• AI, Cybersecurity, and the Future of Networking | ZeroTier CEO Andrew Gault Explains What’s Coming
    Dec 18 2025
    In this episode of Full Spectrum Frontiers, host Tanton interviews Andrew Gault, CEO of ZeroTier and a venture capitalist. They discuss Andrew's career journey, the differences between the startup ecosystems in the US and Europe, and what he looks for in tech startups. Andrew shares insights on the transformative impact of AI, the importance of leadership principles in building resilient teams, and offers advice for young founders. He also explains ZeroTier's innovative networking technology and its relevance in today's cybersecurity landscape, while outlining his vision for the future of the company and the tech industry.

    https://www.linkedin.com/in/andrewgault/

    https://www.zerotier.com/

    Show More Show Less
    1 hr and 4 mins
  • Storytelling as Strategy: Shaping Workforce Perception With Peter Murphy Lewis
    Dec 11 2025
    In this episode of Full Spectrum Frontiers, Peter Murphy Lewis discusses the importance of storytelling as a strategic asset in national security and various industries. He shares his journey from creating documentaries to addressing workforce shortages and changing perceptions about trades and manufacturing. Through authentic storytelling, he emphasizes the need to humanize workers and build trust in industries often misunderstood. The conversation highlights transformative moments in documentary filmmaking and the power of narratives in shaping public opinion and attracting young talent to essential jobs.

    https://www.linkedin.com/in/petermurphylewis/


    Show More Show Less
    48 mins
  • Exploring Capitalism's Moral Foundations with Dr. C. Bradley Thompson
    Dec 4 2025
    In this conversation, Brad Thompson, the executive director of the Snow Institute for the Study of Capitalism, discusses the unique mission of the institute, which aims to recapture the moral high ground of capitalism. He addresses common critiques of capitalism, particularly regarding inequality and self-interest, and emphasizes the importance of moral education through programs like the Lyceum Scholars Program. The discussion also highlights the success stories of students from the program and introduces new initiatives aimed at promoting the study of the American Founding and engaging young people in discussions about capitalism.

