Last week, the U.S. Space Force (USSF) released the much-anticipated “Commercial Space Strategy”—the first such strategy released by the USSF—which commits to realigning funding and prioritizing commercial space opportunities. Details from the USSF CSS are available here.
Our hypothesis on AI Hallucinations is based on a quote from the OODAcon 2024 panel, “The Next Generative AI Surprise: “Artificial Intelligence hallucinations may sometimes provide an output that is a very creative interpretation of something or an edge case that proves useful.” With that framing in mind, the following is the first installment in…
The ransomware epidemic is starting to feel like one continuous incident report and a growing national security concern – not to mention the dormant “ghost in the machine” capabilities that have already been positioned in the U.S. internetwork (by nation-state and non-nation-state players alike) as part of a strategic plan for a larger act of…
In December 2023, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Environmental Protection Agency (EPA), and the Israel National Cyber Directorate (INCD) issued an alert regarding the activities of Iranian cyber actors dubbed “CyberAv3ngers” believed to be tied to Iran’s Islamic Revolutionary Guard Corps (IRGC). The alert cited that this group…
Other industry sectors should keep a close eye on the critical milestones and pitfalls of the biotech/healthcare space – with an eye toward what platform, product, service innovations, and architectures may have a potable value proposition within your industry. The Stanford Institute for Human-Centered AI (HAI) is doing great work fielding research in healthcare with…
“Q-Day” is a scenario where “no more secrets” becomes a reality, as previously secure communications and data could be vulnerable to decryption by entities wielding quantum computational power (also known as “Quantum Supremacy”). Find a breakdown, analysis, and future scenarios here.
Regular readers of the OODA Loop know that we cover exponential technologies daily and we expect disproportionate disruption when these technologies start to converge. In this post, we explore AI + an expanded working definition (with subcategories) of what is broadly considered “the metaverse” + blockchain technology as an example of the exponential tech stack…
With Vladamir Putin’s “landslide” victory in the Russian Presidential election in the rearview mirror (the victory extends Putin’s autocratic rule through 2030, which will be his 18th year as president), we provide some situational awareness RE: Putin’s ongoing, global cyber and disinformation offensives – and the drone swarm attacks that are proving the 21st Century…
In this, the fifth installment in our “Dispatches from the Ministry for the Future” series, we take the time to do more of a deep dive into the speculative fiction/science fiction novel that inspired this eponymous series of posts – followed by details of the farmer protest that have broken out all over the EU…
Every year, we make a point of returning to a few social psychology, organizational behavior, and human behavioral psychology factors, namely how your organization should integrate the threat of human targeting and social engineering into your overall company culture and cybersecurity strategy. This post is an update from the frontlines – with recent offensive and defensive…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.