Start your day with intelligence. Get The OODA Daily Pulse.

This page serves as a dynamic resource for OODA Network members looking for insights into the geopolitical dynamics driving global risks. This collection of resources includes content produced exclusively for OODA members as well as a continually updated list of insights from our daily pulse report.

For a comprehensive list of OODA reports on security, cybersecurity and resiliency see:  OODA Security and Resiliency.

The demographic time-bomb impacting industrialized nations has been tracked for decades and now is suddenly impacting global economies. The demographics of most industrialized nations have shifted so there are fewer working age people and more retirement age people. Japan is one of the first major industrialized nations to start to see the impact of graying, but this is a problem for all nations. It is a significant concern for China which has the fastest aging society in history. These and so many other trends are captured below and in our C-Suite Report. 

The Great Nations Are Competing, What Does This Mean For Your Business?

The rise of great power competition and related changes in the international scene are causing changes to corporate risk and opportunities. Businesses have already had to adopt to new sanction regimes, new supply chain disruptions and new hostilities in cyberspace. Expect far more of this type of disruption. Also expect new opportunities, including the opportunity to serve the national security needs of open societies like the US, EU, Japan, ROK, India and many parts of South East Asia.

Modern great power competition is not only on topics like land and geopolitical disputes. Food, water, raw materials like rare-earth elements and technology are front and center in this competition. One critical risk that needs to be understood and mitigated because of this return to great power competition is what it may mean for the global computer chip shortage (we examine scenarios for global computer chip supply chain disruption in this Stratigame). Should tensions rise more between the PRC and Taiwan this could cause the shortage to become a real crisis.

There are many other impacts that flow from great power competition. One is being described by many watchers as the “end of globalization.” Our assessment of trends does not lead us to conclude that globalization is over, but there will certainly be more reshoring of supply chains and more regionalization of trade. Many other impacts are reviewed below.

The OODA C-Suite Report: Operational Intelligence for Business Leaders

What is the value of an informed decision? This list represents developments that fit the category of operating in a VUCA world, identifying and responding to Gray Rhino risks, or opportunities from advancements in emerging technology domains. These are issues we think our members should be tracking and map to collection requirements for our team to keep you as informed as possible.

See: The OODA C-Suite report


C-Suite Considerations Regarding Current Geopolitical Tensions

Something is different in the geopolitical situation today. The reasons are probably a combination of factors that include the pandemic, the rise of the global grid of cyberspace, plus the payoff of years of planning and strategic moves by our adversaries. But whatever the reasons, the world today is more complicated and more dangerous than the world of just a year ago, and in many cases the risks being faced by open societies have never been seen before. The changes are so significant, OODA recommends all business leaders take stock of the geopolitical situation and assess how the nature of these changes should impact your business strategy.

“The world is a more dangerous and complicated place than it was just a year ago. Your corporate strategy and defensive posture needs to reflect that” See: C-Suite Considerations Regarding Current Geopolitical Tensions


China’s Plan for Countering Weaponized Interdependence

In an article entitled “The international environment and countermeasures of network governance during the “14th Five-Year Plan” period” by Xu Xiujun (徐秀军) in the February 27, 2021 edition of China Information Security, we see the continuation of China’s concerns over Weaponized Interdependence and China’s desire to shape a global technology and economic environment that is less influenced by Western power. Xiujun identifies concerns in several interconnected areas including cybersecurity, economic centralization, and advancement in technologies like AI, Quantum, and 5G.

How Changes In China’s Approach To The World Should Change Your Strategy: The situation in China has changed over the last year (see: C-Suite Considerations Regarding Current Geopolitical Tensions). Changes in China’s behaviors include new approaches to diplomacy, new aggressive moves by the Chinese military, new compliance requirements for companies seeking to do business with China, and increased punishment of corporations that are seen to be behaving in ways not supportive of China’s strategic objectives. Cyber threats emanating from China have also continued to evolve, with criminal groups and national level intelligence agencies all leveraging increasing capabilities to gain unauthorized access to data meant to be protected. Meanwhile, many legal, but unfair trading practices are contributing to the rapid rise of China’s economic power and shifting global markets.


