OODA Loop provides actionable intelligence, analysis, and insight on global security, technology, and business issues. Our free newsletter keeps our readers up to date on a daily basis, and our special reports and advisories provide insights for those that need deeper insights into key markets and topics of executive interest.
OODALoop offers additional insights and community resources to our members. For more on becoming a member visit the OODA Network Signup Page.
Special reports members have access to include:
Special Series on Artificial Intelligence
AI, machine learning, and data science will be used to create some of the most compelling technological advancements of the next decade. The OODA team will continue to expand our reporting on AI issues. Please check out the AI reports listed below.
- AI Security: Four Things to Focus on Right Now
- A Decision-Maker’s Guide to Artificial Intelligence
- When Artificial Intelligence Goes Wrong
- Artificial Intelligence for Business Advantage
Country Studies and Threat Briefs
These reports provide a solid baseline that can inform your decision-making and put our daily reports into better context. Please contact us for questions or comments on any of these reports.
Russia should be considered a kleptocracy, where the rule of law exists as long as it supports the objectives of the state and the ruling oligarchs. All U.S. businesses should exercise extreme caution before doing business in or with Russia. Our special report on The Russian Threat captures insights on the full spectrum of Russian capabilities and intention, including their actions in cyber conflict. For more read the continuously updated Russia Threat Brief.
Also, be sure to check out our special report: Russia 2020: What Will Putin Do Next?
Several countries have the capability to inflict harm on U.S. interests. However, China is the only one who has declared an intent to challenge the U.S. for global supremacy. China remains a closed society where challenges to party rule are met with harsh, sole crushing response. China is a powerhouse, but one with weaknesses. The same statement carries over to military and intelligence domains. For more read the continuously updated China Threat Brief.
Iran has been investing heavily in cyber operations and is experienced in conducting both espionage and attack. Iran is undemocratic, with power centered in a Supreme Leader (Ali Khamenei). A President exists but has little power compared to the Supreme Leader. But below them is a vibrant and powerful country of over 81 million. Iranian education systems and scientific pursuits make them a technologically empowered nation that can mount surprisingly sophisticated cyber operations. Updated report coming soon.
North Korea describes itself as a “self-reliant socialist state” but it is really best described as a Stalinist dictatorship. Leader Kim Jong-un holds power and dominates all functions through a mix of violence, rewards and intense propaganda. A common misperception about the DPRK is that they are so backwards and poor that they cannot mount a modern cyber war. But reality is that their policy of “Songun” (military first) means there are resources for capabilities considered strategic, and that includes cyber war. North Korea Threat Brief
Special Reports
Traveling executives are frequent targets for cyber espionage. This report provides detailed guidance for global executives and their security teams on how to protect their information and technology systems while on the go. Produced by OODA co-founders Matt Devost and Bob Gourley, the report is based on best practices, an awareness of threats, and a deep understanding of the state of technology. A tiered threat model is provided enabling executives to better tailor actions to the threat. For more see: OODA Releases a Traveling Executive’s Guide to Cybersecurity
In a Joint Intelligence Bulletin issued by the U.S. Department of Homeland Security and Federal Bureau of Investigation the threat of terrorist attacks against faith-based communities and soft targets amid religious holidays is discussed. OODA captures more detail and as always provides input that can help drive your actions. Read more at: DHS/FBI Warn of Attacks Against Faith-Based Communities and Soft Targets Amid Religious Holidays
OODA Best Practices for Agile Cybersecurity: Members of the OODA expert network continuously track best practices for policy, procedures, technology and governance related to cyber defense. We work directly defending enterprises in cyber defense and maintain an always up to date list of actions in a form designed to help any organization stay as agile as possible in the face of dynamic adversaries. Read more at the OODA Special Report on Best Practices for Agile Cybersecurity.
Are you making the most of your data holdings? If you want to leverage your data to the better of your business you need to treat it like a weapon and use it to gain advantage over others. This is not just about your technical architecture, this is about your attitude and the approach you take to being proactive. For our best practices on how to do so see the OODA Guide to Using Your Data As A Weapon.
The last decade has seen an incredible increase in the commercial use of space. Businesses and individual consumers now leverage space solutions that are so integrated into our systems that they seem invisible. Some of these services include: Communications, including very high-speed low latency communications to distant and mobile users. Learn more at: OODA Research Report: What Business Needs To Know About Security In Space
Special Reporting on The Cyber Threat
OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. Review all in this series at: OODA’s Cyber Threat Analysis Report