Featured Analysis

10 Dec 2017

Trump: Accidental Nuclear Genius?

Love him or hate him, when it comes to North Korea, Trump just may be frustratingly suited for nuclear negotiations. Unpredictability, emotional outbursts, irrationality, and other descriptors that have been applied to the sitting president are likely qualities a president should not have in general. According to Cold War-era nuclear

20 Jul 2017

DHS Issues Report on AI Risk to Critical Infrastructure

Artificial Intelligence (AI) is an emerging risk that will affect critical infrastructure (CI) as it becomes common throughout the United States. The purpose of this research paper is to analyze the narratives about AI to understand the prominence of perceived key benefits and threats from AI adoption and the resulting

30 Mar 2017

Iranian Presidential Elections: Suppressing Dissension through Cyber

Introduction During the next months leading up to Iran’s Presidential elections on 17 May, Iranians will see an increase in cyber espionage leveraged against their systems and accounts. This increase will especially target politically active citizens as well as prolific and politically vocal Iranian-Americans abroad. These attempts by Iran’s intelligence

02 Mar 2017

Defense Science Board Report on Cyber Deterrence

The United States gains tremendous economic, social, and military advantages from cyberspace. However, our pursuit of these advantages has created extensive dependencies on highly vulnerable information technologies and industrial control systems. As a result, U.S. national security is at unacceptable and growing risk. Over the past several years, the United

27 Feb 2017

Top 10 Security and Intelligence Stories of 2016

According to the logs for OODAloop.com, here are the top stories from 2016 ranked by number of page views. #1: 10 Red Teaming Lessons Learned over 20 Years by Matt Devost #2: Best Security, Business, and Technology Books of 2016 by Matt Devost #3: The Red Teamers Top Ten Books

21 Feb 2017

The 2017 Red Teamer’s Bookshelf

“It’s been a couple of months since we first announced that Red Team Journal, Redteams.net, and OODALoop would be compiling the latest ‘Red Teamer’s Bookshelf’ jointly. For those of you who’ve been waiting, the list is finally here. It’s larger than previous years, so we’ve organized the titles by category

10 Feb 2017

DHS enhanced analysis of Grizzly Steppe election hack

DHS analysts leverage the Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. The phases of the Cyber Kill Chain are Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on the Objective. This section will provide a high-level overview of GRIZZLY STEPPE activity within this

09 Feb 2017

DHS report on how terrorists will target sporting events

The U.S. Department of Homeland Security (DHS) has issued an intelligence assessment (dated 2 February 2017) on the potential techniques and tactics that terrorists could use to target sporting events. The report is based upon detailed analysis of sporting event attacks overseas. The report’s key judgements note that: “Five separate

SHARE

Home New

Free Daily Intel Brief

Join thousands of global leaders by starting your day with our Global Intelligence Briefing.

 

Covering global threat, risk, technology, and cybersecurity issues.

Thank you for subscribing.  Your contact details will never be shared.