Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • “AI Accidents” framework from the Georgetown University CSET

    The Center for Security and Emerging Technology) (CSET)  in a July 2021 policy brief, “AI Accidents:  An Emerging Threat – What Could Happen and What to Do,” makes a noteworthy contribution to current efforts by governmental entities, industry, AI think tanks and academia to  “name and frame” the critical issues surrounding AI risk probability and impact.  For the current enterprise, as we pointed…

  • Black Hat and Def Con 2021 – Observations and Trends

    The Black Hat and Def Con cybersecurity events are the most highly anticipated of the year.  Each event had an in-person component this year and OODA CEO Matt Devost provides his observations from each event.

  • The Privatization of Cyber Tools and Operations Further Muddies Attribution Efforts

    The recent exposure of NSO, the Israeli company that developed the Pegasus mobile phone spyware, has again brought to the forefront private companies that develop and sell their technology to “only” governments and licensed law enforcement entities for the purposes of spying and surveilling targets of interest.  While ostensibly Pegasus can be used against criminal…

  • Elon Musk and his Five-Step Engineering Process Based on First Principles

    If you have not discovered The Everyday Astronaut (a website and YouTube channel), it should be on your sensemaking radar.  Gone are the days of dependence on traditional media outlets to watch seminal space launches or returns at a fixed time in an exclusively nation-state based space race.  Everyday Astronaut is an example of the…

  • OODA Special Report: Megadrought 2021 and Scenario Planning – Step One (Scale and Scope)

    A critical component of scenario planning is strategic communication.  Interestingly, according to The National Oceanic and Atmospheric Administration (NOAA), National Integrated Drought Information System (NIDIS): “Drought communication is important not only for informing people about current drought conditions, but also for providing education and encouraging people to take adaptation action.”  While drought conditions are traditionally…

  • The False Pundits of Cyber Will Lead Us Astray If We Let Them

    They’re not cybersecurity experts, but they did stay at a Holiday Inn Express last night. Because we have no common body of knowledge from which to explore and learn from prior art, you can predict like the seasons when another cohort of professionals from other disciplines will attempt to tell us what is good for…

  • At Black Hat 2021, CISA Director Jen Easterly launches CISA JCDC (Joint Cyber Defense Collaborative)

    The Cybersecurity and Infrastructure Security Agency (CISA) has launched a new agency effort, the Joint Cyber Defense Collaborative (JCDC), to develop cyber defense operations strategies and to implement those plans in collaboration with partners to mitigate risk prior to incidents happening and to coordinate unified defensive actions in the event of a cyber-attack.

  • What the C-Suite needs to know about a Return to “Great Power Competition” and DoD Capabilities (per the Congressional Research Service)

    This post provides insights into what the C-Suite needs to know about the rise of great power competition, based largely on a recently released report by the policy and legal research agency of the United States Congress, the Congressional Research Service (CRS), titled Renewed Great Power Competition: Implications for Defense—Issues for Congress. Great Power Competition:  U.S. DoD…

  • Stark Vulnerabilities and Strong Recommendations continue in 2021 update to “Federal Cybersecurity: America’s Data at Risk” Report (2019)

    In a follow-up to a 2019 report that found major cybersecurity vulnerabilities at eight government agencies, the U.S. Senate Committee on Homeland Security and Governmental Affairs has released a 2021 updated report. Entitled Federal Cybersecurity:  America’s Data Still at Risk,  the update does not mince words: “This report revisits those same eight agencies two years later. What this report finds is stark.”  

