Logo

    99: The Spy

    Private investigator Igor works in NYC, often keeping a distant eye on someone through binoculars in a case that didn't sit right with him. He sensed something was off on this particular investigation.

    en-usAugust 17, 2021
    1
    Darknet Diaries

    150 Episodes

    How do spies use shoelaces for communication?
    What is Igor's role as a private eye?
    Who targeted John Scott-Railton and why?
    Why did Igor become a whistleblower?
    What concerns does JSR's experience raise about cybersecurity?

    • Creative Methods Spies Use to Send Messages UnnoticedFrom coded shoe laces to surveillance, learn how spies use innovative methods to communicate undetected, as shared by private investigator Igor in New York City.

      Spies use creative methods to communicate messages right in front of us without being detected. Shoe laces can be tied in specific ways to convey different meanings. Using different combinations of messages on two shoes, a spy can convey different messages depending on the situation. Igor, a private eye in New York City, spends his days and sometimes nights inside cars and watching people closely. He helps insurance carriers assess the validity of insurance claims. Igor has a lot of interesting stories from his work that he is willing to share.

    • Private Intelligence and Unscrupulous PurposesPrivate intelligence companies can be hired for unethical purposes, such as spying on victims and journalists, highlighting the need for proper regulation and oversight. Always question the ethics of the work you are doing.

      Black Cube is a private intelligence company that provides business intelligence, but they have been hired by billionaires and foreign countries to carry out spying campaigns. They were contracted by Harvey Weinstein to spy on his victims and also on Ronan Farrow, who was investigating Weinstein's sexual harassment case. They used a method of sending spam messages to Ronan Farrow to get his geolocation. Igor, who was hired to carry out the surveillance, discovered the truth and realized that he was unwittingly working for Harvey Weinstein. The revelation shows the dark and dangerous side of such private intelligence companies that can be used for unscrupulous purposes.

    • From spying to journalism: Igor's journey towards integrityIt's important to protect journalistic integrity and be aware of the risks involved when dealing with private intelligence companies trying to silence stories. Always choose the side of truth.

      Igor felt uneasy when assigned to spy on respected publications and ascertain their sources for a private intelligence company. He realized this could be a negative thing and potentially damage the journalists and their stories. After unsuccessfully trying to contact law enforcement, Igor decided to call Ronan Farrow and help him with the Weinstein story. Igor kept sharing information with Farrow and switched sides from doing dirty work to helping journalists. He filled in for his colleague on an important job and recognized John Scott-Railton, the target of Black Cube. Igor's experience highlights the importance of journalistic integrity and the risks of private intelligence companies trying to silence stories.

    • Black Cube Targeted Investigative ResearcherInvestigative researchers like Citizen Lab face targeted attacks, highlighting the critical need to strengthen their cybersecurity measures and remain vigilant to threats by creating awareness of the techniques used by these operatives.

      John Scott-Railton from Citizen Lab was targeted by Black Cube operative in an attempt to uncover and discredit Citizen Lab's work. The operative created a fake digital identity and met with one of JSR's colleagues to ask about Citizen Lab's work. Later, JSR was contacted by a man named Michel Lambert, who acted interested in JSR's previous work on aerial photography using kites. JSR suspected that Michel was the same Black Cube operative who targeted Citizen Lab. He recorded their conversations to gather evidence against him. This incident highlights the threats faced by investigative researchers like Citizen Lab and the need to strengthen their cybersecurity measures.

    • JSR's plan of confronting Michel with a reporting team using a covert camera video necktie.JSR plans to tackle Michel at the meeting with proof. However, things didn't go as planned, highlighting the importance of remaining calm during uncertain situations.

