Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Intelligence-led Mitigation

    This paper explores methods for capitalizing on existing law enforcement intelligence capabilities to provide intelligence support to decision makers for a full spectrum of public safety and emergency service operations. Intelligence-led mitigation is a management philosophy and business process to proactively guide strategic, operational, and tactical decisions for mitigating the effects of intentional, accidental, and…

  • Hype, Social Media, and Networked Social Movements

    “What good did social media actually do for the people of Iran?” TechCrunch‘s Paul Carr asks. “Despite a slew of YouTube videos and a couple of thousand foreign Twitter users turning their avatar green and pretending to be in Tehran, Mahmoud Ahmadinejad is still in power.” While harsh, this criticism is essentially correct. New technologies,…

  • NO DNI love for uGOV

    In the finger-pointing-fest after 9/11, the US Intelligence Community was blamed for failing to “connect the dots.” As incomplete a description of the intelligence analysis process as that may be, it brought to the fore a point that many of us in the business had been complaining about for years: stovepipes and parochial interests inhibited…

  • Toward Operational Art for Policing

    The military, facing a complex and intractable mixture of “wicked problems” on the battlefield, has responded with a doctrinal revolution in the production and practice of operational theory.  But most police agencies don’t incorporate the “operational level of maneuver” into their planning and concept of operations.   We face a constellation of complex “high-intensity policing” problems…

  • A Millennium Challenge for Homeland Security

    Among defense insiders, Millennium Challenge 2002 stands out as one of the most controversial red team exercises in American military history. MC2002 suspiciously resembled the looming invasion of Iraq, as it involved a conventional BLUE force facing RED military forces of a small Middle Eastern nation. In theory, either side could win the free play…

  • Frontlines of Criminal Insurgency: Understanding the Plazas

    Mexico, and the cross-border region that embraces the frontier between Mexico and the United States, are embroiled in a series of interlocking, networked criminal insurgencies. These criminal insurgencies are essentially battles for dominance of the plazas, or corridors for the shipment of drugs into the United States. They are battles for profit and power. Cartels…

  • The Rise of Cyber-Mobilization

    In Gaza, a tentative ceasefire has been declared. But the war in cyberspace continues. Israel and its adversaries have taken to the global cyber commons to wage cyberwar against each other, deploying crowdsourced information militias. The Israeli Consulate and the Israeli Defense Forces (IDF) extensively utilize Youtube and Twitter to make their case, boiling complicated…

  • Can Strategy Be Crowdsourced?

    Criminal, terrorist, and insurgent networks have become powerful world actors. They utilize network forms of organization to make fast decisions, cover a wide operational space, remain resilient in the face of state reprisals, and have a capacity for learning and self-correction that many top-down organizations lack.

  • Criminal Netwarriors in Mexico’s Drug Wars

    Mexico is imploding in a series of interlocking ‘criminal insurgencies’ culminating in a virtual civil war. Kidnappings, assassinations, beheadings, shoot-outs:  Mexico is gripped by combat between drug cartels, gangs and the police. Mexican President Felipe Calderon starkly states: “It’s a War.” The Drug War in Mexico has killed 6,836 people since January 2007. This year…

  • Analytical Approaches for Sensing Novel and Emerging Threats

    We are proud to feature this new paper by John Sullivan: Security and public safety agencies must address a range of current and emerging  threats. These range from conflicts, strategic crime, terrorism, disease and natural hazards, as well as the confluence of any or all occurring at a given point in time. A range of…


OODAcasts

  • Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power
    ,

    Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power

    Michael Kanaan has helped a wide swath of decision-makers better grasp the nature of AI. He has a knack for expressing complex topics in clear, accurate and succinct ways and many of us in the national security community have already had the pleasure of hearing from him in person or in conferences. His book, T-Minus…

  • Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats
    ,

    Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats

    Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats.  He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four…

  • Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards was a close associate of the late US Air Force Colonel John Boyd. He was there as the concept of the OODA Loop was being developed and constructed the first graphics of the OODA Loop from sketches Boyd drew. Chet is the author of the widely read business book “Certain to Win” which…

  • Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman leads Palantir’s Privacy and Civil Liberties Engineering Team. In this capacity he works extensively with local, state and international governments and philanthropic partners to develop technology-driven solutions to information sharing needs that respect applicable privacy, security and data integrity requirements. He does so in a way that is informed by experience and well…

  • Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto is an investment banker delivering advice and execution assistance to high growth businesses preparing for M&A and financial transactions. His company, KippsDeSanto, has developed a reputation for trusted execution support for companies in government contracting, aerospace, defense and cybersecurity. He leads teams that advise senior management, boards of directors and shareholders. The art…

  • Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter is a visionary investor who has pioneered investments in many new alternative investments classes including having been an early backer of hedge funds in 1982 while speculating on the Chicago Mercantile Exchange. He was also an early investor in Bitcoin and other cryptocurrency ecosystems and at a dinner with OODA CEO Matt Devost…

  • Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andrew (Andy) Lustig is a partner at the high tech law firm Cooley, where he focuses on private equity investments, mergers and acquisitions and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data…

  • Paul Pagnato, CEO and Founder at PagnatoKarp  and Author of The Transparency Wave
    ,

    Paul Pagnato, CEO and Founder at PagnatoKarp and Author of The Transparency Wave

    Paul Pagnato migrated from a career as a scientist looking for life in outer space to one of the top financial advisors in the U.S. with a keen eye for tracking innovation, exponential change, and other emerging global issues. He is also the author of the recent book, The Transparency Wave, which highlights the essential…

  • Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence
    ,

    Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence

    Bill Crowell is a senior executive with extensive experience in government (rose to the level of Deputy Director of the National Security Agency) and in industry. He has been a CEO of leading companies like Cylink, taking them through growth to acquisition. He has been a director of multiple public and private companies with a…

  • Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer is the #1 New York Times bestselling author of The Cupler Ring Trilogy (The Inner Circle, The Fifth Assassin, The President’s Shadow), The Escape Artist, The Book of Lies and many other thrillers loved by millions for their realism and well researched fact based themes and drama filled plots. He is also widely…

OODAcons