OODA Loop - Intelligence | Analysis | Insight
OODA Loop provides critical intelligence, analysis and insight on global security, technology, and business issues. In addition to providing original analysis, our team hand-curates hundreds of international OSINT sources to identify the most important stories that should be inside your decision cycle.
Google’s Ingress game, produced by Niantic Labs has prompted the Colorado Fusion Center to issue an alert regarding the game which has been shared nationally with other Regional and State Fusion Centers. The four page document entitled “Google’s Ingress Game Involves Taking Picture [...]
This week saw continuing violence throughout the country. The AMISOM and SNA offensive recaptured more keys towns, however, Al-Shabaab is far from defeated with continuing violence in Mogadishu and other key urban areas. The following is a detailed security and political awareness report for Somalia [...]
Fear Before the March of Flames Even as the flames of the Olympic torch approach their destination in Sochi, Russia, security officials race to respond to emerging threats by non-state actors. Multiple terrorist organizations have issued ominous threats against the games while reports of other threa [...]
By Kristan J. Wheaton and Melonie K. Richey The legality of the National Security Agency’s (NSA’s) use of US citizens’ metadata to identify and track foreign intelligence organizations and their operatives is currently a subject of much debate. Less well understood (and consequently routinely [...]
The IT security market is popping Champaign corks today in celebration of the tremendous valuation placed on Mandiant. According to the New York Times, FireEye has agreed to pay $1 Billion in cash, stock and options for the Alexandria, VA, based Mandiant. This is a 10x revenue valuation based on 201 [...]
The recent theft of a truckload of highly radioactive material in Mexico unearthed a series of panicked questions about the homeland security threat of dirty bombs. “What are they?”, “what can they do?”, “who has them?”, and “who could have them?” were [...]
Introduction The threat of “insiders” in positions of trust with access to critical aspects of an organization’s Information Technology (IT) infrastructure, whether government, military, or private sector, to intentionally compromise and sabotage their secrets or proprietary information has be [...]
Edward Snowden is guilty of lot of things. But contrary to Kurt Eichenwald’s recent Newsweek analysis, he did not “escalate the cyberwar.” Eichenwald interviews a host of business, intelligence, cybersecurity, and Asia experts and argues that Edward Snowden’s disclosures dee [...]
An Arab Spring political cycle is emerging. Single-party domination gives way to multi-party democracy which crumbles back into single-party domination. Football: An Introductory Anecdote Sitting with a group of western-educated, politically active Tunisians at a restaurant in Tunis, I commented on [...]
Introduction The 21st century has seen large-scale, well-organized terrorist attacks by Islamist terrorists on nearly every continent. These same terrorists and terrorist organizations have leveraged the cyber domain to support recruitment, training, and attacks. The maritime frontier, however, is p [...]
Are You In the Loop?
Free Daily OSINT Report
SUBSCRIBE TO DAILY OSINT