      JSR plans to confront Michel with a reporting team led by Raphael Satter during the meeting. He prepares himself by making a covert camera video necktie. JSR is worried about the outcome of the meeting and whether Michel will guess that they are onto him. However, when the day of the meeting came, things started going wrong. JSR arrived at the hotel too early, which made him anxious. The meeting is about to become a game of spy versus spy as JSR sets up to spy on the Black Cube agent Michel Lambert, and Igor watches their backs. The objective of the meeting is unclear, but JSR thinks Michel may try to harm him or his colleagues' reputations.

    • Overcoming Obstacles to Record a Top-Secret MeetingDespite facing multiple challenges, quick thinking and resilience can help achieve success even in unexpected situations.

      The author had a challenging time making it to a top-secret meeting location while carrying recording equipment. Despite facing challenges like pouring rain, difficulty finding a taxi, and a traffic jam, he made it to the restaurant using his quick thinking and running. Upon arriving, the author managed to avoid raising suspicion and recorded the meeting as planned, all while feeling unprepared and awkward. The meeting was conducted in French and was mostly meaningless chit-chat. The author's resilience and resourcefulness paid off in the end as he successfully recorded the meeting without getting caught, even though he had to make several last-minute adjustments along the way.

    • Operative's Experience During Surveillance OperationIn surveillance, being inconspicuous is essential; following instructions, being cost-conscious, and using appropriate equipment can help operatives fulfill their tasks efficiently.

      During a surveillance operation, operatives try to avoid being noticed and take precautions to exclude the operative's identity from video footage. The meeting with the target and agents went so well that the operative was asked to relax and stay at the bar. This was unusual as the meetings are usually brief and tense. The operator was instructed to follow them until they split up, but not to follow the agent. Black Cube usually strictly follows instructions and is very cost-conscious. The equipment used by the operative were an iPhone for pictures, a camcorder, and no microphone for eavesdropping. When he returned to the hotel, a professional photoshoot was happening in the lobby.

    • Staying Vigilant in Public SpacesAlways be cautious of who's around you and the conversations you have with them. Verify their identity, protect sensitive info, and report suspicious behavior to prevent security breaches.

      In this text, a man narrates his experience at a hotel bar where he witnessed a photoshoot and was later approached by a stranger who was trying to gather information about Citizen Lab. The stranger used offensive tactics to get the man to reveal something valuable. The key takeaway is to always be cautious of the people around us and the conversations we have with them, especially when it comes to sensitive information. It's important to verify that the person is who they say they are, to avoid revealing any information that might be valuable to others. We should also report any suspicious behaviour to the authorities to prevent security breaches.

    • The Risks of Making Fake CompaniesCreating fake companies can lead to ethical dilemmas and reputational risks. It is essential for businesses to prioritize ethical practices and be accountable for their actions.

      A journalist from The Associated Press, Raphael Satter, and his videographer confront a man named John about his fake company, CPW Consulting. John tries to avoid the camera and questions, but his terror grows as the situation escalates. Finally, he spots an open door in the back to a private dining room and goes inside. A restaurant staffer helps him and closes the door. Meanwhile, Igor, one of John's associates, is on the phone with their boss, Roman Khaykin, who is worried about the situation and wants to help get John out of there. The incident highlights the risks of creating fake companies and the importance of ethical business practices.

    • Tips for Navigating Chaos and UncertaintyStay observant and responsive, gather information discreetly through pictures and videos, listen carefully to those in danger, maintain personal boundaries and avoid illegal requests.

      In situations of chaos and uncertainty, it's important to gather as much information as possible. Taking pictures of people and identifying them can be crucial in understanding what's going on. Having a discreet video app and noticing small details about people's appearances can also provide valuable information. When tasked with helping someone in danger, it's important to listen carefully and follow their instructions, offering whatever assistance they need. However, it's also important to have personal boundaries and not agree to unethical or illegal requests, even in high-pressure situations. Overall, staying calm, observant, and responsive can be key in navigating uncertain and potentially dangerous situations.

    • Strategies to Check if You're Being Followed as a Private InvestigatorPrivate investigators use tactics like driving down quiet streets, analyzing small details and using garage entrances to check if they're being followed. Overthinking is an essential skill for their job.

