Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The New DoD University Consortium for Cybersecurity (UC2)

    This post is an effort to follow up on a conversation from The December 2021 OODA Network Member Meeting regarding “The Security Community:  Communication Style, Public Relations, Outreach Efforts, and Workforce Skills” (which came up when discussing responses to the Log4Shell threat and pro bono efforts by OODA Network members).  We are not sure about…

  • In 2022, the Strategic Impact of Global Intermodal Supply Chain Gridlock on IT Supply Chain Remains High

    The OODA Loop Research Team has been tracking the impact on supply chains from the onset of the pandemic.

  • Front Companies Muddy Already Dark Waters of Hostile Cyber Activity

    Recently, the Federal Bureau of Investigation (FBI) published an industry advisory outlining the tactics, techniques, and procedures of Emennet Pasargad, an Iran-based cybersecurity company supporting government organizations to help them defends against this company’s potential hostile activities. Earlier, the Department of Justice (DoJ) charged two Iranian nationals with cyber intrusion, fraud, voter intimidation, interstate threats,…

  • Extradited Russian Hacker and Indicted Iranian Hackers May Hold Keys to Foreign Influence Campaigns

    Throughout the Mueller investigation, many subject matter experts (who felt the whole investigation to be a bit myopic) encouraged us to not miss the role Chinese, North Korean, and Iranian influence campaigns were playing (in addition to the Russians in what was a multinational Bitskrieg on our cognitive infrastructure in the lead up to the…

  • The National Counterterrorism Center (NCTC) Releases Mobile App to Federal and Military Partners

    The National Counterterrorism Center (NCTC) was established at the recommendation of the 9/11 Commission and given responsibility for integrating government analysis, strategic planning, and information-sharing with state, local, tribal, territorial, and federal partners.  For the C-Level and executives managing the safety of personnel, mission-critical operations, and threats to physical plants and assets,  risk awareness of…

  • The Current AI Innovation Hype Cycle: Large Language Models, OpenAI’s GPT-3 and DeepMind’s RETRO

    For better or for worse, Large Language Models (LLMs) – used for natural language processing by commercial AI Platform-as-a-Service (PaaS) subscription offerings – have become one of the first “big data” applied technologies to become a crossover hit in the AI marketplace. OpenAI, a San Francisco-based research and deployment company, released GPT-3 in June of…

  • The Past, Present and Future of DeFi, Bitcoin, Blockchain, Cryptocurrency, and Ethereum

    We continue our effort to underscore certain patterns and themes found throughout the OODAcast library of over 80 conversations with leaders and decision-makers. In January 2021, OODA CEO Matt Devost interviewed Camila Russo, author of the book “The Infinite Machine: How an Army of Crypto-hackers Is Building the Next Internet with Ethereum”. Camila is also…

  • Cyber Safety Review Board Launched by DHS

    Consistent with our analysis back in November ’21 – Cybersecurity and Cyber Incidents: Innovation and Design Lessons from Aviation Safety Models and a Call for a “Cyber NTSB” – the DHS has now established a Cyber Safety Review Board.   The announcement was made today by the DHS. 

  • Continue to Tighten Your OODA Loop for Year Three of the COVID-19 Pandemic

    We strongly encourage OODA Loop subscribers to continue to prioritize tools for clear decision-making while operating in a low information environment.  It is this ‘tightening your OODA Loop’ we want to reinforce now as we head into year three of our research and analysis of the pandemic and its impacts. Our goal is to assist…

  • Renewed Interest in Hack-Backs Is a Step in the Wrong Direction

    In mid-2021, members of the Senate Finance Committee introduced Bill S2292, which directed the Department of Homeland Security (DHS) to study the potential pros and cons of allowing private companies to hack back against perpetrators that attack their organizations. Dubbed the “Study on Cyber-Attack Response Options Act,” the bill is the government’s attempt to address…


