The Great Tech Game Podcast: Geopolitics, Technology, Business and Global Affairs, with Anirudh Suri

Anirudh Suri
undefined
Aug 22, 2025 • 49min

Ep 36 - Tariff Roulette: How India Can Play Trump's Tariff Game | Ft. Jason Furman, Harvard Economist

n this episode of The Great Tech Game podcast, Professor Jason Furman -- the Aetna Professor of the Practice of Economic Policy at Harvard Kennedy School and former 28th Chairman of the Council of Economic Advisors under President Barack Obama -- offers a rare peek behind the curtain of President Trump's tariff strategy and their far-reaching impacts. We explore the surprising realities of who truly wins and loses in this global economic upheaval, both within the US and across the world, and why the aggregate picture might not be what you expect.Professor Furman critically examines India's unique and challenging position in this tariff landscape, facing a potentially "unfair" deal with a projected 50% tariff rate. Could this be India's pivotal "1991 moment" for significant domestic reforms? What strategic choices lie ahead for its booming economy?The discussion also delves into:• Why countries have largely opted for "personalistic" bilateral deals rather than forming a united front against US tariffs, and what this reveals about global negotiation dynamics.• The one country that has successfully pushed back against US tariffs, and the unique leverage that allowed it to do so.• The potential long-term shifts in global trade patterns and whether the "most favored nation" principle is truly a thing of the past.• The profound implications of AI for global productivity and the future of jobs. Will AI be a "massively positive" force, and how might its benefits be distributed across different nations?• The critical role of immigration in fuelling the US tech and AI industries, and why its future is a key concern.Professor Furman also provides candid rapid-fire answers on pressing questions like whether Trump's trade war protects American jobs (his answer may surprise you!) and who ultimately pays the price for high tariffs, and whether Trump will finally strike a deal with India eventually or not.Tune in to gain a deeper understanding of the forces shaping today's global economy and what lies ahead for nations caught in the "Tariff Roulette."Subscribe for more insightful discussions on geopolitics, technology, and economics!
undefined
Aug 4, 2025 • 1h 4min

Ep 35 - Space Wars: How Satellites Are The New Weapons | ft. John Klein, Space Strategist

In this episode of The Great Tech Game podcast, host Anirudh Suri sits down with Dr. John Klein—space strategist, military theorist, and author of Fight for the Final Frontier—as part of our Future of War and Tech series. This episode marks our first deep dive into the space domain.Dr. Klein explains why “space is not special, just wonderfully different,” urging a strategic and historical lens to understand the shifting nature of space power. The conversation explores how commercial firms—now responsible for over 90% of spacecraft in orbit—are transforming the global space landscape, and what that means for governments, warfighting, and deterrence.From anti-satellite tests and cyber attacks on satellite infrastructure to the critical role of geospatial intelligence in the Russia-Ukraine war, the episode highlights how space is already shaping today’s conflicts. Reflecting on maritime analogies, the risks of “mirror imaging,” and India’s evolving posture in this domain, this is a must-watch episode for anyone interested in space strategy and geopolitics.CHAPTERS00:00 Trailer04:06 Key Technological Advancements in Space in Recent Years10:56 Who Are the Key Nations in the Space Power Club?14:21 Key Private Space Entities and their Relationship with Governments31:36 How Commercial Companies are Governed by International Space Treaties36:38 Drone Warfare and GPS Jamming in the India-Pak Conflict40:15 Geospatial Intelligence and OSINT in Recent Conflicts50:31 India's Space Capabilities and Strategic Advice for Indian Startups57:20 How Should Countries Navigate Space Geopolitics?01:00:42 Book Recommendations and Final ThoughtsAbout Dr. John Klein:Dr. John J. Klein is a Senior Fellow and Strategist at Falcon Research, Inc., and Adjunct Professor at George Washington University’s Space Policy Institute and Georgetown University’s Strategic Studies Program. He frequently writes on space strategy, deterrence, and the Law of Armed Conflict. He is the author of the books Understanding Space Strategy: The Art of War in Space (2019), Space Warfare: Strategy, Principles and Policy (2006) and the recently released Fight for the Final Frontier: Irregular Warfare in Space (2023), along with a score of other book chapters and articles. He is a retired Commander of US Navy, where he served as a Naval Flight Officer from 22 years. He also supported combat operations in Iraq and Afghanistan. Links to Dr. Klein's books:Understanding Space Strategy: The Art of War in Space - https://www.amazon.in/Understanding-Space-Strategy-Power-Politics/dp/1138354627Space Warfare: Strategy, Principles and Policy - https://www.amazon.in/Space-Warfare-Strategy-Principles-Politics/dp/0415407966Fight for the Final Frontier: Irregular Warfare in Space - https://www.amazon.in/Fight-Final-Frontier-Irregular-Warfare/dp/155750735XHost of the Podcast, Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: [www.anirudhsuri.com](http://www.anirudhsuri.com/) Book and Podcast: [www.greattechgame.com](http://www.greattechgame.com/)🎥 Clip Credit 1:“2021 Russian Satellite Intercept” – Ansys Government Initiatives (AGI)Watch here: https://youtu.be/b52F9R9ByOY?si=vp1uc224HqiYJZE6🎥 Clip Credit 2:“Geostationary, Molniya, Tundra, Polar & Sun Synchronous Orbits Explained” – Scott ManleyWatch here: https://youtu.be/PZAkiXNJIqc?si=d7S8mNKstsYLbXEc🎬 Clip Credit 3:“Northrop Grumman’s MEV-1 docked with the Intelsat 901 satellite” – SciNewsWatch here: https://youtu.be/pHrxDGafnV4?si=q_MLCT9UDbhpI1iJ🎬 Clip Credit 4:“Low Earth orbit is littered with human-made space junk” – RAZOR Science ShowWatch here: https://youtu.be/QTXUbW77WZE?si=dZZr4NzR61DcrFFT
undefined
Jul 18, 2025 • 1h 43min