      Checking if you're being followed is important for a private investigator. In heavy traffic areas like Midtown Manhattan, one strategy is to drive down quiet streets and force someone to stay behind, then change directions of travel to see if they follow. Garage entrances are also useful, one can enter and exit through different exits and try to force someone to go through a garage. Other strategies include going through drive-throughs and seeing who is constantly showing up in the same cars. PIs also analyze small details - such as a name tag on a luggage - as this could provide valuable information about a person. Overthinking is helpful for a private investigator's job.

    • The Importance of Secrecy in Intelligence OperationsIntelligence operatives must always prioritize secrecy in order to avoid compromising their identity and hampering their ability to conduct covert activities.

      An intelligence operative's picture being taken is the worst thing and can prevent them from conducting covert activities. Michel, an operative, needed to get home because he believed his face could end up being on TV or in a publication tomorrow. This would put his covert activities in jeopardy. So, he was trying to get a flight to Israel. The person driving him understands this and takes him to a hotel with a big glass lobby where he can be far away, removed from the street, that nobody would see him. This incident shows how careful intelligence operatives need to be to protect their identity to carry out their activities undetected.

    • Black Cube's Connection to Former Israeli Intelligence Official Exposed by JournalistsThe investigation and subsequent exposure of Aharon Almog-Assoulin's involvement with Black Cube highlights the importance of investigative journalism in uncovering information that might otherwise remain hidden, and underscores the importance of journalistic freedom and independence in countries around the world.

      Raphael Satter, a reporter at Associated Press, investigated Michel after receiving information from Igor, who had also sent the same information to Ronan Farrow. Farrow and Satter shared media, which revealed that Michel worked for Black Cube. Upon publication of the story, people in Michel's home country recognized him and he was identified as Aharon Almog-Assoulin, a former Israeli intelligence official. Black Cube asked Igor to take a polygraph test and questioned him if he was paid by the journalists. This incident showed that the American system of journalism is not the same as in other countries and how uninformed some officials can be.

    • A Journalist's Experience with a Secret JobWhen compartmentalizing work that involves sensitive information, it's important to communicate boundaries and protect oneself from being used as a scapegoat. Despite the stress, opportunities to witness powerful figures in action can leave a lasting impression.

      The speaker compartmentalizes his work, as he is not given advance notice of a job. He was offended when they asked him if journalists paid him. He found it absurd as he had no information worth buying. He also warned his employer that they might use him as a fall guy and tell journalists he broke the law. He felt disappointed when the journalist who interviewed him delayed introducing him to the subjects of his story. The job was a stressful and intense experience that forged lasting memories. The speaker was in awe of the parties involved and expressed his admiration for them.

    • Being spied on by Black Cube gave John a taste of what it's like to be a victim of spyware.John's experience underscores the profound violation of privacy that comes with being targeted by a powerful entity, and the uncertainty and fear that comes with not knowing if someone is watching your every move.

      The experience of being spied on by Black Cube gave John a sense of what it feels like to be a victim of spyware. It was a profound experience for him to meet Igor, one of the people behind the operation, and to learn that Igor had turned whistleblower because he realized that what he was doing was bad. The fact that lawyers representing victims of NSO Group were also targeted by the same operation raises the question of who spent so much money to discredit them. Despite the lack of hard evidence that links the operation with NSO Group, it is a strong theory. John's experience highlights the terrible feeling of being targeted by a well-resourced entity and not knowing whether someone is following you.

    Was this summary helpful?

