Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • DHS Runs Out of Pork Loin (Update & Bump Up)

    The Department of Homeland Security yesterday slashed anti-terrorism money for Washington and New York, part of an immediately controversial decision to reduce grant funds for major urban areas in the Northeast while providing more to mid-size cities from Jacksonville to Sacramento. The announcement that the two cities targeted on Sept. 11, 2001, would suffer 40…

  • Imagine That!

    They have a plan, they have a pattern . . . Armed with details of billions of telephone calls, the National Security Agency used phone records linked to the Sept. 11, 2001 attacks to create a template of how phone activity among terrorists looks, say current and former intelligence officials who were briefed about the…

  • Jihad via PSP

    Gamers quibble over trees while missing a forest: Was an elite congressional intelligence committee shown video footage from an off-the-shelf retail game and told by the Pentagon and a highly-paid defense contractor that it was a jihadist creation designed to recruit and indoctrinate terrorists? It’s looking more and more like that is the case. The…

  • Preparing to Fail

    A long post derived from Inside the Pentagon (subscription): Retired Marine Corps Lt. Gen. Paul Van Riper, who led a “red team” of notional enemy forces at the outset of JFCOM’s Millennium Challenge 2002 war game, is calling on the command to spell out publicly how the experiment has influenced the Defense Department view of…

  • Nicely Done Mr. Barone

    Acting on Assumptions with Iran & Iraq: To learn lessons from history, including recent history, it’s essential to get the history right. That’s why, in order to understand what to do about the mullahs’ regime in Iran, it’s worth revisiting the debate over the intelligence in Iraq. . . . and that’s just the first…

  • De Oppresso Liber

    Work (I won’t call it duty) calls and finds me at the keyboard when I should be doing something that a lot of brothers are unable to do today: enjoying their families. In between flashes of corporate panic I find myself visiting the ‘sphere and taking note of those who are intentionally still blogging today,…

  • Get Ready for the RIF

    A very interesting entry at Strategy Page, with the most significant points brought out in the second paragraph: DoD is overhauling its entire intelligence apparatus …The plans are pretty ambitious, and are partially implemented. The basic idea is to take advantage of abundant computer power, and affordable networking, to tie together as many troops, vehicles…

  • Piling on Wehner

    Not that he needs it but . . . Misleading Intel: Everyone (not just some US political cabal) thought Iraq had WMD. We’ve found arty shells with nerve-agent (sarin) in them; documents placing orders for precursor chemicals used to make this thing called Zyklon-B (famously used by another tyrant decades ago); and shady-looking mobile labs…

  • Nice Try (NSA critique) (Update)

    One of the better attempts to critique the NSA’s efforts today in the NY Times: If the program is along the lines described by USA Today — with the security agency receiving complete lists of who called whom from each of the phone companies — the object is probably to collect data and draw a…

  • Now THIS Creeps Me Out

    So the other day I tried to use my credit card to buy something, and it was denied even though I knew perfectly well my credit card was just fine. So I called my credit-card company to find out what was up with all this, and it turned out I had made the unpardonable mistake…


OODAcasts

  • Operational Cybersecurity Leader Cameron Over

    Operational Cybersecurity Leader Cameron Over

    Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…

  • Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Phil Reitinger has been been a pioneer in cutting edge concepts for reducing risks in cyberspace for years. He was a special assistant US Attorney in the late 1990’s, a time when high end nation state attacks were on the rise and the application of US law to help counter threats was in a nascent…

  • Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…

  • Quantum Security Practitioner Jane Melia of QuintessenceLabs

    Quantum Security Practitioner Jane Melia of QuintessenceLabs

    In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies.…

  • Former CIA CTO Bob Flores on Accelerating Technology Disruption

    Former CIA CTO Bob Flores on Accelerating Technology Disruption

    OODA CTO Bob Gourley was joined by former CTO of the CIA Bob Flores in a discussion on the state of enterprise technology, resulting in this next in our series designed to provide actionable insights to leaders in business and government. Bob is a member of the OODA Network and was one of the scheduled…

  • Tony Cole On Deception In Cyber Operations

    Tony Cole On Deception In Cyber Operations

    OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…

  • Lewis Shepherd on Government Mission Needs

    Lewis Shepherd on Government Mission Needs

    In this second of a two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are…

  • David Bray On Today’s Global Risk Environment

    David Bray On Today’s Global Risk Environment

    This is part two of our series with Dr. David Bray of the Atlantic Council’s Geotech Center. This second of two parts covers questions businesses should be asking about today’s global risk environment and approach to knowing what comes next. The session is full of important advice on how to survive and thrive in and…

  • Dan Gerstein of RAND Corporation on The Story of Technology
    ,

    Dan Gerstein of RAND Corporation on The Story of Technology

    OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation.  Dan is also the author of the recently released book entitled “The Story of Technology”.

OODAcons