Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Optimizing Corporate Intelligence: A guide to reforming your enterprise intelligence efforts

    This post dives into actionable recommendation on ways to optimize a corporate intelligence effort. It is based on a career serving large scale analytical efforts in the US Intelligence Community and in applying principles of intelligence in corporate America.

  • DoD Seeking Innovative Ideas on Logistics For Modern Times

    Logistics has always been a critically important part of military power. But it is also, frankly, boring. There is no sizzle and little glory in moving supplies. It has always been this way. But great masters of strategy have always known the importance of transport. Here is the way Winston Churchill put it:  “Victory is…

  • Is the Paranoia About Kaspersky Lab Products Justified?

    In late March 2022, the Federal Communications Commission (FCC) placed cybersecurity firm Kaspersky Lab on the list of organization it deems a potential threat to the United States. This is the first Russian company on the list with Kaspersky Lab joining a growing list of Chinese technology and telecommunications companies that include Huawei, ZTE, China…

  • The Critical Infrastructure Defense Project: Free, Premium Cybersecurity Services Available to Hospitals and Utilities

    As Western companies continue to break ties with the Russian State (as an extension of the sanctions imposed on Russia by the U.S. and NATO),  three U.S. cybersecurity companies in the U.S. are addressing the ongoing threat of potential cyber-attacks in the U.S.  by making their platforms available to critical infrastructure entities, including the energy…

  • IriusRisk’s Open-Threat Model (OTM) Standard Available via Creative Commons License

    In 2014, Elon Musk applied the open-source philosophy to Telsa patents (to foster innovation and “create a common, rapidly-evolving technology platform”) making all the company’s patents available for public use. The automated threat modeling company IriusRisk may have similar motivations for the rapid market creation of an open-standard threat modeling tools marketplace, with the added…

  • Crafting a Humanitarian Surge to Respond to the War on Ukraine

    The Russian invasion of Ukraine has placed an extraordinary burden on civilians and civilian infrastructure. According to the UN High Commissioner for Human Rights, as of March 20, 2022, 902 civilians have been killed and another 1,459 have been wounded. This casualty rate is likely much higher and will certainly increase as the conflict continues.

  • Using Artificial Intelligence For Competitive Advantage in Business

    AI technologies are making continuous advances in domains like industrial robotics, logistics, speech recognition and translation, banking, medicine and advanced scientific research. But in almost every case, the cutting edge AI that drives the advances drops from attention, becoming almost invisible when it becomes part of the overall system. The fact that most AI use…

  • The March 2022 OODA Network Member Meeting: Core Themes Emerge from Five Scenarios for War’s End

    To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • Why is cyber threat detection so hard?

    Why is cyber threat detection so hard? The most obvious reason threat detection is hard is that “threat” is too abstract to solve. It may seem obvious, but effective problem solving requires problem framing. Hence, everyone involved in the process clearly understands the problem and what it is not. We get distracted by vague and…

  • China Keeps U.S. Cyber Operations in the News

    In March 2022, the Chinese cybersecurity company Pangu Lab attributed cyber espionage targeting Chinese organization to the United States’ premier signals intelligence agency. The Chinese company Qihoo 360 had done this in 2020 when it attributed hostile cyber activity to the Central Intelligence Agency (APT-C-39). In the past, Beijing appeared content to ride out global…


OODAcasts

OODAcons