Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Clearance? We don’t need no stinking clearance

    The head of a private research company has challenged the director of national intelligence to an information duel. Robert David Steele Vivas, the chief executive officer of Open Source Solutions, is a longtime proponent of improving the U.S. government’s ability to retrieve and analyze the vast amounts of information available publicly from web sites, magazines,…

  • Mother, not whore

    I’m reading about and occasionally watching snippets of the illegal immigration protests going on around the country. Looking at the crowds I am reminded of the deer hunting drives of my youth and wonder why there isn’t a line of CBP agents at one end of the street with bags of flex-cuffs, while another line…

  • Their Kung Fu is Strong

    A key component of China’s information warfare expertise comes from a group called the “Red Hackers Alliance,” which identifies itself as “a network security research organization made up of Chinese patriotic hackers,” U.S. officials say. Chinese-origin hackers are responsible for tens of thousands of computer attacks on U.S. government networks, U.S. officials say. A Hong…

  • Amazing

    How this made it into print is beyond me (it isn’t but I like to pretend to be indignant). Lots of movement but it is more flailing than dancing. Perhaps the master of the online quilting archive feels left out? Something that the doctor is not aware of or has ignored: unless an item is…

  • Inexcusable!

    Not the reporting – the carelessness. A computer drive sold openly Wednesday at a bazaar outside the U.S. air base here holds what appears to be a trove of potentially sensitive American intelligence data, including the names, photographs and telephone numbers of Afghan spies informing on the Taliban and Al Qaeda. The flash memory drive,…

  • HLS: Serious or Not Serious VIII

    Something I alluded to before but since has been exposed to new light: A computer failure that hobbled border-screening systems at airports across the country last August occurred after Homeland Security officials deliberately held back a security patch that would have protected the sensitive computers from a virus [Zotob] then sweeping the internet, according to…

  • School Safety

    CHICAGO – Most schools’ emergency plans are outdated, especially against technologies like the Internet and cell phones, safety experts said Friday. Districts that don’t review and update plans for a terrorist attack or shooting rampage won’t be prepared when a crisis occurs, experts warned principals and superintendents at the National School Boards Association convention in…

  • Save it for the Team Room

    Eric Haney has made much out of his time as a member of Delta Force, America’s clandestine counterterrorism outfit. Way too much, according to former Delta Force officers and operators, who say Haney has embellished his résumé and fabricated other parts of his military career on his way to becoming an acclaimed author and a…

  • Here comes the judge

    Via AEI: Judge Posner weighs in on the state of IC reform. Some highlights: The fundamental cause of the ambitious reorganization of the intelligence community that we are living through is not, I believe, some deep flaws in the system as it existed on the eve of the 9/11 attacks. Rather, it is a deep…

  • HLS: Serious or Not Serious VII

    When 22 Chinese nationals let themselves out of a cramped and smelly cargo container at the Port of Seattle last week, it ended their dangerous and costly two-week trip from Shanghai. But after a few minutes of freedom and fresh air, they were apprehended and are likely to be deported. There was no indication that…


OODAcasts

  • Operational Cybersecurity Leader Cameron Over

    Operational Cybersecurity Leader Cameron Over

    Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…

  • Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Phil Reitinger has been been a pioneer in cutting edge concepts for reducing risks in cyberspace for years. He was a special assistant US Attorney in the late 1990’s, a time when high end nation state attacks were on the rise and the application of US law to help counter threats was in a nascent…

  • Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…

  • Quantum Security Practitioner Jane Melia of QuintessenceLabs

    Quantum Security Practitioner Jane Melia of QuintessenceLabs

    In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies.…

  • Former CIA CTO Bob Flores on Accelerating Technology Disruption

    Former CIA CTO Bob Flores on Accelerating Technology Disruption

    OODA CTO Bob Gourley was joined by former CTO of the CIA Bob Flores in a discussion on the state of enterprise technology, resulting in this next in our series designed to provide actionable insights to leaders in business and government. Bob is a member of the OODA Network and was one of the scheduled…

  • Tony Cole On Deception In Cyber Operations

    Tony Cole On Deception In Cyber Operations

    OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…

  • Lewis Shepherd on Government Mission Needs

    Lewis Shepherd on Government Mission Needs

    In this second of a two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are…

  • David Bray On Today’s Global Risk Environment

    David Bray On Today’s Global Risk Environment

    This is part two of our series with Dr. David Bray of the Atlantic Council’s Geotech Center. This second of two parts covers questions businesses should be asking about today’s global risk environment and approach to knowing what comes next. The session is full of important advice on how to survive and thrive in and…

  • Dan Gerstein of RAND Corporation on The Story of Technology
    ,

    Dan Gerstein of RAND Corporation on The Story of Technology

    OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation.  Dan is also the author of the recently released book entitled “The Story of Technology”.

OODAcons