    Recent Episodes from Darknet Diaries

    150: mobman 2

    150: mobman 2
    Re-examining Episode 20 of Darknet Diaries, exploring doubts about Greg aka 'mobman' claiming to create sub7 malware.
    Darknet Diaries
    en-usOctober 01, 2024

    148: Dubsnatch

    148: Dubsnatch
    Story of daring teens pursuing unreleased dubstep music, revealing their audacious tactics to sneak a peek before others.
    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado
    In this podcast, Geoff White discusses the digital heist of Axie Infinity and Tornado Cash, revealing how cryptocurrencies were manipulated for money laundering, details from his book 'Rinsed'.
    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Three Men in a Boat navigating British Journalism

    Three Men in a Boat navigating British Journalism

    Our podcast with The Three Old Hacks, aka former BBC Sports News editor Mihir Bose, Economics editor of the Sunday Times David Smith, and political analyst Nigel Dudley, has been described as ‘the modern equivalent of Jerome K Jerome’s book Three Men in a Boat‘ by broadcaster and journalist Lucy Beresford.

    Like George, Harris and Jerome they are old friends who consider themselves overworked and in need of a holiday (always). Like the River Thames, they have a tendency to meander. Theirs is not so much a travel guide as a commentary on the state of British journalism based on their experiences over the past 40 years, delivered with warmth and humour and that slight edge of competitiveness that journalists never lose.

    This week it is the rich hinterland of Nigel’s knowledge which they rely on to discuss the situation in Israel, as he has spent many years reporting from the Middle East. They disagree on whether the BBC was right not to label Hamas as ‘terrorists’ and lament the vogue for ‘showbiz personality’ foreign reporting, while praising some of the outstanding reporting from those on the ground in Gaza.

    Listen to the podcast on all the usual podcast platforms or on The Chiswick Calendar website. https://chiswickcalendar.co.uk/episode-37-three-men-in-a-boat-navigating-british-journalism/

    Get in contact with the podcast by emailing threeoldhacks@outlook.com, we’d love to hear from you!

