Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Will the United States Ever Accept that Cyber Espionage Is Vital for China’s National Security?

    China’s national security interests revolve around three core issues: its national sovereignty, the security of its sovereign interests, and its economic growth.  Current President Xi Jinping has repeatedly used the word “national security” in speeches before the Chinese Communist Party to underscore its importance to China’s continued rise as a global leader.  According to a…

  • NSA sets 2035 post-quantum cryptography deadline; Joint Advisories with CISA and FBI

    The debate about the “dual hat” leadership structure of the NSA and Cyber Command has evolved into a study group effort (announced by the White House this week) to review the fact that “both Cyber Command and NSA have always been helmed by the same military officer, a role currently filled by Army Gen. Paul…

  • Commerce, NIST and Implementation of the CHIPS and Science Act of 2022

    There were many vital takeaways from our recent What’s Next? interview with Dr. Melissa Flagg and Dr. Jennifer Buss on the Chips and Science Act of 2022, but the most crucial insights from Flagg and Buss were about the future role of the Department of Commerce and the NIST (National Institute of Standards and Technology,…

  • The Executive’s Guide To Artificial Intelligence: What you need to know about what really works and what comes next

    Introduction The megatrend of Artificial Intelligence is transforming the algorithms of business in exciting ways. This reference, aimed at the business decision-maker, will help you make the most of AI in your organization. It provides clear articulations of fundamental concepts, succinct examples of highly impactful use cases, and tips you can put in place to…

  • The September 2022 OODA Network Member Meeting: Dr. Bilyana Lilly Presents Research on Russian Information Warfare

    OODA hosts a monthly video call to help members optimize opportunities and reduce risk to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • Mergeflow CEO and OODA Network Member Florian Wolf on “Small Data” (Part 1 of 2)

    On multiple occasions, OODA Network member Florian Wolf has presented to the OODA Network membership on the topic of small data.  An evangelist and subject matter expert on the topic, Wolf is the CEO of Mergeflow, a company he founded in 2007, where he is responsible for company strategy and product design.   Wolf has a…

  • New Open-Source Report Documents China’s Decades-long Success with Human Targeting Efforts

    According to a recent open-source report from Strider Technologies, “The People’s Republic of China (PRC) is employing a Talent Superpower Strategy designed to incentivize academics, researchers, and scientists to go abroad, deepen their expertise, and return to China to advance its strategic interests. What began in the 1980s as a program to send young talent…

  • Orbital Space Debris: Recent Events, Research and Policy

    Space debris has been a topic of conversation since a 2021 OODA Network member monthly conversation, when Leo Labs, a global, ground-based radar to track space junk business model was discussed in the context of the Russian anti-satellite [ASAT] test which broke up their Cosmos 1408 satellite, resulting in an in orbit, debris-generating event that put…

  • Severing Diplomatic Ties: A New Approach to Confronting State Cyber Aggression?

    There is little doubt that cyber attacks are used by both state and nonstate actors a medium to support their geopolitical views and positions during times of regional and global crisis.  The Ukraine conflict has underscored what has been going on for several years – actors resorting to offensive cyber operations to register their displeasure…

  • Speculative Design: U.S. Army Experimental CubeSats (Miniaturized Satellites)

    This case study is a lot more “experimental/operational” than previous posts in our ongoing Speculative Design series – with the full resources of the U.S. Army Space and Missile Defense Command (SMDC) “in the midst of evaluating the results of experimental satellite tech designed to directly warn soldiers on the ground when GPS signals have been…


OODAcasts

  • David Greenberg on Decision-making in Volatile Markets

    While the OODA Loop was been heralded in the domain of conflict, we often find the concept in business and there is no greater business analogy to dogfighting that David Greenberg’s experience as a trader on the floor of the world’s largest physical commodities exchange. David’s job required rapid decision making based on constantly changing…

