LikeWar: The Weaponization of Social Media – An OODA Loop interview with P.W. Singer
An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.
Start your day with intelligence. Get The OODA Daily Pulse.
An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.
With every sector of the economy, every element of critical infrastructure and every component of government now dependent on IT and software, clearly software has eaten the world.
The United States is currently years behind its rivals in cyberspace, both conceptually and operationally.
Lessons learned from US agents who operate in enemy territory have been captured for years and transformed into a code of conduct popularly known as "Moscow Rules." Those old rules existed for a reason. Real-world ...
Federal Cyber Security professionals have long considered the “insider threat” as the most insidious, hardest to protect against threat vector. This has always been the toughest form of threat, even before computers were created. Now ...
"The Federal Bureau of Investigation's top cyber cop offered a grim appraisal of the nation's efforts to keep computer hackers from plundering corporate data networks: "We're not winning," he said. " (Source: U.S. Outgunned in Hacker ...