    Privacy Is Power

    Privacy Is Power
    Part of the Colloquium on AI Ethics series presented by the Institute of Ethics in AI. This event is also part of the Humanities Cultural Programme, one of the founding stones for the future Stephen A. Schwarzman Centre for the Humanities. In conversation with author, Dr Carissa Veliz (Associate Professor Faculty of Philosophy, Institute for Ethics in AI, Tutorial Fellow at Hertford College University of Oxford). The author will be accompanied by Sir Michael Tugendhat and Dr Stephanie Hare in a conversation about privacy, power, and democracy, and the event will be chaired by Professor John Tasioulas (inaugural Director for the Institute for Ethics and AI, and Professor of Ethics and Legal Philosophy, Faculty of Philosophy, University of Oxford). Summary Privacy Is Power argues that people should protect their privacy because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data will have the power. Privacy is not a personal preference; it is a political concern. Personal data is a toxic asset, and should be regulated as if it were a toxic substance, similar to asbestos. The trade in personal data has to end. As surveillance creeps into every corner of our lives, Carissa Véliz exposes how our personal data is giving too much power to big tech and governments, why that matters, and what we can do about it. Have you ever been denied insurance, a loan, or a job? Have you had your credit card number stolen? Do you have to wait too long when you call customer service? Have you paid more for a product than one of your friends? Have you been harassed online? Have you noticed politics becoming more divisive in your country? You might have the data economy to thank for all that and more. The moment you check your phone in the morning you are giving away your data. Before you've even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. Our phones, our TVs, even our washing machines are spies in our own homes. Without your permission, or even your awareness, tech companies are harvesting your location, your likes, your habits, your relationships, your fears, your medical issues, and sharing it amongst themselves, as well as with governments and a multitude of data vultures. They're not just selling your data. They're selling the power to influence you and decide for you. Even when you've explicitly asked them not to. And it's not just you. It's all your contacts too, all your fellow citizens. Privacy is as collective as it is personal. Digital technology is stealing our personal data and with it our power to make free choices. To reclaim that power, and our democracy, we must take back control of our personal data. Surveillance is undermining equality. We are being treated differently on the basis of our data. What can we do? The stakes are high. We need to understand the power of data better. We need to start protecting our privacy. And we need regulation. We need to pressure our representatives. It is time to pull the plug on the surveillance economy. To purchase a copy of ‘Privacy is Power’, please click https://www.amazon.co.uk/Privacy-Power-Should-Take-Control/dp/1787634043 Biographies: Dr Carissa Véliz is an Associate Professor at the Faculty of Philosophy and the Institute for Ethics in AI, and a Tutorial Fellow in Philosophy at Hertford College. Carissa completed her DPhil in Philosophy at the University of Oxford. She was then a Research Fellow at the Uehiro Centre for Practical Ethics and the Wellcome Centre for Ethics and Humanities at the University of Oxford. To find out more about Carissa’s work, visit her website: www.carissaveliz.com Sir Michael Tugendhat was a Judge of the High Court of England and Wales from 2003 to 2014 after being a barrister from 1970. From 2010 to 2014 he was the Judge in charge of the Queen’s Bench Division media and civil lists. He was Honorary Professor of Law at the University of Leicester (2013-16) and is a trustee of JUSTICE. His publications include Liberty Intact: Human Rights in English Law: Human Rights in English Law (Oxford University Press 2017) and Fighting for Freedom? (Bright Blue 2017), The Law of Privacy and Media (Oxford University Press 1st edn 2002). Dr Stephanie Hare is an independent researcher and broadcaster focused on technology, politics and history. Previously she worked as a Principal Director at Accenture Research, a strategist at Palantir, a Senior Analyst at Oxford Analytica, the Alistair Horne Visiting Fellow at St Antony's College, Oxford, and a consultant at Accenture. She holds a PhD and MSc from the London School of Economics and a BA in Liberal Arts and Sciences (French) from the University of Illinois at Urbana-Champaign. Her work can be found at harebrain.co Professor John Tasioulas is the inaugural Director for the Institute for Ethics and AI, and Professor of Ethics and Legal Philosophy, Faculty of Philosophy, University of Oxford. Professor Tasioulas was at The Dickson Poon School of Law, Kings College London, from 2014, as the inaugural Chair of Politics, Philosophy & Law and Director of the Yeoh Tiong Lay Centre for Politics, Philosophy & Law. He has degrees in Law and Philosophy from the University of Melbourne, and a D.Phil in Philosophy from the University of Oxford, where he studied as a Rhodes Scholar. He was previously a Lecturer in Jurisprudence at the University of Glasgow, and Reader in Moral and Legal Philosophy at the University of Oxford, where he taught from 1998-2010. He has also acted as a consultant on human rights for the World Bank.

    OSINT Scraping with Python - Ryan Hays - PSW #656

    OSINT Scraping with Python - Ryan Hays - PSW #656

    With bug bounties becoming more and more main stream for organizations. The bounty hunters are turning to more and more automation. Open source intelligence gathering can be automated with the use of python and a handful of other opensource tools such as Recon-NG, Amass, and others.

     

