Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Speculative Design: U.S. Army Experimental CubeSats (Miniaturized Satellites)

    This case study is a lot more “experimental/operational” than previous posts in our ongoing Speculative Design series – with the full resources of the U.S. Army Space and Missile Defense Command (SMDC) “in the midst of evaluating the results of experimental satellite tech designed to directly warn soldiers on the ground when GPS signals have been…

  • What The National Academies Believe Regarding The Future of Encryption

    The National Academies of Sciences, Engineering and Medicine recently completed a study at the request of the Office of the Director of National Intelligence focused on Encryption and the future of encryption given advances in technology. The academies brought together experts for a detailed study aimed at identifying potential scenarios of critical interest.

  • “The Era of the Global Internet is Over” According to CFR Task Force Report

    Nate Fick, who was confirmed last week to lead the State Department’s Bureau of Cyberspace and Digital Policy, was also the co-chair (along with Jami Miscik of Global Strategic Insights) of the Council on Foreign Relations (CFR) Independent Task Force on Cybersecurity. In May, the CFR Task Force delivered their final report, “Confronting Reality in…

  • Nate Fick Confirmed to Lead State Department Bureau of Cyberspace and Digital Policy

    In April, The State Department launched a new cybersecurity bureau, designed to enhance digital diplomacy and online standards around the world. Last week, the Senate confirmed Nate Fick as the first person to lead the new Bureau as the first State Department Ambassador-at-Large for Cyberspace and Digital Policy. Fick is familiar to the OODA Loop…

  • Signals from Mainstream Information Outlets on Digital Self-Sovereignty, Digital Rights and Digital Identity

    We continue our research on  Digital Self-Sovereignty, Digital Rights, and Digital Identity, which is an area of research concerned with the security of personal data, transactional or otherwise, and the individual’s right to ownership of their personal data. In the last few months, a signal-to-noise ratio has emerged on this topic, where previously there was…

  • A Proactive National Technology Strategy in the Great Power Competition with China

    The co-authors of a recent article in Foreign Affairs, America Could Lose the Tech Contest With China, Eric Schmidt and Yll Bajraktari, are Chair and CEO of the Special Competitive Studies Project (SCSP), respectively. The SCSP “builds on the work of the National Security Commission on Artificial Intelligence (NSCAI), which ended its congressionally-mandated work in October…

  • The Stanford Internet Observatory and Covert Influence Operations

    With the technological infrastructure that physicists and astronomers have brought to bear for decades as its foundational metaphor, the Stanford Internet Observatory (SIO) was launched two years ago to create an equally as powerful social sciences-based “Observatory” for internet researchers. We analyze the SIO’s latest offering, in partnership with Graphika:  the August 24th release of…

  • Opportunities for Advantage: Reshoring Manufacturing and Shortening Supply Chains

    Future Typhoons.  Future Covid-19 Lockdowns.  Future Pandemics. Future Climate Crises Impacts.  Future Wars.  All of it adds up to a clear incentive structure for American businesses to reshore manufacturing and shorten supply chains. 

  • Global Crypto and Digital Currency Initiatives: Pakistan

    We continue with our survey of crypto and digital currency initiatives from around the globe, all of which are officially sanctioned to enhance national competitive advantage (in the event crypto overtakes the US dollar as the global reserve currency).  It is the cumulative adoption rate of state-sanctioned crypto and digital currency legalization and regulation that…

  • Chinese Cyber Espionage Against Russia Is About Keeping Tabs and Learning

    Chinese state-sponsored cyber espionage is nothing notable as Beijing has been long engaged in the most expansive cyber-enabled data theft operation for the past decade.  However, its recent activities targeting Russia’s military industries is rather novel and not widespread.  What’s more, this is not the first Chinese APT actor that has brazenly targeted its close…


