Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Ha! Aha! Ahahahahahahaha! DIA’s approach [to organizational change was] based on three principles. First, the agency discovered that any mechanism to facilitate change must be positioned outside DIA’s business units and must have the protection of top leadership. Second, it saw that structuring this mechanism should be done through raids – short-term pilot projects – instead of…
Quick turn around back to DC so enjoy these tidbits while I try to carve out some time for something more substantial: The War on Terror just got a lot harder, thanks to our “ally” Another data point on the generally bizarre clearance process. Still more details on why the SSCI report is at best…
I can now join the TSA queue and prepare for my probing with a smile knowing that my latest Standard piece is available for your reading pleasure. Thanks to Tom for the shout-out. Folks, if you think the SSCI report is anything but a political tool, you are deluding yourself. Should we expect more? Perhaps if…
A bipartisan group of senators is urging John Negroponte, the director of national intelligence, to see to it that an information-sharing implementation plan, as required by the Intelligence Reform and Terrorism Prevention Act of 2004, is submitted to Congress without further delay. The plan was due in July I think, and they can’t seem to…
H/T: Michael Rubin at The Corner Two basic urges meet head-on in this area, and conflict is inherent in this collision of interests. These urges reveal themselves in daily news accounts of killings and terrorism, of pressure groups in opposition, and of raw nationalism and naked expansionism masquerading as diplomatic maneuvers. The urges tie together…
If you’ve been tracking the discussion about Iraqi documents you know that my position is that we are a long way from getting to the bottom of this situation. How long? You might consider the length of time it took to come to this conclusion about another situation related to Iraq. You might also note…
CIA counterterrorism officers have signed up in growing numbers for a government-reimbursed, private insurance plan that would pay their civil judgments and legal expenses if they are sued or charged with criminal wrongdoing, according to current and former intelligence officials and others with knowledge of the program. The new enrollments reflect heightened anxiety at the…
The imagery . . . . . . or the memories . . .
150+ pages is a lot to go over with a day job, so I’ll take a meta-view by focusing on the Conclusions . . . My problem with all of these reports is highlighted in the first paragraph of Section II, when they invoke “The Comprehensive Report of the Special Advisor ….” My dictionary defines…
A former Pentagon analyst who passed highly classified intelligence to two Chinese military officers was sentenced to three months in prison yesterday — far shy of four to five years called for in sentencing guidelines. His excuses sound eerily similar to those given by Jonathan Pollard when he passed classified to the Israelis (he got…
Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…
In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…
OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…