Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
As mentioned previously, I participated in a panel discussion about captured media at the Heritage Foundation on Tuesday. Most of the thunder was stolen by HPSCI Chairman Hoekstra, but I didn’t mind. The guy has his finger on the pulse of related issues and frankly I wouldn’t have cared if he had talked the whole…
Crypto star and security maven Schneier trots out an academic ally to beat the “data mining is bad” horse: Floyd Rudmin, a professor at a Norwegian university, applies the mathematics of conditional probability, known as Bayes’ Theorem, to demonstrate that the NSA’s surveillance cannot successfully detect terrorists unless both the percentage of terrorists in the…
Some US intelligence experts say the government should rethink how it gathers information in the war on terror. Four intelligence community veterans led by former C-I-A deputy director Richard Kerr offer their assessment in an unofficial C-I-A journal. The group was tasked with studying how the agency botched its assessment of Saddam Hussein’s weapons of…
A Senate intelligence panel is pushing the National Security Agency to open its databases of raw signals intelligence to a wider audience within the intelligence community. […] The Senate Select Committee on Intelligence ordered the NSA and the Defense Intelligence Agency to arrive at an agreement by the end of August to extend access to…
In another story that may not make the White House happy, The New York Times on Sunday reported that it had obtained what it calls “a sharply worded letter” by a top Republican sent to President Bush on May 18, which charged that the administration “might have violated the law by failing to inform Congress…
A friend from the biz used to say that after a few days out of the office he would delete any emails or other messages older than 72 hours old; odds are that whatever was being discussed prior to that point was likely to have been overtaken-by-events, so why bother wasting time trying to catch…
A government consultant, using computer programs easily found on the Internet, managed to crack the FBI’s classified computer system and gain the passwords of 38,000 employees, including that of FBI Director Robert S. Mueller III. The break-ins, which occurred four times in 2004, gave the consultant access to records in the Witness Protection Program and…
Teri O’Brien at The American Thinker considers the impact that Apple-like compartmentalization would have on . . . well . . . the IC: So, I think [DNI Negroponte] should resign, and President Bush should give [his] gig to Apple CEO Steve Jobs. To understand why, check out the article in this morning’s Wall Street…
In this OODAcast we interview Michel Kwon, the founder and CEO of W@tchTower. She is a leader who has proven herself through an ability to success in three different career fields, first as a developer and programmer creating enterprise grade solutions, then as a government executive who would eventually lead the United States Computer Emergency Readiness…
Masha Sedova is an award-winning people-security expert, speaker, and entrepreneur focused on helping companies transform employees from a risk into a key element of defense. She has been a part of our OODA Network for years, including speaking at our legacy FedCyber event, where she introduced the behavior-based and gamified cybersecurity training and awareness she…
Paul Kurtz is an internationally recognized expert on cybersecurity and the Co-Founder and Chairman of TruSTAR. In this OODAcast we dive into Paul’s views on the cybersecurity landscape today and learn more about his approach to decision-making. We discuss a new concept he has been shepherding in the community regarding how cyber intelligence can be…