This page serves as a dynamic resource for OODA Network members looking for Quantum Computing, Quantum Security and Quantum Sensing insights to drive their decision-making process.
-
China and the United States are locked in a technological race to define the future of warfare through Physical AI—the fusion of artificial intelligence and computer graphics simulations with real-world, sensor-rich environments.
-
Dartmouth’s Institute for Security, Technology, and Society (ISTS) convened thirty experts from government, industry, academia, and venture capital to assess how the private sector currently supports U.S. offensive cyber operations—and to propose ways to scale this partnership responsibly.
-
A recent October 22, 2025 article revealed that the Cybersecurity and Infrastructure Security Agency (CISA) will be laying off nearly all of its 95 employees within the Stakeholder Engagement Division (SED), effectively dismantling three of its four operational units. The division historically served as CISA’s linchpin linking the agency with state and local governments, private…
-
Accelerating Disruptive Technologies: October 29, 2025 | Reston, VA
-
This year’s OODAcon theme is Accelerating Disruptive Technologies, recognizing that the pace of technological advancement demands new frameworks for assessing, adopting and scaling innovation.
-
Outpacing fast-moving adversaries requires procurement built for speed. Across the U.S. national‑security enterprise, acquisition has been reframed as a strategic capability—compressing timelines from prototype to fielded capability.
-
The OODAcon 2025 panel “From Automation to Autonomy: Navigating the Next Wave of AI Agents,” led by experts Josh Devon, Thomas Quinn, David Ginn, Josh Ray, and Andy Black, will confront a defining question for enterprise leaders: how to operate (and secure) organizations run by autonomous AI agents.
-
According to Bill Hagestad at RedDragon1949, China is rapidly transitioning from legacy informationized warfare to intelligentized, AI-driven, cognitive warfare — reshaping the future of strategic competition.
-
The hardware supply chain is a clear front in the global competition to control (or at least heavily influence) the global IT supply chain — and Hardware Bills of Materials (HBOMs) are emerging as the critical tool for transparency and risk reduction.
-
The global race to expand AI compute is pushing data centers underwater, into orbit, and adjacent to new energy sources — reshaping critical infrastructure and geopolitical risk.
-
This post is a reference designed to help you make the most of discussions on quantum, both at OODAcon and beyond
-
This summer at DEFCON 33, DARPA’s 2025 AI Cyber Challenge showcased how generative and agentic AI can autonomously find and fix vulnerabilities in complex software systems.
-
A new body of reports reveals how Beijing’s state-backed networks are embedding control across semiconductors, software, and infrastructure, transforming commercial interdependence into strategic dominance.
-
The global race to secure rare earths has moved beneath the waves. Undersea nodule mining near Palau and along the U.S. coastline could become a strategic counterweight to China’s control over critical minerals—if environmental and regulatory barriers can be managed.
-
This integrated assessment explores how geoeconomic transformations are unfolding across the Americas, the Northern Frontier of Mexico, the Arctic, and Africa, drawing from recent OODA Loop analyses.
-
How Statecraft, Finance, and Technology Are Reshaping Global Power in the Era of Polycrisis.
-
The upcoming OODAcon 2025 session “Securing Internet First Principles; Access, Privacy, and Expression in the Age of Disruptive Technology”—a fireside chat with SnowStorm CEO Serene—arrives at a critical inflection point for global digital governance.
-
For over half a century, the Office of Net Assessment (ONA) served as the Pentagon’s internal think tank for long-term competition, strategic foresight, and technological offset. Its founder, Andrew W. Marshall, known as “Yoda,” designed it to peer decades ahead, comparing U.S. military and technological trajectories against those of potential adversaries.
