Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • DOD wants contractors to safeguard unclassified info, report breaches

    “Federal contractors whose information systems contain unclassified Defense Department information would have to safeguard that information from unauthorized access and notify DOD of any breaches under a proposed rule published today.” (Source: DOD wants contractors to safeguard unclassified info, report breaches — Federal Computer Week.)

  • Biggest-ever criminal botnet links computers in more than 172 countries

    “Computer security experts say they have detected what appears to be the world’s largest-ever computer ‘botnet,’ a network of millions of computers controlled clandestinely by a criminal cyber gang with roots in Eastern Europe.” (Source: Biggest-ever criminal botnet links computers in more than 172 countries – CSMonitor.com.)

  • Cyber attack on Gannett targets U.S. soldiers

    “Hackers broke into a Gannett Co database containing personal information about subscribers to publications read by U.S. government officials, military leaders and rank-and-file soldiers, the media company said on Tuesday.” (Source: Cyber attack on Gannett targets U.S. soldiers – baltimoresun.com.)

  • Feds Identify Top 25 Software Vulnerabilities

    “Department of Homeland Security worked with non-profits and the private sector to come up with a list of the most worrisome threats and how organizations can mitigate them.” (Source: Feds Identify Top 25 Software Vulnerabilities — InformationWeek.)

  • Old worm won’t die after 2008 attack on U.S. military

    “Three years after what the Pentagon called the most significant breach of U.S. military networks ever, new versions of the malware blamed for the attack are still roiling U.S. networks, Reuters has learned.” (Source: Old worm won’t die after 2008 attack on U.S. military | Reuters.)

  • Pentagon’s advanced research arm tackles cyberspace

    “The Pentagon’s advanced research arm, the same group credited with developing the forerunner of the Internet in the 1960s, is working on many fronts to boost U.S. defenses against computer-generated attacks.” (Source: Pentagon’s advanced research arm tackles cyberspace | Reuters.)

  • Project Responder: National Technology Plan for Emergency Response to Catastrophic Terrorism

    The National Memorial Institute for the Prevention of Terrorism (MIPT) in Oklahoma City focuses on “preventing and deterring terrorism or mitigating its effects.” Since April 2001, MIPT has funded Project Responder, an effort by Hicks & Associates, Inc. and the Terrorism Research Center, Inc., aimed ultimately at improving local, state and federal emergency responders’ capabilities…

  • Organized Crime and Terrorist Activity in Mexico, 1999-2002

    This study is based on open source research into the scope of organized crime and terrorist activity in the Republic of Mexico during the period 1999 to 2002, and the extent of cooperation and possible overlap between criminal and terrorist activity in that country. The analyst examined those organized crime syndicates that direct their criminal…

  • Intelligence Co-production and Transaction Analysis for Counterterrorism and Counter-netwar

    Combatting networked threats requires new approaches to producing intelligence to support a range of operations. Contemporary networked threats include terrorism and insurgency. This paper describes the need for a distributed global network for the co-production of intelligence. It introduces the concept of Intelligence Preparation for Operations (IPO) and describes a transaction analysis model suited to…

  • Intelligence-led Mitigation

    This paper explores methods for capitalizing on existing law enforcement intelligence capabilities to provide intelligence support to decision makers for a full spectrum of public safety and emergency service operations. Intelligence-led mitigation is a management philosophy and business process to proactively guide strategic, operational, and tactical decisions for mitigating the effects of intentional, accidental, and…


OODAcasts

OODAcons