Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • New Open-Source Report Documents China’s Decades-long Success with Human Targeting Efforts

    According to a recent open-source report from Strider Technologies, “The People’s Republic of China (PRC) is employing a Talent Superpower Strategy designed to incentivize academics, researchers, and scientists to go abroad, deepen their expertise, and return to China to advance its strategic interests. What began in the 1980s as a program to send young talent…

  • Orbital Space Debris: Recent Events, Research and Policy

    Space debris has been a topic of conversation since a 2021 OODA Network member monthly conversation, when Leo Labs, a global, ground-based radar to track space junk business model was discussed in the context of the Russian anti-satellite [ASAT] test which broke up their Cosmos 1408 satellite, resulting in an in orbit, debris-generating event that put…

  • Severing Diplomatic Ties: A New Approach to Confronting State Cyber Aggression?

    There is little doubt that cyber attacks are used by both state and nonstate actors a medium to support their geopolitical views and positions during times of regional and global crisis.  The Ukraine conflict has underscored what has been going on for several years – actors resorting to offensive cyber operations to register their displeasure…

  • Speculative Design: U.S. Army Experimental CubeSats (Miniaturized Satellites)

    This case study is a lot more “experimental/operational” than previous posts in our ongoing Speculative Design series – with the full resources of the U.S. Army Space and Missile Defense Command (SMDC) “in the midst of evaluating the results of experimental satellite tech designed to directly warn soldiers on the ground when GPS signals have been…

  • What The National Academies Believe Regarding The Future of Encryption

    The National Academies of Sciences, Engineering and Medicine recently completed a study at the request of the Office of the Director of National Intelligence focused on Encryption and the future of encryption given advances in technology. The academies brought together experts for a detailed study aimed at identifying potential scenarios of critical interest.

  • “The Era of the Global Internet is Over” According to CFR Task Force Report

    Nate Fick, who was confirmed last week to lead the State Department’s Bureau of Cyberspace and Digital Policy, was also the co-chair (along with Jami Miscik of Global Strategic Insights) of the Council on Foreign Relations (CFR) Independent Task Force on Cybersecurity. In May, the CFR Task Force delivered their final report, “Confronting Reality in…

  • Nate Fick Confirmed to Lead State Department Bureau of Cyberspace and Digital Policy

    In April, The State Department launched a new cybersecurity bureau, designed to enhance digital diplomacy and online standards around the world. Last week, the Senate confirmed Nate Fick as the first person to lead the new Bureau as the first State Department Ambassador-at-Large for Cyberspace and Digital Policy. Fick is familiar to the OODA Loop…

  • Signals from Mainstream Information Outlets on Digital Self-Sovereignty, Digital Rights and Digital Identity

    We continue our research on  Digital Self-Sovereignty, Digital Rights, and Digital Identity, which is an area of research concerned with the security of personal data, transactional or otherwise, and the individual’s right to ownership of their personal data. In the last few months, a signal-to-noise ratio has emerged on this topic, where previously there was…

  • A Proactive National Technology Strategy in the Great Power Competition with China

    The co-authors of a recent article in Foreign Affairs, America Could Lose the Tech Contest With China, Eric Schmidt and Yll Bajraktari, are Chair and CEO of the Special Competitive Studies Project (SCSP), respectively. The SCSP “builds on the work of the National Security Commission on Artificial Intelligence (NSCAI), which ended its congressionally-mandated work in October…

  • The Stanford Internet Observatory and Covert Influence Operations

    With the technological infrastructure that physicists and astronomers have brought to bear for decades as its foundational metaphor, the Stanford Internet Observatory (SIO) was launched two years ago to create an equally as powerful social sciences-based “Observatory” for internet researchers. We analyze the SIO’s latest offering, in partnership with Graphika:  the August 24th release of…


OODAcasts

  • John Spencer on Connected Soldiers and the Future of Conflict
    ,

    John Spencer on Connected Soldiers and the Future of Conflict

    John Spencer is a writer, thinker, speaker scholar who currently serves as the Chair of Urban Warfare Studies at the US Military Academy. He brings the experience of a veteran who has led in combat to his work, and in his latest book, Connected Soldiers, also provides insights from his time as a stay at…

