17 Sep 2021

The People’s Liberation Army (PLA), Global Supply Chains and Chinese Military-Civil Fusion (MCF)

The U.S. DoD has embarked on a strategic transformation based on changes in organizational structure, putting nuclear once again at center stage, a renewed commitment to the U.S. and allied military capabilities in the Indo-Pacific region, strength through power in Europe (in the form of U.S. and NATO military capabilities), and the maintenance of superiority by the U.S. in conventional weapon technologies.

Central to this transformation are supply chains. Specifically, an understanding and reduction of the reliance by U.S. military systems on foreign components, subcomponents, materials, and software.  “Made in America” is an objective, rectifying supply chain security concerns with American-made components, subcomponents, materials, and software.

As it turns out, supply chain transformation is a central military operational activity of the Chinese Communist Party (CCP) – and they want their supply chain to be “Made in America” too.

Read More
16 Sep 2021

Clapper and Ashley on Joint Ops/Intel Operations, Decision-making, the History and Future of Intelligence and Cyber Threats

We started the OODAcast as a way of highlighting insights and lessons learned from leaders and decision-makers in the OODA Network.

In the Spring of 2021, Bob Gourley had a conversation with General Jim Clapper and Lieutenant General Robert Ashley. We continue our effort to underscore certain patterns and themes found throughout the OODAcast library of over 80 conversations with leaders and decision-makers, on topics such as leadership, empowering a team, finding the right people, clear decision-making while operating in a low information environment, situational awareness and the qualities and best practices of a true leader. 

Threads that emerge in these conversations include the nature and history of intelligence, the importance of Joint Ops/Intel operations, the future of intelligence, and specific characteristics of the cyber threat.

Read More
15 Sep 2021

The Future of War, Information, AI Systems and Intelligence Analysis

The U.S. is in a struggle to maintain its dominance in air, land, sea, space, and cyberspace over countries with capabilities increasingly on par in all domains with that of the U.S.  In addition, information (in all its forms) is the center of gravity of a broad set of challenges faced by the United States, including information operations, cyber information warfare, foreign hostile influence, intelligence operations, influence warfare, disinformation, proxy warfare, and the perennial threat of terrorism, foreign and domestic. 

Information, then, is the clear strategic vector of value creation for the emergence of applied technologies to enable operational innovation. For the U.S., the desired outcome is continued dominance for another American Century.  For the Chinese, military capabilities usher in the dawn of a new technological superiority and, as a result, geopolitical and military dominance on the world stage.

Read More
14 Sep 2021

Quantum Computing Use Cases and Post-Quantum Cryptography

Quantum computing is a fascinating, complex, highly technical, sometimes daunting to conceptualize technological breakthrough and driver of the future marketplace. So yes, the promise of quantum computing will happen and is happening. The question is how quantum will have an impact during a growth phase in which the capital expenditure capabilities and strategic concerns are driven more by governmental, governmental agency’s and, in our current climate, non-state actors’ (loosely tethered to nation-states for plausible deniability) ability to deploy adversarial methods only possible with next-generation quantum computational power.

Read More
13 Sep 2021

Intelligence, Afghanistan, and Hedging Bets

I am a member of OODA Loop. The few discussions that I have been able to listen to thus far were extremely informative, especially the most recent one on Afghanistan and intelligence issues.  It prompted a few comments on intelligence collection and hedging bets amongst regional and great power players in Afghanistan. 

This article was generated from the OODA Network Member monthly meeting and access is restricted accordingly. If you are an OODA Subscriber, but not a member of our expert network, you will not be able to access this content.

Read More
13 Sep 2021

Zero Trust Will Yield Zero Results Without A Risk Analysis

Over the past four years there has been an avalanche of new Zero Trust products. However during the same period there has been no measurable reduction in cyber breaches. To the contrary, ransomware, data exfiltration and lateral moving malware attacks seem to be increasing. If the emergence of Zero Trust was supposed to make us safer, it hasn’t happened. One of the common mistakes we see enterprises IT leaders and many cybersecurity experts make is to think of Zero Trust as a product. it is not.  Zero Trust is a concept where an organization has Zero Trust in a specific individual, supplier or technology that is the source of their cyber risk. One needs to have Zero Trust in something and then act to neutralize that risk. Thus buying a Zero Trust product makes no sense unless it is deployed as a countermeasure to specific cyber risk. Buying products should be the last step taken not the first.

To help enterprises benefit from Zero Trust concepts here is a modified OODA loop type process to guide your strategy development and execution.

Read More
11 Sep 2021

Decision-Making Inside the CIA Counterterrorism Center Before, During and After 9/11

We started the OODAcast as a way of highlighting insights and lessons learned from leaders and decision-makers in the OODA Network including former intelligence community leaders and operators. Themes emerge throughout these interviews on topics such as how clearly the intelligence community warned of the pending attacks, the early preparedness of a response by the intelligence community, the role the agency played in the success of the early stages of the campaign in Afghanistan, leadership in a crisis, empowering your team and finding the right people to execute on a plan, clear decision-making while operating in a low information environment, situational awareness and the qualities and best practices of a true leader.  In this second part of the series, we draw on perspectives from former CIA Counterterrorism Center (CTC) Director Cofer Black and former CIA CTC Director of Operations Ric Prado.

Read More
10 Sep 2021

The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks

Bob Bigman spent a career in the intelligence community. He was the CISO of the CIA where he was tasked with leading efforts to protect the nation’s most sensitive secrets. Since 2012 he has provided direct consulting services to CISOs, CIOs, CTOs and CEOs seeking to reduce risk and improve security programs. Through it all he has built a reputation for rapidly assessing the state of enterprise security programs and then working to build action plans to drive continuous improvement. This OODAcast examines aspects of Bigman’s approach to security that can inform you own approach. We also solicit his views on compliance and security checklists, metrics, and the state of the IT industry (he does not hold back on any of those!).

Read More
10 Sep 2021

A CIA Officer and Delta Force Operator Share Perspectives on 9/11

We started the OODAcast as a way of highlighting insights and lessons learned from leaders and decision-makers in the OODA Network including former intelligence community leaders and operators. Themes emerge throughout these interviews on topics such as how clearly the intelligence community warned of the pending attacks, the early preparedness of a response by the intelligence community, the role the agency played in the success of the early stages of the campaign in Afghanistan, leadership in a crisis, empowering your team and finding the right people to execute on a plan, clear decision-making while operating in a low information environment, situational awareness and the qualities and best practices of a true leader.  In this article we draw on perspectives from former CIA Officer and Congressman Will Hurd and former CIA and Delta Force operator Gary Harrington.

Read More
08 Sep 2021

The Next Evolution of Ransomware Gangs: Collaboration

Ransomware gangs continue to evolve their tactics to stay one step ahead of network defenders and those tracking their developments.  Increased reporting that ransomware gangs – particularly Russian groups – are collaborating with one another is another example of this type of evolution.  The joining of forces enables these groups to share advice, targeting information tactics, and a data leak program, all of which contribute to executing more sophisticated attacks.  What’s more, these partnerships are proving successful and yielding substantial financial gains.

Read More