Military Cyber-Force:-https://a.co/d/03FfTolRansom War: How Cyber Crime Became a Threat to National Security:-https://a.co/d/2FuXaWSBy Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: http://www.anirudhsuri.com/Book and Podcast: http://www.greattechgame.com/#cyber #cybersecurity #cyberwarfare #ransomware #cybercrime #hackers #tech #geopolitics #thegreattechgame #thegreattechgamepodcast #tgtgpodcast #anirudhsuri #maxsmeets
loading
Comments