Putin’s Russia has demonstrated a penchant for relying on proxies to provide a degree of deniability while pursuing its military objectives. As noted in Christoph Zürcher’s book The post-Soviet wars: Rebellion, ethnic conflict and nationhood in the Caucasus, Putin’s popularity emerged in large part due to his successful resolution of the conflict with Chechnya, which…
The December 2016 “Grizzly Steppe” joint analysis report issued by the FBI and DHS provided a table of monikers attributable to various Russian cybercriminal organizations serving the state’s intelligence services. However, understanding what these names refer to is a challenge in and of itself. As noted by Florian Roth in a 2018 Medium article, similarities…
Humans are more connected now than ever before. However, half the global population is behind on the digital revolution and there is great regional disparity in the availability of affordable Internet. While reports show a growth rate of one million new users a day from 2018-2019, approximately 3 billion people are still not connected. SpaceX,…
Rama Polefka at Black Mountain Dynamics noticed a trend a long time ago: Young companies need a robust, powerful, secure IT infrastructure. But their founders are often so busy creating the company, the IT lags behind and compromises their growth. He has spent his career working with startups to grow their IT at exactly the right…
OODA is pleased to announce that our Future Proof conference will be held on March 19, 2020 in Tysons Corner, Virginia. The Future Proof conference brings together the hackers, thinkers, strategists, disruptors, leaders, technologists, and creators with one foot in the future to discuss the most pressing issues of the day and provide insight into…
A recent RAND report looks at the role of information warfare and how targeted social media campaigns and similar approaches are deployed to cause damage to a state. RAND has coined the term “hostile social manipulation” to capture this phenomenon, which builds on familiar influence techniques including propaganda and disinformation. Hostile social manipulation is used…
Gary Harrington’s career in special forces and the CIA could be the basis for a very successful action movie. For over thirty years, he directly planned or executed dozens of unconventional warfare operations on our Nation’s adversaries.
Managing the nexus between physical and cyber security is possible with a deliberate mindset and full cooperation and integration between the two teams. Physical security practitioners should view cyber defense experts as a vital component of their risk management strategy.
OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of…
Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.