OODAcasts

  • Megan Jaffer on Leadership, Intelligence, Innovation and Iron Butterfly Media

    Megan Jaffer on Leadership, Intelligence, Innovation and Iron Butterfly Media

    In this episode of OODAcast, Megan Jaffer joins the conversation to discuss her journey in the intelligence community and the creation of Iron Butterfly Media Group. Megan also discusses the expansion of Iron Butterfly Media, including new podcast series and a documentary on women in intelligence. Megan shares her background, including her studies in international…

  • Decision-Making and Deep Tech with Laura Thomas: Insights from a Former CIA Officer
    ,

    Decision-Making and Deep Tech with Laura Thomas: Insights from a Former CIA Officer

    In this episode of OODAcast, Bob Gourley interviews Laura Thomas, a deep tech consultant and former CIA officer. Laura discusses her journey from a small town in North Carolina to a career in the CIA, where she served as a case officer. She emphasizes the importance of critical thinking and decision-making under uncertainty, and how…

  • Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

    Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

    Allan Friedman is a senior strategist at CISA (the Cyber Security and Infrastructure Security Agency) where he coordinates all of their cross-sector activities on the topic of SBOM: The Software Bill of Materials.

  • Joe Sullivan on Managing Complex Security Challenges

    Joe Sullivan on Managing Complex Security Challenges

    Joe Sullivan has been at the forefront of managing security risk in rapidly growing high tech companies over the past 20 years serving as the Chief Security Officer at Facebook from early start-up through the IPO, CSO of Uber and CloudFlare, and as a security leader at eBay/PayPal. Learn what motivates him and some of…

  • Joe Tranquillo on the Revolution in Biological Science
    ,

    Joe Tranquillo on the Revolution in Biological Science

    Joe Tranquillo is a Professor of Biomedical Engineering at Bucknell University and a provost at the school. He is also and author and speaker with a knack for helping make new and at times complex subjects understandable. In this OODAcast we discuss many aspects of the revolution in biological sciences with Joe including topics like:…

  • MITRE Futurist Charles Clancy on our Quantum Enabled Future

    MITRE Futurist Charles Clancy on our Quantum Enabled Future

    Charles Clancy has successfully led technology efforts in government, industry, academia and continues to lead and innovate in his current position as Senior Vice President and GM of MITRE Labs. He is MITRE’s Chief Futurist. His role in technology leadership and his tracking of tech across multiple domains made for an incredibly insightful OODAcast. We…

  • Mark McGrath: John Boyd Is Far More Than The OODA Loop

    Mark McGrath: John Boyd Is Far More Than The OODA Loop

    Mark McGrath has applied the teachings of John Boyd to a career that began in the Marine Corps, included leadership positions in financial services firms and consulting with businesses with a need to learn to thrive in volatile, uncertain, complex and ambiguous (VUCA) environments. He co-founded the consultancy AGLX and serves as its Chief Learning…

  • Serene – The Hacker Pianist Saving Cyberspace

    Serene – The Hacker Pianist Saving Cyberspace

    Serene is a hacker in the truest sense of the word. She’s applied a hacker mindset to learn coding, piano, and blend art and engineering in fascinating ways. You’ll find her collaborating on-stage with Grimes one night and coding censorship resistant technologies the next day. As a self-taught coder she was the first engineer hired…

  • Andy Bochman on Countering Cyber Sabotage

    Andy Bochman on Countering Cyber Sabotage

    Andy Bochman is the Senior Grid Strategist-Defender for Idaho National Laboratory’s National and Homeland Security directorate. In this role, Andy provides strategic guidance on topics at the intersection of grid security and climate resilience to INL leadership as well as senior U.S. and international government and industry leaders. Andy is a frequent speaker, writer, and trainer…

  • Spencer Ante on Creative Capital and Disruptive Innovation

    Spencer Ante on Creative Capital and Disruptive Innovation

    Spencer Ante is the author or “Creative Capital: Georges Doriot and the Birth of Venture Capital”, which was on my Top 10 book list for 2022. In fact, I found Doriot’s story so compelling that a portrait of him hangs on the wall at the Hack Factory start-up studio in Reston, VA. Doriot is a…

OODAcons