Ep 34 - Can AI Win Wars? Inside the US Military’s Project Maven | Lt. Gen. Jack Shanahan

In this week's episode, we sit down with Lieutenant General Jack Shanahan, the first director of the Pentagon’s Joint Artificial Intelligence Center (JAIC) and former head of Project Maven, to unpack how AI is transforming the battlefield.Project Maven (officially called the Algorithmic Warfare Cross Functional Team) is a project undertaken by the Pentagon starting in 2017, involving using machine learning and data from multiple sources with the aim of identifying potential targets, among other things. The Maven Smart System has been used, among other situations, in the Russia - Ukraine context by the US to help Ukrainian forces.Gen. Shanahan shares what it took to bring AI into the Department of Defense, from fighting bureaucratic inertia to handling mountains of battlefield data. We dive into the Pentagon’s collaboration—and tensions—with private tech firms, the high-stakes AI race between the US and China, and the lessons emerging from Ukraine. We also explore how AI could change cyber warfare forever—and what these shifts mean for the future of global power.If you’re curious about how technology is reshaping war, strategy, and geopolitics, this conversation is for you.Chapters:00:00 The Evolution of the Department of Defense00:52 The Rise of Silicon Valley and the Tech Boom01:33 Challenges in Integrating Tech with Defense02:48 Introduction to the Great Tech Game Podcast05:18 The Big Picture: Post-Cold War Shifts11:18 Project Maven: The AI Revolution in Defense21:33 Data Management Challenges in AI Projects27:32 Collaborating with Private Tech Firms36:08 Purpose and Challenges of AI in Defense36:55 Corporate Collaboration and Ethical Considerations37:52 Impact of Ukraine Conflict on AI Adoption38:22 Emergence of New Defense Primes39:17 Partnerships Between Big and Small Companies40:20 Transforming Government with Silicon Valley Talent44:24 Project Maven's Strategic Impact45:31 Algorithmic Warfare and Human-Machine Integration49:40 Global Use and Future of Project Maven54:58 US-China AI Military Competition01:03:41 China's AI Development and Civil-Military Fusion01:10:05 China's Manufacturing and Technology Growth01:10:48 Autonomous Systems and AI Integration01:11:07 China's Government and Tech Companies01:13:53 India's AI and Military Technology01:15:31 Challenges and Opportunities in India01:19:15 AI in Cyber Defense and Offense01:22:42 Private Tech Firms vs. Nation States01:31:08 Future of Industrial Policy and National Security01:36:08 Book and Podcast Recommendations#thegreattechgame #tgtgpodcast #anirudhsuri #jackshanahan #militarytechnology #projectmaven #dod #departmentofdefense #military #geopolitics #defenseinnovation #siliconvalley #uschina #indiaai #usmilitary #thegreattechgamepodcast
undefined
Jun 11, 2025 • 60min