  • Duyane Norman on Disrupting the CIA to Deal with Emerging Threats
    ,

    Duyane Norman on Disrupting the CIA to Deal with Emerging Threats

    Duyane Norman spent nearly 30 years in the CIA with three Chief of Station and multiple other tours in a variety of interesting geographies and also had a focus on technology issues serving as Deputy Director of the Office of Technical Service within CIA’s Directorate of Science and Technology, and as a member of the…

  • First Federal CISO Greg Touhill on Advanced Cybersecurity by Design

    First Federal CISO Greg Touhill on Advanced Cybersecurity by Design

    Greg Touhill is one of the nation’s premier cybersecurity, information technology and risk management leaders. As an Air Force officer he led technology efforts in some of our nation’s most demanding organizations including combatant commands during time of war. He is an accomplished speaker and author and business executive and also served as our nation’s…

  • Former Tenable CEO Ron Gula Applies a Hacker Mindset to Investing, Public Awareness, and Philanthropy

    Former Tenable CEO Ron Gula Applies a Hacker Mindset to Investing, Public Awareness, and Philanthropy

    In this OODAcast, we interview Ron Gula, co-founder and CEO of the highly successful Tenable Security(NASDAQ:TENB) and currently President of Gula Tech Adventures. Ron has a long history in the cybersecurity field that includes starting his career as an NSA hacker and then transitioning into an entrepreneur responsible for multiple innovations in the market and…

  • Jim Lawler on the Art of Espionage and the Perfect Intelligence Operation
    ,

    Jim Lawler on the Art of Espionage and the Perfect Intelligence Operation

    In this OODAcast, we talk with Jim Lawler who is a Senior Partner at MDO Group, which provides HUMINT training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues. Mr. Lawler is a noted speaker on the Insider Threat in government and industry. Prior to this, Mr. Lawler…

  • Lifelong Hacker and Experienced Security Executive Alyssa Miller, Author of Cybersecurity Career Guide
    ,

    Lifelong Hacker and Experienced Security Executive Alyssa Miller, Author of Cybersecurity Career Guide

    Alyssa Miller is a life-long hacker and highly experienced security executive who has a passion for security and the security community. She is an excellent advocate for continuous improvement in the community and a frequent speaker to audiences of both fellow business leaders and security community audiences. This combined with her deep experience in the…

  • Dr. Scott Shumate Profiles Russian President Vladimir Putin

    Dr. Scott Shumate Profiles Russian President Vladimir Putin

    This OODAcast is a special edition focused on profiling Russian President Vladimir Putin with Dr. Scott Shumate, who has over 30 years of experience evaluating national leaders, terrorists, spies, and insiders.  Scott shares his unique perspective’s on Putin informed by his extensive experience and insight. Is Putin suicidal? Is he a rational actor? Will he escalate…

  • Chris Butler on the Value of Adversarial Thinking in Product Design and Management

    Chris Butler on the Value of Adversarial Thinking in Product Design and Management

    In this OODACast, Matt talks with Chris Butler about how concepts like adversarial thinking can be applied to product design and management.  Chris is an exemplar of someone who has excelled in his field but also looks to study and bring disruptive ideas like randomness and future framing from other disciplines to determine their value…

  • John Chambers on Risk and Opportunity in the Modern Age

    John Chambers on Risk and Opportunity in the Modern Age

    John Chambers is the legendary former CEO of Cisco, a company he helped grow from $70 million in revenue per year when he joined in 1991 to $1.2 billion a year the year he became CEO to over $48 billion a year by the time he retired in 2015. As a leader John was always…

  • Simon Clark on Investigating the Key Man and a Billion Dollar Fraud

    Simon Clark on Investigating the Key Man and a Billion Dollar Fraud

    In this OODAcast, we talk with Pulitzer Prize nominated journalist Simon Clark about his book the “The Key Man: The True Story of How the Global Elite Was Duped by a Capitalist Fairy Tale “. The book tells the story of Arif Naqvi and his Dubai-based private-equity firm Abraaj and attracted he billions of dollars…

OODAcons