As the United States moves to establish space as an operational domain and seeks to support a space economy, there are corresponding challenges to addressing cybersecurity vulnerabilities and threats to the sector. While many existing cybersecurity principles and practices remain applicable to space as an emerging commercial critical infrastructure sector, there are many nuances and…
A very specific insight from our OODA Network Stratigame – Scenario Planning for Global Computer Chip Supply Chain Disruption – was the role the foreign production of Specialized Manufacturing Equipment (SME) built for the manufacturing of computer chips would play in the health of the computer chip supply chain for the U.S. Netherlands -based ASML Holding…
Last week, a new hacking group took responsibility for the taking down of a Russian telecom satellite, which we interpreted as an expansion of the tactical activity (brought on by the instability in Russia) by Advanced Persistent Threats (APTs) and non-state cyber actors on all sides of the multi-sided hybrid conflict in Europe. The following…
According to recent reporting, the Senate Armed Services Committee has requested a third-party assessment on the potential establishment of an independent military Cyber Force for the Department of Defense (DoD). The six-month assessment would address such areas as the number of commands across the DoD cyber enterprise; the command-and-control relationships of each of these commands; budget and…
While the societal and business impact of AI continues to consume the headlines, the reality is the future of AI, to a large extent, will be formally litigated in the legal system. Following is an overview of the recently filed lawsuits with claims related to AI – followed by further resources and recent analyses of…
This update captures the latest on PRC laws with a special focus on factors relevant to business decision-makers. The content here is tailored to what we recommend every corporate director/board member of international corporations know about these new surveillance laws. These laws post a risk to any company doing business in China, not only including…
At DEFCON 2023, “the U.S. military will stage a contest in which competing teams of white-hat hackers will, for the first time ever, try to penetrate and take over computer systems on a satellite actually in orbit. It took four years, but “this year, we are in space for real,” said Steve Colenzo, Technology Transfer…
This is an extension of the initial post from the June 2023 OODA Network Member meeting, with a discussion from the meeting of open-source Intelligence and commercially available Information (CAI).
Last weekend, the primary risk awareness variable we encouraged our readership to track based on the recent events in Russia was the following: “The information threat vectors and cyber attack surface have been expanded: Be on the lookout for how recent events have ginned up the tactical and strategic activity of Advanced Persistent Threats (APTs)…
SolarWinds, the enterprise technology company made famous after suffering a nation state directed cyber attack in 2020, has been served notice by the SEC that further action is coming. Not only did they receive their own Wells Notice in October, but now two individuals, their CFO and CISO, have as well. This is the first…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.