-
Law Firms Are Prime Targets for APT When the suspected nation state hackers came for Williams & Connolly, they didn’t do it with a crowbar and a ransom note. They slipped through an unpatched crease in the digital plaster, a zero-day exploit, gaining access into a “small number” of attorney email accounts. The incident appears…
-
The National Security Commission on Emerging Biotechnology (NSCEB) 22025 report, mandated by Congress and delivered to the White House and DoD, calls for urgent modernization of U.S. bio-innovation governance to counter China’s accelerating state-driven biotech expansion
-
Biological Smoke Detectors for the Digital Age: A Better Future of AI and Bio Security In recent years, I’ve observed a concerning trend in discussions about artificial intelligence and biotechnology: the rise of “doomers” who paint apocalyptic scenarios about these technologies. While I acknowledge these technologies present real risks, as someone who served as a…
-
In a bold escalation of private-sector engagement with national security, JPMorgan Chase has announced a $1.5 trillion “Security and Resiliency Initiative” aimed at strengthening the U.S. industrial base, critical infrastructure, and technological competitiveness.
-
Operate, Don’t Wait: The Quantum Mission Test I spent over 20 years in clandestine work. In all that time, not a single operation was risk-free. Risk is in the DNA. The decisive question was always the same: after we mitigated all possible risk with tradecraft, did the expected gain justify the risk? That isn’t recklessness;…
-
IBM and Anthropic are pushing forward a new standard for enterprise-grade AI with the Model Content Protocol (MCP), an emerging framework for securely connecting AI agents with enterprise data and applications.
-
China has dramatically expanded its export controls on rare earth minerals, further tightening its grip on materials critical for defense, technology, and semiconductor industries. China’s Ministry of Commerce issued the new restrictions on 9 October 2025. The new restrictions add five more rare earth elements to the controlled list, meaning China now restricts the export…
-
The accelerating use of drones by Mexican and transnational cartels signals a dangerous shift: illicit groups are scaling drone warfare from tactical innovation to a global architecture of power.
-
The new front in great power competition is not cyber or space, but cognition. Beijing and Moscow are systematically weaponizing perception – deploying artificial intelligence, disinformation, and psychological operations to erode trust in institutions, fracture alliances, and weaken democratic resolve from within.
-
Russia’s covert “shadow fleet” of tankers and the global resurgence of piracy mark a new phase in maritime competition. From the Baltic to the Caribbean, gray-zone logistics, economic warfare, and criminal opportunism are converging – turning the world’s sea lanes into a testbed for deterrence in the age of AI surveillance.
-
The rise in political violence in the U.S. (across the political spectrum) and the ongoing government operations crisis are not a traditional left/right “political” narrative. They are symptomatic of the convergence of larger, historically unprecedented inflection points based on some of OODA Loop’s longest-running research themes and topics. Find an extended analysis here.
-
How accelerationism, stochastic terrorism, and networked power are reshaping governance, security, and the role of the nation-state.
-
Tech billionaires are not content with influencing government from the sidelines — they are now attempting to build communities and quasi-states where they can write the laws, apply advanced tech freely, and escape the constraints of nation-states.
-
The transformative potential of exponential technologies – such as AI, quantum computing, robotics, additive manufacturing, and synthetic biology – depends less on breakthroughs in the lab than on whether society can mobilize the necessary power, capital, and skilled labor to deploy them at scale.
-
A synthesis of insights from books, reports, and expert dialogues (that we have included in previous OODA Loop analysis or were in our research queue) all point to a central theme: enterprises should strategically approach generative AI and agentic AI systems given their rapid evolution, emergent behaviors, and risks of architectural lock-in.
-
The Cybersecurity Information Sharing Act (CISA) of 2015 has been the bedrock of the U.S. government’s formal mechanism for sharing cyber threat information with the private sector. As its sunset clause approaches (September 30, 2025), it’s not merely a legislative formality; it’s a crucial moment for policymakers to assess whether the mechanism, born from years of debate,…
-
China’s growing control of ports in Latin America and the Caribbean represents a potential strategic vulnerability for the United States, with 37 projects linked to Chinese firms raising concerns over supply chains, surveillance, and geopolitical leverage.
-
Global competition for critical minerals—from lithium and cobalt to rare earths—has elevated supply chain resilience to a national security issue. Two new reports frame the stakes.