  • Katharina McFarland on Winning in the Age of Artificial Intelligence
    ,

    Katharina McFarland on Winning in the Age of Artificial Intelligence

    Katharina McFarland has led change in a wide array of national security domains including Space, Missile Defense, Acquisition and Nuclear Posture. She is a former Assistant Secretary of Defense for Acquisition (ASD(A) and a former Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASAALT).  She currently serves on several corporate boards and as…

  • John Spencer on Connected Soldiers and the Future of Conflict
    ,

    John Spencer on Connected Soldiers and the Future of Conflict

    John Spencer is a writer, thinker, speaker scholar who currently serves as the Chair of Urban Warfare Studies at the US Military Academy. He brings the experience of a veteran who has led in combat to his work, and in his latest book, Connected Soldiers, also provides insights from his time as a stay at…

  • Duyane Norman on Disrupting the CIA to Deal with Emerging Threats
    ,

    Duyane Norman on Disrupting the CIA to Deal with Emerging Threats

    Duyane Norman spent nearly 30 years in the CIA with three Chief of Station and multiple other tours in a variety of interesting geographies and also had a focus on technology issues serving as Deputy Director of the Office of Technical Service within CIA’s Directorate of Science and Technology, and as a member of the…

  • First Federal CISO Greg Touhill on Advanced Cybersecurity by Design

    First Federal CISO Greg Touhill on Advanced Cybersecurity by Design

    Greg Touhill is one of the nation’s premier cybersecurity, information technology and risk management leaders. As an Air Force officer he led technology efforts in some of our nation’s most demanding organizations including combatant commands during time of war. He is an accomplished speaker and author and business executive and also served as our nation’s…

  • Former Tenable CEO Ron Gula Applies a Hacker Mindset to Investing, Public Awareness, and Philanthropy

    Former Tenable CEO Ron Gula Applies a Hacker Mindset to Investing, Public Awareness, and Philanthropy

    In this OODAcast, we interview Ron Gula, co-founder and CEO of the highly successful Tenable Security(NASDAQ:TENB) and currently President of Gula Tech Adventures. Ron has a long history in the cybersecurity field that includes starting his career as an NSA hacker and then transitioning into an entrepreneur responsible for multiple innovations in the market and…

  • Jim Lawler on the Art of Espionage and the Perfect Intelligence Operation
    ,

    Jim Lawler on the Art of Espionage and the Perfect Intelligence Operation

    In this OODAcast, we talk with Jim Lawler who is a Senior Partner at MDO Group, which provides HUMINT training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues. Mr. Lawler is a noted speaker on the Insider Threat in government and industry. Prior to this, Mr. Lawler…

  • Lifelong Hacker and Experienced Security Executive Alyssa Miller, Author of Cybersecurity Career Guide
    ,

    Lifelong Hacker and Experienced Security Executive Alyssa Miller, Author of Cybersecurity Career Guide

    Alyssa Miller is a life-long hacker and highly experienced security executive who has a passion for security and the security community. She is an excellent advocate for continuous improvement in the community and a frequent speaker to audiences of both fellow business leaders and security community audiences. This combined with her deep experience in the…

  • Dr. Scott Shumate Profiles Russian President Vladimir Putin

    Dr. Scott Shumate Profiles Russian President Vladimir Putin

    This OODAcast is a special edition focused on profiling Russian President Vladimir Putin with Dr. Scott Shumate, who has over 30 years of experience evaluating national leaders, terrorists, spies, and insiders.  Scott shares his unique perspective’s on Putin informed by his extensive experience and insight. Is Putin suicidal? Is he a rational actor? Will he escalate…

  • Chris Butler on the Value of Adversarial Thinking in Product Design and Management

    Chris Butler on the Value of Adversarial Thinking in Product Design and Management

    In this OODACast, Matt talks with Chris Butler about how concepts like adversarial thinking can be applied to product design and management.  Chris is an exemplar of someone who has excelled in his field but also looks to study and bring disruptive ideas like randomness and future framing from other disciplines to determine their value…

OODAcons