Episode: The Kurdish Problem | Episode 80


Covert Contact: The Blogs of War Podcast Logo
Subscribe
The Kurdish Problem | Episode 80

Phillip Smyth is a researcher at the University of Maryland who focuses on Iran-backed Shiite proxy groups. He is also widely known for his Hizballah Cavalcade project on Jihadology.

Phillip joined me, with very short notice, to push out this look at the complexities surrounding the Kurdish drive for independence and how that looks to play out given the recent setback.



Covert Contact: The Blogs of War Podcast
Users who viewed this episode also viewed...

Covert Contact: The Blogs of War Podcast > Team Leadership & Ethics | Episode 93

In his 3+ years as Chief of the Analysis Bureau at New Jersey’s Office of Homeland Security and Preparedness Dean Baratta led a very capable team of intelligence analysts. Dean was a critical part of a small team that was widely recognized for its innovative approaches. Now, as he moves on to another project, he reflects on leadership, lessons learned, team building, and the challenge of public service...

Covert Contact: The Blogs of War Podcast > Egyptian, Muslim, American | Episode 68

My friend Angie Gad joins me for episode 68 of Covert Contact to discuss growing up as a first generation Egyptian-American Muslim. We cover a lot of ground in this episode including her family’s struggle to maintain and establish roots in two very different worlds, her own challenges doing the same, her efforts to find common ground and acceptance from the sometimes suspicious or fearful communities she bridges, and how this has informed her work as a Middle East and terrorism analyst...

Covert Contact: The Blogs of War Podcast > Terrorists and Technology | Episode 85

Levi West, Director of Terrorism Studies at Charles Sturt University in Canberra, returns to look at how terrorists leverage (or don’t leverage) emerging apps and platforms ranging from social media, to encryption, to cryptocurrencies. We do our best to cut through the hype and look at the very real limits and challenges terrorists face when they become early adopters or even sophisticated users of networks where states have a very real advantage.
Comments (0)

Login or Sign up to leave a comment.

Log in
Sign up

Be the first to comment.