OODA Loop Analysis
These big three will make monumental shifts in the world. This new Tech Trinity will redefine our economy, both threaten and fortify our national security, and revolutionize our intelligence community. None of us are ready for this. This convergence requires a deepened commitment to foresight and preparation and planning on a level that is not occurring anywhere.
The principals at OODA have tracked the science and technology of quantum technologies for decades, including closely watching the emergence of commercial firms leveraging quantum effects for security, communications and sensing. We closely track the transition of R&D into real companies that can deliver solutions based on quantum effects and provide a short list of companies that do so on this page. The Quantum List those we believe are poised to have an impact on the economy, including firms that deliver capabilities in Quantum Computing, Quantum Security, Quantum Communications and Quantum Sensing. Companies we track on the list include: IBM, Google, Microsoft, D-Wave, OQC, Cold Quanta, IonQ, Rigetti Computing, Quantinuum, QuSecure, Quantum Xchange, QuintessenceLabs, Crypto Quantique, ID Quantique, QWERZ, SandboxAQ, Argit, Strange Works, Zapata, The Entanglement Institute, TerraQuantum, PsiQuantum, Xanadu.
What business decision-makers need to know now about quantum superiority. This guide captures key concepts and the status of major quantum computing research initiatives in a way meant to serve the needs of operational decision-makers. Our goal: inform you about the near future so you can make the right changes to your strategy today.
This is an update to our Executive’s Guide to Quantum Safe Security, based on a new round of research that has included interviews of OODA Network experts, technology providers and senior executives in enterprises. Quantum Computers will bring new power to adversaries. But when? And what can you do now to mitigate that threat? This report provides insights that can drive your action today.
Quantum key distribution (QKD) is an exciting application of quantum technologies that has exploded in the past decade. QKD is used to share encryption keys across an established optical link or network. QKD can be used to generate a secure, shared secret key between two users. This key is then used in an algorithm to encrypt message traffic. The big advantage QKD offers is that any attempt to read the information stored in the photons would destroy the message and be immediately detected. Quantum cryptography is fundamentally viable today in the laboratory and used in some high-end security applications, like banking and stock trading, that can rely on dedicated short distance physical fibers.
A new NIST program makes creative use of quantum technologies to deliver advanced measurement solutions to users in commerce, medicine, defense and academia. This delivery of measurement standards in a chip format is known as NIST on a CHIP (NOAC). The time for leaders to think of how this may change your business model is now.
Vikram Sharma is the CEO of QuintessenceLabs, a company he founded to leverage an understanding of how physics works at the quantum level to address some of the biggest issues in cybersecurity. In this discussion at OODAcon, Vikram provided a high level overview of what years of quantum theory and 1000’s of experiments on the nature of reality tell us about the nature of reality, especially reality when measured at the smallest scale. His insights into the world of quantum mechanics includes a description of some of some very strange observations, which are seen again and again in experiment after experiment.
Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they could achieve history-making results in the near term. Because of all that we had been producing a series of reports aimed at making you as informed as possible on what breakthrough announcements in quantum computing could mean for your business strategy. This post memorializes a point in history we should all remember, even though it was not a point where a real world use case was performed.
Context from OODA’s Matt Devost on the very near future of quantum computing. This is clearly an area where focused due diligence is required, both for how data is being stored and secured today and how enterprises should be preparing for an age of no more secrets.
Additional Research:
What To Do About Quantum Uncertainty: Guess what, besides uncertainty at a quantum level there is great uncertainty among business and policy makers regarding Quantum Computing.
AI, quantum computing and 5G could make criminals more dangerous than ever, warn police: Quantum is one of many emerging technologies that law enforcement professionals are tracking
Intel offers AI breakthrough in quantum computing: This article is more about quantum simulations for AI, but shows the ecosystem that is developing around the technology
Quantum Computing That Can Crack Modern Encryption More Than a Decade Away: When we see reports like this we wonder what qualifies the experts to say this. But in this case the experts are the National Academies of Sciences.
Could quantum computers render current bitcoin and most blockchain cryptography powerless?: There is a worry that new algorithms that could run on quantum computing could attack blockchain and asymmetric encryption.