Ep. 33 - The Dark Web Uncovered: Who are the World's Deadliest Cyber Criminals? Ft. Geoff White, Author of Rinsed and Host of the Hit BBC Podcast, Lazarus Heist

Join us in this episode of The Great Tech Game Podcast as we delve into the murky world of cybercrime with investigative journalist and author, Geoff White. We discuss why few states succeed in building effective military cyber forces, the evolution of ransomware into a national security crisis, and the actors behind major cybercrime networks. Geoff maps out where these networks function geographically and in cyberspace, and identifies both state and non-state cyber actors, including Russia's ransomware economy, North Korea's Lazarus group, and fraud networks in Southeast Asia and West Africa. We also explore how technology has revolutionized money laundering for the world's deadliest crooks, as seen in Geoff latest book, 'Rinsed,' and touch on key geopolitical impacts, defense strategies, and the intersection of gaming and cybercrime.Key Chapters00:00 Introduction and Recap of Previous Episode02:28: Introducing Today's Guest: Geoff White03:51 The Evolution of Cyber Espionage Post-Snowden Leaks07:45 Mapping the Global Cyber Landscape11:35 Non-State Cyber Actors: A Closer Look17:18 The Infamous Lazarus Group and North Korean Cyber Operations20:08 The Rise of Cryptocurrency in Cybercrime23:44 The Black Axe Group: A Global Threat29:24 Money Laundering in the Digital Age32:20 The Din sisters Double Life33:28 Bitcoin as a Money Laundering Tool34:06 The Arrest and Aftermath35:23 Gaming and Cybercrime37:43 How Cybercriminals Get Caught41:10 Crypto Tech Firms Under Scrutiny52:10 Global Responses to Crypto Crime55:21 Geopolitics and Crypto58:07 Conclusion and RecommendationsBook Links:by Geoff White:Rinsed: From Cartels to Crypto: : https://amzn.in/d/48PaZjNThe Lazarus Heist: https://amzn.in/d/f0xbAofBy Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: http://www.anirudhsuri.com/Book and Podcast: http://www.greattechgame.com/
undefined
Jun 4, 2025 • 4min

Inside the Cyber Battlefield: States and Non-State Actors | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 6)

In this clip, Max Smeets unpacks the global ransomware threat landscape—mapping out where the major cybercriminal groups operate from, who they target, and how geopolitics plays into it all.While Russia remains the epicenter of many ransomware operations, these groups often have multinational member bases across Belarus, Ukraine, and beyond, operating with a tacit agreement not to target Russian allies.We also explore how English-speaking countries like the U.S. are primary targets, not only for ideological reasons, but also because of language familiarity and financial payoff.This conversation dives into groups like Conti, the fragmentation of ransomware gangs, and the shift in targets toward Latin America, as attackers evolve both strategically and politically.If you’re curious about cybercrime, digital geopolitics, or how language shapes attack strategies, this is a must-watch.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
Jun 3, 2025 • 6min

How Governments Hunt Ransomware Gangs | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 5)

In this clip, Max Smeets explores how governments—despite lacking the power of agencies like the FBI or NSA—are still finding smart, effective ways to push back against ransomware attacks.Whether it’s disrupting the cybercriminal ecosystem, targeting crypto wallets, or damaging the reputations of ransomware gangs, governments are learning to fight smarter, not just harder.This conversation dives deep into how international cooperation, public pressure, and infrastructure disruption are becoming powerful tools in this digital arms race.If you're interested in cybersecurity, ransomware policy, or global digital threats, this clip will give you fresh insights into what’s really happening behind the scenes.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
Jun 2, 2025 • 6min

