Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Security Researchers Discover the Mother of All Botnets

    “A new strain of the TDSS malware has been pegged as ‘the most sophisticated threat’ to computer security in the world today by a Kaspersky Labs researcher and is being used to slave more than 4.5 million PCs in a massive botnet that’s equipped with an ‘anti-virus’ to prevent other bot-creating viruses from taking it…

  • DOD wants contractors to safeguard unclassified info, report breaches

    “Federal contractors whose information systems contain unclassified Defense Department information would have to safeguard that information from unauthorized access and notify DOD of any breaches under a proposed rule published today.” (Source: DOD wants contractors to safeguard unclassified info, report breaches — Federal Computer Week.)

  • Biggest-ever criminal botnet links computers in more than 172 countries

    “Computer security experts say they have detected what appears to be the world’s largest-ever computer ‘botnet,’ a network of millions of computers controlled clandestinely by a criminal cyber gang with roots in Eastern Europe.” (Source: Biggest-ever criminal botnet links computers in more than 172 countries – CSMonitor.com.)

  • Cyber attack on Gannett targets U.S. soldiers

    “Hackers broke into a Gannett Co database containing personal information about subscribers to publications read by U.S. government officials, military leaders and rank-and-file soldiers, the media company said on Tuesday.” (Source: Cyber attack on Gannett targets U.S. soldiers – baltimoresun.com.)

  • Feds Identify Top 25 Software Vulnerabilities

    “Department of Homeland Security worked with non-profits and the private sector to come up with a list of the most worrisome threats and how organizations can mitigate them.” (Source: Feds Identify Top 25 Software Vulnerabilities — InformationWeek.)

  • Old worm won’t die after 2008 attack on U.S. military

    “Three years after what the Pentagon called the most significant breach of U.S. military networks ever, new versions of the malware blamed for the attack are still roiling U.S. networks, Reuters has learned.” (Source: Old worm won’t die after 2008 attack on U.S. military | Reuters.)

  • Pentagon’s advanced research arm tackles cyberspace

    “The Pentagon’s advanced research arm, the same group credited with developing the forerunner of the Internet in the 1960s, is working on many fronts to boost U.S. defenses against computer-generated attacks.” (Source: Pentagon’s advanced research arm tackles cyberspace | Reuters.)

  • Project Responder: National Technology Plan for Emergency Response to Catastrophic Terrorism

    The National Memorial Institute for the Prevention of Terrorism (MIPT) in Oklahoma City focuses on “preventing and deterring terrorism or mitigating its effects.” Since April 2001, MIPT has funded Project Responder, an effort by Hicks & Associates, Inc. and the Terrorism Research Center, Inc., aimed ultimately at improving local, state and federal emergency responders’ capabilities…

  • Organized Crime and Terrorist Activity in Mexico, 1999-2002

    This study is based on open source research into the scope of organized crime and terrorist activity in the Republic of Mexico during the period 1999 to 2002, and the extent of cooperation and possible overlap between criminal and terrorist activity in that country. The analyst examined those organized crime syndicates that direct their criminal…

  • Intelligence Co-production and Transaction Analysis for Counterterrorism and Counter-netwar

    Combatting networked threats requires new approaches to producing intelligence to support a range of operations. Contemporary networked threats include terrorism and insurgency. This paper describes the need for a distributed global network for the co-production of intelligence. It introduces the concept of Intelligence Preparation for Operations (IPO) and describes a transaction analysis model suited to…


OODAcasts

  • The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks
    ,

    The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks

    Bob Bigman spent a career in the intelligence community. He was the CISO of the CIA where he was tasked with leading efforts to protect the nation’s most sensitive secrets. Since 2012 he has provided direct consulting services to CISOs, CIOs, CTOs and CEOs seeking to reduce risk and improve security programs. Through it all…

  • Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications
    , ,

    Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications

    In this OODAcast we glean lessons learned and insights into the future of the Metaverse and its implications from Randall Fort. Fort is a seasoned security, intelligence and technology leader known for his grasp of enterprise mission needs and his ability to track the rapid advancing capabilities of technology to meet those needs. His background…

  • Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…

  • Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives
    ,

    Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives

    Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…

  • Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…

  • Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…

  • Jer Thorp on Living in Data and Creating Better Futures

    Jer Thorp on Living in Data and Creating Better Futures

    Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…

  • Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…

  • Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…

  • Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…

OODAcons