Agile strategies are able to change in all three definitional dimensions—ends, ways and means. Missteps are changes without strategic advantage. What’s the Biden administration’s strategy for Afghanistan?
This sortie is a follow-on to ICSL Paper #28 which showed how critical thinking errors lead to exploitation. Our focus here is on freely available platforms and programs that can track and destroy disinformation.
Disinformation is a global threat. Pervasive digitized technology and social media provide rich opportunities to distort public perceptions at scale. Authoritarians assail democracies incessantly. Comparitech recently discovered a Facebook bot farm that controls nearly 14,000 fake accounts and produces 200,000 posts per month.
Authoritarian states are weaponizing supply chains into all-effects warfare while democratic states compete with inferior strategies. We can be more competitive and wage superior complex warfare in kind.
If strategy means anything, it should have definition and purpose. US strategy toward the current Russia regime, and just about any competitor, continues to be described simplistically as deter and defend.
Supply chains are vital to socio-economic well-being and military success. They have become arenas where authoritarians wage complex warfare while democracies compete with inferior strategies.
As a follow-on to China’s strategy, we show how Russia’s use of narrative reorients decisions in an Observe-Orient-Decide-Act (OODA) Loop. The distortion of information is not just divisive. It envelops the “when-deterrence-fails” US approach to warfare.
This Note paraphrases today’s webinar from the Alliance for Security Democracy on Hamilton 2.0, a dashboard on Russian, and now Chinese, disinformation.
State-sponsored cyber attacks against critical infrastructure are increasingly pervasive. Their global presence and effective methods are asymmetric, coercive, and debilitating.
We must also seek solutions that limit the effects of disinformation. This effort starts with leaders recognizing and publishing Russian exploits as they are discovered. Overt exposure of Russian methodology goes a long way in limiting the effectiveness of false narratives. Investigations should identify who is targeted in hacks, why they were chosen as targets, what information has been stolen, and the extent of related penetration.
While teaching sense-making in the information environment, I began to apply previous work on complex warfare strategy in East Asia to other regions. Russia is a critical case — a declining nuclear power using combinations of effects to regain a perceived loss of prestige.