What Actually Happens in a Ransomware Attack? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 4)

In this clip, Max Smeets walks us through a real-world example of how a ransomware attack unfolds — from the initial phishing email to the final ransom negotiations.It usually starts with a simple hook, like a fake Amazon gift card email, designed to get someone inside the organization to click. Once inside, attackers move laterally, using everyday tools already in the system — a tactic known as living off the land. Their goal is to reach critical systems and backups, staying hidden as long as possible.Eventually, they reveal themselves with a ransom note — not just demanding money, but proposing a business-like conversation. Discounts, cryptocurrency preferences, and even “customer service” come into play. But behind the scenes, it’s rarely the victim negotiating directly. Professional ransomware negotiators often step in, and in many cases, they’ve dealt with the attackers before.This clip offers a rare look at the detailed anatomy of a ransomware operation.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
Jun 1, 2025 • 4min

What Is the PETIO Framework in Cyber Strategy? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 3)

In this clip, Max Smeets explains his PETIO framework — a practical model for how countries can build effective cyber capabilities.PETIO stands for People, Exploits, Tools, Infrastructure, and Organization, but as the guest emphasizes, it all starts with People — recruiting, training, and retaining the right talent, both technical and non-technical.Surprisingly, the most discussed element, exploits, might actually be the least essential. As NSA’s Rob Joyce once said, success in cyber operations often comes not from flashy zero-days, but from knowing your adversary’s network better than they do.This clip is a must-watch for anyone curious about how cyber power is really built behind the scenes.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
May 31, 2025 • 3min

Who Are the Hacktivist Groups Attacking Governments? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 2)

In this clip, Max Smeets explores two lesser-known but highly significant players in the cyber domain — Cyber Partisans and Predatory Sparrow — who are reshaping the boundaries of cyber conflict beyond traditional nation-states.Cyber Partisans is a Belarusian resistance group that has conducted multiple disruptive cyberattacks against the Belarusian government. Their operations have included halting railway networks, exposing passport scans of top officials including President Lukashenko, and leaking sensitive personal details of officers. Remarkably, the group is attempting to build a responsible framework around its actions, deciding what to target, whom to notify, and where not to operate — setting a precedent for organized digital resistance.Predatory Sparrow, on the other hand, is an elusive actor claiming to be hacktivist-led, though signs suggest a likely connection to a state actor. They are known for highly sophisticated attacks on Iranian infrastructure, including a steel mill and energy facilities. In a rare move, they notified emergency services before launching attacks to minimize civilian harm, raising deep questions about ethics, attribution, and the rules of engagement in cyber operations.In both cases, these groups deserve more analytical attention for how they blur the lines between activism, cyberwarfare, and covert state action in a rapidly evolving digital battlefield.Watch Full Episode: https://youtu.be/XXSIa5-exTI
undefined
May 30, 2025 • 6min

What Sets US and Chinese Cyber Commands Apart? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 1)

In this clip, Max Smeets unpacks the contrasting cyber strategies of two global superpowers: the United States and China. The U.S. operates with a centralized and aggressive approach, led by U.S. Cyber Command and the NSA. Through a strategy known as persistent engagement, it actively disrupts adversaries, even across foreign networks, demonstrating a global mindset in cyber operations. Historical cases like Stuxnet reveal the extent to which the U.S. has been willing to conduct destructive and disruptive cyber activities.China, on the other hand, adopts a more decentralized and evolving model, involving a wide range of actors from PLA-affiliated units to universities and independent hacker groups. Much of China’s known activity revolves around IP theft and espionage, with increasing emphasis on Operational Preparation of the Environment (OPE) — quietly infiltrating systems and holding them at risk for potential future attacks.This conversation explores not only their strategic differences but also the structural contrasts between a tightly coordinated U.S. system and China’s more complex, layered cyber ecosystem. It also looks ahead to how both countries may continue to evolve, especially as China moves toward more centralized coordination of its cyber capabilities.Watch Full Episode: https://youtu.be/XXSIa5-exTI

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app