Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • It’s Getting Kinda Technic(al)

    A reminder that there is more to intelligence and security than policy-wonk stuff . . . The older I get the less proficient in technology I get, but there was a time when I was fairly ‘l33t (get your kids to explain it to you). Today I’m in the running for the world’s worst computer science grad and I’m rapidly…

  • Breakfast, not at Tiffany’s (Update)

    There was plenty of Splenda thank goodness, which went well with the Japanese-style breakfast.* CSPAN was there, but it isn’t on the site yet as far as I can tell. Additional press coverage here and here.** Chairman Hoekstra was on his game as always, and Dr. Ledeen was as gracious a host as one could have wanted. Quick…

  • How Not to Promote Sharing

    The Homeland Security Information Network came under fire today from the Homeland Security Department’s Office of the Inspector General, which said management and trust problems have undermined the project. HSIN was intended to be a network for developing and disseminating threat alerts, notifications and warnings among public safety organizations, emergency personnel, and state and local…

  • Cyber Security: Captain Wanted (Update)

    One can have varying degrees of concern over “cyber” terrorism or how badly we might suffer were someone to go EBO on us, but I think we can all agree that while planning may continue, a rudderless ship is still unlikely to reach its destination. We have been hearing about what a high priority this…

  • The Lab No One Ever Heard Of

    Ha! Aha! Ahahahahahahaha! DIA’s approach [to organizational change was] based on three principles. First, the agency discovered that any mechanism to facilitate change must be positioned outside DIA’s business units and must have the protection of top leadership. Second, it saw that structuring this mechanism should be done through raids – short-term pilot projects – instead of…

  • Monday Quick Hits

    Quick turn around back to DC so enjoy these tidbits while I try to carve out some time for something more substantial: The War on Terror just got a lot harder, thanks to our “ally” Another data point on the generally bizarre clearance process. Still more details on why the SSCI report is at best…

  • It’s Academic

    I can now join the TSA queue and prepare for my probing with a smile knowing that my latest Standard piece is available for your reading pleasure.  Thanks to Tom for the shout-out. Folks, if you think the SSCI report is anything but a political tool, you are deluding yourself. Should we expect more? Perhaps if…

  • Intel Sharing: Get On With It

    A bipartisan group of senators is urging John Negroponte, the director of national intelligence, to see to it that an information-sharing implementation plan, as required by the Intelligence Reform and Terrorism Prevention Act of 2004, is submitted to Congress without further delay. The plan was due in July I think, and they can’t seem to…

  • Far Reaching Indeed

    H/T: Michael Rubin at The Corner Two basic urges meet head-on in this area, and conflict is inherent in this collision of interests. These urges reveal themselves in daily news accounts of killings and terrorism, of pressure groups in opposition, and of raw nationalism and naked expansionism masquerading as diplomatic maneuvers. The urges tie together…

  • Timeframe

    If you’ve been tracking the discussion about Iraqi documents you know that my position is that we are a long way from getting to the bottom of this situation. How long? You might consider the length of time it took to come to this conclusion about another situation related to Iraq. You might also note…


OODAcasts

  • Operational Cybersecurity Leader Cameron Over

    Operational Cybersecurity Leader Cameron Over

    Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…

  • Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Phil Reitinger has been been a pioneer in cutting edge concepts for reducing risks in cyberspace for years. He was a special assistant US Attorney in the late 1990’s, a time when high end nation state attacks were on the rise and the application of US law to help counter threats was in a nascent…

  • Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…

  • Quantum Security Practitioner Jane Melia of QuintessenceLabs

    Quantum Security Practitioner Jane Melia of QuintessenceLabs

    In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies.…

  • Former CIA CTO Bob Flores on Accelerating Technology Disruption

    Former CIA CTO Bob Flores on Accelerating Technology Disruption

    OODA CTO Bob Gourley was joined by former CTO of the CIA Bob Flores in a discussion on the state of enterprise technology, resulting in this next in our series designed to provide actionable insights to leaders in business and government. Bob is a member of the OODA Network and was one of the scheduled…

  • Tony Cole On Deception In Cyber Operations

    Tony Cole On Deception In Cyber Operations

    OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…

  • Lewis Shepherd on Government Mission Needs

    Lewis Shepherd on Government Mission Needs

    In this second of a two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are…

  • David Bray On Today’s Global Risk Environment

    David Bray On Today’s Global Risk Environment

    This is part two of our series with Dr. David Bray of the Atlantic Council’s Geotech Center. This second of two parts covers questions businesses should be asking about today’s global risk environment and approach to knowing what comes next. The session is full of important advice on how to survive and thrive in and…

  • Dan Gerstein of RAND Corporation on The Story of Technology
    ,

    Dan Gerstein of RAND Corporation on The Story of Technology

    OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation.  Dan is also the author of the recently released book entitled “The Story of Technology”.

OODAcons