This is the second in our series of special reports on mitigating the risks and improving corporate strategic planning regarding the drought in the US. The first is the OODA Special Report: How Drought In The US Should Impact Your Mid To Long Range Strategic Planning. This report expands on the mid to long term scenario planning methodology and provides more insights into best practices in scenario planning as a strategic practice and pointers on how to get started ‘building’ your scenario.
Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a Better Information Future” was that book for me in 2021 so I was delighted to host Jer for a conversation on the OODAcast.
er Thorp is an artist, writer and teacher living in New York City. He is best known for designing the algorithm to place the nearly 3,000 names on the 9/11 Memorial in Manhattan. Jer was the New York Times’ first Data Artist in Residence, is a National Geographic Explorer, and in 2017 and 2018 served as the Innovator in Residence at the Library of Congress. Jer is one of the world’s foremost data artists, and is a leading voice for the ethical use of big data.
Project Pegasus: Global news organizations reveal expansive investigation of NSO Group “zero click” surveillance software
Seventeen news organizations around the globe have launched Project Pegasus, a hard-hitting investigative report of the Israel-based NSO group. The news project is eponymously concerned with Pegasus, the cyberespionage tool developed by the NSO Group.
In June 2021, the 25-member United Nations (UN) “Group of Governmental Experts on Advancing Responsible State Behavior in Cyberspace in the Context of International Security” (GGE) produced a report, building on its previous meetings to get the international community on the same page with respect to cyber attacks. Typically, final reports are only produced when the members have reached consensus. Notably, where previous GGEs succeeded, the 2016-2017 GGE did not produce such a report, with disagreements over key issues such as self-defense and the right to take countermeasures in response to cyber attacks. The latest report is noteworthy, particularly coming on the heels of some of the most prominent cyber attacks suspected of being executed by the very governments represented in the GGE, as well as the Open-Ended Working Group that addresses the same issues but is open to all UN members.
What The C-Suite Needs To Know About The USG Advisory on Risks and Considerations for Businesses Operating in Hong Kong
The US Government released a statement jointly produced by the Department of State, Department of Treasury, Department of Commerce and Department of Homeland Security on the topic of business risks associated with operating in Hong Kong. If any single agency released a memo on a topic like this it would be important. With all four teaming to produce this it is a clear signal that this advisory should be read and understood by any company doing business in or with Hong Kong.
OODA has long been advising our clients and network members on the nature of the changes underway in Hong Kong and for most of our readers here the changes are probably not a surprise. But this joint advisory provides a good opportunity to pause and review the situation and assess whether or not your strategy is in the right place. We provide a list of recommendations for the C-Suite at the end of this overview.
Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that learned the importance of quickly assessing challenges that were not being addressed and then forming an ability to express what needs to be done and how to do it quickly. As we hear in the discussion, this type of approach, very consistent with the famous “Heilmeier Catechism”, ended up producing a wide range of DARPA breakthroughs, including one that is now in every cell phone in the globe (next time you use your cell phone’s mapping and location services, remember to thank the Fuller Brush company!).
This OODA Network Expert interview is with John P. Sullivan, a career police officer and creator of the Terrorism Early Warning Group concept. He retired as a lieutenant with the Los Angeles County Sheriff’s Department. John discusses his career progression and insights for current and future leaders on dealing with emerging threats.
“Slow down, listen and use the intelligence available to you.”
Recently, the International Institute for Strategic Studies (IISS) published a report that assessed nation state cyber capabilities and national power. The qualitative assessment covered and codified seven categories that contributed to building a nation state’s cyber program: strategy and doctrine; governance, command and control; core cyber intelligence capability; cyber empowerment and dependence; cyber security; global leadership in cyber affairs; and offensive cyber capability. The culmination of two-year’s worth of research, IISS conducted this broader study in order to provide a more comprehensive view and ultimately ranking what it considered the top 15 countries into three tiers based on its findings.
AI technologies are making continuous advances in domains like industrial robotics, logistics, speech recognition and translation, banking, medicine and advanced scientific research. But in almost every case, the cutting edge AI that drives the advances drops from attention, becoming almost invisible when it becomes part of the overall system. The fact that most AI use today is invisible can lead to the erroneous assumption that it is not delivering on expected value, and this can translate to caution when considering new ways of applying AI to business operations. If your competition becoming apathetic about AI they may be doing you a favor. To keep your organization for doing them a favor back, we provide our recommendations for your approach to an AI strategy here.
In early May we began a discussion with our OODA Network members that started with an observation. About six months prior we had been through the Solar Winds attack, which from our perspective was clearly one of the most damaging attacks/espionage operations in history. Soon after that, the attack series named Hafnium by Microsoft was revealed. Hafnium had started as espionage but then turned into a Gold Rush of criminal activity, one of the worst attacks in history. Then the Codecov attack hit.
You know where we are going with this don’t you? We are in an age of continuous crisis.