OODAcasts

  • Simon Clark on Investigating the Key Man and a Billion Dollar Fraud

    Simon Clark on Investigating the Key Man and a Billion Dollar Fraud

    In this OODAcast, we talk with Pulitzer Prize nominated journalist Simon Clark about his book the “The Key Man: The True Story of How the Global Elite Was Duped by a Capitalist Fairy Tale “. The book tells the story of Arif Naqvi and his Dubai-based private-equity firm Abraaj and attracted he billions of dollars…

  • Charity Wright on China’s Digital Colonialism
    ,

    Charity Wright on China’s Digital Colonialism

    Charity Wright is a Cyber Threat Intelligence Analyst with over 15 years of experience at the US Army and the National Security Agency, where she translated Mandarin Chinese. Charity now specializes in dark web cyber threat intelligence, counter-disinformation, and strategic intelligence at Recorded Future. Her analysis has provided deep insights into a variety of incidents,…

  • Jan Chipchase on Field Research for Actionable Insights

    Jan Chipchase on Field Research for Actionable Insights

    Jan Chipchase is the founder and director of Studio D Radiodurans, a research, design and innovation consultancy. He specializes in identifying nuanced patterns of human behavior. The insight it generates informs and inspires design, strategy, brand and public policy. Jan describes his work in design anthropology in terms of a satellite launched into space that…

  • Ben Dubow on Detecting and Countering Malign Influence Operations

    Ben Dubow on Detecting and Countering Malign Influence Operations

    Ben Dubow is CTO and founder of Omelas, a firm that provides data and analysis on how nations manipulate the web to achieve their geopolitical goals. He has a background in research on Russian and Chinese online information operations and is a recognized expert, having appeared on international media including Reuters, Bloomberg and Roll Call.…

  • Jahon Jamali On Bitcoin, Ethereum, and the Coming Metaverse

    Jahon Jamali is a leading expert on emerging technologies, global risk management and international relations. He began his career as a U.S. Intelligence Officer with the Defense Intelligence Agency. He also has extensive experience in the high tech community creating and growing startups through to successful exits. All this makes him an even more credible…

  • Maury Rogow: Every Corporation Will Have A Metaverse Strategy

    Maury Rogow: Every Corporation Will Have A Metaverse Strategy

    Maury Rogow builds a solid case that your brand will live or die based on the story you tell in the metaverse. Maury is a pioneer in applying the art of storytelling to convey the value of technology in the Internet age. He built a successful approach to storytelling that made direct contributions to the…

  • Alan Cohen of DCVC on Investing in Deep Tech For Humanity

    Alan Cohen of DCVC on Investing in Deep Tech For Humanity

    Alan Cohen is a partner at DCVC, a highly regarded venture capital firm who pioneered the concept of investing in Deep Tech. He has helped lead and grow some of the most influential enterprise IT companies in the world. We talk tech with Alan, and he is the perfect guy to examine some of the…

  • Digital Self Sovereignty and Avoiding the Long Night with John Robb

    Digital Self Sovereignty and Avoiding the Long Night with John Robb

    John is one of the most disruptive thinkers of our time and is capable of drilling down on critical issues like security, society, and technology with deep authority and insights. In this conversation we cover a lot of topics, including John’s concept of OODA Shear, data and digital self sovereignty, Afghanistan, AI, Bitcoin, and the…

  • Inman’s Rules: The Enduring Principles of Operational Intelligence

    Inman’s Rules: The Enduring Principles of Operational Intelligence

    Admiral Bobby Ray Inman retired from the US Navy in 1982. But his influence endures. His principles, which he codified into a list still exchanged among intelligence community leaders today, is now known as Inman’s Rules. In this OODAcast interview of Admiral Inman we review these rules, seeking insights into how they can be applied to…

  • The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks
    ,

    The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks

    Bob Bigman spent a career in the intelligence community. He was the CISO of the CIA where he was tasked with leading efforts to protect the nation’s most sensitive secrets. Since 2012 he has provided direct consulting services to CISOs, CIOs, CTOs and CEOs seeking to reduce risk and improve security programs. Through it all…

OODAcons