Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The Key to a Defensible Cyberspace – A Look at the Work of Jason Healey and the NY Cyber Task Force

    Jason Healey has been a vocal advocate for challenging the assumptions and metrics we use to develop a defensible cyberspace and also to ensure that the networks of today continue to afford us great communication, economic, and societal benefits.  This in-depth article takes a look at Jason’s work, with a special emphasis on his NY…

  • The Hackers Who Saved the World – Interview with Author Joe Menn

    I’ve just finished reading an advance copy of Joseph Menn’s new book Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Amazon Link) and can recommend highly for OODA Loop members. As the importance of hacker history goes, this was a book that was destined to be written.  I’m…

  • How a Presidential Commission Was Tracking Hackers in 1996

    The President’s Commission on Critical Infrastructure Protection is often cited as one of the most important initiatives from the 1990s that advanced our cybersecurity programs in the U.S.  The commission, which looked at cyber threats to critical infrastructure, created a lasting critical infrastructure framework that is still in use today.  In addition, it proposed the…

  • Maturing the Cyber Threat Intelligence Field into a Discipline

    My background is in operational intelligence. I started my career as a naval intelligence officer working the dynamic problems of operational fleets in real-world, ours-vs-theirs situations. I later worked joint and allied military intelligence, but still in that operational side of the field, trying to figure out what might happen in chaotic situations where adversaries…

  • Is There An Emerging Global Food Industry Resiliency Crisis?

    It is a truism that every society is only a few meals away from revolution, proven not for the first time when high food prices initiated the Arab Spring, and yet food security is a woefully neglected national security concern. America lacks a national food policy, even though we are headed towards a crisis.

  • Cyber Threat Analysis Report Volume 1, Edition 6

    The black hat hiding in the closet and other analysis by Mike Tanji in this week’s Cyber Threat Analysis Report.

  • Unmasking Maskirovka: Russia’s Cyber Influence Operations – OODA Network Expert Book Review

    Unmasking Maskirovka: Russia’s Cyber Influence Operations examines Russian ‘Information Operations’ (InfoOps) as a tool of strategic influence.  This exploration is timely and relevant given the Russian assault on the American electoral process in the 2016 Presidential election—especially since the long-range implications are still being assessed.

  • Cyber Threat Analysis Report Volume 1 Edition 5

    Why is it so hard for us to pay attention to cybersecurity? Mike Tanji analyzes the latest news and trends in the cybersecurity industry.

  • Cyber Threat Analysis Report Volume 1, Edition 4

    NIST’s Ron Ross on the state of cyber: ’We literally are hemorrhaging critical information’ After Chinese hackers infiltrated a Navy subcontractor’s computer network and stole a trove of highly sensitive data on submarine warfare, it spurred the government to revise the standards that contractors must follow to ensure government data is properly protected data. What…

  • Cyber Threat Analysis Report Volume 1, Edition 3

    Can you trust NSA tools? This and more as OODA Network Expert Michael Tanji provides insightful analysis of the most recent and significant cyber news.


OODAcasts

OODAcons