

The Great Tech Game Podcast: Geopolitics, Technology, Business and Global Affairs, with Anirudh Suri
Anirudh Suri
Interested in geopolitics, technology, business, entrepreneurship and global affairs?
The Great Tech Game Podcast is the perfect podcast for you. Host Anirudh Suri, a tech venture capitalist, policy advisor, and bestselling author of The Great Tech Game, brings you smart, insightful conversations at the intersection of tech and geopolitics.
Listen to the carefully curated line up of the world's best thinkers on these themes. They will help you see the big picture, and in the process, understand how to get ahead in a world thats constantly being upended by technology and geopolitics.
The Great Tech Game Podcast is the perfect podcast for you. Host Anirudh Suri, a tech venture capitalist, policy advisor, and bestselling author of The Great Tech Game, brings you smart, insightful conversations at the intersection of tech and geopolitics.
Listen to the carefully curated line up of the world's best thinkers on these themes. They will help you see the big picture, and in the process, understand how to get ahead in a world thats constantly being upended by technology and geopolitics.
Episodes
Mentioned books

Jun 13, 2025 • 5min
How North Korean Hackers Pulled Off a $1B Bank Heist | Ft. Geoff White, host of BBC Podcast. (Clip 1 - Ep 33)
In this video, Geoff White, host of BBC Podcast 'Lazarus Heist', dives into the shocking story of the Lazarus Heist — one of the most infamous cybercrime operations in the world. North Korea’s state-backed hackers have allegedly stolen billions of dollars through highly sophisticated attacks on banks, cryptocurrency firms, gaming platforms, and financial institutions worldwide.From the infamous 2016 Bangladesh Bank hack, where hackers attempted to steal $1 billion and successfully got away with $80 million, to the Cosmos Cooperative Bank ATM heist in India, which led to a $12 million loss, these operations reveal just how advanced and calculated North Korea’s cyber strategies are.The conversation also explores how the Lazarus Group shifted focus toward cryptocurrency and gaming platforms, leading to one of the biggest hacks in history — the Axie Infinity breach in 2022, where $625 million was stolen through blockchain vulnerabilities. With the rise of digital finance, crypto exchanges and gaming ecosystems have become prime targets for global cybercriminals.We also discuss how these hackers launder stolen money through underground networks, shell companies, and poorly regulated sectors, making their financial trails nearly impossible to track. This video unpacks the motives, methods, and global impact of North Korea’s state-sponsored cybercrime machine.If you’re interested in cybersecurity, cryptocurrency, or digital warfare, this is a must-watch.Watch Full Episode: https://youtu.be/66u1zeJVKLI

Jun 11, 2025 • 60min
Ep. 33 - The Dark Web Uncovered: Who are the World's Deadliest Cyber Criminals? Ft. Geoff White, Author of Rinsed and Host of the Hit BBC Podcast, Lazarus Heist
Join us in this episode of The Great Tech Game Podcast as we delve into the murky world of cybercrime with investigative journalist and author, Geoff White. We discuss why few states succeed in building effective military cyber forces, the evolution of ransomware into a national security crisis, and the actors behind major cybercrime networks. Geoff maps out where these networks function geographically and in cyberspace, and identifies both state and non-state cyber actors, including Russia's ransomware economy, North Korea's Lazarus group, and fraud networks in Southeast Asia and West Africa. We also explore how technology has revolutionized money laundering for the world's deadliest crooks, as seen in Geoff latest book, 'Rinsed,' and touch on key geopolitical impacts, defense strategies, and the intersection of gaming and cybercrime.Key Chapters00:00 Introduction and Recap of Previous Episode02:28: Introducing Today's Guest: Geoff White03:51 The Evolution of Cyber Espionage Post-Snowden Leaks07:45 Mapping the Global Cyber Landscape11:35 Non-State Cyber Actors: A Closer Look17:18 The Infamous Lazarus Group and North Korean Cyber Operations20:08 The Rise of Cryptocurrency in Cybercrime23:44 The Black Axe Group: A Global Threat29:24 Money Laundering in the Digital Age32:20 The Din sisters Double Life33:28 Bitcoin as a Money Laundering Tool34:06 The Arrest and Aftermath35:23 Gaming and Cybercrime37:43 How Cybercriminals Get Caught41:10 Crypto Tech Firms Under Scrutiny52:10 Global Responses to Crypto Crime55:21 Geopolitics and Crypto58:07 Conclusion and RecommendationsBook Links:by Geoff White:Rinsed: From Cartels to Crypto: : https://amzn.in/d/48PaZjNThe Lazarus Heist: https://amzn.in/d/f0xbAofBy Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: http://www.anirudhsuri.com/Book and Podcast: http://www.greattechgame.com/

