Analysis & Planning

Our growing portfolio provides unique insight into security and leadership in diverse contexts. A virtual (and physical) place for business, government and academe to discuss challenges and opportunities. Discussions include the information environment, complex threats, emerging technologies, combined-effects strategies, and leadership development.

If you would like to comment on an S&L analysis, please register here once.

Select a Region or Topic to see available products.

Topics:

Commercial

Cyber

Leadership

Security

Strategy

About this Blog

Papers (> 1000 words) and Notes (< 1000 words) offer perspectives and solutions

Stick & Rudder briefs cover what needs to be done

Each contains an up-front look at Content

The Peoples’ Republic of China (PRC) “One Country, Two Systems” narrative toward Taiwan out-competes the US “strategic ambiguity” and “one China” policies even though it’s false. How? The narrative operates as a strategy to gain
Read more
Gulf of Tonkin, 1964 On 4 August 1964, data-driven decisions in an uncertain operational environment falsely assumed a North Vietnamese patrol boat attack on American destroyers in Gulf of Tonkin international waters. See Secretary of
Read more
China uses narrative warfare as an integral part of diplomatic, informational, military, economic, and social (DIMES) combined effects to seize disputed territories. This Note explains how this strategy is globally propagated, narrated warfare. China’s Narrative
Read more
This Note synthesizes three popular approaches to “Center of Gravity” (COG) and presents Concepts of Influence (COI) as a supplement to COG analysis in the Information Environment (IE). Center of Gravity COG is variously defined
Read more
Winning complex wars requires setting more than military end states. Information-heavy complex problems (ICP’s) in hyper-connected environments can persist for generations (Ehlers and Blannin, Campaigning for Complex Problems). These problem sets require enduring social efforts and
Read more
We need to reform our legacy language of coercion theory to compete in the Age of Artificial Intelligence. Information forces and their specialized school houses across the interagency already exceed coercion theory’s limited vocabulary of
Read more
Authoritarians wage all-effects warfare that democracies don’t regard as “real war.” The problem is that many so-called peacetime operations are information warfare and narrative strategies designed to shape conditions for “real warfare.” Such as inducing
Read more
All the techniques used in the JMark Services Information Environment Advanced Analysis (IEAA) course apply to supply chain networks. I’ve selected three and added a new fourth type based on Project Socrates (see endnote xi).
Read more
This paper is Part I of II that defines and applies information environment concepts to supply chain networks for an age of artificial intelligence (AI).  To avoid overtrained learning, I draw from supply chain examples
Read more