    https://www.theredneckintellectual.com/

    https://www.clemson.edu/centers-institutes/capitalism/sisc/

    https://www.clemson.edu/centers-institutes/capitalism/lyceum/
    Show More Show Less
    1 hr and 1 min
  • The Silent Battlefield: How Small Town America Became the Front Line
    Nov 7 2025
    The conversation delves into the nature of cyber intrusions and the reality of cyber warfare, emphasizing that these threats are not random but targeted, and that the battlefield is local rather than distant. Resources:When the FBI says there have been around 200 intrusions targeting small water systems, they’re not talking about bored teenagers in basements. They’re referring to coordinated foreign state-affiliated cyber groups.Source:NBC News reporting on Littleton breachSource:https://www.nbcnews.com/news/us-news/littleton-mass-cyberattack-foreign-hack-water-systems-rcna163133CISA ICS Security Advisorieshttps://www.cisa.gov/topics/industrial-control-systems We have seen this tactic before. Russia pre-positioned inside Ukraine’s power grid years before the 2014 annexation of Crimea and long before the 2022 invasion. When they needed leverage, they didn’t have to build new cyber tools. They already had the access. They already understood the system. So when it came time to act, they shut off parts of Ukraine’s grid in the dead of winter. They weren’t experimenting. They were executing what had been prepared long in advance. Reference:Ukraine grid cyberattack analysis, US DHS ICS-CERThttps://www.cisa.gov/news-events/ics-case-studies/ukraine-power-grid-attackThe Department of Justice has already indicted Iranian-linked hackers who targeted U.S. critical infrastructure systems. That is a matter of public record. These charges detail explicit efforts to compromise municipal water facilities, energy companies, and public works operations. Source:U.S. DOJ press release on Iranian cyber activitieshttps://www.justice.gov/opa/pr/justice-department-announces-actions-disrupt-iranian-malicious-cyber-activitiesIf you want the receipts, read the EPA’s March 2024 letter and the enforcement alert. They basically say the quiet part out loud: basic cyber hygiene is missing in too many places to ignore. https://www.epa.gov/system/files/documents/2024-03/epa-apnsa-letter-to-governors_03182024.pdf and https://www.epa.gov/enforcement/enforcement-alert-drinking-water-systems-address-cybersecurity-vulnerabilities The attack surface is known, the weaknesses are common, and the fix list starts with boring discipline. https://www.cisa.gov/water and https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/water-and-wastewater-sector If a booster station’s telemetry is reachable, someone will eventually reach for it. Coverage from AP and sector write-ups laid out both the intrusion details and the legislative scramble that followed. https://apnews.com/article/1c475f5d2ef3b5d52410c93bdeab3aad and https://www.cpomagazine.com/cyber-security/iranian-hackers-breached-a-us-water-utility-via-an-israeli-made-scada-system/ Changes to treatment processes or loss of situational awareness can put public health at risk. https://www.gao.gov/assets/gao-24-106744.pdf Now the constructive part. If the weakness is local, the counterweight must also be local. Here is what that looks like in practice for a small utility that wants to punch above its weight.1. Tighten identity and access. Kill default passwords. Enforce unique accounts and role-based access. Remove vendor accounts that are not in active use. Turn on multifactor authentication for anything with a public IP. This sounds basic because it is. The EPA letter literally cites unchanged defaults as a root problem. https://www.epa.gov/system/files/documents/2024-03/epa-apnsa-letter-to-governors_03182024.pdf EPA2. Segment operational tech from business IT. If your billing workstation can talk directly to plant controls, you are one phishing email away from a very bad day. Even coarse network separation with strict allow lists is a leap forward for small teams. CISA’s “Cyber Risks and Resources for the Water Sector” provides starter guidance and a map to help choose controls that match staff capacity. https://www.cisa.gov/resources-tools/resources/cyber-risks-and-resources-management-water-and-wastewater-systems-sector CISA3. Know your assets. You cannot defend what you cannot see. Build and maintain a simple inventory of PLCs, HMIs, remote access appliances, and their firmware versions. The American Water Works Association keeps current guidance and assessment tools, including small systems resources. Use them. https://www.awwa.org/technical-reports/ and https://www.awwa.org/AWWA-Articles/is-your-utility-vulnerable-to-cyberattacks/ American Water Works Association+14. Practice manual failover. Aliquippa proved that people and clipboards still matter. Rehearse safe shutdown and manual operation of critical functions. That single habit converts a crisis into an inconvenience.5. Set a baseline and monitor. Even a low-cost logging setup that tracks unusual remote connections and sudden config changes will catch a large percentage of amateur intrusions and shorten the dwell time of ...
    Show More Show Less
    36 mins
  • 3I/ATLAS: When the Unknown Cruises Through Our Neighborhood
    Oct 31 2025
    In this episode of Full Spectrum Frontiers, Bennett explores the intriguing interstellar visitor 3I Atlas, discussing its unique characteristics, the scientific data gathered, and the public's reaction to its arrival. The conversation delves into the implications for planetary defense and national security, emphasizing the importance of agility and communication in the face of uncertainty. Ultimately, the episode serves as a reminder of the human experience with the unknown and the need to embrace curiosity and resilience.
    Show More Show Less
    34 mins
  • Shutdown Signals: When Politics Becomes a National Security Threat
    Oct 23 2025
    In this episode, Bennett Tanton discusses the far-reaching implications of government shutdowns on national security, operational readiness, and the defense industrial base. He emphasizes how bureaucratic dysfunction not only affects military capabilities but also alters global perceptions of American power. The conversation highlights the slow erosion of readiness and the potential long-term consequences of political gridlock, urging listeners to recognize the strategic costs associated with such shutdowns.
    Show More Show Less
    31 mins
  • The Element War: How Beijing’s Minerals Could Break America’s Tech
    Oct 17 2025
    In this episode of Full Spectrum Frontiers, Bennett Tanton explores the critical importance of rare earths and minerals in modern warfare and technology. He discusses the geopolitical implications of China's control over these resources, the U.S. response through stockpiling and rebuilding its industrial base, and the broader narrative of resilience and innovation in the face of global challenges. The conversation emphasizes the need for a shift in mindset towards long-term strategies for national security and independence.
    Show More Show Less
    29 mins
  • Ghost Fleet 2.0: The Future of Autonomous Warfare
    Oct 9 2025
    The next war won’t be fought by humans alone. In this episode of Full Spectrum Frontiers, host Bennett Tanton explores the dawn of autonomous warfare—where AI pilots outmaneuver human aces, unmanned submarines stalk the depths, and algorithms make battlefield decisions at machine speed. From DARPA’s ACE and OFFSET programs to the ethical crossroads of machine-led combat, Bennett unpacks how technology is redefining the warrior’s role, the chain of command, and even the meaning of courage. It’s not about who fires first—it’s about who stops being human last. Join Bennett as he takes you through the rise of the Machine Mind, the moral fog of the new kill chain, and the ghosts haunting the digital battlefield. 🎧 Listen, share, and review to help Full Spectrum Frontiers grow—and stay ahead of the curve in understanding the full spectrum of conflict and its impact on our world.
    Show More Show Less
    29 mins