Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Opportunity (Update)

    Iraq’s national security adviser said Thursday a “huge treasure” of documents and computer records was seized after the raid on terror leader Abu Musab al-Zarqawi’s hideout, giving the Iraqi government the upper hand in its fight against al-Qaida in Iraq. […] When asked how he could be sure the information was authentic, al-Rubaie said “there…

  • HLS: Serious or Not Serious XV

    Emphasis mine: U.S. immigration officials said on Wednesday they had arrested 55 illegal immigrants who were working at a construction site in the secure area at Dulles International Airport.

  • Fmr DEPSECDEF Hits Nail on Head

    Dr. Hamre’s comments in Federal Times. The kicker: To date, most investments in new technology have not produced major productivity improvements because we have introduced new technology into unchanging organizations with inflexible operational concepts. Computers simply streamlined obsolete business practices. True productivity will come only when we break free of the current structure and let…

  • So Much for Oversight (Update)

    Incomprehensibly, there are reports that House Minority Leader Nancy Pelosi has decided to oust fellow Rep. Jane Harman of California in January as the top Democrat on the House Permanent Select Committee on Intelligence. Mrs. Pelosi intends to replace Mrs. Harman in her Intelligence Committee leadership role with Rep. Alcee Hastings of Florida, who, depending…

  • It’s gettin’ kinda hectic

    Spooky86 sends out a Warning Report: From today’s Financial Times comes word that North Korea may be planning a test-launch of its Tapeo Dong 2 (TD-2) missile from a test site along its northeastern coast. A test launch of the missile’s medium-range predecessor (designated the TD-1) created an international incident in 1998, when the missile…

  • Why Indeed?

    WaPo associated editor Robert Kaiser tries to justify the publication of secrets. The gem: Labeling something “classified” or important to “national security” does not make it so. The government overclassifies with abandon. And the definition of “national security” is elusive. Some politicians act as though revealing any classified information threatens our nation’s security, but that…

  • Pesky Details (will help win the war)

    Via Powerline: All that paper, all those hard drives, all those unanswered questions, so little time . . . What’s that you say? The war is over? This is just history? The war is approaching the 30-year mark with no sign of respite as long as we keep deluding ourselves that martial victory in a…

  • Keepin’ it Real

    Real insecure: The Department of Homeland Security allowed a man to enter its headquarters last week using a fake Matricula Consular card as identification, despite federal rules that say the Mexican-issued card is not valid ID at government buildings. Bruce DeCell, a retired New York City police officer, used his phony card — which lists…

  • Avast!

    A computer hacker got into the U.S. agency that guards the country’s nuclear weapons stockpile and stole the personal records of at least 1,500 employees and contractors, a senior U.S. lawmaker said on Friday. The target of the hacker, the National Nuclear Safety Administration, is the latest agency to reveal that sensitive private information about…

  • Oldie but Goodie

    Military officials insist their case [in 2003] for attacking Zarqawi¹s operation [a terrorist camp in Iraq] was airtight, but the administration feared destroying the terrorist camp in Iraq could undercut its case for war against Saddam. Al-Qaida in Iraq before the war. Iraq, that place run by Saddam, the guy who would never work with…


OODAcasts

  • Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…

  • Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives
    ,

    Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives

    Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…

  • Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…

  • Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…

  • Jer Thorp on Living in Data and Creating Better Futures

    Jer Thorp on Living in Data and Creating Better Futures

    Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…

  • Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…

  • Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…

  • Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…

  • ,

    Kim Zetter on Understanding the Realities of Cyberthreats and How Code Has a Story to Tell

    This week’s OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades.  Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today’s security environment. Kim also shares details as to how she…

  • Junaid Islam on Zero Trust Architecture

    Junaid Islam on Zero Trust Architecture

    In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam. Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose…

OODAcons