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/PSWEpisode656

    Privacy Is Power

    Privacy Is Power
    Part of the Colloquium on AI Ethics series presented by the Institute of Ethics in AI. This event is also part of the Humanities Cultural Programme, one of the founding stones for the future Stephen A. Schwarzman Centre for the Humanities. In conversation with author, Dr Carissa Veliz (Associate Professor Faculty of Philosophy, Institute for Ethics in AI, Tutorial Fellow at Hertford College University of Oxford). The author will be accompanied by Sir Michael Tugendhat and Dr Stephanie Hare in a conversation about privacy, power, and democracy, and the event will be chaired by Professor John Tasioulas (inaugural Director for the Institute for Ethics and AI, and Professor of Ethics and Legal Philosophy, Faculty of Philosophy, University of Oxford). Summary Privacy Is Power argues that people should protect their privacy because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data will have the power. Privacy is not a personal preference; it is a political concern. Personal data is a toxic asset, and should be regulated as if it were a toxic substance, similar to asbestos. The trade in personal data has to end. As surveillance creeps into every corner of our lives, Carissa Véliz exposes how our personal data is giving too much power to big tech and governments, why that matters, and what we can do about it. Have you ever been denied insurance, a loan, or a job? Have you had your credit card number stolen? Do you have to wait too long when you call customer service? Have you paid more for a product than one of your friends? Have you been harassed online? Have you noticed politics becoming more divisive in your country? You might have the data economy to thank for all that and more. The moment you check your phone in the morning you are giving away your data. Before you've even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. Our phones, our TVs, even our washing machines are spies in our own homes. Without your permission, or even your awareness, tech companies are harvesting your location, your likes, your habits, your relationships, your fears, your medical issues, and sharing it amongst themselves, as well as with governments and a multitude of data vultures. They're not just selling your data. They're selling the power to influence you and decide for you. Even when you've explicitly asked them not to. And it's not just you. It's all your contacts too, all your fellow citizens. Privacy is as collective as it is personal. Digital technology is stealing our personal data and with it our power to make free choices. To reclaim that power, and our democracy, we must take back control of our personal data. Surveillance is undermining equality. We are being treated differently on the basis of our data. What can we do? The stakes are high. We need to understand the power of data better. We need to start protecting our privacy. And we need regulation. We need to pressure our representatives. It is time to pull the plug on the surveillance economy. To purchase a copy of ‘Privacy is Power’, please click https://www.amazon.co.uk/Privacy-Power-Should-Take-Control/dp/1787634043 Biographies: Dr Carissa Véliz is an Associate Professor at the Faculty of Philosophy and the Institute for Ethics in AI, and a Tutorial Fellow in Philosophy at Hertford College. Carissa completed her DPhil in Philosophy at the University of Oxford. She was then a Research Fellow at the Uehiro Centre for Practical Ethics and the Wellcome Centre for Ethics and Humanities at the University of Oxford. To find out more about Carissa’s work, visit her website: www.carissaveliz.com Sir Michael Tugendhat was a Judge of the High Court of England and Wales from 2003 to 2014 after being a barrister from 1970. From 2010 to 2014 he was the Judge in charge of the Queen’s Bench Division media and civil lists. He was Honorary Professor of Law at the University of Leicester (2013-16) and is a trustee of JUSTICE. His publications include Liberty Intact: Human Rights in English Law: Human Rights in English Law (Oxford University Press 2017) and Fighting for Freedom? (Bright Blue 2017), The Law of Privacy and Media (Oxford University Press 1st edn 2002). Dr Stephanie Hare is an independent researcher and broadcaster focused on technology, politics and history. Previously she worked as a Principal Director at Accenture Research, a strategist at Palantir, a Senior Analyst at Oxford Analytica, the Alistair Horne Visiting Fellow at St Antony's College, Oxford, and a consultant at Accenture. She holds a PhD and MSc from the London School of Economics and a BA in Liberal Arts and Sciences (French) from the University of Illinois at Urbana-Champaign. Her work can be found at harebrain.co Professor John Tasioulas is the inaugural Director for the Institute for Ethics and AI, and Professor of Ethics and Legal Philosophy, Faculty of Philosophy, University of Oxford. Professor Tasioulas was at The Dickson Poon School of Law, Kings College London, from 2014, as the inaugural Chair of Politics, Philosophy & Law and Director of the Yeoh Tiong Lay Centre for Politics, Philosophy & Law. He has degrees in Law and Philosophy from the University of Melbourne, and a D.Phil in Philosophy from the University of Oxford, where he studied as a Rhodes Scholar. He was previously a Lecturer in Jurisprudence at the University of Glasgow, and Reader in Moral and Legal Philosophy at the University of Oxford, where he taught from 1998-2010. He has also acted as a consultant on human rights for the World Bank.
    Logo

    © 2024 Podcastworld. All rights reserved

    Company

    Pricing

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io