Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
For all the screaming mimis . . . this is how it works in a REAL police state.
From ABC: Americans by nearly a 2-1 ratio call the surveillance of telephone records an acceptable way for the federal government to investigate possible terrorist threats, expressing broad unconcern even if their own calling patterns are scrutinized. Lending support to the administration’s defense of its anti-terrorism intelligence efforts, 63 percent in this ABC News/Washington Post…
Scary piece on NSA’s supposed evils in USA Today this morning. Will have a more thorough treatment up later today, but in the mean time, allow me to do my bit for the environment and recycle another post that should provide some insights and balance out the hype. Moring coverage from Michelle Malkin, Strata-Sphere, OTB,…
Who here ever heard of DOCEX prior to the release of the West Point report? Prior to the IDA study? Prior to Steve Hayes writing about it throughout last year? That’s what I thought. You couldn’t hold a gun to anyone’s head and get them to acknowledge the mission because it was the under-appreciated scut…
I swear, if I read one more story about sinking morale in the CIA due to the “supremacy” of the DNI, I’m going to . . . blog some more! People I know on the inside are cautiously optimistic. They’ve never wavered in their motivation towards the job, but they are all candidates for medication…
(H/T to Guy Kawasaki) Some refreshing comments from the business world on how not to do things. “Escape from Cubicle Nation” – doesn’t get much better than that. Could be used in individual agency management, or reform writ large, if anyone cares to listen. Of course take out all the references to “money” and “profit”…
Likely to be lost in the FLAILCON 2 environment surrounding the nomination of Gen Hayden for DCIA: U.S. intelligence czar John Negroponte this week announced the appointment of a new chancellor for the National Intelligence University. Carson K. Eoyang’s started work May 1, said a statement Monday from the office of the director of national…
Prize-winner Dana Priest points out what some expect Hayden’s strategy to be: Former and current intelligence officers say Goss never had a strategic plan for improving spying on terrorist networks. [former DDO Stephen] Kappes, on the other hand, had slowly begun to put his ideas, gained through 23 years of experience around the world, into…
Most reports on intel reform over the last few days center on the perceived ills that face the CIA if a military man takes charge. I’ve already pointed out that the DCIA doesn’t report to the SECDEF and with four stars Hayden doesn’t owe Rumsfeld anything except the time of day. Just as he was…
I’m obliged for a number of unrelated reasons to like many of the people behind the voices that are coming out against Gen Hayden for DCIA. I’m obliged to like them, but I’m not obliged to avoid criticizing them when due. The laundry list grows by the day, but for the life of me I…
Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…
In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…
OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…