Today we recorded an OODAcast with long time colleague Dr. Scott Shumate who has 33 years of national security experience with both the Central Intelligence Agency as an undercover operations officer and the Department of Defense with the Counterintelligence Field Activity as a Senior Executive level director of Behavioral Science support to the departments investigative and counterintelligence units.
Here are the major takeaways from the interview to inform your perspective.
Department of Defense Acknowledges that Contractor Consolidation has Created a National Security Risk
A recent report from the Department of Defense highlights the risk the U.S. national security posed by an increasing consolidation of Defense contractors.
At OODA, we continue to highlight how disruptive technology can provide innovation advantage and work hard to get new capabilities introduced into the Department of Defense and intelligence community through the OODA Network of Experts and through our work with organizations like MissionLink Next. According to the report, these efforts are vital to our national security.
Supply Chain and Cybersecurity Resilience: Palantir-backed Analytics Platform Partnership and DoD CMMC 2.0 Announced
Two recent developments speak to both a market-driven and governmental response to the vital operational role technology, innovation, standardization, and collaboration will play in a transition to 1) a resilient supply chain that mitigates risk in the global IT supply chain; and 2) cybersecurity processes to protect the defense industrial base. We provide a brief analysis of both developments: The Athinia Platform and the DoD Cybersecurity Maturity Model Certification (CMMC) 2.0 Program.
The Government Accountability Office has found that 10 out of 15 of the Department of Defense’s IT projects are behind schedule. The Defense Department’s programs consist of software development approaches seeking to avoid cost increases and schedule delays for information technology systems. However, the Government Accountability Office (GAO) also found
The Defense Department has added two new supercomputers to its arsenal, announcing the acquisition earlier this week. The computers will seek to establish a cumulative capability of more than 23 petaflops of performance. The agency believes that the supercomputers will enter production service at some point in mid-2021. The supercomputers
On Friday, the Department of Defense announced that it has decided to award Microsoft with the contentious $10 billion JEDI contract. This has created more controversy between Microsoft and Amazon, who went to court in a legal fight for the lucrative DoD contract. In October of last year, Microsoft won
Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats. He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four times.
In this OODAcast, we discuss a wide variety of topics including how to use red teaming to plan for emerging threats and opportunities, how to bridge the gap between planning and execution, lessons-learned from 40 years of working with top strategists and thinkers, and the emerging threat landscape.
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) previously issued a malware report in which they detailed a new remote-access trojan variant used by APT groups in North Korea. The report claims that the remote access trojan, BLINDINGCAN, is associated with the government of North Korea. The
Yesterday, the White House announced that it is advancing the deployment of 5G networks by releasing 100 megahertz of the ideal midrange spectrum to commercial organizations. However, this has sparked some controversy, with critics claiming that the megahertz released should be double the amount. Chief Technology Officer Michael Kratsios made
According to researchers, sensitive and confidential documents have been obtained from Westech International, a US military nuclear missile contractor, after a cyberattack. Experts believe the cyberattack was likely the work of threat group Maze, a well-known and sophisticated group. Cyber-criminals were reportedly able to gain unauthorized access to Westech’s computer