Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Mr. Ricks is shocked, shocked, to find influence campaigns going on here: The U.S. military is conducting a propaganda campaign to magnify the role of the leader of al-Qaeda in Iraq, according to internal military documents and officers familiar with the program. The effort has raised his profile in a way that some military intelligence…
Captain Ed takes a little initiative (and a hit in the wallet) to drive the point home. IBD has the right spirit, but wrong on methodology. The gov’t lacks the resources and the motivation. There are fish that have yet to be fried. In essense the only people who care are the bloggers and “amateurs”…
Hat tip to John Robb Finally, a media outlet that doesn’t have a problem with amateurs exploiting captured material: BAGRAM, Afghanistan — No more than 200 yards from the main gate of the sprawling U.S. base here, stolen computer drives containing classified military assessments of enemy targets, names of corrupt Afghan officials and descriptions of…
“You know what Justice Black used to say? Flexibility is mush.” With that quip, Judge A. Raymond Randolph cut into the opening statement of the government’s lawyer, who was defending new workplace rules at the Department of Homeland Security. I’ll ask one more time: would someone who is in a HLS or other national security…
Senior Pentagon officials are poised to implement a sweeping overhaul of how each combatant command carries out joint intelligence operations, using U.S. Central Command as a template for streamlining battlefield data collection and analysis, according to a senior military official and documents. Anything but the status quo.
Update: GCN updated their story today – after I posted – to point out that while the investigation continues, the charges against Mr. Lynch were dropped. My comments on the basic security aspect of this piece stand. Another perv in the ranks: Charles Lynch, director of the Defense Information Systems Agency’s Internet Protocol version 6…
Fox, welcome to the hen house. Zorro, recepción a la casa de la gallina. We’re looking, but we’re not seeing. On the immigration bill “compromise” . . . let me see if I get this right: the longer you’ve been breaking the law, the better the deal, is that it? Are you f***king kidding me?…
Leak: What you do when you pass classified to people not authorized to recieve it. Authorized Disclosure: What you do when you pass classified to people you think should have it when you have the authority to declassify.
If you have been following the developments surrounding what has been found in the captured Iraqi documents, you’re aware that they portray a dramatic and sometimes shocking state of affairs in pre-war Iraq. Some have asked how the US intelligence community could ignore these documents when they apparently contain such bombshells. The easy and predictable…
Sen. Patrick Leahy (D-Vt.) blasted the DOJ and the FBI division for a recent five-year, $12 million contract for ChoicePoint to provide investigative analysis software to the FBI. In February 2005, ChoicePoint announced a data breach after criminals set up fake businesses that purchased private information from the data broker. “What in heaven’s name are…
Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…
In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…
OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…