How we frame threats in the information environment influences what we think we can do to counter them. One way
US Joint Operations doctrine about the Operational Environment (OE) omits the agency of artificial intelligence (AI). How is this a
For those who study and teach the subject of revolution, human events over the past two decades provide a fascinating
Both North Korea and South Korea seek self-reliance and alignments with main powers. From that take-off point, I recommend this
Waiting to retaliate against use of force is a losing strategy by itself. The problem is, reacting to attacks fits
In August 2019 (Note #11), while waiting to see if Iran’s shootdown of a US drone would prompt a counterstrike,
Using complex warfare concepts from Papers #13 (East Asia), #14 (China) and #16 (Japan), we apply and compare that holistic
Using complex warfare concepts from Papers #13 (East Asia) and #14 (China), we apply that approach to Japanese security strategy,
State-sponsored cyber attacks against critical infrastructure are increasingly pervasive. Their global presence and effective methods are asymmetric, coercive, and debilitating. 
This paper uses concepts of complex warfare established in ICSL Paper #13 to analyze the world view, threat assessment, and
Complex warfare is a high stakes competition in learning and we are being out-thought. Contemporary warfare cuts across all domains,
In 1983, Project Socrates began as a Reagan initiative to develop technology-driven competitive advantage. Then it ended. At the apparent ending of
The essence of Chinese strategy consists of waging complex wars that exploit opponents’ expectations of warfare. The operational design creates
We are well into complex, hybrid, grey zone warfare that dynamically blends confrontation with competition. Victory in the form of
We must also seek solutions that limit the effects of disinformation. This effort starts with leaders recognizing and publishing Russian