Start your day with intelligence. Get The OODA Daily Pulse.
Home > Example Query Loops
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
The Five Eyes intelligence allies – government agencies in the United States, United Kingdom, Australia, Canada, and New Zealand – issued a joint Cybersecurity advisory (CSA) days before the Christmas holiday, offering guidance for the Apache Log4j vulnerability worldwide. Nation-states and ransomware gangs are already starting to exploit the vulnerabilities, including Log4Shell (part of the…
The capabilities of Russia to conduct cyber espionage and cyber attack have been battle tested and are hard to thwart even during daily “peacetime” operations. They include well resourced capabilities of the military and intelligence services and also deep technical expertise in the Russian business ecosystem and in organized crime which operates as part of…
To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…
Whether you are just overwhelmed with data or just curious about what you will learn, you may be feeling the impulse to jump on the artificial intelligence (AI) bandwagon. Before you go too far down the road, please consider this Top 10 list of the most common mistakes managers make when building an AI project.…
This 20 Dec 2021 OODA Salon features a discussion with Jennifer Ewbank, Deputy Director of CIA for Digital Innovation. Her office is responsible for current and future activities associated with both technologies and business processes around digital innovation, a topic which touches every aspect of agency missions. This includes activities in domains like Cloud, IT,…
Part II of the Center for Security and Emerging Technologies (CSET) series is available which “examines how AI/ML technologies may shape future disinformation campaigns and offers recommendations for how to mitigate them.” We offered an analysis of Part I of the series (CSET Introduces a “Disinformation Kill Chain”) earlier this month. Disinformation is not new,…
Climate change and the insecurity it stimulates have the potential to amplify existing conflicts, trigger conflicts over scarce resources, and trigger forced migration (refugees and internally displaced persons or IDPs) now and in the future. Climate conflicts converge with transnational criminal activity (cartels and gangs) and exacerbate violence against persons in fragile communities. These convergences…
In December 2021, Iran’s Ambassador to the United Nations issued a formal statement rejecting Iran’s use of force in cyberspace. In the statement, the Ambassador acknowledged Iran’s victimization by cyber-attacks, underscoring the 2010 Stuxnet attack that directly impacted a key infrastructure by disrupting its nuclear enrichment process. A key component in this address was Iran’s…
In response to the SolarWinds Orion and Hafnium Microsoft Exchange breaches, the U.S. Senate Committee on Armed Services, Subcommittee on Cyber, held a hearing on April 14th. Entitled “Future Cybersecurity Architectures”. The specific breaches were actually only the context for a larger conversation about (and a general update on) DoD implementation of the recently approved…
Ukraine may be the Gray-zone in the headlines right now, but Taiwan is the more significant strategic hybrid warfare battlefield, in no small part due to its global leadership in semiconductor manufacturing. Considering the hype cycle around all things Quantum, you would think it would be positive, sound strategic news that Taiwanese leaders recently announced…
Michael Kanaan has helped a wide swath of decision-makers better grasp the nature of AI. He has a knack for expressing complex topics in clear, accurate and succinct ways and many of us in the national security community have already had the pleasure of hearing from him in person or in conferences. His book, T-Minus…
Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats. He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four…
Chet Richards was a close associate of the late US Air Force Colonel John Boyd. He was there as the concept of the OODA Loop was being developed and constructed the first graphics of the OODA Loop from sketches Boyd drew. Chet is the author of the widely read business book “Certain to Win” which…
Courtney Bowman leads Palantir’s Privacy and Civil Liberties Engineering Team. In this capacity he works extensively with local, state and international governments and philanthropic partners to develop technology-driven solutions to information sharing needs that respect applicable privacy, security and data integrity requirements. He does so in a way that is informed by experience and well…
Kevin DeSanto is an investment banker delivering advice and execution assistance to high growth businesses preparing for M&A and financial transactions. His company, KippsDeSanto, has developed a reputation for trusted execution support for companies in government contracting, aerospace, defense and cybersecurity. He leads teams that advise senior management, boards of directors and shareholders. The art…
Bradley Rotter is a visionary investor who has pioneered investments in many new alternative investments classes including having been an early backer of hedge funds in 1982 while speculating on the Chicago Mercantile Exchange. He was also an early investor in Bitcoin and other cryptocurrency ecosystems and at a dinner with OODA CEO Matt Devost…
Andrew (Andy) Lustig is a partner at the high tech law firm Cooley, where he focuses on private equity investments, mergers and acquisitions and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data…
Paul Pagnato migrated from a career as a scientist looking for life in outer space to one of the top financial advisors in the U.S. with a keen eye for tracking innovation, exponential change, and other emerging global issues. He is also the author of the recent book, The Transparency Wave, which highlights the essential…
Bill Crowell is a senior executive with extensive experience in government (rose to the level of Deputy Director of the National Security Agency) and in industry. He has been a CEO of leading companies like Cylink, taking them through growth to acquisition. He has been a director of multiple public and private companies with a…
Brad Meltzer is the #1 New York Times bestselling author of The Cupler Ring Trilogy (The Inner Circle, The Fifth Assassin, The President’s Shadow), The Escape Artist, The Book of Lies and many other thrillers loved by millions for their realism and well researched fact based themes and drama filled plots. He is also widely…
Copyright © 2025 — All Rights Reserved.
Notifications