Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
No way I can blog this full-time, but am catching bits and pieces on the radio. Some good, hard questions, very good and solid answers. I am particularly fond of the statement reference the “80-90” people briefed at the start of the terrorism surveillance project; NOT a small cabal of untouchables a’la Graham and crew…
The Homeland Security Department has not yet submitted a strategic plan to Congress on how it intends to improve border security and immigration enforcement, prompting House appropriators to cut funding in the department’s fiscal 2007 budget. I don’t want to be seen as piling-on given the report from Hugh Hewitt on the disconnect between the…
Qwest says they flat-out didn’t oblige NSA’s request for phone records. Bell South and Verizon are now saying “We Never!” That leaves AT&T holding the bag, but probably not for long. So are the phone companies lying? Only if there is an elaborate agreement in place to have each org cover the @ss of the…
Usama says: “don’t forget to opt out of the surveillance program.”
A senior federal law enforcement official tells ABC News the government is tracking the phone numbers we call in an effort to root out confidential sources. Human intelligence (traditional “spying”) is in part successful because people have a sense of trust that the guy (intelligence officer) who is talking you (impending traitor) into doing something…
(The retooled, recycled version of the earlier post mentioned. Periodical option fell through so baby goes shoeless this month 😉 ) After General Michael Hayden was nominated by President Bush for the directorship of the Central Intelligence Agency, it took mere days for stories about alleged illegalities perpetrated during his tenure at the National Security…
For all the screaming mimis . . . this is how it works in a REAL police state.
From ABC: Americans by nearly a 2-1 ratio call the surveillance of telephone records an acceptable way for the federal government to investigate possible terrorist threats, expressing broad unconcern even if their own calling patterns are scrutinized. Lending support to the administration’s defense of its anti-terrorism intelligence efforts, 63 percent in this ABC News/Washington Post…
Scary piece on NSA’s supposed evils in USA Today this morning. Will have a more thorough treatment up later today, but in the mean time, allow me to do my bit for the environment and recycle another post that should provide some insights and balance out the hype. Moring coverage from Michelle Malkin, Strata-Sphere, OTB,…
Who here ever heard of DOCEX prior to the release of the West Point report? Prior to the IDA study? Prior to Steve Hayes writing about it throughout last year? That’s what I thought. You couldn’t hold a gun to anyone’s head and get them to acknowledge the mission because it was the under-appreciated scut…
Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…
In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…
OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…