Quantcast
Channel: Featured Analysis – OODA Loop
Browsing all 44 articles
Browse latest View live

Jordan’s Uncertain Future

Public protests erupted throughout Jordan in February of this year. While security officials in Amman are well accustomed to demonstrations within the city limits, the February protests also reached...

View Article



Dangerous Minds – The Relationship between Beliefs, Behaviors, and Tactics

This research monograph – Dangerous Minds, examines the relationship between the individual beliefs, behaviours, and tactics of an attacker. It was developed out of work, following human factors...

View Article

State Sponsored Cyber Threats – The Long View

Thinking about state-sponsored cyber threats over the long term doesn't come easy to Western strategists. This essay takes a look at at the strategic implications of thinking only in the short-term.

View Article

Boko Haram: A Threat to Nigeria and Beyond

Al-Qaeda, Hamas, Al-Shabaab, Hezbollah, the Haqqani network, and the Taliban are all infamous names to the Western world. These organizations, however, are but a handful of the many dozens of...

View Article

The International Drug Trade and West Africa: An Enforcement Quandary

“In the past decade, there has been significant growth in the illicit trafficking of drugs, people, firearms, and natural resources. Trafficking in these and other commodities is generally...

View Article


Slavery and Human Trafficking in 2013

Introduction Reports and statistics from the UN, national governments, and politically diverse NGO’s demonstrate that human trafficking and slavery are as common today as they were during the years...

View Article

Privacy in the Age of Big Data

Social media, Web 2.0, the Internet of Things, mobile computing, and the expansion of sensors is allowing more information to be gathered than ever before which, coupled with Big Data analytics, offers...

View Article

The Cyber Moscow Rules

Lessons learned from US agents who operate in enemy territory have been captured for years and transformed into a code of conduct popularly known as “Moscow Rules.” Those old rules existed for a...

View Article


Criminal Netwarriors in Mexico’s Drug Wars

Mexico is imploding in a series of interlocking ‘criminal insurgencies’ culminating in a virtual civil war. Kidnappings, assassinations, beheadings, shoot-outs:  Mexico is gripped by combat between...

View Article


Toward Operational Art for Policing

The military, facing a complex and intractable mixture of “wicked problems” on the battlefield, has responded with a doctrinal revolution in the production and practice of operational theory.  But most...

View Article

Intelligence-led Mitigation

This paper explores methods for capitalizing on existing law enforcement intelligence capabilities to provide intelligence support to decision makers for a full spectrum of public safety and emergency...

View Article

Anders Behring Breivik: A Lethal Mind in an Unlikely Place

“I explained to God that unless he wanted the Marxist-Islamist alliance and the certain Islamic takeover of Europe to completely annihilate European Christendom within the next hundred years, he must...

View Article

Frame Reflection:A Critical Review of US Military Approaches to Complex...

We are pleased to present this monograph on frame reflection. As the authors note: “Our hope is that the insights gained from institutional barriers in the modern military may provide insights for...

View Article


Football and the Illusive Stability of Coalition Governments in the MENA States

An Arab Spring political cycle is emerging. Single-party domination gives way to multi-party democracy which crumbles back into single-party domination. Football: An Introductory Anecdote Sitting with...

View Article

Did Snowden Escalate the Cyberwar?

Edward Snowden is guilty of lot of things. But contrary to Kurt Eichenwald’s recent Newsweek analysis, he did not “escalate the cyberwar.” Eichenwald interviews a host of business, intelligence,...

View Article


Identifying “Insider” Threats in Information Security

Introduction The threat of “insiders” in positions of trust with access to critical aspects of an organization’s Information Technology (IT) infrastructure, whether government, military, or private...

View Article

Radioactive Thefts and Dirty Bomb Threats

The recent theft of a truckload of highly radioactive material in Mexico unearthed a series of panicked questions about the homeland security threat of dirty bombs. “What are they?”, “what can they...

View Article


Making Sense of Mandiant’s Billion Dollar Valuation

The IT security market is popping Champaign corks today in celebration of the tremendous valuation placed on Mandiant. According to the New York Times, FireEye has agreed to pay $1 Billion in cash,...

View Article

Sochi 2014 Threat Overview

Fear Before the March of Flames Even as the flames of the Olympic torch approach their destination in Sochi, Russia, security officials race to respond to emerging threats by non-state actors. Multiple...

View Article

Somalia Report

This week saw continuing violence throughout the country. The AMISOM and SNA offensive recaptured more keys towns, however, Al-Shabaab is far from defeated with continuing violence in Mogadishu and...

View Article
Browsing all 44 articles
Browse latest View live




Latest Images