Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Imagine That!

    They have a plan, they have a pattern . . . Armed with details of billions of telephone calls, the National Security Agency used phone records linked to the Sept. 11, 2001 attacks to create a template of how phone activity among terrorists looks, say current and former intelligence officials who were briefed about the…

  • Jihad via PSP

    Gamers quibble over trees while missing a forest: Was an elite congressional intelligence committee shown video footage from an off-the-shelf retail game and told by the Pentagon and a highly-paid defense contractor that it was a jihadist creation designed to recruit and indoctrinate terrorists? It’s looking more and more like that is the case. The…

  • Preparing to Fail

    A long post derived from Inside the Pentagon (subscription): Retired Marine Corps Lt. Gen. Paul Van Riper, who led a “red team” of notional enemy forces at the outset of JFCOM’s Millennium Challenge 2002 war game, is calling on the command to spell out publicly how the experiment has influenced the Defense Department view of…

  • Nicely Done Mr. Barone

    Acting on Assumptions with Iran & Iraq: To learn lessons from history, including recent history, it’s essential to get the history right. That’s why, in order to understand what to do about the mullahs’ regime in Iran, it’s worth revisiting the debate over the intelligence in Iraq. . . . and that’s just the first…

  • De Oppresso Liber

    Work (I won’t call it duty) calls and finds me at the keyboard when I should be doing something that a lot of brothers are unable to do today: enjoying their families. In between flashes of corporate panic I find myself visiting the ‘sphere and taking note of those who are intentionally still blogging today,…

  • Get Ready for the RIF

    A very interesting entry at Strategy Page, with the most significant points brought out in the second paragraph: DoD is overhauling its entire intelligence apparatus …The plans are pretty ambitious, and are partially implemented. The basic idea is to take advantage of abundant computer power, and affordable networking, to tie together as many troops, vehicles…

  • Piling on Wehner

    Not that he needs it but . . . Misleading Intel: Everyone (not just some US political cabal) thought Iraq had WMD. We’ve found arty shells with nerve-agent (sarin) in them; documents placing orders for precursor chemicals used to make this thing called Zyklon-B (famously used by another tyrant decades ago); and shady-looking mobile labs…

  • Nice Try (NSA critique) (Update)

    One of the better attempts to critique the NSA’s efforts today in the NY Times: If the program is along the lines described by USA Today — with the security agency receiving complete lists of who called whom from each of the phone companies — the object is probably to collect data and draw a…

  • Now THIS Creeps Me Out

    So the other day I tried to use my credit card to buy something, and it was denied even though I knew perfectly well my credit card was just fine. So I called my credit-card company to find out what was up with all this, and it turned out I had made the unpardonable mistake…

  • Spies in the Shower

    From InfoWorld: I don’t want to alarm you, but a reader just sent me evidence showing that a large and secretive organization is tracking some surprising information about us. No, not the National Security Agency. We’re talking about a really secretive organization: Proctor & Gamble. The sender hits the nail on the head: “My privacy…


OODAcasts

  • John Spencer on Connected Soldiers and the Future of Conflict
    ,

    John Spencer on Connected Soldiers and the Future of Conflict

    John Spencer is a writer, thinker, speaker scholar who currently serves as the Chair of Urban Warfare Studies at the US Military Academy. He brings the experience of a veteran who has led in combat to his work, and in his latest book, Connected Soldiers, also provides insights from his time as a stay at…

  • Duyane Norman on Disrupting the CIA to Deal with Emerging Threats
    ,

    Duyane Norman on Disrupting the CIA to Deal with Emerging Threats

    Duyane Norman spent nearly 30 years in the CIA with three Chief of Station and multiple other tours in a variety of interesting geographies and also had a focus on technology issues serving as Deputy Director of the Office of Technical Service within CIA’s Directorate of Science and Technology, and as a member of the…

  • First Federal CISO Greg Touhill on Advanced Cybersecurity by Design

    First Federal CISO Greg Touhill on Advanced Cybersecurity by Design

    Greg Touhill is one of the nation’s premier cybersecurity, information technology and risk management leaders. As an Air Force officer he led technology efforts in some of our nation’s most demanding organizations including combatant commands during time of war. He is an accomplished speaker and author and business executive and also served as our nation’s…

  • Former Tenable CEO Ron Gula Applies a Hacker Mindset to Investing, Public Awareness, and Philanthropy

    Former Tenable CEO Ron Gula Applies a Hacker Mindset to Investing, Public Awareness, and Philanthropy

    In this OODAcast, we interview Ron Gula, co-founder and CEO of the highly successful Tenable Security(NASDAQ:TENB) and currently President of Gula Tech Adventures. Ron has a long history in the cybersecurity field that includes starting his career as an NSA hacker and then transitioning into an entrepreneur responsible for multiple innovations in the market and…

  • Jim Lawler on the Art of Espionage and the Perfect Intelligence Operation
    ,

    Jim Lawler on the Art of Espionage and the Perfect Intelligence Operation

    In this OODAcast, we talk with Jim Lawler who is a Senior Partner at MDO Group, which provides HUMINT training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues. Mr. Lawler is a noted speaker on the Insider Threat in government and industry. Prior to this, Mr. Lawler…

  • Lifelong Hacker and Experienced Security Executive Alyssa Miller, Author of Cybersecurity Career Guide
    ,

    Lifelong Hacker and Experienced Security Executive Alyssa Miller, Author of Cybersecurity Career Guide

    Alyssa Miller is a life-long hacker and highly experienced security executive who has a passion for security and the security community. She is an excellent advocate for continuous improvement in the community and a frequent speaker to audiences of both fellow business leaders and security community audiences. This combined with her deep experience in the…

  • Dr. Scott Shumate Profiles Russian President Vladimir Putin

    Dr. Scott Shumate Profiles Russian President Vladimir Putin

    This OODAcast is a special edition focused on profiling Russian President Vladimir Putin with Dr. Scott Shumate, who has over 30 years of experience evaluating national leaders, terrorists, spies, and insiders.  Scott shares his unique perspective’s on Putin informed by his extensive experience and insight. Is Putin suicidal? Is he a rational actor? Will he escalate…

  • Chris Butler on the Value of Adversarial Thinking in Product Design and Management

    Chris Butler on the Value of Adversarial Thinking in Product Design and Management

    In this OODACast, Matt talks with Chris Butler about how concepts like adversarial thinking can be applied to product design and management.  Chris is an exemplar of someone who has excelled in his field but also looks to study and bring disruptive ideas like randomness and future framing from other disciplines to determine their value…

  • John Chambers on Risk and Opportunity in the Modern Age

    John Chambers on Risk and Opportunity in the Modern Age

    John Chambers is the legendary former CEO of Cisco, a company he helped grow from $70 million in revenue per year when he joined in 1991 to $1.2 billion a year the year he became CEO to over $48 billion a year by the time he retired in 2015. As a leader John was always…

  • Simon Clark on Investigating the Key Man and a Billion Dollar Fraud

    Simon Clark on Investigating the Key Man and a Billion Dollar Fraud

    In this OODAcast, we talk with Pulitzer Prize nominated journalist Simon Clark about his book the “The Key Man: The True Story of How the Global Elite Was Duped by a Capitalist Fairy Tale “. The book tells the story of Arif Naqvi and his Dubai-based private-equity firm Abraaj and attracted he billions of dollars…

OODAcons