Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • A different take on document exploitation

    Hat tip to John Robb Finally, a media outlet that doesn’t have a problem with amateurs exploiting captured material: BAGRAM, Afghanistan — No more than 200 yards from the main gate of the sprawling U.S. base here, stolen computer drives containing classified military assessments of enemy targets, names of corrupt Afghan officials and descriptions of…

  • Where is the shop steward?

    “You know what Justice Black used to say? Flexibility is mush.” With that quip, Judge A. Raymond Randolph cut into the opening statement of the government’s lawyer, who was defending new workplace rules at the Department of Homeland Security. I’ll ask one more time: would someone who is in a HLS or other national security…

  • Always Out Front

    Senior Pentagon officials are poised to implement a sweeping overhaul of how each combatant command carries out joint intelligence operations, using U.S. Central Command as a template for streamlining battlefield data collection and analysis, according to a senior military official and documents. Anything but the status quo.

  • Get a handle on it

    Update: GCN updated their story today – after I posted – to point out that while the investigation continues, the charges against Mr. Lynch were dropped. My comments on the basic security aspect of this piece stand. Another perv in the ranks: Charles Lynch, director of the Defense Information Systems Agency’s Internet Protocol version 6…

  • HLS: Serious or Not Serious III-VI

    Fox, welcome to the hen house. Zorro, recepción a la casa de la gallina. We’re looking, but we’re not seeing. On the immigration bill “compromise” . . . let me see if I get this right: the longer you’ve been breaking the law, the better the deal, is that it? Are you f***king kidding me?…

  • Leak Vs. Authorized Disclosure

    Leak: What you do when you pass classified to people not authorized to recieve it. Authorized Disclosure: What you do when you pass classified to people you think should have it when you have the authority to declassify.

  • Where is the value?

    If you have been following the developments surrounding what has been found in the captured Iraqi documents, you’re aware that they portray a dramatic and sometimes shocking state of affairs in pre-war Iraq. Some have asked how the US intelligence community could ignore these documents when they apparently contain such bombshells. The easy and predictable…

  • Connect the Dots Indeed

    Sen. Patrick Leahy (D-Vt.) blasted the DOJ and the FBI division for a recent five-year, $12 million contract for ChoicePoint to provide investigative analysis software to the FBI. In February 2005, ChoicePoint announced a data breach after criminals set up fake businesses that purchased private information from the data broker. “What in heaven’s name are…

  • It would be nice to think so

    The CIA DI leads a cheer that should be read in full: Nearly one year ago, President Bush’s commission on weapons of mass destruction released its report identifying shortcomings in the intelligence community. Many of the commission’s judgments dealt with analysis, the discipline I lead at the CIA. The primary criticism was that our analysts…

  • Seize the High Ground

    Time to revisit an old favorite via Captain’s Quarters:


OODAcasts

  • Megan Jaffer on Leadership, Intelligence, Innovation and Iron Butterfly Media

    Megan Jaffer on Leadership, Intelligence, Innovation and Iron Butterfly Media

    In this episode of OODAcast, Megan Jaffer joins the conversation to discuss her journey in the intelligence community and the creation of Iron Butterfly Media Group. Megan also discusses the expansion of Iron Butterfly Media, including new podcast series and a documentary on women in intelligence. Megan shares her background, including her studies in international…

  • Decision-Making and Deep Tech with Laura Thomas: Insights from a Former CIA Officer
    ,

    Decision-Making and Deep Tech with Laura Thomas: Insights from a Former CIA Officer

    In this episode of OODAcast, Bob Gourley interviews Laura Thomas, a deep tech consultant and former CIA officer. Laura discusses her journey from a small town in North Carolina to a career in the CIA, where she served as a case officer. She emphasizes the importance of critical thinking and decision-making under uncertainty, and how…

  • Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

    Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

    Allan Friedman is a senior strategist at CISA (the Cyber Security and Infrastructure Security Agency) where he coordinates all of their cross-sector activities on the topic of SBOM: The Software Bill of Materials.

  • Joe Sullivan on Managing Complex Security Challenges

    Joe Sullivan on Managing Complex Security Challenges

    Joe Sullivan has been at the forefront of managing security risk in rapidly growing high tech companies over the past 20 years serving as the Chief Security Officer at Facebook from early start-up through the IPO, CSO of Uber and CloudFlare, and as a security leader at eBay/PayPal. Learn what motivates him and some of…

  • Joe Tranquillo on the Revolution in Biological Science
    ,

    Joe Tranquillo on the Revolution in Biological Science

    Joe Tranquillo is a Professor of Biomedical Engineering at Bucknell University and a provost at the school. He is also and author and speaker with a knack for helping make new and at times complex subjects understandable. In this OODAcast we discuss many aspects of the revolution in biological sciences with Joe including topics like:…

  • MITRE Futurist Charles Clancy on our Quantum Enabled Future

    MITRE Futurist Charles Clancy on our Quantum Enabled Future

    Charles Clancy has successfully led technology efforts in government, industry, academia and continues to lead and innovate in his current position as Senior Vice President and GM of MITRE Labs. He is MITRE’s Chief Futurist. His role in technology leadership and his tracking of tech across multiple domains made for an incredibly insightful OODAcast. We…

  • Mark McGrath: John Boyd Is Far More Than The OODA Loop

    Mark McGrath: John Boyd Is Far More Than The OODA Loop

    Mark McGrath has applied the teachings of John Boyd to a career that began in the Marine Corps, included leadership positions in financial services firms and consulting with businesses with a need to learn to thrive in volatile, uncertain, complex and ambiguous (VUCA) environments. He co-founded the consultancy AGLX and serves as its Chief Learning…

  • Serene – The Hacker Pianist Saving Cyberspace

    Serene – The Hacker Pianist Saving Cyberspace

    Serene is a hacker in the truest sense of the word. She’s applied a hacker mindset to learn coding, piano, and blend art and engineering in fascinating ways. You’ll find her collaborating on-stage with Grimes one night and coding censorship resistant technologies the next day. As a self-taught coder she was the first engineer hired…

  • Andy Bochman on Countering Cyber Sabotage

    Andy Bochman on Countering Cyber Sabotage

    Andy Bochman is the Senior Grid Strategist-Defender for Idaho National Laboratory’s National and Homeland Security directorate. In this role, Andy provides strategic guidance on topics at the intersection of grid security and climate resilience to INL leadership as well as senior U.S. and international government and industry leaders. Andy is a frequent speaker, writer, and trainer…

  • Spencer Ante on Creative Capital and Disruptive Innovation

    Spencer Ante on Creative Capital and Disruptive Innovation

    Spencer Ante is the author or “Creative Capital: Georges Doriot and the Birth of Venture Capital”, which was on my Top 10 book list for 2022. In fact, I found Doriot’s story so compelling that a portrait of him hangs on the wall at the Hack Factory start-up studio in Reston, VA. Doriot is a…

OODAcons