Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Ukraine-Russia War Threat to Space Security Update

    The space security and space war aspects of the current Russian invasion of Ukraine have manifested in various ways since the beginning of the war. However, it was preceded by months of build-up, as massive military vehicle parks were created at various places along the Russian and Belarusian borders – all viewed from space. The…

  • Russia Is Not Following Its Own Blueprint for Success in Cyberspace Against Ukraine

    More than a week into its invasion of Ukraine, by many accounts the Russian military effort is not going as well as expected. Some movements have stalled, impacting Russian force supplies and prompting a 40-mile convoy to address these shortcomings. There is a general consensus Moscow has miscalculated its ability in winning the conflict quickly,…

  • Project Hamilton: The Federal Reserve Bank of Boston and The MIT Digital Currency Initiative

    Based on the recent release of our Web3 Cyber Incident Database, we continue with our brief survey of crypto and digital currency initiatives from around the globe, all of which are officially sanctioned to enhance national competitive advantage. Today we provide an analysis of the major central bank digital currency (CBDC) initiative in the U.S.,…

  • The Russian Invasion of Ukraine: Perspectives for the C-Suite Decision-Maker

    As we have previously mentioned, the Russian aggression against Ukraine will have impacts far beyond the region. All companies and all government organizations (including those at local and state levels) should evaluate the potential impact of these hostilities on operations. This post is the next in a series of reports on this threat and mitigation…

  • A No Hype Assessment On Starlink Security In Combat Environments: There are risks and mitigation measures

    The full Starlink system is an incredible capability. High quality engineering was applied to reimagine the every component of the architecture, including ground stations to control the architecture, satellites which communicate with each other and the ground, and new terminals with advanced antennas that can track satellites without need for a gimbal. The ground element…

  • Goodbye to All That

    The conflict in Ukraine has validated a number of assumptions cyberspace strategy and intelligence thinkers have been promulgating for over 20 years. The use of cyber attacks in conjunction with the traditional components of armed conflict, for example. Likewise, the involvement of “patriotic hackers” in an armed conflict, with or without the approval of the…

  • Chinese Company Outs U.S. Cyber Espionage and Sends a Message

    In late February 2022, Qi An Pangu Lab, a Chinese cybersecurity company, “declassified” technical details of a cyber espionage campaign allegedly perpetrated by an elite hacking group working under the U.S. National Security Agency (NSA). Per the company’s findings, these state actors dubbed the “Equation Group” by the cybersecurity community created an advanced backdoor that…

  • Full Log4Shell Attack Chain-Enabled Conti Ransomware Gang Supports Russia; Ukrainian Gang Member Retaliates

    In early February, a cybercrime crackdown by Russian authorities included the arrest of members of the REvil gang. Overall, follow-up reports suggested a growing sentiment that the Russian authorities were out to optimize the appeasement value to the U.S. of the arrests. We later suggested that the REvil Gang arrest was possibly a false flag…

  • Cyber Incident Reporting Rule for Critical Infrastructure Approved by U.S. Senate

    Hours before the State of the Union address, the Senate unanimously passed the Strengthening American Cybersecurity Act,  which is actually various bills that have now been made into one piece of legislation. Months ago, the measures had previously been removed from the annual defense policy bill.

  • The 2022 Russian Invasion and Ukraine Defence: A Black Day Scenario

    A ‘Black Day’ in European military culture is historically associated with a day on which the Army suffers its worse number of casualties. In the war so far, public information at the time of this analysis has identified that Russian military losses have been substantial.  Substantial losses during an invasion are to be expected: defenders…


OODAcasts

  • Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications
    , ,

    Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications

    In this OODAcast we glean lessons learned and insights into the future of the Metaverse and its implications from Randall Fort. Fort is a seasoned security, intelligence and technology leader known for his grasp of enterprise mission needs and his ability to track the rapid advancing capabilities of technology to meet those needs. His background…

  • Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…

  • Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives
    ,

    Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives

    Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…

  • Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…

  • Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…

  • Jer Thorp on Living in Data and Creating Better Futures

    Jer Thorp on Living in Data and Creating Better Futures

    Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…

  • Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…

  • Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…

  • Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…

  • ,

    Kim Zetter on Understanding the Realities of Cyberthreats and How Code Has a Story to Tell

    This week’s OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades.  Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today’s security environment. Kim also shares details as to how she…

OODAcons