Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The March 2022 OODA Network Member Meeting: Core Themes Emerge from Five Scenarios for War’s End

    To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • Why is cyber threat detection so hard?

    Why is cyber threat detection so hard? The most obvious reason threat detection is hard is that “threat” is too abstract to solve. It may seem obvious, but effective problem solving requires problem framing. Hence, everyone involved in the process clearly understands the problem and what it is not. We get distracted by vague and…

  • China Keeps U.S. Cyber Operations in the News

    In March 2022, the Chinese cybersecurity company Pangu Lab attributed cyber espionage targeting Chinese organization to the United States’ premier signals intelligence agency. The Chinese company Qihoo 360 had done this in 2020 when it attributed hostile cyber activity to the Central Intelligence Agency (APT-C-39). In the past, Beijing appeared content to ride out global…

  • Open-Source Intelligence Resources: The EU Disinformation Lab’s Ukraine Conflict Resource Hub

    EU DisinfoLab is an independent non-governmental organization (NGO) focused on “researching and tackling sophisticated disinformation campaigns targeting the European Union, its member states, core institutions, and core values.” The lab has created the Ukraine Conflict Resource Hub with essential information and links to reliable research, analysis, and fact-checks to help [organizations] navigate during this crisis.…

  • Global Crypto and Digital Currency Initiatives: China

    We continue with our brief survey of crypto and digital currency initiatives from around the globe, all of which are officially sanctioned to enhance national competitive advantage (in the event crypto overtakes the US dollar as the global reserve currency). In previous posts, we provided an analysis of crypto and digital currency initiatives in El Salvador,…

  • For Corporate Strategic Planners: Five Scenarios For War’s End

    As we have discussed in OODA network meetings and our reporting since the beginning of renewed Russian hostilities against Ukraine, assessing the likelihood of war was relatively easy. We listened to what Putin was saying and understood Russian history, culture and Putin’s imperial ambitions and assessed early that he had made up his mind to…

  • What Will The Federal Government Do In Response To The Rise of Cryptocurrencies?

    Over the years it has been very exciting to watch the incredible innovations around Bitcoin and Ethereum and other projects in the crypto space. And there have been huge disappointments in statements by government leaders over the years, many of which have really said disparaging things about the movement. There are still some real haters…

  • Mental Models For Leadership In The Modern Age

    The study of mental models can improve your ability to make decisions and improve business outcomes. This post, part of our series on Decision Intelligence, reviews the mental models we recommend all business and government decision makers master. Retired Air Force Colonel John Boyd was an early advocate for the study of mental models in competitive…

  • The Very Serious Okta Breach and the Arrest of the Lapsus$ Ransomware Gang

    The recent breach of the industry-standard, cloud-based single sign-on (SSO) authentification service provider Okta is a consequential cyber incident. Following is a timeline of the Okta Breach and the recent Lapsus$ ransomware rampage, concluding with technical guidance and recommendations gleaned from a handful of ongoing technical investigations underway by law enforcement, Okta, Microsoft, Nvidia and…

  • You be the Judge: Deepfakes Enter the Information Warfare Ecosystem

    In a troubling development, war conditions are potentially acting as an accelerant in the adoption rate of deepfakes.  


OODAcasts

OODAcons