  • What To Know And Do About The Coming Metaverse

    In the early 1990’s SciFi fans were introduced to a concept called the Metaverse in Neal Stephenson’s book SnowCrash. In the book this described a future virtual reality beyond the universe that was populated by user-controlled avatars as well as AI and bots. Now decades later the age of the Metaverse is upon us. Most…


OODAcasts

  • Charity Wright on China’s Digital Colonialism
    ,

    Charity Wright on China’s Digital Colonialism

    Charity Wright is a Cyber Threat Intelligence Analyst with over 15 years of experience at the US Army and the National Security Agency, where she translated Mandarin Chinese. Charity now specializes in dark web cyber threat intelligence, counter-disinformation, and strategic intelligence at Recorded Future. Her analysis has provided deep insights into a variety of incidents,…

  • Jan Chipchase on Field Research for Actionable Insights

    Jan Chipchase on Field Research for Actionable Insights

    Jan Chipchase is the founder and director of Studio D Radiodurans, a research, design and innovation consultancy. He specializes in identifying nuanced patterns of human behavior. The insight it generates informs and inspires design, strategy, brand and public policy. Jan describes his work in design anthropology in terms of a satellite launched into space that…

  • Ben Dubow on Detecting and Countering Malign Influence Operations

    Ben Dubow on Detecting and Countering Malign Influence Operations

    Ben Dubow is CTO and founder of Omelas, a firm that provides data and analysis on how nations manipulate the web to achieve their geopolitical goals. He has a background in research on Russian and Chinese online information operations and is a recognized expert, having appeared on international media including Reuters, Bloomberg and Roll Call.…

  • Jahon Jamali On Bitcoin, Ethereum, and the Coming Metaverse

    Jahon Jamali is a leading expert on emerging technologies, global risk management and international relations. He began his career as a U.S. Intelligence Officer with the Defense Intelligence Agency. He also has extensive experience in the high tech community creating and growing startups through to successful exits. All this makes him an even more credible…

  • Maury Rogow: Every Corporation Will Have A Metaverse Strategy

    Maury Rogow: Every Corporation Will Have A Metaverse Strategy

    Maury Rogow builds a solid case that your brand will live or die based on the story you tell in the metaverse. Maury is a pioneer in applying the art of storytelling to convey the value of technology in the Internet age. He built a successful approach to storytelling that made direct contributions to the…

  • Alan Cohen of DCVC on Investing in Deep Tech For Humanity

    Alan Cohen of DCVC on Investing in Deep Tech For Humanity

    Alan Cohen is a partner at DCVC, a highly regarded venture capital firm who pioneered the concept of investing in Deep Tech. He has helped lead and grow some of the most influential enterprise IT companies in the world. We talk tech with Alan, and he is the perfect guy to examine some of the…

  • Digital Self Sovereignty and Avoiding the Long Night with John Robb

    Digital Self Sovereignty and Avoiding the Long Night with John Robb

    John is one of the most disruptive thinkers of our time and is capable of drilling down on critical issues like security, society, and technology with deep authority and insights. In this conversation we cover a lot of topics, including John’s concept of OODA Shear, data and digital self sovereignty, Afghanistan, AI, Bitcoin, and the…

  • Inman’s Rules: The Enduring Principles of Operational Intelligence

    Inman’s Rules: The Enduring Principles of Operational Intelligence

    Admiral Bobby Ray Inman retired from the US Navy in 1982. But his influence endures. His principles, which he codified into a list still exchanged among intelligence community leaders today, is now known as Inman’s Rules. In this OODAcast interview of Admiral Inman we review these rules, seeking insights into how they can be applied to…

  • The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks
    ,

    The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks

    Bob Bigman spent a career in the intelligence community. He was the CISO of the CIA where he was tasked with leading efforts to protect the nation’s most sensitive secrets. Since 2012 he has provided direct consulting services to CISOs, CIOs, CTOs and CEOs seeking to reduce risk and improve security programs. Through it all…

  • Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications
    , ,

    Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications

    In this OODAcast we glean lessons learned and insights into the future of the Metaverse and its implications from Randall Fort. Fort is a seasoned security, intelligence and technology leader known for his grasp of enterprise mission needs and his ability to track the rapid advancing capabilities of technology to meet those needs. His background…

OODAcons