Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
The editors of the Weekly Standard sound off: “WHERE WAS THE NUCLEAR material transported to?” asks an aide to Saddam Hussein, in a taped conversation released last week. He answers his own question: “A number of them were transported out of Iraq.” This provocative snippet is part of 12 hours of taped exchanges between Saddam…
Eli Lake reports on an exodus: Two former CIA directors have resigned from the board of the organization planning tomorrow to make public secret recordings of Saddam Hussein and his advisers. In the last week both John Deutch and James Woolsey abruptly left their positions at Intelligence Summit, according to its president, John Loftus, who…
Update: Kent’s Imperative gets deeper into some of the issues mentioned below. A number of visitors write and ask me why I have it out for my old profession/employers/cohorts. Clearly I am disgruntled and left under a cloud. The fact of the matter is that I’m not and I did not. I rose faster and…
Knowing Tony Shaffer as I do (albeit in a limited fashion) I have tried to keep my distance from the Able Danger controversy. Generally speaking in the spooky business one likes to keep a stiff-arm out for those in the spotlight, though there is a lot of quiet cheering (or jeering) in private. Giving his…
A very interesting report from the USMA CTC on what can be learned from captured documents: One of the best ways to learn about al-Qa’ida is to read the papers, manuals, and other documents which al-Qa’ida leaders have written to guide and discipline their own enterprise. Many of these documents have been captured by military…
This needs no further elaboration.
Able Danger Blog points out a significant development: We had testimony that all of the Able Danger data-mining material was destroyed. I [Rep. Curt Weldon R-PA] now know that that’s not the case. In fact, I now know there’s data still available. And I am in contact with people who are still able to data…
In Slate Eric Weiner beats me to the punch on comparing wiretapping in the US and Europe: For Europeans, scolding the Bush administration for everything from Guantanamo to the Iraq War to secret CIA prisons has become a full-time job. But when it comes to the American scandal over President Bush’s warrantless wiretaps, there’s been…
I shake my head ruefully at the thought of those I have left behind that are now likely to face still more hours away from the job learning how to love and respect one another: John Robinson was appointed the first chief of equal employment opportunity for U.S. intelligence by the Director of National Intelligence…
Newsweek, the magazine that was so sure that we were flushing Korans down toilets, now uses its mind reading powers to explain away content it hasn’t heard. There are plenty of other sites that address journalists as political hacks and MSM bias, so I won’t try to replicate that here. Let’s just take a minute…
Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…
In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…
OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…