The Cybersecurity Sensemaking page was recently updated with the USG Cybersecurity Initiatives and Updates page. We need to make sense of and look at the patterns found between interagency cybersecurity initiatives, cybersecurity organizations, and private sector partnerships (specifically the technology sector) throughout the USG. In the pilot stages of this research, we will first try to address the facile complaint about the USG (usually offered by non-subject matter experts retroactively only after a crisis emerges): “The USG left-hand does not know what the USG right hand is doing.” To start, a compilation of current government agency and private sector partnership activity in the domain will ground our research.
Labor Day Weekend Ransomware Warnings: U.S. warns firms to be on guard against hostile network activity
In a press briefing at the White House yesterday, White House deputy national security adviser Anne Neuberger reinforced the warning the FBI and CISA released a few days ago. Officials acknowledged that the threats over the weekend were not specific, but “we do have this history.” The largest incidents in 2021 – Colonial Pipeline, JBS and Kaseya – all happened over holidays and weekends.
Checkers, Chess and 围棋 (Wéiqí – aka Go): When It Comes to Games in Cyberspace, China May Be the Master
Checkers is the ultimate game of tactical engagement where two competitors push their forces forward in the attempt to conquer his foe by capturing all of his pieces. Chess is a more strategic option. Whereas checkers perhaps best exemplifies a single engagement of a battle, chess represents the entire battle, requiring a strategic vision that is executed by moving pieces of different capabilities against an equal opposition force. Multi-dimensional thinking is required as pieces are moved in joint operations, the goal of which is to trap the opponent’s king. These two games are well known and socialized in the United States, and like it or not, both have been likened to military conflict especially as they embody the principles of warfare, involving a struggle of wills, movement, engagement, and protection.
However, there is a third game that also bears attention. Played by the Chinese, Go (also known as Wei Ch’i or Wei Qi) is an abstract game in which the goal is for one of the competitors to surround more territory than his opponent.
OODA Network members are invited to participate in a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or future events impacting their organizations. We also use these sessions to help better focus our research and reporting on member needs.
The August monthly meeting focused on issues around Afghanistan and the many geopolitical and business related elements of these chaotic events. Members also discussed topics in the OODA C-Suite Report.
This post was generated from the OODA Network Member monthly meeting and access is restricted accordingly. If you are an OODA Subscriber, but not a member of our expert network, you will not be able to access this content.
In this OODAcast we glean lessons learned and insights into the future of the Metaverse and its implications from Randall Fort. Fort is a seasoned security, intelligence and technology leader known for his grasp of enterprise mission needs and his ability to track the rapid advancing capabilities of technology to meet those needs. His background includes time as the director of global security for Goldman Sachs. He also led one of the most highly regarded teams of analysts in the world, the Department of State’s Bureau of Intelligence and Research. Randy later worked at Raytheon and is now now the COO of QWERX.
This page serves as a dynamic resource for OODA Network members looking for Global Supply Chain information to drive their decision-making process. It is in a formative stage, with recent developments and previous OODALoop coverage and analysis grouped into the following categories: Pandemic Disruptions; Technology, Platforms and Supply Chain Intelligence; Case Study: The Global Semiconductors Supply Chain; Supply Chains and Forced Labor; and National Security and Critical Infrastructure.
These categories will evolve into the usual suite of resources authored expressly for a Sensemaking resource page (Business Advantage, Decisionmaker’s Guide, Executive Guides, etc.). If you would like to recommend a resource, please email us at email@example.com.
Since authoring the seminal Cyberwar is Coming! in 1993, Dr. John Arquilla has been on the forefront of thinking about the digital domain and the conflicts that now occurring on a daily basis. His expertise on the subject of “netwar” and “swarming” tactics have been revolutionary, serving as a military consultant and now teaching courses on national security and defense analysis. In Cyberwar is Coming!, Dr. Arquilla understood that the digital world and the information world were inherently tied together, a relationship that would only intertwine and strengthen the more advanced and the technology became. Indeed, the multiple and diverse influence operations that transpired during the 2016 U.S. presidential elections proved testament to his thoughts, showing how cyber-enabled information campaigns could “disrupt, damage, or modify what a target population ‘knows’ or thinks it knows about itself and the world around it.” These remarks were very prescient indeed, considering they were written more than 20 years before the U.S. victimization of such campaigns by Russian and other foreign interests.
DHS Science and Technology Directorate (S&T) releases Artificial Intelligence (AI) and Machine Learning (ML) Strategic Plan Amidst Flurry of USG-wide AI/ML RFIs
An artificial intelligence security strategy (see “Securing AI – Four Areas to Focus on Right Now”) should be the cornerstone of any AI and machine learning (ML) efforts within your enterprise. We also recently outlined the need for enterprises to further operationalize the logging and analysis of artificial intelligence (AI) related accidents and incidents based on an “AI Accidents” framework from the Georgetown University CSET. The best analysis is a sophisticated body of work on AI-related issues of morality, ethics, fairness, explainable and interpretable AI, bias, privacy, adversarial behaviors, trust, fairness, evaluation, testing and compliance.
As far as governmental contributions, what should be encouraging to industry players is the fact that AI/ML strategy is now very actionable at the policy, research and development and strategic partnership level across the USG.
In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud. Amr has a BS in EE from Cairo University, an MS in Computer Engineering from Cairo University, and a PhD EE from Stanford University. His experiences in tech and company leadership put him in the perfect position to help bring actionable insights to decision-makers today.
The Center for Security and Emerging Technology) (CSET) in a July 2021 policy brief, “AI Accidents: An Emerging Threat – What Could Happen and What to Do,” makes a noteworthy contribution to current efforts by governmental entities, industry, AI think tanks and academia to “name and frame” the critical issues surrounding AI risk probability and impact. For the current enterprise, as we pointed out as early as 2019 in Securing AI – Four Areas to Focus on Right Now, the fact still remains that “having a robust AI security strategy is a precursor that positions the enterprise to address these critical AI issues.” In addition, enterprises which have adopted and deployed AI systems also need to commit to the systematic logging and analysis of AI-related accidents and incidents.