Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Developing a Group Strategic Threat and Modus Operandi Profile Analytical Framework

    This paper will outline the conceptual contours of developing a Group Strategic Threat and Modus Operandi Profile (GSTMOP) Analytical Framework as an element of John P. Sullivan’s IPO and Transaction Analysis Cycle counterterrorism intelligence frameworks. It will examine the constellations of group variables such as group psychologies, group behaviors and structures, ideology, available weaponry and…

  • The iBigot List

    Teri O’Brien at The American Thinker considers the impact that Apple-like compartmentalization would have on . . . well . . . the IC: So, I think [DNI Negroponte] should resign, and President Bush should give [his] gig to Apple CEO Steve Jobs. To understand why, check out the article in this morning’s Wall Street…

  • Ever Forward

    Charlie is on the job: Years without an intelligence strategy to secure U.S. borders resulted in uncoordinated and sometimes incomplete threat information about immigrants, a top counterterrorism official said Wednesday. Only over the past year has the Bush administration begun to develop plans to analyze border security gaps with information gleaned from all the intelligence…

  • Discarding an Important Tool

    Given a chance to cut back on future leaks, the Senate balks: The U.S. Senate has refused to protect whistleblowers in intelligence agencies. The Senate last week passed a markedly different version of whistleblower protection legislation than the U.S. House of Representatives had previously approved, resulting in a call by one congressman for the creation…

  • Intelligence Reporting: Is “Good Enough” Good Enough?

    To say that I am on the anti-secrets-publication bandwagon would be something of an understatement, but while listening to various editors and reporters on the radio talking about the rightness or wrongness of revealing classified material during a time of war (which is a debatable point in some circles), a couple of questions occurred to…

  • Haste Makes Waste

    Nearly five years after the Sept. 11 attacks, the Departments of Justice and Homeland Security continue to clash over who is in charge of coordinating and vetting information on terrorism. As a result, state and local authorities continue to get conflicting or incomplete information – sometimes none at all – on threats inside the United…

  • So Much Data . . .

    . . . so little privacy: Almost every piece of personal information that Americans try to keep secret — including bank account statements, e-mail messages and telephone records — is semi-public and available for sale. That was the lesson Congress learned over the last week during a series of hearings aimed at exposing peddlers of…

  • When to Publish

    You will probably only find it in a second-hand bookstore (I found mine in Ottawa), or you can wait a month and maybe Amazon will be able to find a paperback version for you, but a great book on a fantastic intelligence success is The Double-Cross System by Sir J.C. Masterman. The short version: British…

  • WMD: Moving at the speed of government (Running Updates)

    Pesky details courtesy of Captain’s Quarters: I think that we have known of a handful of recovered chemical-weapons shells, but not 500. That number has more significance. An artillery company could have laid down a very effective attack on an enemy position, quickly killing or disabling them in a manner outlawed for decades. Of course,…

  • Please, Stop with the “Privacy” Arguments

    First, in light of recent events and because I am a good steward of the virtual planet, allow me to recycle this post as well as this one. Second, and at the risk of beating a dead horse, could we please stop with rating from privacy advocates about how government investigation into large pools of…


OODAcasts

  • Junaid Islam on Zero Trust Architecture

    Junaid Islam on Zero Trust Architecture

    In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam. Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose…

  • Scythe CEO Bryson Bort on Enhancing Security with Realistic Adversary Emulation

    Scythe CEO Bryson Bort on Enhancing Security with Realistic Adversary Emulation

    Bryson Bort is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a boutique cybersecurity consultancy. He is widely known in the cybersecurity community for helping advance concepts of defense across multiple critical domains. He is the co-founder of the ICS Village, a non-profit advancing awareness of industrial control…

  • Trond Undheim on the Future of Technology and a Framework for Analyzing Forces of Disruption

    Trond Undheim on the Future of Technology and a Framework for Analyzing Forces of Disruption

    Trond Undheim is a futurist, investor, consultant, executive, speaker, entrepreneur and podcaster. He produces widely impactful podcasts: Futurized, which tracks the underlying forces of disruption in tech, policy, business models, social dynamics and the environment, and Augmented, which reveals stories behind the new era of industrial operations.

  • Jeremy King on the greatest leaders he has ever seen (and how we can all keep learning leadership)

    Jeremy King on the greatest leaders he has ever seen (and how we can all keep learning leadership)

    Jeremy King is a trusted advisor to corporate boards and some of the nation’s most elite business leaders. He is also a serial connector helping move business information on opportunities at the intersection of talent, capital, entrepreneurs and business development. Jeremy is an entrepreneur himself, creating successful executive search firms and also a game-changing non-profit…

  • Ben Ford, Founder of Commando Development, on the OODA Loop and Tech Leadership

    Ben Ford, Founder of Commando Development, on the OODA Loop and Tech Leadership

    Ben Ford is the founder of Commando Development, a firm which leverages his deep background and experience in enterprise IT as well as his years in service as a Royal Marine to the benefit of technology teams in startups and large enterprises. In this OODAcast we discuss Ben’s views on the history of Commando’s, from…

  • Matt Devost on Entrepreneurship, Innovation, and Succeeding in Competitive Environments

    Matt Devost on Entrepreneurship, Innovation, and Succeeding in Competitive Environments

    OODA CEO Matt Devost has a track record of executing on innovation via entrepreneurship. You may also know him as the Co-Host of the OODAcast or perhaps through his role as a technologist and international security expert. He has extensive past performance in cybersecurity, counterterrorism, critical infrastructure protection, intelligence, and risk management issues.

  • Jim Clapper Shares Wisdom From A Career in Operational Intelligence
    ,

    Jim Clapper Shares Wisdom From A Career in Operational Intelligence

    Security, Risk Management and Intelligence professionals all know of Jim Clapper, this week’s OODAcast guest. He had a long and distinguished career in the US Air Force, which included leadership spanning the Vietnam era all the way to the end of the Cold War. By the time he retired he was a three star General,…

  • Ray Wang, CEO and Founder of Constellation Research, On The Business Impact of Technology
    ,

    Ray Wang, CEO and Founder of Constellation Research, On The Business Impact of Technology

    In this week’s OODAcast we interview Ray Wang, CEO of Constellation Research. Ray is a great leader, evidenced by the people he has attracted to his firm. I know many of his team and can say for a fact that they are people who can do just about anything they want (which means they are…

  • Lisa Porter On Innovation, Technology, Security and Lessons in Leadership

    Lisa Porter On Innovation, Technology, Security and Lessons in Leadership

    Lisa J. Porter has successfully lead some of the world’s largest and most critical technology efforts. Her career started with a focus on academic rigor in pursuit of some of the toughest degrees, a B.S. in Nuclear Engineering from MIT and a PhD in Applied Physics from Stanford. She would later lecture at MIT and…

  • Nate Fick on Dynamic Leadership and Adapting to Change

    Nate Fick on Dynamic Leadership and Adapting to Change

    Nate Fick’s career has been eclectic, but with a common element of demonstrating superior leadership abilities in a diverse array of successful opportunities. Nate is currently a General Manager at Elastic, having joined the firm with their acquisition of Endgame where he served as CEO.

OODAcons