Recently, Russia signed a joint “International Cooperation in the Field of Information Security” agreement with several authoritarian governments to include but not limited to Belarus, Cuba, Iran, North Korea, and Venezuela. The agreement asserts that the motivation behind this agreement is to sustain “transparent and equitable system of international information security based on the principles…
The Center for Strategic and International Studies (CSIS) Commission on U.S. Quantum Leadership warns that without immediate, large-scale federal investment and policy support, the United States risks falling behind in the race for quantum supremacy, particularly against China. Why This Matters …China’s state-backed surge in funding and infrastructure threatens to outpace American efforts. Quantum technologies—from…
Ukraine has become the proving ground, and increasingly the foundry, for the future of security-related technologies. We need that learning, and we need it more quickly and at greater scale.
In 1932, Rear Admiral Harry E. Yarnell led a naval exercise that should have changed history. Commanding aircraft carriers USS Lexington and USS Saratoga, Yarnell’s planes successfully executed a simulated attack on Pearl Harbor, dropping flour sacks to represent bombs. Despite this clear demonstration of vulnerability, military leadership disqualified the results, deeming them unrealistic. Nine…
Many OODA Network Members also participate in the community of practice created by the Special Competitive Studies Project (SCSP), which convenes this week in Washington, D.C., for the SCSP AI Expo and Ash Carter Exchange 2025. This post is a compilation of OODA Loop research, which includes references to SCSP research, researchers, and events, as…
Amid drone strikes, shifting alliances, and unconventional diplomacy, Ukrainian Economist Alexandra Vacroux recently outlined four core scenarios for Ukraine’s future—each shaped by battlefield realities, global power dynamics, and long-term economic resilience.
apan has been a frequent target of both cybercriminals as well as nation state actors that have targeted its critical infrastructure as well as private sector with a variety of attacks that have ranged from DDoS attacks, data breaches, and state-led cyber espionage campaigns.
The May 2025 OODA Network meeting delivered a comprehensive analysis of the cyber and national security technology landscape, drawing from recent network member attendance at major conferences including RSA, the In-Q-Tel CEO Summit, and SOF Week. OODA Network members on the monthly call surfaced major trends in AI, cybersecurity, defense tech, and geopolitical influence.
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.