Jun 4, 2025 • 4min
Inside the Cyber Battlefield: States and Non-State Actors | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 6)
In this clip, Max Smeets unpacks the global ransomware threat landscape—mapping out where the major cybercriminal groups operate from, who they target, and how geopolitics plays into it all.While Russia remains the epicenter of many ransomware operations, these groups often have multinational member bases across Belarus, Ukraine, and beyond, operating with a tacit agreement not to target Russian allies.We also explore how English-speaking countries like the U.S. are primary targets, not only for ideological reasons, but also because of language familiarity and financial payoff.This conversation dives into groups like Conti, the fragmentation of ransomware gangs, and the shift in targets toward Latin America, as attackers evolve both strategically and politically.If you’re curious about cybercrime, digital geopolitics, or how language shapes attack strategies, this is a must-watch.Watch Full Episode: https://youtu.be/XXSIa5-exTI

Jun 3, 2025 • 6min
How Governments Hunt Ransomware Gangs | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 5)
In this clip, Max Smeets explores how governments—despite lacking the power of agencies like the FBI or NSA—are still finding smart, effective ways to push back against ransomware attacks.Whether it’s disrupting the cybercriminal ecosystem, targeting crypto wallets, or damaging the reputations of ransomware gangs, governments are learning to fight smarter, not just harder.This conversation dives deep into how international cooperation, public pressure, and infrastructure disruption are becoming powerful tools in this digital arms race.If you're interested in cybersecurity, ransomware policy, or global digital threats, this clip will give you fresh insights into what’s really happening behind the scenes.Watch Full Episode: https://youtu.be/XXSIa5-exTI

Jun 2, 2025 • 6min
What Actually Happens in a Ransomware Attack? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 4)
In this clip, Max Smeets walks us through a real-world example of how a ransomware attack unfolds — from the initial phishing email to the final ransom negotiations.It usually starts with a simple hook, like a fake Amazon gift card email, designed to get someone inside the organization to click. Once inside, attackers move laterally, using everyday tools already in the system — a tactic known as living off the land. Their goal is to reach critical systems and backups, staying hidden as long as possible.Eventually, they reveal themselves with a ransom note — not just demanding money, but proposing a business-like conversation. Discounts, cryptocurrency preferences, and even “customer service” come into play. But behind the scenes, it’s rarely the victim negotiating directly. Professional ransomware negotiators often step in, and in many cases, they’ve dealt with the attackers before.This clip offers a rare look at the detailed anatomy of a ransomware operation.Watch Full Episode: https://youtu.be/XXSIa5-exTI

Jun 1, 2025 • 4min
What Is the PETIO Framework in Cyber Strategy? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 3)
In this clip, Max Smeets explains his PETIO framework — a practical model for how countries can build effective cyber capabilities.PETIO stands for People, Exploits, Tools, Infrastructure, and Organization, but as the guest emphasizes, it all starts with People — recruiting, training, and retaining the right talent, both technical and non-technical.Surprisingly, the most discussed element, exploits, might actually be the least essential. As NSA’s Rob Joyce once said, success in cyber operations often comes not from flashy zero-days, but from knowing your adversary’s network better than they do.This clip is a must-watch for anyone curious about how cyber power is really built behind the scenes.Watch Full Episode: https://youtu.be/XXSIa5-exTI

May 31, 2025 • 3min
Who Are the Hacktivist Groups Attacking Governments? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 2)
In this clip, Max Smeets explores two lesser-known but highly significant players in the cyber domain — Cyber Partisans and Predatory Sparrow — who are reshaping the boundaries of cyber conflict beyond traditional nation-states.Cyber Partisans is a Belarusian resistance group that has conducted multiple disruptive cyberattacks against the Belarusian government. Their operations have included halting railway networks, exposing passport scans of top officials including President Lukashenko, and leaking sensitive personal details of officers. Remarkably, the group is attempting to build a responsible framework around its actions, deciding what to target, whom to notify, and where not to operate — setting a precedent for organized digital resistance.Predatory Sparrow, on the other hand, is an elusive actor claiming to be hacktivist-led, though signs suggest a likely connection to a state actor. They are known for highly sophisticated attacks on Iranian infrastructure, including a steel mill and energy facilities. In a rare move, they notified emergency services before launching attacks to minimize civilian harm, raising deep questions about ethics, attribution, and the rules of engagement in cyber operations.In both cases, these groups deserve more analytical attention for how they blur the lines between activism, cyberwarfare, and covert state action in a rapidly evolving digital battlefield.Watch Full Episode: https://youtu.be/XXSIa5-exTI