 

Russia Threat Brief:

Russia should be considered a kleptocracy, where the rule of law exists as long as it supports the objectives of the state and the ruling oligarchs. All U.S. businesses should exercise extreme caution before doing business in or with Russia. Our special report on The Russian Threat captures insights on the full spectrum of Russian capabilities and intention, including their actions in cyber conflict. For more read the continuously updated Russia Threat Brief. Also, be sure to check out our special report:  Russia What Will Putin Do Next? and The Kinetic Potential of Russian Cyber War, which examines Russia’s mastery of cyber and kinetic linkages, and What Kleptocratic Support for Cybercriminals Means for Russian Cyber Capabilities and Cybercriminals as the Russian State’s Deniable Proxies and The Five Most Dangerous Criminal Organizations Acting As Proxies for Russia.


China Threat Brief:

Several countries have the capability to inflict harm on U.S. interests. However, China is the only one who has declared an intent to challenge the U.S. for global supremacy. China remains a closed society where challenges to party rule are met with harsh, sole crushing response. China is a powerhouse, but one with weaknesses. The same statement carries over to military and intelligence domains. For more read the continuously updated China Threat Brief. Also see our special report on Your Strategy for This Phase of the Trade War – The short version is, stay agile! Also see our special report on What You Should Know About China’s “Destructive Warfare” Doctrine. What’s the China-Arab State Data Security Pact Really Mean?: What the C-Suite needs to know about the rise of China.


Iran Threat Brief:

Iran has been investing heavily in cyber operations and is experienced in conducting both espionage and attack. Iran is undemocratic, with power centered in a Supreme Leader (Ali Khamenei). A President exists but has little power compared to the Supreme Leader. But below them is a vibrant and powerful country of over 81 million. Iranian education systems and scientific pursuits make them a technologically empowered nation that can mount surprisingly sophisticated cyber operations.  Iran Threat Brief. Also see: What You Need To Know About Iranian Cyber War Capabilities and Intentions.


DPRK Threat Brief:

North Korea describes itself as a “self-reliant socialist state” but it is really best described as a Stalinist dictatorship. Leader Kim Jong-un holds power and dominates all functions through a mix of violence, rewards and intense propaganda. A common misperception about the DPRK is that they are so backwards and poor that they cannot mount a modern cyber war. But reality is that their policy of “Songun” (military first) means there are resources for capabilities considered strategic, and that includes cyber war. North Korea Threat Brief


 

Security In Space and Security of Space:

The last decade has seen an incredible increase in the commercial use of space. Businesses and individual consumers now leverage space solutions that are so integrated into our systems that they seem invisible. Some of these services include: Communications, including very high-speed low latency communications to distant and mobile users. Learn more at: OODA Research Report: What Business Needs To Know About Security In Space Also see: Is Space Critical Infrastructure, and the special report on Cyber Threats to Project Artemis, and Mitigating Threats To Commercial Space Satellites


Intelligence, Afghanistan, and Hedging Bets

We have not yet figured out how to create an enterprise that brings material together from local PDs, feds, private sector, and foreign sources and shares it with those who need to know.  There are (or were) some good operations at the local level, but these were the result of individual initiatives and were difficult to institutionalize.  I also think that, as one participant noted, this is a major challenge resulting from the country’s political polarization, which will make intelligence collection more difficult.  This is not a new problem, but it has become more acute even in the last several years.


Russians and Chinese using human targeting – amongst other tools- to achieve security advantage in key emerging technologies by 2030

In late October, The National Counterintelligence and Security Center (NCSC) issued a report warning of China’s goal to achieve a technological advantage over the U.S. in certain key emerging technologies. Beijing’s long-term goal is a strategic advantage over the U.S. and its security interests by 2030 in areas such as biotechnology, genomic technology, artificial intelligence, and semiconductors. Russia is making strides in this direction as well, but is constrained by resources and has not made the level of commitment as the Chinese. Human targeting is highlighted as a tool used prolifically by the Chinese.


