OODA Network Member Resources
Resources listed on this page are available to OODA Network Members. For information on becoming a member please visit our Join OODA Loop page.
Special Series on Artificial Intelligence
AI, machine learning, and data science will be used to create some of the most compelling technological advancements of the next decade. The OODA team will continue to expand our reporting on AI issues. Please check out the AI reports listed below.
- AI Security: Four Things to Focus on Right Now – This is the only security framework we have seen that helps prevent AI issues before they develop
- A Decision-Maker’s Guide to Artificial Intelligence – This plain english overview will give you the insights you need to drive corporate decisions
- When Artificial Intelligence Goes Wrong – By studying issues we can help mitigate them
- Artificial Intelligence for Business Advantage – The reason we use AI in business is to accomplish goals. Here are best practices for doing just that
- The Future of AI Policy is Largely Unwritten – Congressman Will Hurd provides insight on the emerging technologies of AI and Machine Learning.
- AI Will Test American Values In The Battlefield – How will military leaders deal with AI that may treat troops as expendable assets to win the “game”.
- The AI Capabilities DoD Says They Need The Most – Savvy businesses will pay attention to what this major customer wants.
Special Series on Quantum Computing
The developments in the field of Quantum Computing are coming faster and faster. OODA analysts are focusing on what matters most to today’s business decision makers. Recent reporting includes:
- The Executive’s Guide To Quantum Computing: What business decision-makers need to know now about quantum superiority
- Is Quantum Computing Ushering in an Era of No More Secrets?: Context from OODA’s Matt Devost on the very near future of quantum computing.
- What To Do About Quantum Uncertainty: Guess what, besides uncertainty at a quantum level there is great uncertainty among business and policy makers regarding Quantum Computing.
- AI, quantum computing and 5G could make criminals more dangerous than ever, warn police: Quantum is one of many emerging technologies that law enforcement professionals are tracking
- Intel offers AI breakthrough in quantum computing: This article is more about quantum simulations for AI, but shows the ecosystem that is developing around the technology
- Quantum Computing That Can Crack Modern Encryption More Than a Decade Away: When we see reports like this we wonder what qualifies the experts to say this. But in this case the experts are the National Academies of Sciences.
- Could quantum computers render current bitcoin and most blockchain cryptography powerless?: There is a worry that new algorithms that could run on quantum computing could attack blockchain and asymmetric encryption.
Country Studies and Threat Briefs
These reports provide a solid baseline that can inform your decision-making and put our daily reports into better context. Please contact us for questions or comments on any of these reports.
Russia Threat Brief:
Russia should be considered a kleptocracy, where the rule of law exists as long as it supports the objectives of the state and the ruling oligarchs. All U.S. businesses should exercise extreme caution before doing business in or with Russia. Our special report on The Russian Threat captures insights on the full spectrum of Russian capabilities and intention, including their actions in cyber conflict. For more read the continuously updated Russia Threat Brief. Also, be sure to check out our special report: Russia 2020: What Will Putin Do Next? and The Kinetic Potential of Russian Cyber War, which examines Russia’s mastery of cyber and kinetic linkages.
China Threat Brief:
Several countries have the capability to inflict harm on U.S. interests. However, China is the only one who has declared an intent to challenge the U.S. for global supremacy. China remains a closed society where challenges to party rule are met with harsh, sole crushing response. China is a powerhouse, but one with weaknesses. The same statement carries over to military and intelligence domains. For more read the continuously updated China Threat Brief. Also see our special report on Your Strategy for This Phase of the Trade War – The short version is, stay agile!
Iran Threat Brief:
Iran has been investing heavily in cyber operations and is experienced in conducting both espionage and attack. Iran is undemocratic, with power centered in a Supreme Leader (Ali Khamenei). A President exists but has little power compared to the Supreme Leader. But below them is a vibrant and powerful country of over 81 million. Iranian education systems and scientific pursuits make them a technologically empowered nation that can mount surprisingly sophisticated cyber operations. Iran Threat Brief.
