Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Security Researchers Discover the Mother of All Botnets

    “A new strain of the TDSS malware has been pegged as ‘the most sophisticated threat’ to computer security in the world today by a Kaspersky Labs researcher and is being used to slave more than 4.5 million PCs in a massive botnet that’s equipped with an ‘anti-virus’ to prevent other bot-creating viruses from taking it…

  • DOD wants contractors to safeguard unclassified info, report breaches

    “Federal contractors whose information systems contain unclassified Defense Department information would have to safeguard that information from unauthorized access and notify DOD of any breaches under a proposed rule published today.” (Source: DOD wants contractors to safeguard unclassified info, report breaches — Federal Computer Week.)

  • Biggest-ever criminal botnet links computers in more than 172 countries

    “Computer security experts say they have detected what appears to be the world’s largest-ever computer ‘botnet,’ a network of millions of computers controlled clandestinely by a criminal cyber gang with roots in Eastern Europe.” (Source: Biggest-ever criminal botnet links computers in more than 172 countries – CSMonitor.com.)

  • Cyber attack on Gannett targets U.S. soldiers

    “Hackers broke into a Gannett Co database containing personal information about subscribers to publications read by U.S. government officials, military leaders and rank-and-file soldiers, the media company said on Tuesday.” (Source: Cyber attack on Gannett targets U.S. soldiers – baltimoresun.com.)

  • Feds Identify Top 25 Software Vulnerabilities

    “Department of Homeland Security worked with non-profits and the private sector to come up with a list of the most worrisome threats and how organizations can mitigate them.” (Source: Feds Identify Top 25 Software Vulnerabilities — InformationWeek.)

  • Old worm won’t die after 2008 attack on U.S. military

    “Three years after what the Pentagon called the most significant breach of U.S. military networks ever, new versions of the malware blamed for the attack are still roiling U.S. networks, Reuters has learned.” (Source: Old worm won’t die after 2008 attack on U.S. military | Reuters.)

  • Pentagon’s advanced research arm tackles cyberspace

    “The Pentagon’s advanced research arm, the same group credited with developing the forerunner of the Internet in the 1960s, is working on many fronts to boost U.S. defenses against computer-generated attacks.” (Source: Pentagon’s advanced research arm tackles cyberspace | Reuters.)

  • Project Responder: National Technology Plan for Emergency Response to Catastrophic Terrorism

    The National Memorial Institute for the Prevention of Terrorism (MIPT) in Oklahoma City focuses on “preventing and deterring terrorism or mitigating its effects.” Since April 2001, MIPT has funded Project Responder, an effort by Hicks & Associates, Inc. and the Terrorism Research Center, Inc., aimed ultimately at improving local, state and federal emergency responders’ capabilities…

  • Organized Crime and Terrorist Activity in Mexico, 1999-2002

    This study is based on open source research into the scope of organized crime and terrorist activity in the Republic of Mexico during the period 1999 to 2002, and the extent of cooperation and possible overlap between criminal and terrorist activity in that country. The analyst examined those organized crime syndicates that direct their criminal…

  • Intelligence Co-production and Transaction Analysis for Counterterrorism and Counter-netwar

    Combatting networked threats requires new approaches to producing intelligence to support a range of operations. Contemporary networked threats include terrorism and insurgency. This paper describes the need for a distributed global network for the co-production of intelligence. It introduces the concept of Intelligence Preparation for Operations (IPO) and describes a transaction analysis model suited to…


OODAcasts

  • Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack is widely known in the cybersecurity world for his pioneering work on disclosing and discussing computer vulnerabilities (the CVE  (common vulnerabilities and exposures) list). He also helped formalize and train leading approaches to threat modeling and wrote the foundational book on the subject (Threat Modeling: Designing for Security). In this OODAcast we seek…

  • Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby joined the OODAcast for a discussion about the Power Law in venture capital and the rise of the global hedge fund and private equity industries.

  • Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Neil Wiley has lead some of the US Intelligence Community’s most important analytical functions. His career in intelligence began as a Naval Intelligence Officer in an operational intelligence center focused on support to critical operational naval missions. He would later serve joint intelligence missions in Europe, would rise to lead all analytical activities at the…

  • Michael Gibson Wants to Light the Paper Belt on Fire

    Michael Gibson Wants to Light the Paper Belt on Fire

    This OODAcast features a fascinating conversation with Michael Gibson, the author of the book “Paper Belt on Fire” who is also the co-founder of the Thiel Fellowship program and the 1517 Fund, both of which focus on identifying unconventional ideas and individuals that can drive disruptive innovation in technology, arts, and science.

  • Jimmy Soni on Why PayPal Was Successful
    ,

    Jimmy Soni on Why PayPal Was Successful

    In this OODAcast, we talk with Jimmy Soni, the author of the book “The Founders: The Story of PayPal and the Entrepreneurs Who Shaped Silicon Valley”. Jimmy takes a deep, historical look at the founding story of PayPal with detailed analysis, interviews, and access that you won’t find in any other telling of the PayPal…

  • Jen Hoar on Corporate Intelligence and Investigations

    Jen Hoar on Corporate Intelligence and Investigations

    In this OODAcast we interview one of our close friends and OODA network members, Jen Hoar. Jen is a former journalist-turned-corporate investigator who has leveraged the potent act of asking, and listening, to turn strangers into sources and contacts into clients. Her expertise, which is clearly also her passion, is identifying and interviewing smart people…

  • Joseph Menn on Observations From Tech Journalism
    ,

    Joseph Menn on Observations From Tech Journalism

    Covering technology issues, and specifically cybersecurity as a journalist is a tough endeavor. Some of these technologies are complex as are the security vulnerabilities often inherent in their deployment and making these topics broadly accessible can be a challenge. Many of the underlying issues touch upon national security and civil liberties creating an interesting nexus…

  • Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman has researched and reported on quantum technologies from the beginning of the discipline of quantum computing. He is now the President of Inside Quantum Technology (IQT), which provides in-depth business intelligence for the quantum technology industry. IQT also runs several major quantum technology conferences as well as a quantum industry news service. On…

  • 100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    In 2020, we launched the OODAcast video and podcast series designed to provide insightful analysis and actionable intelligence to decision makers. In this 100th episode, co-hosts Matt Devost and Bob Gourley review some of the key insights from the series. Matt and Bob also discuss a OODA’s recent assessment of risks and opportunities given the…

  • David Greenberg on Decision-making in Volatile Markets

    While the OODA Loop was been heralded in the domain of conflict, we often find the concept in business and there is no greater business analogy to dogfighting that David Greenberg’s experience as a trader on the floor of the world’s largest physical commodities exchange. David’s job required rapid decision making based on constantly changing…

OODAcons