What the C-Suite Needs to Know about the Potential Political Instability of Xi Jinping, the CPC and the PLA

The Sunday Morning Herald reports that Xi Jinping and his loyalists have experienced a plot against their power; have deployed subsequent purges of power based on these challenges, and question the loyalty of their top military brass in China. Details of these events are reviewed here.


China’s Continued Rise Hinges on Information Control

In November 2021, the U.S.-China Economic Security Review Commission published its annual report to Congress. The Commission addressed several key areas in the report including the Chinese Communist Party’s (CCP) ambitions in the wake of its centennial. One of these included China’s burgeoning use of its cyber capabilities as a state tool supporting its political, military, and economic well-being.


What to know about a Return to “Great Power Competition” 

This post provides insights into what the C-Suite needs to know about the rise of great power competition, based largely on a recently released report by the policy and legal research agency of the United States Congress, the Congressional Research Service (CRS), titled Renewed Great Power Competition: Implications for Defense—Issues for Congress. For more see: What the C-Suite needs to know about a Return to “Great Power Competition” 


A Better Understanding of the Size and Strength of China’s Great Firewall

A research team uncovered that the Great Firewall (GFW) runs a hidden layer of HTTPS censorship. Another team of researchers determined the size of the GFW through a nine-month project measuring Chinese DNS censorship. Censorship evasion strategy tools and a DNS blocking measurement platform dashboard have also been made available by the researchers.


What to know about The USG Advisory on Risks and Considerations for Businesses Operating in Hong Kong

The US Government released a statement jointly produced by the Department of State, Department of Treasury, Department of Commerce and Department of Homeland Security on the topic of business risks associated with operating in Hong Kong. If any single agency released a memo on a topic like this it would be important. With all four teaming to produce this it is a clear signal that this advisory should be read and understood by any company doing business in or with Hong Kong. For more see: What The C-Suite Needs To Know About The USG Advisory on Risks and Considerations for Businesses Operating in Hong Kong


OODA Member Monthly Meeting Generates Unique Insights Into Issues Associated With The Rise of China

The business environment in China has changed over the last year. Changes in China’s behaviors include new approaches to diplomacy, new aggressive moves by the Chinese military, new compliance requirements for companies seeking to do business with China, and increased punishment of corporations that are seen to be behaving in ways not supportive of China’s strategic objectives. Cyber threats emanating from China have also continued to evolve, with criminal groups and national level intelligence agencies all leveraging increasing capabilities to gain unauthorized access to data meant to be protected. Meanwhile, many legal, but unfair trading practices are contributing to the rapid rise of China’s economic power and shifting global markets.


When It Comes to Political Warfare, China is at the Head of the Class

Beijing appears to be engaging in political warfare where it is attempting to fester animosity between foreign governments that show favor to Taiwan, a threat to the long-standing policy of “One Country, Two Systems” with regard to the island.  In a recent instance, a fake announcement appeared to be from Taiwan’s Presidential Office on Facebook that asserted that the Taiwanese government intended to accept contaminated wastewater from a Japanese nuclear power plant.  A second incident occurred in December 2020 when Taiwanese authorities investigated two Taiwanese with ties to Chinese mainland spreading a similar fake Presidential Office announcement that alleged U.S. and Taiwanese in involvement in protests in Thailand.


Explore OODA Research and Analysis

Use OODA Loop to improve your decision making in any competitive endeavor. Explore OODA Loop

Decision Intelligence

The greatest determinant of your success will be the quality of your decisions. We examine frameworks for understanding and reducing risk while enabling opportunities. Topics include Black Swans, Gray Rhinos, Foresight, Strategy, Stratigames, Business Intelligence and Intelligent Enterprises. Leadership in the modern age is also a key topic in this domain. Explore Decision Intelligence

Disruptive/Exponential Technology

We track the rapidly changing world of technology with a focus on what leaders need to know to improve decision-making. The future of tech is being created now and we provide insights that enable optimized action based on the future of tech. We provide deep insights into Artificial Intelligence, Machine Learning, Cloud Computing, Quantum Computing, Security Technology, Space Technology. Explore Disruptive/Exponential Tech

