Once again, we present to you the annual OODA Almanac which is intended to be a quirky forecasting of themes that the OODA Network think will be emergent in 2022. Our 2021 Almanac had some great frameworks for understanding the year ahead with lots of compelling insights. The theme for this year is surviving and thriving in an age of exponential disruption. It seems that everything is getting disrupted; national security, economic security, technology, culture and media. New ideas are old and old ideas are new. Here’s our take for 2022.
The Cybersecurity and Infrastructure Security Agency (CISA) is holding virtual mini-Industry Day events throughout this year. These events will allow CISA and industry to have meaningful discussions about cybersecurity capabilities, challenges, top priorities, requirements, and technologies as well as future business opportunities. The first Virtual Mini-Industry Day will be Wednesday, January 26, at 10 a.m. (EST).
The Global Cyber Criminal Threat: Interpol, Europol and European Nations Step Up to the Plate in 2022
Two recent developments in the fight against global ransomware criminal organizations should filter into your organization’s risk awareness relative to the events in Europe and the overall cyber threat worldwide.
Initial Access Brokers (IAB) are poised to become a force in 2022, due to a unique skill set that positions them as a valuable commodity for the deployment of hostile cybercrime activity. IABs serve as middlemen, specializing in the exploitation of victims and gaining initial entry. Once achieved and sustained, these actors sell these unique accesses to interested customers on dark web forums and markets. In this capacity, they execute the first phase of a cyber-attack chain, performing the necessary research prior to conducting an operation. Emilio Iaisiello explores the implications of the growth of IABs.
We are conscious of our need to keep our usual variety of News Brief and OODA Analysis, but for obvious reasons, this week is top-heavy with Russian, NATO, and Ukrainian coverage. We intend on keeping our focus on providing context you need vice the blow by blow of major moves. Like in other domains we endeavor to provide the “So What?” and “What’s Next?” you need to help drive your decisions.
OODA’s experts have decades of experience in geopolitical risk, including deep experience in the US intelligence community which resulted in foundational knowledge on Russian culture, history and motivations. We maintain awareness of current thinking of analysts in and around the intelligence community through community events, email lists and video meetings, and have been pulled into an almost daily dialog with experts on how things may unfold in Europe because of Russia’s actions here.
The Everyday Astronaut’s Tim Dodd is your color commentator for this archived live stream of the James Webb Space Telescope | Ariane 5 ECA launch from Christmas Day a few weeks ago.
Following is an update of Log4Shell activities organized by nation-states – with non-state actors and cybercriminal organizations which are suspected to be state-affiliated or located in the country.
Today, Putin Sends Cybercrime Crackdown Signal to U.S.; Unattributed Cyber Attack on Ukrainian Government Sites
More than any of the mixed signals of the high-level meetings between the U.S. and Russia, two cyberwar developments today are far more clear indicators of the direction of the Ukrainian conflict playing out between NATO, Putin, and the U.S.
Ever since Star Wars Episode VI: Return of the Jedi, when Boba Fett busts his jet suit on Jabba the Hutt’s sail barge during the Battle of the Great Pit of Carkoon, well, this writer was hooked. Jet packs have since been depicted in media and sci-fi, most notably in the dystopian scenario of Spielberg’s 2002 Minority Report. Technological fact now mirrors science fiction, as the British Royal Navy has recently been testing jet suit technology to board ships. A new video was recently released by the UK-based Gravity Industries, which manufactures the jet suit technology.
A Chinese Team (Katzebin) won the Def Con 29 CTF competition. It was the second year in a row that a Chinese team had won the competition. Considering the recent Communist Party of China (CPC) restrictions on hacker participation in CTF events outside of the CPC, how were the Chinese team participating in a 2021 CTF in Vegas? Recently, we returned to researching this question. In so doing, it converged with Apple, Inc., The iPhone IOS, the privacy wars between Google and Apple, CPC surveillance technologies, The NSO Group, and the Chinese suppression of the Uighurs in Xinjiang, a northwestern province of China.