Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Introducing the CSET Emerging Technology Observatory: CSET Seminar Today, Monday, December 5th @4 pm EST

    The next online session of the CSET Security and Emerging Technology Seminar Series will be held on Monday, December 5th at 4 PM EST.  OODA Network Member Dr. Melissa Flagg will be participating in the virtual event: CSET’s newly launched Emerging Technology Observatory (ETO) offers data and insight on critical emerging technology issues. Building on…

  • Department of Defense Establishes Office of Strategic Capital

    On December 1st, Secretary of Defense Lloyd J. Austin III established the Office of Strategic Capital (OSC), a Department of Defense organization that will help build an enduring technological advantage by partnering with private capital providers. OSC will connect companies developing critical technologies vital to national security with capital. Critical technologies such as advanced materials,…

  • The [Military] Accelerationism Research Consortium

    In an effort to continue “pulling the string” on the recent OODA Network Member Meeting discussion of domestic political extremism and violence with Brian Jenkins, we took a look at the research product of and community of practice represented by the Accelerationism Research Consortium (ARC).

  • DHS National Terrorism Advisory System Bulletin: Summary of Terrorism Threat to the United States (November 2022- March 2023)

    The United States remains in a heightened threat environment. Lone offenders and small groups motivated by a range of ideological beliefs and/or personal grievances continue to pose a persistent and lethal threat to the Homeland. In the coming months, threat actors could exploit several upcoming events to justify or commit acts of violence, including certifications…

  • What’s 2023 Cybersecurity Look Like? Trust.

    The volume of cyber-related information is daunting to say the least. A “cyber professional” can encompass a multitude of functions and disciplines ranging in technicality.  Skills include but are not limited to network security, network architecture, application security, data loss prevention, forensics, vulnerability management, incident response, security auditor, encryption, and threat intelligence, to name a…

  • An OODA Network Q&A Session on Domestic Political Extremism and Violence with OODA Network Member Brian Jenkins

    The November OODA Network Member Monthly Call was held on Friday, November 18th.  The call was dedicated to opening remarks by OODA Network Member Brian Jenkins and a Q and A session with OODA Network Members on the topic of domestic political extremism, his most recent research on the topic, and lessons learned from Jenkins’…

  • GPT-3, Neural Language Models and The Risks of Radicalization

    In a report released in 2020 and made possible by the OpenAI API Academic Access Program, The Middlebury Institute of International Studies – Center on Terrorism, Extremism, and Counterterrorism (CTEC) evaluated the revolutionary improvements of GPT-3 for the risk of weaponization by extremists who may attempt to use GPT-3 or hypothetical unregulated models to amplify…

  • Brian Jenkins on Domestic Political Extremism at the November 2022 OODA Network Member Meeting

    OODA hosts a monthly video call to help members optimize opportunities and reduce risk to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • Top 10 Security, Technology, and Business Books of 2022

    Welcome to the 2022 edition of my top 10 books of the year list. This year, I’ve decided to split the fiction books into an additional category and given you two bonus books for your consideration written by close friends of mine.  With the launch of the Hack Factory this year, I’ve been very focused…

  • The Second Global Ransomware Meeting Much of the Same Thing

    The United States hosted a group of 37 nations and 13 global companies to discuss the problem of ransomware, as well as other cybercrime.  The meeting was a follow up to last year’s Counter-Ransomware Initiative (CRI), an informal gathering where nations reaffirmed their commitment to collaborating on the escalation of ransomware operations and voice common…


OODAcasts

OODAcons