On May 24, 2023, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), as well as the Five Eyes, issued advisories on a “cluster of activity” linked …
China’s Grand Strategy For Global Data Dominance: Overview of Hoover Insitution Report
The following is a summary of the Hoover Institution report titled China's Grand Strategy For Global Data Dominance. It is based on extensive research into China’s statements on intentions in using …
U.S.-South Korea Cyber Cooperation Helps Contain China Regionally
The United States and South Korea recently established a formal “Strategic Cybersecurity Cooperation Framework,” in which both governments agree to cooperate in the targeting of cyber adversaries such …
Continue Reading about U.S.-South Korea Cyber Cooperation Helps Contain China Regionally
The Cybersecurity Implications of ChatGPT and Enabling Secure Enterprise Use of Large Language Models
ChatGPT security is emerging as a risk as well as an opportunity for operational innovation for all types of organizations. As our readership knows: this is not our first rodeo - and it is the …
The Future of Food (In)Security and Agriculture Cybersecurity: Grain Hoarding, Rice Shortages and the War in Ukraine
Global Health Security is a research area we will be laying out in the next few months, including the role of cybersecurity and emerging and exponential technologies in the areas of: Pandemic …
Ukraine is a Master Class in Cyber Defense and a Real-time AI Accelerator
In March 2022, at the onset of the Russian invasion of Ukraine, OODA Loop CTO Bob Gourley posited a working thesis that We Are In The First Open Source Intelligence War. A year and change into the …
Continue Reading about Ukraine is a Master Class in Cyber Defense and a Real-time AI Accelerator
Will China’s Newly Formed National Data Administration Mine Data for Economic Growth?
China's annual parliamentary meeting was held last month, "confirming President Xi Jinping for a historic third term and appointing a new batch of other top leaders, the government also approved a …
The Recent Pentagon Leak is as Much a Generational Story as it is a National Security Breach
The recent AI Open Letter was both an opportunity to discuss the risk attached to the training of AI systems more powerful than GPT-4 as characterized by the letter and introduce the OODA Loop …
Cyber Assistance Fund Proposed by Cyber Ambassador Nate Fick as Part of Three-part Plan
In the What's Next? section of our recent analysis of the U.S. Turning Strategic Focus Towards Cyber Threat Vectors in Guam, Albania, and Costa Rica, we mentioned that we would continue to follow the …
The U.S. Turns Strategic Focus Towards Cyber Threat Vectors in Guam, Albania, and Costa Rica
There are no coincidences: The recent arrival of 4 B-52 bombers in Guam - along with the Marines and the official opening in January of a reactivated, expanded U.S. military base on the U.S. …