May 30, 2025 • 6min
What Sets US and Chinese Cyber Commands Apart? | ft. Max Smeets, Cyber Expert. (Ep 32 - Clip 1)
In this clip, Max Smeets unpacks the contrasting cyber strategies of two global superpowers: the United States and China. The U.S. operates with a centralized and aggressive approach, led by U.S. Cyber Command and the NSA. Through a strategy known as persistent engagement, it actively disrupts adversaries, even across foreign networks, demonstrating a global mindset in cyber operations. Historical cases like Stuxnet reveal the extent to which the U.S. has been willing to conduct destructive and disruptive cyber activities.China, on the other hand, adopts a more decentralized and evolving model, involving a wide range of actors from PLA-affiliated units to universities and independent hacker groups. Much of China’s known activity revolves around IP theft and espionage, with increasing emphasis on Operational Preparation of the Environment (OPE) — quietly infiltrating systems and holding them at risk for potential future attacks.This conversation explores not only their strategic differences but also the structural contrasts between a tightly coordinated U.S. system and China’s more complex, layered cyber ecosystem. It also looks ahead to how both countries may continue to evolve, especially as China moves toward more centralized coordination of its cyber capabilities.Watch Full Episode: https://youtu.be/XXSIa5-exTI

May 29, 2025 • 1h 34min
Ep. 32 - Ransom Wars: Are States Losing Control of Cyberspace? ft. Cyber Expert Max Smeets
In the latest episode of The Great Tech Game podcast, cyber conflict expert Max Smeets—senior researcher at ETH Zurich and co-director of Virtual Routes—draws on his books “No Shortcuts” and “Ransom War” to explore why most states struggle to build effective cyber forces and how ransomware has become a major national security threat. He breaks down the contrasting cyber strategies of the US, China, and Russia, the rise of professionalized ransomware groups like Conti, and what it takes for governments to build capable cyber commands. A must-watch for anyone seeking to understand the evolving frontlines of cyber conflict.Chapters00:00 Trailer03:37 Introduction to the Great Tech Game Podcast03:51 Meet Max Smeets: Cybersecurity Expert06:04 Max's Journey from Finance to Cyber Warfare08:22 Discussing No Shortcuts: Challenges in Cyber Command17:11 Global Cyber Strategies: US vs China27:09 Building Cyber Capacity: The PETIO Framework46:38 Ransomware: A Growing National Security Threat52:03 Evolution of Ransomware53:30 The Rise of Conti55:03 Global Ransomware Landscape59:14 Ransomware Trust Paradox1:02:48 Conti Group and the MOB Framework1:09:45 Ransomware Attack Lifecycle1:19:36 Government Responses to Ransomware1:25:25 Comparing Ransomware to APTs and Terrorist Groups1:29:14 Book Recommendations and Final ThoughtsBook Links:By Max SmeetsNo Shortcuts: Why States Struggle to Develop a Military Cyber-Force:-https://a.co/d/03FfTolRansom War: How Cyber Crime Became a Threat to National Security:-https://a.co/d/2FuXaWSBy Anirudh Suri:The Great Tech Game by Anirudh Suri - https://amzn.eu/d/1Su38My Follow Anirudh here:X (formerly Twitter): https://x.com/anirudhsuriLinkedin: https://www.linkedin.com/in/anirudhsuri/Instagram: https://www.instagram.com/anirudh_suriFacebook: https://www.facebook.com/AnirudhSuri.inWebsite: http://www.anirudhsuri.com/Book and Podcast: http://www.greattechgame.com/#cyber #cybersecurity #cyberwarfare #ransomware #cybercrime #hackers #tech #geopolitics #thegreattechgame #thegreattechgamepodcast #tgtgpodcast #anirudhsuri #maxsmeets

May 19, 2025 • 6min
Short Clip- How China’s Tech Focus Threatens India's Security Ft. Lt Gen Shukla (Ep 31 - Clip 6)
In this powerful clip, Lt Gen Shukla breaks down how China’s military is deeply integrated with its tech and university ecosystems from AI and battery innovation to rocket science and shipbuilding. While India debates, China executes. He warns that unless India builds serious civil-military-tech fusion and prioritizes algorithmic innovation, we risk being outpaced in future wars—not just militarily, but technologically.