Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The Growing Threat of Maritime Terrorism

    Introduction The 21st century has seen large-scale, well-organized terrorist attacks by Islamist terrorists on nearly every continent. These same terrorists and terrorist organizations have leveraged the cyber domain to support recruitment, training, and attacks. The maritime frontier, however, is perhaps the one that has continued comparatively untouched throughout the history of modern Islamist terrorism. Attacks…

  • Frame Reflection:A Critical Review of US Military Approaches to Complex Situations

    We are pleased to present this monograph on frame reflection. As the authors note: “Our hope is that the insights gained from institutional barriers in the modern military may provide insights for designers in other walks – with ideas on framing messy situations. We have advocated that frame reflection is essential to design practice in…

  • Why “Cyberwar” Isn’t Happening

    “Cyberwar” is an imprecise and ugly term. Equal parts misleading and ambiguous, the term cyberwar has somehow battled its way into our modern lexicon and is used vaguely to describe acts of virtual aggression. Most often, cyberwar is used to describe an ill-defined and inevitable sate of computer-centric conflict between two nation states or groups.…

  • We’re only Human: Addressing the Cyber Threat Origin

    Private entities are pouring money and manpower into creating the best technologies to help mitigate a host of threats in the cyber realm. The US federal government is increasingly following this strategy. Yet, even cutting edge technology cannot determine one of the most critical and elusive intelligence questions: motivation. What drives the adversary? What does…

  • Destruction and Creation

    To comprehend and cope with our environment we develop mental patterns or concepts of meaning. The purpose of this paper is to sketch out how we destroy and create these patterns to permit us to both shape and be shaped by a changing environment. In this sense, the discussion also literally shows why we cannot…

  • Skid Row Terrorist

    The rubric of terrorism studies embeds terrorist TTPs (Tactics, Techniques, and Procedures) within the overall context of motivations and intent that a terrorist are/is presumed to have. This is further fundamentally subordinate to the over-arching al-Qaeda framework. However, if we consider characters such as the ‘dishevelled or nihilist terrorist’ (Flaherty, 2012), then terrorist TTPs have…

  • The Cyber Moscow Rules: Trust no one. Trust no device.

    Lessons learned from US agents who operate in enemy territory have been captured for years and transformed into a code of conduct popularly known as “Moscow Rules.” Those old rules existed for a reason. Real-world experience proved their effectiveness when agents had to operate in the presence of adversaries. Since modern cyber defenders are also…

  • When Armies Divide: The Security of Nuclear Arsenals During Revolts, Coups, and Civil Wars

    In this brief volume Jenkins takes a detailed look at the General’s putsch, which was a 1961 coup attempt by a group of retired French Generals against President Charles de Gaulle. However, it is not the putsch itself that attracts Jenkins’ analytical attention, but the chaos surrounding the status of a nuclear device that was…

  • West Africa: Terrorism’s New Front Yard

    Introduction There is a new front in the global fight against terrorism and terrorists. Ethnic, religious, and political tensions in West Africa, simmering for the past few years, have boiled over into widespread violence and coordinated military efforts throughout the region. A recent attack at an oil facility in Algeria has highlighted the wealth of…

  • Slavery and Human Trafficking in 2013

    Introduction Reports and statistics from the UN, national governments, and politically diverse NGO’s demonstrate that human trafficking and slavery are as common today as they were during the years when transAtlantic slave trading was a legal enterprise. Estimates place the number of global victims as high as 29 million. The reality of this twenty-first century…


OODAcasts

  • Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications
    , ,

    Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications

    In this OODAcast we glean lessons learned and insights into the future of the Metaverse and its implications from Randall Fort. Fort is a seasoned security, intelligence and technology leader known for his grasp of enterprise mission needs and his ability to track the rapid advancing capabilities of technology to meet those needs. His background…

  • Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…

  • Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives
    ,

    Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives

    Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…

  • Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…

  • Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…

  • Jer Thorp on Living in Data and Creating Better Futures

    Jer Thorp on Living in Data and Creating Better Futures

    Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…

  • Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…

  • Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…

  • Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…

  • ,

    Kim Zetter on Understanding the Realities of Cyberthreats and How Code Has a Story to Tell

    This week’s OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades.  Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today’s security environment. Kim also shares details as to how she…

OODAcons