Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Speculative Design: U.S. Army Experimental CubeSats (Miniaturized Satellites)

    This case study is a lot more “experimental/operational” than previous posts in our ongoing Speculative Design series – with the full resources of the U.S. Army Space and Missile Defense Command (SMDC) “in the midst of evaluating the results of experimental satellite tech designed to directly warn soldiers on the ground when GPS signals have been…

  • What The National Academies Believe Regarding The Future of Encryption

    The National Academies of Sciences, Engineering and Medicine recently completed a study at the request of the Office of the Director of National Intelligence focused on Encryption and the future of encryption given advances in technology. The academies brought together experts for a detailed study aimed at identifying potential scenarios of critical interest.

  • “The Era of the Global Internet is Over” According to CFR Task Force Report

    Nate Fick, who was confirmed last week to lead the State Department’s Bureau of Cyberspace and Digital Policy, was also the co-chair (along with Jami Miscik of Global Strategic Insights) of the Council on Foreign Relations (CFR) Independent Task Force on Cybersecurity. In May, the CFR Task Force delivered their final report, “Confronting Reality in…

  • Nate Fick Confirmed to Lead State Department Bureau of Cyberspace and Digital Policy

    In April, The State Department launched a new cybersecurity bureau, designed to enhance digital diplomacy and online standards around the world. Last week, the Senate confirmed Nate Fick as the first person to lead the new Bureau as the first State Department Ambassador-at-Large for Cyberspace and Digital Policy. Fick is familiar to the OODA Loop…

  • Signals from Mainstream Information Outlets on Digital Self-Sovereignty, Digital Rights and Digital Identity

    We continue our research on  Digital Self-Sovereignty, Digital Rights, and Digital Identity, which is an area of research concerned with the security of personal data, transactional or otherwise, and the individual’s right to ownership of their personal data. In the last few months, a signal-to-noise ratio has emerged on this topic, where previously there was…

  • A Proactive National Technology Strategy in the Great Power Competition with China

    The co-authors of a recent article in Foreign Affairs, America Could Lose the Tech Contest With China, Eric Schmidt and Yll Bajraktari, are Chair and CEO of the Special Competitive Studies Project (SCSP), respectively. The SCSP “builds on the work of the National Security Commission on Artificial Intelligence (NSCAI), which ended its congressionally-mandated work in October…

  • The Stanford Internet Observatory and Covert Influence Operations

    With the technological infrastructure that physicists and astronomers have brought to bear for decades as its foundational metaphor, the Stanford Internet Observatory (SIO) was launched two years ago to create an equally as powerful social sciences-based “Observatory” for internet researchers. We analyze the SIO’s latest offering, in partnership with Graphika:  the August 24th release of…

  • Opportunities for Advantage: Reshoring Manufacturing and Shortening Supply Chains

    Future Typhoons.  Future Covid-19 Lockdowns.  Future Pandemics. Future Climate Crises Impacts.  Future Wars.  All of it adds up to a clear incentive structure for American businesses to reshore manufacturing and shorten supply chains. 

  • Global Crypto and Digital Currency Initiatives: Pakistan

    We continue with our survey of crypto and digital currency initiatives from around the globe, all of which are officially sanctioned to enhance national competitive advantage (in the event crypto overtakes the US dollar as the global reserve currency).  It is the cumulative adoption rate of state-sanctioned crypto and digital currency legalization and regulation that…

  • Chinese Cyber Espionage Against Russia Is About Keeping Tabs and Learning

    Chinese state-sponsored cyber espionage is nothing notable as Beijing has been long engaged in the most expansive cyber-enabled data theft operation for the past decade.  However, its recent activities targeting Russia’s military industries is rather novel and not widespread.  What’s more, this is not the first Chinese APT actor that has brazenly targeted its close…


OODAcasts

  • Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…

  • Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives
    ,

    Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives

    Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…

  • Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…

  • Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…

  • Jer Thorp on Living in Data and Creating Better Futures

    Jer Thorp on Living in Data and Creating Better Futures

    Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…

  • Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…

  • Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…

  • Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…

  • ,

    Kim Zetter on Understanding the Realities of Cyberthreats and How Code Has a Story to Tell

    This week’s OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades.  Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today’s security environment. Kim also shares details as to how she…

  • Junaid Islam on Zero Trust Architecture

    Junaid Islam on Zero Trust Architecture

    In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam. Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose…

OODAcons