Security and Resiliency

Security and resiliency topics include geopolitical and cyber risk, cyber conflict, cyber diplomacy, cybersecurity, nation state conflict, non-nation state conflict, global health, international crime, supply chain and terrorism. Explore Security and Resiliency

Black Swans and Gray Rhinos

Now more than ever, organizations need to apply rigorous thought to business risks and opportunities. In doing so it is useful to understand the concepts embodied in the terms Black Swan and Gray Rhino. See: Potential Future Opportunities, Risks and Mitigation Strategies in the Age of Continuous Crisis

See: Cybersecurity, Artificial Intelligence,  COVID-19, SpaceQuantum ComputingGlobal Supply ChainsGlobal Risk and Geopolitics, Advanced Technology, Corporate GovernanceDue Diligence Federal Markets.

  • OODA Security and Resiliency: A comprehensive list of OODA reports on security, cybersecurity and resiliency.
  • Global Risk and Geopolitical Sensemaking page:  Focused reporting on geopolitical topics including what the C-Suite needs to know about Russia, China, Iran, DPRK.
  • Putin’s cyber OODA Loop is Tighter Than Yours: The Putin regime has fully adopted cyber operations as a component of international relations and an appropriate tool to use in “reaction” to other global measures like sanctions or regional interference.
  • America’s Most Critical Infrastructure is also Our Most Neglected Infrastructure: Our thesis is that America’s most critical infrastructure is our cognitive infrastructure. This is also the most attacked and least defended. In short, our most important infrastructure is also our most neglected infrastructure.
  • Mitigating Risks To America’s Cognitive Infrastructure:This is the second of a series on our nation’s most neglected critical infrastructure, our cognitive infrastructure. The first post dove into the nature of the challenge and why it is so important for our future that the threats to our cognitive infrastructure are understood and addressed. This post flows from that one and suggests ways the nation can mitigate many of these risks.
  • A Practitioner’s View of Corporate Intelligence: Organizations in competitive environments should continually look for ways to gain advantage over their competitors. The ability of a business to learn and translate that learning into action, at speeds faster than others, is one of the most important competitive advantages you can have. This fact of business life is why the model of success in Air to Air combat articulated by former Air Force fighter pilot John Boyd, the Observe – Orient – Decide – Act (OODA) decision loop, is so relevant in business decision-making today.
  • Useful Standards For Corporate Intelligence: Discusses standards in intelligence, a topic that can improve the quality of all corporate intelligence efforts and do so while reducing ambiguity in the information used to drive decisions and enhancing the ability of corporations to defend their most critical information.
  • Optimizing Corporate Intelligence: Actionable recommendation on ways to optimize a corporate intelligence effort. It is based on a career serving large scale analytical efforts in the US Intelligence Community and in applying principles of intelligence in corporate America.
  • An Executive’s Guide To Cognitive Bias in Decision Making: Cognitive Bias and the errors in judgement they produce are seen in every aspect of human decision-making, including in the business world. Companies that have a better understanding of these cognitive biases can optimize decision making at all levels of the organization, leading to better performance in the market. Companies that ignore the impact these biases have on corporate decision-making put themselves at unnecessary risk.
  • Operational Intelligence for Strategic Decision-making: In this OODAcast, OODA Network Expert Jen Hoar interviews noted cybersecurity and intelligence professional Bob Gourley, CTO of OODA LLC, diving deep into what makes him tick. Jen asks Bob about his career, including the constants and dynamics in his professional life, starting with a deep background in operational intelligence as a naval intelligence officer. She explores his strengths and weaknesses and how he makes decisions in domains of overwhelming information. Jen asks Bob for advice for others on ways to keep learning.
  • Potential Future Opportunities, Risks and Mitigation Strategies in the Age of Continuous Crisis: Now more than ever, organizations need to apply rigorous thought to business risks and opportunities. In doing so it is useful to understand the concepts embodied in the terms Black Swan and Gray Rhino