John W. Little
  • Home
  • About
  • Media
  • Advisory Services
  • Bluesky
  • Podcast
  • Contact
Sign in Subscribe
The AI Paradigm Shift
AI

The AI Paradigm Shift

AI's rapid advancement is creating a divide between those embracing these technologies and those ignoring the ground shifting beneath them. The debate about AGI timelines misses the point—transformative disruption is already here.
Read More
John Little
Archillect TV
AI

Archillect TV

Archillect TV offers a uniquely compelling AI-curated media stream that I've followed since launch. It creates unexpected visual narratives balancing beauty with occasional unease. It's an artful AI implementation that stimulates creativity without demanding attention.
Read More
John Little
Covert Contact 118: Shortwave Numbers Stations
Covert Contact

Covert Contact 118: Shortwave Numbers Stations

A brief exploration of number stations—enigmatic shortwave radio broadcasts used in espionage since the Cold War, highlighting their historical significance and ongoing presence in contemporary intelligence operations.
Read More
John Little
Covert Contact 117: Chinese Espionage Operations
Covert Contact

Covert Contact 117: Chinese Espionage Operations

An exploration of China's diverse espionage operations targeting American law enforcement and European institutions, examining both contemporary cases and historical parallels that reveal the unchanging human elements of intelligence work.
Read More
John Little
Covert Contact 104: Alon Pinkas on Israeli-American Relations
Covert Contact

Covert Contact 104: Alon Pinkas on Israeli-American Relations

An analysis of the evolving Israeli-American alliance, examining how historical factors, political shifts, and changing global priorities have brought this crucial relationship to a crossroads requiring new frameworks and creative diplomatic approaches.
Read More
John Little
The Last Interview
Books

The Last Interview

I reluctantly agreed to Melville House publishing my 2014 Bourdain interview, requesting they donate to the National Suicide Prevention Lifeline instead of paying me. While I wish Tony was still with us, I find comfort knowing his insights will reach more people while supporting a vital cause.
Read More
John Little
Covert Contact 76: Australian Special Operations Forces
Covert Contact

Covert Contact 76: Australian Special Operations Forces

A deep dive into Australia's evolving security landscape and special operations capabilities, exploring how geographic isolation has given way to global vulnerability and how the U.S.-Australian alliance forms a critical foundation for addressing emerging threats in an increasingly unstable world.
Read More
John Little
John Goes to Court
Security

John Goes to Court

In a surprising turn of events, my blog has made its way into federal jurisprudence. A judge recently cited my writing while ruling that the FBI can legally access suspects' computers without warrants - certainly not an application I ever anticipated when publishing the post.
Read More
John Little
Anthony Bourdain Talks Travel, Food, and War
Interviews

Anthony Bourdain Talks Travel, Food, and War

I sat down with Tony in 2014 for a conversation that ventured beyond food. He shared candid reflections on traveling through conflict zones, revealing how shared meals create human connections where diplomacy fails and how these experiences transformed his worldview.
Read More
John Little
Hacker OPSEC with The Grugq
Interviews

Hacker OPSEC with The Grugq

I spoke with "the Grugq" about hacker OPSEC against state-level surveillance. He emphasized that proper tradecraft and behavior matter more than technology, offering valuable insights on the psychological toll of maintaining operational security while evading sophisticated adversaries.
Read More
John Little
Tor and the Illusion of Anonymity

Tor and the Illusion of Anonymity

An exploration of digital privacy challenges in the modern internet landscape, examining how government surveillance, technological vulnerabilities, and user behavior intersect. Absolute online privacy is unattainable, and users must adopt a more realistic approach to protecting their data.
Read More
John Little
John W. Little © 2025
  • About
  • Sign up
  • Advisory Services
  • Privacy Policy
  • Github
Powered by Ghost