DPRK Threat Brief:
North Korea describes itself as a “self-reliant socialist state” but it is really best described as a Stalinist dictatorship. Leader Kim Jong-un holds power and dominates all functions through a mix of violence, rewards and intense propaganda. A common misperception about the DPRK is that they are so backwards and poor that they cannot mount a modern cyber war. But reality is that their policy of “Songun” (military first) means there are resources for capabilities considered strategic, and that includes cyber war. North Korea Threat Brief
The Executive’s Guide to Space:
The rapid pace of innovation in space is producing real capabilities which can be leveraged for businesses in every sector of the economy. There is a growing excitement over the many developments in the space industry, giving rise to many questions about how these developments will impact markets overall. This guide is meant to assist strategic planners in assessing developments in the space sector. For more see: The Executive’s Guide To Commercial Use of Space
The Revolution in Bio-Science:
This post provides an overview of key thrusts of the transformation underway in biology and offers seven topics business leaders should consider when updating business strategy to optimize opportunity because of these changes. For more see: The Executive’s Guide To The Revolution in Biology
Food Industry Resiliency Crisis:
It is a truism that every society is only a few meals away from revolution, proven not for the first time when high food prices initiated the Arab Spring, and yet food security is a woefully neglected national security concern. America lacks a national food policy, even though we are headed towards a crisis. This concern is much greater for other allied nations and is also driving actions by many adversaries. For more see: Is There An Emerging Global Food Industry Resiliency Crisis?
Attacks Against Faith-Based Communities:
In a Joint Intelligence Bulletin issued by the U.S. Department of Homeland Security and Federal Bureau of Investigation the threat of terrorist attacks against faith-based communities and soft targets amid religious holidays is discussed. OODA captures more detail and as always provides input that can help drive your actions. Read more at: DHS/FBI Warn of Attacks Against Faith-Based Communities and Soft Targets Amid Religious Holidays
Data As A Weapon System:
Are you making the most of your data holdings? If you want to leverage your data to the better of your business you need to treat it like a weapon and use it to gain advantage over others. This is not just about your technical architecture, this is about your attitude and the approach you take to being proactive. For our best practices on how to do so see the OODA Guide to Using Your Data As A Weapon.
Security In Space:
The last decade has seen an incredible increase in the commercial use of space. Businesses and individual consumers now leverage space solutions that are so integrated into our systems that they seem invisible. Some of these services include: Communications, including very high-speed low latency communications to distant and mobile users. Learn more at: OODA Research Report: What Business Needs To Know About Security In Space
Special Reporting on The Cyber Threat
OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. Review all in this series at: OODA’s Cyber Threat Analysis Report
The Cyber Threat to NASA Artemis Program:
NASA is enabling another giant leap for humanity. With the Artemis program, humans will return to the Moon in a way that will enable establishment of gateways to further exploration of not just the Moon but eventually the entire solar system. The initial expenses of the program will return significant advances for scientific understanding and tangible economic returns. As Artemis continues, the project will eventually deliver improvements for humanity that as of yet have only been dreamed of. But there are huge threats. For more see: The Cyber Threat To Artemis
Traveling Executive’s Guide to Cybersecurity:
Traveling executives are frequent targets for cyber espionage. This report provides guidance for executives and their security teams on how to protect their information and technology while on the go. Produced by OODA co-founders Matt Devost and Bob Gourley, the report provides best practices, awareness of threats, and a deep understanding of the state of technology. A tiered threat model is provided enabling a better tailoring of actions to meet the threat. For more see: OODA Releases a Traveling Executive’s Guide to Cybersecurity
OODA Best Practices for Agile Cybersecurity:
Members of the OODA expert network continuously track best practices for policy, procedures, technology and governance related to cyber defense. We work directly defending enterprises in cyber defense and maintain an always up to date list of actions in a form designed to help any organization stay as agile as possible in the face of dynamic adversaries. Read more at the OODA Special Report on Best Practices for Agile Cybersecurity.
Additional Cyber Security Reporting and Analysis:
Cyber Sensemaking: Lessons for enhanced cybersecurity across multiple domains including government, corporate, think tank and academic.
