Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Let the Flailing Begin

    So controversial is the forthcoming National Intelligence Estimate on Iraq, say officials and observers, that even the terms of reference are likely to be the subject of intense, but highly secret, discussion and debate. Somewhere in a conference room in Northern Virginia, roughly two-dozen seniors and their backups are sitting around a table and bickering…

  • Here Comes the Judge

    The plot has also revealed the indispensability of good counterterrorism intelligence. A defense against terrorists, as against other enemies of the nation, must be multilayered to have a reasonable chance of being effective. One of the outer defenses is intelligence, designed to detect plots in advance so that they can be thwarted. One of the…

  • As they bloody well should

    The [UK] Government is discussing with airport operators plans to introduce a screening system that allows security staff to focus on those passengers who pose the greatest risk. The passenger-profiling technique involves selecting people who are behaving suspiciously, have an unusual travel pattern or, most controversially, have a certain ethnic or religious background. The system…

  • No connection . . .

    . . . execpt for the tactic. Incredible: The FBI said Monday it had no information to indicate that the three Texas men arrested in Michigan with about 1,000 cell phones in their van had any direct connection to known terrorist groups. Also, a prosecutor in a separate Ohio case said he can¹t prove a…

  • I don’t buy it

    This is what passes for CT analysis at Time. Acceptance that this is less an AQ issue than it is a terrorism issue is a nice change of pace from the class that loves to poo-poo any disrupted plot that doesn’t reveal the perps had wallets full of AQ business cards. Note however the quick…

  • The Difference Between LE and DI

    As a friend from one of the Commonwealth nations points out, “Nice job by the domestic intelligence service,” which is his subtle but well-meaning dig at both our FBI and larger intelligence apparatus. Domestic tip-off; foreign intelligence supplement; and allied intel cooperation all operationalized for the door-kickers inside of a year. Were this a US…

  • Clarity, Quick Hits & A Suggestion

    As I alluded to earlier, it is a little hard to accurately assess things if you’re not prepared to use accurate if un-PC language. US and UK media might have an aversion to mentioning the Muslim connection, but the Italian media apparently does not. Ethnic and religious descriptions are hardly immaterial in situations like this,…

  • More Terror Plot Short Takes

    Bloody day job . . . Surveillance, electronic or otherwise, works:  By late 2005, the probe had expanded to involve several hundred investigators on three continents. They kept dozens of suspects under close surveillance for months, even as some of the plotters traveled between Britain and Pakistan to raise money, find recruits and refine their…

  • Go Big Blue

    As a guy who knows a thing or two about warning systems, I watched again with dismay the misuse and abuse of the homeland security advisory system today. Granted, it isn’t really a “warning” system per se, but the general concept is the same: give people a quick way to assess the threat. The problem…

  • Curious

    This by Evan Kohlmann on the CT Blog yesterday 8/9: Participants on key Arabic-language Al-Qaida chat forums on the Internet have announced their intent to launch collective cyberterrorist attacks tomorrow, August 10, aimed at interrupting or denying service to other pro-Israeli websites–namely the “Internet Haganah” cyberterror watchdog site run by Aaron Weisburd. […] . .…


OODAcasts

  • David Greenberg on Decision-making in Volatile Markets

    While the OODA Loop was been heralded in the domain of conflict, we often find the concept in business and there is no greater business analogy to dogfighting that David Greenberg’s experience as a trader on the floor of the world’s largest physical commodities exchange. David’s job required rapid decision making based on constantly changing…

  • Katharina McFarland on Winning in the Age of Artificial Intelligence
    ,

    Katharina McFarland on Winning in the Age of Artificial Intelligence

    Katharina McFarland has led change in a wide array of national security domains including Space, Missile Defense, Acquisition and Nuclear Posture. She is a former Assistant Secretary of Defense for Acquisition (ASD(A) and a former Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASAALT).  She currently serves on several corporate boards and as…

  • John Spencer on Connected Soldiers and the Future of Conflict
    ,

    John Spencer on Connected Soldiers and the Future of Conflict

    John Spencer is a writer, thinker, speaker scholar who currently serves as the Chair of Urban Warfare Studies at the US Military Academy. He brings the experience of a veteran who has led in combat to his work, and in his latest book, Connected Soldiers, also provides insights from his time as a stay at…

  • Duyane Norman on Disrupting the CIA to Deal with Emerging Threats
    ,

    Duyane Norman on Disrupting the CIA to Deal with Emerging Threats

    Duyane Norman spent nearly 30 years in the CIA with three Chief of Station and multiple other tours in a variety of interesting geographies and also had a focus on technology issues serving as Deputy Director of the Office of Technical Service within CIA’s Directorate of Science and Technology, and as a member of the…

  • First Federal CISO Greg Touhill on Advanced Cybersecurity by Design

    First Federal CISO Greg Touhill on Advanced Cybersecurity by Design

    Greg Touhill is one of the nation’s premier cybersecurity, information technology and risk management leaders. As an Air Force officer he led technology efforts in some of our nation’s most demanding organizations including combatant commands during time of war. He is an accomplished speaker and author and business executive and also served as our nation’s…

  • Former Tenable CEO Ron Gula Applies a Hacker Mindset to Investing, Public Awareness, and Philanthropy

    Former Tenable CEO Ron Gula Applies a Hacker Mindset to Investing, Public Awareness, and Philanthropy

    In this OODAcast, we interview Ron Gula, co-founder and CEO of the highly successful Tenable Security(NASDAQ:TENB) and currently President of Gula Tech Adventures. Ron has a long history in the cybersecurity field that includes starting his career as an NSA hacker and then transitioning into an entrepreneur responsible for multiple innovations in the market and…

  • Jim Lawler on the Art of Espionage and the Perfect Intelligence Operation
    ,

    Jim Lawler on the Art of Espionage and the Perfect Intelligence Operation

    In this OODAcast, we talk with Jim Lawler who is a Senior Partner at MDO Group, which provides HUMINT training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues. Mr. Lawler is a noted speaker on the Insider Threat in government and industry. Prior to this, Mr. Lawler…

  • Lifelong Hacker and Experienced Security Executive Alyssa Miller, Author of Cybersecurity Career Guide
    ,

    Lifelong Hacker and Experienced Security Executive Alyssa Miller, Author of Cybersecurity Career Guide

    Alyssa Miller is a life-long hacker and highly experienced security executive who has a passion for security and the security community. She is an excellent advocate for continuous improvement in the community and a frequent speaker to audiences of both fellow business leaders and security community audiences. This combined with her deep experience in the…

  • Dr. Scott Shumate Profiles Russian President Vladimir Putin

    Dr. Scott Shumate Profiles Russian President Vladimir Putin

    This OODAcast is a special edition focused on profiling Russian President Vladimir Putin with Dr. Scott Shumate, who has over 30 years of experience evaluating national leaders, terrorists, spies, and insiders.  Scott shares his unique perspective’s on Putin informed by his extensive experience and insight. Is Putin suicidal? Is he a rational actor? Will he escalate…

  • Chris Butler on the Value of Adversarial Thinking in Product Design and Management

    Chris Butler on the Value of Adversarial Thinking in Product Design and Management

    In this OODACast, Matt talks with Chris Butler about how concepts like adversarial thinking can be applied to product design and management.  Chris is an exemplar of someone who has excelled in his field but also looks to study and bring disruptive ideas like randomness and future framing from other disciplines to determine their value…

OODAcons