This sortie is a follow-on to ICSL Paper #28 which showed how critical thinking errors lead to exploitation. Our focus here is on freely available platforms and programs that can track and destroy disinformation.
Authoritarian states are weaponizing supply chains into all-effects warfare while democratic states compete with inferior strategies. We can be more competitive and wage superior complex warfare in kind.
The Mekong Infrastructure Tracker launched today, providing a public platform that creates transparency on nearly 4000 ongoing or planned infrastructure projects in this strategic region.
Supply chains are vital to socio-economic well-being and military success. They have become arenas where authoritarians wage complex warfare while democracies compete with inferior strategies.
This Note paraphrases today’s webinar from the Alliance for Security Democracy on Hamilton 2.0, a dashboard on Russian, and now Chinese, disinformation.
COVID-19 is an advanced threat against humanity, requiring a broad-based combination of effects to defeat.
This Note uses critical thinking to analyze complex linkages in a YouTube video from the MIT Center for Transportation and Logistics: The Corona Virus and the Impact on the Global Supply Chain.
Let’s explore how to gain advantages by comparing analog and digital characteristics of the Information Environment (IE).
State-sponsored cyber attacks against critical infrastructure are increasingly pervasive. Their global presence and effective methods are asymmetric, coercive, and debilitating.
In 1983, Project Socrates began as a Reagan initiative to develop technology-driven competitive advantage. Then it ended.
We must also seek solutions that limit the effects of disinformation. This effort starts with leaders recognizing and publishing Russian exploits as they are discovered. Overt exposure of Russian methodology goes a long way in limiting the effectiveness of false narratives. Investigations should identify who is targeted in hacks, why they were chosen as targets, what information has been stolen, and the extent of related penetration.
The question of what and whom to trust applies to all situations because uncertainty is pervasive. In the information environment (IE), the overriding context of trust is that it’s contested. Actors fight for the kind of information and people they need to compete and prevail. Four types of competition become apparent when we consider four contested purposes of strategic and anticipatory analysis:
As a detailed follow-on to The US National Security Strategy Needs Combined Effects, this paper integrates combined effects with the US National Defense Strategy (NDS), too.
Previous notes introduced combined effects strategy for complex warfare. We can understand this form of warfare as a competition that blends cooperation and confrontation.