Analysis & Planning

Our growing portfolio provides unique insight into security and leadership in diverse contexts. A virtual (and physical) place for business, government and academe to discuss challenges and opportunities. Discussions include the information environment, complex threats, emerging technologies, combined-effects strategies, and leadership development.

If you would like to comment on an S&L analysis, please register here once.

Select a Region or Topic to see available products.

Topics:

Commercial

Cyber

Leadership

Security

Strategy

About this Blog

Papers (> 1000 words) and Notes (< 1000 words) offer perspectives and solutions

Stick & Rudder briefs cover what needs to be done

Each contains an up-front look at Content

Narratives present advantages in any conflict because they influence resolve and if ignored, can reverse operational victories. What are they? What Are Narratives? Narratives are cultural contexts that underlie stories and provide meaning. Stories go on
Read more
This paper applies a narrative weaponization model to decision making (Observe, Orient, Decide and Act), using Iranian disinformation. Papers 23 and 24 did the same with disinformation from China and Russia. Understanding how narrative strategy
Read more
As in Note #19, this thought-piece refers to agile strategies as those that can adjust ends, ways and means. Missteps are changes without strategic advantage. How will the Biden administration perform with respect to Iraq
Read more
Agile strategies are able to change in all three definitional dimensions—ends, ways and means. Missteps are changes without strategic advantage. What’s the Biden administration’s strategy for Afghanistan? Operational Excellence, Strategic Missteps Three weeks after the 9/11 terrorist attacks on the
Read more
Military operations must be prepared to conduct  so-called “great power competition” as well as big and small wars just as complex. In all cases, we need to implement superior strategy to defeat clever competitors.  Especially with
Read more
Manipulating information over cyber networks has become a societal weapon of choice. Compared to traditional military, diplomatic and economic instruments of state power, cyber information power has competitive advantages.  Unlike military power and similar to transnational crime, cyber influence can be projected worldwide at
Read more
Plan with a winning strategy. Follow through with activities to bring about superior effects. Anticipate what competitors will do. Reimagine and repeat. Decisions, Decisions ICSL Note #4 (“Planning to Win”) contains examples of eight preventive
Read more
Following our historical context review of ten African states in Part I (Paper #31), this section begins Part II with linkage analysis, focusing on strategy in Somalia. We start with relationships that influence three critical
Read more
Abraham, 4 millennia ago, was not placed favorably into the contested region on the eastern shore of the Mediterranean Sea. No wonder. As the first monotheist guided by the instructions of Yahweh, he was rejected
Read more