Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • A 4X Increase in Disinformation in Africa is Fundamentally Destabilizing

    A new report from the Africa Center for Strategic Studies found that “disinformation campaigns seeking to manipulate African information systems have surged nearly fourfold since 2022, triggering destabilizing and antidemocratic consequences.”  Find a summary and analysis of the report here. 

  • Are Chinese-Made Ship-to-Shore Cranes at U.S. Ports a Critical Infrastructure Vulnerability?

    The 2023 National Defense Authorization Act (NDAA)  (made into law in December 2022) included some specific military-related cybersecurity provisions, including a required study of cybersecurity and national security threats posed by foreign-manufactured cranes at United States ports” to assess whether foreign manufactured cranes at United States ports pose cybersecurity or national security threats.” The study was…

  • The March 2024 OODA Network Monthly Meeting: The Global and Domestic Impacts of the Exponential Pace of Technological Change

    At the March 2024 OODA Network Member Meeting – which was held on Friday, March 15, 2024 –  Four categories were discussed as framing for the discussion:  The speed with which artificial intelligence changes are happening;  Geopolitical conflict and crisis issues;  Domestic issues that are at times being underreported; and the general march of technology…

  • Undersea Communications Cables and the Seabed Continue to Evolve as Threat Vectors and Contested Arenas

    Back in March 2023, we provided an analysis of  “Undersea Telecommunications Cables and the Seabed as Geopolitical Contested Arenas” which, at the time, we framed relative to a great power competition with China:  “Along with Africa and the Arctic, add the growing tensions between the U.S. and China about undersea cable deployment and seabed warfare to your geopolitical…

  • Swarm Intelligence and Network Swarms: Future Scenarios

    The concept of network swarms, particularly in the context of modern conflict and security, represents a fascinating and somewhat disorientating evolution in the dynamics of warfare and strategic operations.  The implications of swarm intelligence also extend beyond  these immediate scenarios in technology and defense. They challenge our traditional notions of intelligence, control, and organization, suggesting…

  • Wondering if we are living in a simulation? If we are it is probably based on NVIDIA

    We Are Living In A Simulation That Runs On NVIDIA Ok maybe that is totally tongue in cheek and maybe even a bit hyperbolic. If we are running in a simulation I have know idea what the base layer really runs on. But the power of NVIDIA’s new Blackwell platform, combined with everything else they…

  • The Interim Report of the U.S. National Security Commission on Emerging Biotechnology

    The U.S. National Security Commission on Emerging Biotechnology publicly released its first report in January of this year – with ideas and recommendations “they will be advancing throughout 2024…culminating in a comprehensive report to Congress in December 2024.”  Find a summary and analysis of the interim report here.  

  • For the Cybersecurity Community: A Call to Action for Memory-safe Strategies and “Better Diagnostics that Measure Cybersecurity Quality”

    In late February, “the National Cyber Director (ONCD) released a report calling on the technical community to proactively reduce the attack surface in cyberspace. ONCD makes the case that technology manufacturers can prevent entire classes of vulnerabilities from entering the digital ecosystem by adopting memory-safe programming languages. ONCD is also encouraging the research community to…

  • The Drone Swarm Architecture Will Transform U.S. Warfighting Capacity

    Lieutenant General (ret.) Clint Hinote, U.S. Air Force and Major General (ret.) Mick Ryan, Australian Army – Special Advisors to the Special Competitive Studies Project (SCSP) – have co-authored a paper on “Uncrewed systems—which are now undergoing a form of Cambrian Explosion in capability, quality, and quantity…these systems are disrupting how combatants are considering risk,…

  • Exponential Technology Stack Convergence: Generative AI-enabled Blockchain Networks

    Throughout 2024, we expect disproportionate disruption when the exponential tech stack starts to converge.   One of the most promising of these exponential technological intersections will be Generative AI-enabled Blockchain Networks – of which applications and use cases have started to emerge.


OODAcasts

  • Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power
    ,

    Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power

    Michael Kanaan has helped a wide swath of decision-makers better grasp the nature of AI. He has a knack for expressing complex topics in clear, accurate and succinct ways and many of us in the national security community have already had the pleasure of hearing from him in person or in conferences. His book, T-Minus…

  • Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats
    ,

    Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats

    Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats.  He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four…

  • Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards was a close associate of the late US Air Force Colonel John Boyd. He was there as the concept of the OODA Loop was being developed and constructed the first graphics of the OODA Loop from sketches Boyd drew. Chet is the author of the widely read business book “Certain to Win” which…

  • Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman leads Palantir’s Privacy and Civil Liberties Engineering Team. In this capacity he works extensively with local, state and international governments and philanthropic partners to develop technology-driven solutions to information sharing needs that respect applicable privacy, security and data integrity requirements. He does so in a way that is informed by experience and well…

  • Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto is an investment banker delivering advice and execution assistance to high growth businesses preparing for M&A and financial transactions. His company, KippsDeSanto, has developed a reputation for trusted execution support for companies in government contracting, aerospace, defense and cybersecurity. He leads teams that advise senior management, boards of directors and shareholders. The art…

  • Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter is a visionary investor who has pioneered investments in many new alternative investments classes including having been an early backer of hedge funds in 1982 while speculating on the Chicago Mercantile Exchange. He was also an early investor in Bitcoin and other cryptocurrency ecosystems and at a dinner with OODA CEO Matt Devost…

  • Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andrew (Andy) Lustig is a partner at the high tech law firm Cooley, where he focuses on private equity investments, mergers and acquisitions and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data…

  • Paul Pagnato, CEO and Founder at PagnatoKarp  and Author of The Transparency Wave
    ,

    Paul Pagnato, CEO and Founder at PagnatoKarp and Author of The Transparency Wave

    Paul Pagnato migrated from a career as a scientist looking for life in outer space to one of the top financial advisors in the U.S. with a keen eye for tracking innovation, exponential change, and other emerging global issues. He is also the author of the recent book, The Transparency Wave, which highlights the essential…

  • Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence
    ,

    Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence

    Bill Crowell is a senior executive with extensive experience in government (rose to the level of Deputy Director of the National Security Agency) and in industry. He has been a CEO of leading companies like Cylink, taking them through growth to acquisition. He has been a director of multiple public and private companies with a…

  • Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer is the #1 New York Times bestselling author of The Cupler Ring Trilogy (The Inner Circle, The Fifth Assassin, The President’s Shadow), The Escape Artist, The Book of Lies and many other thrillers loved by millions for their realism and well researched fact based themes and drama filled plots. He is also widely…

OODAcons