Recently, Microsoft and CrowdStrike are collaborating in order to streamline the naming conventions of state and nonstate cyber activity in an effort to clarify current inconsistencies across the cybersecurity industry’s attribution taxonomies. As anyone involved in cybersecurity knows, vendor reporting of hostile campaigns can be confusing as companies use unique identifiers to classify campaigns to differentiate the orchestrators…
At the 2025 SCSP AI Expo, Extropic CEO Guillaume Verdon provided details and updates that build on his presentation from OODAcon 2024 back in November. Verdon continues to provide real-world updates on the traction of his startup operation while broadly evangelizing a vision of the future of thermodynamic computing, which promises orders-of-magnitude improvements in energy…
Generative AI is transforming robotics from code-heavy systems into intuitive tools, enabling non-experts to program complex tasks and unlocking massive gains in automation, productivity, and adaptability.
Former Google CEO and Chairman Eric Schmidt is the Chair of the Special Competitive Studies Project (SCSP), which hosted its annual AI Expo and Ash Carter Exchange last week. Speaking at the event, Schmidt warned that AI is transforming not just knowledge creation, but the very workflows that underpin national power, enterprise innovation, and personal…
Recently, Russia signed a joint “International Cooperation in the Field of Information Security” agreement with several authoritarian governments to include but not limited to Belarus, Cuba, Iran, North Korea, and Venezuela. The agreement asserts that the motivation behind this agreement is to sustain “transparent and equitable system of international information security based on the principles…
The Center for Strategic and International Studies (CSIS) Commission on U.S. Quantum Leadership warns that without immediate, large-scale federal investment and policy support, the United States risks falling behind in the race for quantum supremacy, particularly against China. Why This Matters …China’s state-backed surge in funding and infrastructure threatens to outpace American efforts. Quantum technologies—from…
Ukraine has become the proving ground, and increasingly the foundry, for the future of security-related technologies. We need that learning, and we need it more quickly and at greater scale.
In 1932, Rear Admiral Harry E. Yarnell led a naval exercise that should have changed history. Commanding aircraft carriers USS Lexington and USS Saratoga, Yarnell’s planes successfully executed a simulated attack on Pearl Harbor, dropping flour sacks to represent bombs. Despite this clear demonstration of vulnerability, military leadership disqualified the results, deeming them unrealistic. Nine…
Many OODA Network Members also participate in the community of practice created by the Special Competitive Studies Project (SCSP), which convenes this week in Washington, D.C., for the SCSP AI Expo and Ash Carter Exchange 2025. This post is a compilation of OODA Loop research, which includes references to SCSP research, researchers, and events, as…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.