Opportunities for Advantage: A Real-Time, Precise, Accurate, Interoperable OS for Autonomous Systems
In the OODA Almanac 2022, OODA CEO Matt Devost provided our initial “position’ for the exploration of “Autonomous Everything” throughout the 2022 calendar year of OODA Loop research and analysis: “Every year more robots enter our businesses and private lives. Emerging examples include Tesla’s Full Self Driving (FSD) capability (which leverages advanced computer vision, machine learning, neural networks, and control of a self-contained electric vehicle) or the humanoid robot called digit from Agility Robotics (that is designed to work with humans in a factory or retail environment). AI and machine learning will automate data analytics and improve IT-based workflows – and we expect improved support for automated workflows by complex physical and tech systems.” This post expands on this initial position and our ongoing research on the future of autonomous systems.
Reshoring is the transfer of business operations back to its country of origin. The term is usually associated with manufacturing but it applies to any business operation. The trend of reshoring back to the US from China began about a decade ago when some businesses realized costs in China (including labor and compliance and also transportation) were rising. Meanwhile automation was changing the cost equation for some business operations, making reshoring decisions easier. Over the last decade, tarrifs due to unfair practices and persecution of ethnic minorities added new motivation to reshore. The pandemic and China’s zero covid policy and resulting shutdowns of industry and transportation in China has now build an even stronger motivation to reshore, and the war in Ukraine has proven to any doubters the importance of having supply chains free of influence of totolitarian nations. The trend of reshoring will clearly accelerate.
We have another crucial update on what has been characterized as “the greatest cryptographic migration in history.” National Security Memorandum (NSM) 8, “Improving the Cybersecurity of National Security, Department of Defense and Intelligence Community Systems” was released in January, and was followed up by the Quantum Cybersecurity Preparedness Act. We provided an initial analysis of NSM8, followed by a breakdown and analysis on April 29th of NSM8 and the Quantum Cybersecurity Preparedness Act. Days after our analysis in April, our core research question regarding a more formal role for the private sector in this migration was answered by the release on May 4th of National Security Memorandum (NSM) 10.
John Spencer is a writer, thinker, speaker scholar who currently serves as the Chair of Urban Warfare Studies at the US Military Academy. He brings the experience of a veteran who has led in combat to his work, and in his latest book, Connected Soldiers, also provides insights from his time as a stay at home parent as his wife deployed. His analysis of connectivity and ints impact from multiple angles makes his book a very well rounded examination of how the Internet age is transforming how nations go to war.
Tracking The Cryptocurrency Revolution: A guide to OODA Loop Research and Reporting on Bitcoin and Ethereum
It is still very early in the cryptocurrency revolution, but Bitcoin, Ethereum and other related projects have now generated a combined market cap of over $1.6 Trillion Dollars, a signal of heft in this new of the economy. Estimates of the numbers of people using cryptocurrency vary widely, but there could be up to 20% of the US population with some cryptocurrency ownership, and large corporations are starting to leverage cryptocurrencies as a store of value and for use cases involving transactions. The startup world in the cryptocurrency ecosystem is incredibly hot with crunchbase tracking over 1300 cryptocurrency related startup companies. Clearly something is happening here we should all track.
On January 19th, the President signed National Security Memorandum (NSM) 8, “Improving the Cybersecurity of National Security, Department of Defense and Intelligence Community Systems”.
NSM8 appeared to have been inspired by Project Warp Speed – specifically, the elimination of layers of reportage and bureaucracy when trying to innovate with unprecedented speed and scale. With NSM8 and NSS, the goal was not so much the acceleration of innovation, but the ability to “defend forward” at speed and scale – with a tight OODA Loop between the White House and the NSA. At the time, the signing of NSM 8 appeared tactical, not strategic.
A Cambrian Explosion in innovation in cryptocurrency related products and services is underway. The uptake in cryptocurrency interest by institutions has been so large that it is probably prudent for all businesses to review their internal strategies regarding cryptocurrencies, not just as financial assets but as a way to improve internal innovation and positioning for the future.
This post provides executive level insights into a component of the Bitcoin ecosystem called a “node” and recommends every company and government organization now consider running a Bitcoin node.
According to the 2022 DIA Challenges to Security in Space report, “As China’s and Russia’s space and counterspace capabilities increase, both nations are integrating space scenarios into their military exercises…the expansion of Chinese and Russian space and counterspace weapons combined with the general rise of other foreign space capabilities is driving many nations to formalize their space policies to better position themselves to secure the space domain and facilitate their own space services.” A sophisticated report on the issues of Space Security was released this month: the Fifth Annual Space Threat Assessment 2022 from the Center for Strategic and International Studies – which expands on foundational thinking on defensive and offensive counterspace capabilities.
Our Artificial Intelligence tracking, research, and analysis fall into four categories: Surfacing business strategy insights based on current AI capabilities; Tracking Responsible and Ethical AI frameworks and projects; Exponential technologies, including AI, and Great Power competition; and tracking AI applied technology in various industry verticals (along with market drivers). Following are some general AI research insights that fall under a few of these AI research categories. OODA Loop research efforts are designed to sort through the exponential disruption fueled by artificial intelligence – focusing on how best to frame opportunities for advantage (business, strategic, etc.) to our members.
In 2019, the Defense Intelligence Agency (DIA) published the first Challenges to Security in Space “to address the main threats to the array of U.S. space capabilities, and examine space and counterspace strategies and systems pursued primarily by China and Russia and, to a lesser extent, by North Korea and Iran.” DIA has followed up the inaugural version of the report with the recently published Challenges to Security in Space 2022. This second edition expands on the insights of the first publication and provides an “unclassified overview of the threats to U.S. space capabilities, particularly from China and Russia, as those threats continue to expand.”