Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops

Category: Business

Exponential innovation is causing exponential disruption

Author: OODA Analyst

Exponential innovation is causing exponential disruption


Analysis

  • This is a bad thing how, exactly?

    Mr. Ricks is shocked, shocked, to find influence campaigns going on here: The U.S. military is conducting a propaganda campaign to magnify the role of the leader of al-Qaeda in Iraq, according to internal military documents and officers familiar with the program. The effort has raised his profile in a way that some military intelligence…

  • What is Wrong with Amateurs?

    Captain Ed takes a little initiative (and a hit in the wallet) to drive the point home. IBD has the right spirit, but wrong on methodology. The gov’t lacks the resources and the motivation. There are fish that have yet to be fried. In essense the only people who care are the bloggers and “amateurs”…

  • A different take on document exploitation

    Hat tip to John Robb Finally, a media outlet that doesn’t have a problem with amateurs exploiting captured material: BAGRAM, Afghanistan — No more than 200 yards from the main gate of the sprawling U.S. base here, stolen computer drives containing classified military assessments of enemy targets, names of corrupt Afghan officials and descriptions of…

  • Where is the shop steward?

    “You know what Justice Black used to say? Flexibility is mush.” With that quip, Judge A. Raymond Randolph cut into the opening statement of the government’s lawyer, who was defending new workplace rules at the Department of Homeland Security. I’ll ask one more time: would someone who is in a HLS or other national security…

  • Always Out Front

    Senior Pentagon officials are poised to implement a sweeping overhaul of how each combatant command carries out joint intelligence operations, using U.S. Central Command as a template for streamlining battlefield data collection and analysis, according to a senior military official and documents. Anything but the status quo.

  • Get a handle on it

    Update: GCN updated their story today – after I posted – to point out that while the investigation continues, the charges against Mr. Lynch were dropped. My comments on the basic security aspect of this piece stand. Another perv in the ranks: Charles Lynch, director of the Defense Information Systems Agency’s Internet Protocol version 6…

  • HLS: Serious or Not Serious III-VI

    Fox, welcome to the hen house. Zorro, recepción a la casa de la gallina. We’re looking, but we’re not seeing. On the immigration bill “compromise” . . . let me see if I get this right: the longer you’ve been breaking the law, the better the deal, is that it? Are you f***king kidding me?…

  • Leak Vs. Authorized Disclosure

    Leak: What you do when you pass classified to people not authorized to recieve it. Authorized Disclosure: What you do when you pass classified to people you think should have it when you have the authority to declassify.

  • Where is the value?

    If you have been following the developments surrounding what has been found in the captured Iraqi documents, you’re aware that they portray a dramatic and sometimes shocking state of affairs in pre-war Iraq. Some have asked how the US intelligence community could ignore these documents when they apparently contain such bombshells. The easy and predictable…

  • Connect the Dots Indeed

    Sen. Patrick Leahy (D-Vt.) blasted the DOJ and the FBI division for a recent five-year, $12 million contract for ChoicePoint to provide investigative analysis software to the FBI. In February 2005, ChoicePoint announced a data breach after criminals set up fake businesses that purchased private information from the data broker. “What in heaven’s name are…


OODAcasts

  • Operational Cybersecurity Leader Cameron Over

    Operational Cybersecurity Leader Cameron Over

    Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…

  • Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Phil Reitinger has been been a pioneer in cutting edge concepts for reducing risks in cyberspace for years. He was a special assistant US Attorney in the late 1990’s, a time when high end nation state attacks were on the rise and the application of US law to help counter threats was in a nascent…

  • Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…

  • Quantum Security Practitioner Jane Melia of QuintessenceLabs

    Quantum Security Practitioner Jane Melia of QuintessenceLabs

    In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies.…

  • Former CIA CTO Bob Flores on Accelerating Technology Disruption

    Former CIA CTO Bob Flores on Accelerating Technology Disruption

    OODA CTO Bob Gourley was joined by former CTO of the CIA Bob Flores in a discussion on the state of enterprise technology, resulting in this next in our series designed to provide actionable insights to leaders in business and government. Bob is a member of the OODA Network and was one of the scheduled…

  • Tony Cole On Deception In Cyber Operations

    Tony Cole On Deception In Cyber Operations

    OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…

  • Lewis Shepherd on Government Mission Needs

    Lewis Shepherd on Government Mission Needs

    In this second of a two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are…

  • David Bray On Today’s Global Risk Environment

    David Bray On Today’s Global Risk Environment

    This is part two of our series with Dr. David Bray of the Atlantic Council’s Geotech Center. This second of two parts covers questions businesses should be asking about today’s global risk environment and approach to knowing what comes next. The session is full of important advice on how to survive and thrive in and…

  • Dan Gerstein of RAND Corporation on The Story of Technology
    ,

    Dan Gerstein of RAND Corporation on The Story of Technology

    OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation.  Dan is also the author of the recently released book entitled “The Story of Technology”.

OODAcons