Essential Management Strategies for Cybersecurity: Management lessons learned and essential actions to mitigate risks
10 Red Teaming Lessons Learned Over 20 Years – Red teaming is one of the most valuable things you can do within your organization. OODA CEO and Co-Founder Matt Devost offers up his top ten red teaming lessons learned from over two decades of red teaming across hundreds of engagements.
The Five Modes of HACKthink – Explores how to use a hacker mindset to solve complex problems and unlock opportunity.
The State of the Cybersecurity Community: An update following RSA 2019 – OODA Experts provide their perspective on the RSA 2019 conference including a list of 30+ companies to watch.
Email – The Often Overlooked Cybersecurity Risk – Are silly email mistakes putting your sensitive data and customer PII at risk or in violation of GDPR. Matt Devost breaks down four real life examples that highlight inadvertent email risks.
Here’s What the New U.S. Intelligence Strategy Says About Cyber Threats – The United States intelligence strategy for 2019 has been released, covering seven specific themes. Here’s how the United States Intelligence Community will deal with cyber threats: “Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to come.
Def Con – The highest yield cyber security event of the year.
The 5G Supply Chain Blindspot – This is the place few are looking regarding 5G security
Special Reporting on The Federal Technology Market
The federal government spends almost $90B a year on technology. But serving this market can be hard, especially for a startup firm. Our analysts have decades of experience helping tech startup CEOs succeed in the federal space. Our special reporting on this topic provides actionable insights to help you prioritize your actions and optimize your strategy. Our federal technology expert Bob Gourley produces this series and is available to all OODA Network members seeking additional insights for growth in this sector. Review all in this series at: OODA’s Special Reporting on the Federal Technology Market.
OODA Network Interviews
We may be biased, but we believe OODA network members are some of the most interesting people in the world. They are certainly some of the most successful. To capture some of the lessons learned from professionals in the network we have started an interview series. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting some of the great people that make our continued research and reporting possible. Review all in this series at: OODA Expert Network.
OODA Loop Greatest Hits
In addition to the special reports above, OODA Experts are publishing unique analysis on a variety of topics. The following is a sampling of the most popular topics:
2019 and the Evolving Role of OSINT – Open Source Intelligence, to include social media analysis, has evolved a next generation of crowdsourcing and accountability.
OODA Trends 2019 – Our take on an annual trends report looks at emerging technology and security trends that should be in your OODA Loop.
Manage Insider Risk and Prevent Big Brother Perception – A four part series by OODA Network Expert Crystal Lister on managing insider threats.
DHS & FBI Report that Election Infrastructure in all 50 States Targeted During 2016 – The Department of Homeland Security and the Federal Bureau of Investigation have issued a special report acknowledging that the election infrastructure in all 50 states was targeted during the 2016 election.
DoD’s new Capability Maturity Model for Cyber (CMMC): How the government will measure you.
The Top 10 Security, Technology, and Business Books – OODA CEO and Co-Founder Matt Devost reads over 50 books a year and provides his top 10 for 2018. Also see the 2017 list and 2016 list or our curated list of great reads at Amazon.com
LikeWar and the Weaponization of Social Media – Our interview with author P.W. Singer.
Unmasking Maskirovka: Russia’s Cyber Influence Operations – OODA Network Expert Book Review – This exploration is timely and relevant given the Russian assault on the American electoral process in the 2016 Presidential election—especially since the long-range implications are still being assessed. The AI Books Chinese President Xi Jinping is Reading: What we saw on his bookshelf
The Red Teamer’s Bookshelf – Our pick of key reads for security practitioners
What If You Could Know What The Designers Of Our AI-Enabled Future Think? – To really see where we are all going with Artificial Intelligence (AI) there is no better way than asking those who are architecting the future of AI.
Does Technology Threaten The Future of Humanity? According to this book it may.
For more on the benefits of your Membership see the OODA Members’ Guide
The OODA Unlocked program offers discounts to best-in-class services and solutions. For a list of current discounts, please visit the OODA Unlocked page.
The OODA Daily Pulse Report provides a detailed summary of the top cybersecurity, technology, and global risk stories of the day. Subscribe today!