In this report we capture context on the shift in ICC intentions regarding investigating and prosecuting cyber war crimes. Recent reporting reveals that the International Criminal Court (ICC) will now investigate and prosecute cyber war crimes in the same way it does kinetic and physical war crimes. The ICC’s lead prosecutor Karim Khan authored an article that though acknowledged that…
This post captures some key content from the OODAcast including observations from OODA Network Members who were in positions to know what the national security situation was before, during and after the attacks.
This post seeks to inform your understanding of the cyber landscape from the perspective of the realities of the world as it is vice as we would like it to be. International efforts to grapple with the complexities of hostile cyber activities continue to languish in the United Nations. Whether it be trying to codify cyber norms of…
“Tracking, unpacking and governing the complex field of global AI governance law and policy has quickly become a top tier strategic issue for organizations.” The IAPP and OECD provide tracking resources for your organization to leverage into your AI strategy.
What if blockchain moves away from a store of value to a store of information as a priority- all the while facing the exponential growth of bitcoin storage requirements? Ordinal inscriptions present this challenge for the bitcoin ecosystem. Unintended consequence aside, bitcoin boosters and evangelist soldier on with the launch of The Open Ordinals Institute.…
Researchers from the the Center for Security and Emerging Technology (CSET) recently mapped “the gain- and loss-of-function global research landscape.” We contextualize the CSET findings relative to the biosafety levels in U.S. biomedical laboratories. A looming question: do other countries have the adequate commitment to health security and biosafety measures in their high risk pathogen…
While the Chinese press may push the narrative that the U.S. wants to return to the structures of the binary fractures of the cold war, the CPC is turning its innovative powers to a new construct they call “discourse power” – which includes formal, global operations (tethered directly to Beijing) used to influence the global…
It is bad form to try to explain any security framework to leaders who do not see a reason to care about it. This post provides some reasons why non technical business executives should care about the new NIST cybersecurity framework and recommendations for what they should know.
The August OODA Network Monthly call was held on Friday, August 18, 2023. This discussion is an extension of the initial read out from the monthly meeting: What do We Need to Track About China?
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.