Paper #39. Information Intelligence & Assessment for All-Effects Warfare: A Competition that Subsumes Combined Arms & Deterrence
-
May 6, 2021
-
Thomas A. Drohan, Ph.D., Brig Gen USAF ret.
-
Leadership, Security, Strategy
Our previous paper offered an assessable definition of “information“ to address two persistent problems in US security strategy: (1) the mismatch between narrow military doctrine and its broad effects; and (2) a “competition continuum“ below armed conflict. Why does this matter? The Information Environment is expansive, accessible and dynamic, characteristics that enable competitors to exploit…
Paper #34. Cyber Security-Resilience: Compliance & Competitiveness in the Information Environment
-
November 22, 2020
-
Thomas A. Drohan, Ph.D., Brig Gen USAF ret.
-
Commercial, Cyber, Security, Strategy
Manipulating information over cyber networks has become a societal weapon of choice. Compared to traditional military, diplomatic and economic instruments of state power, cyber information power has competitive advantages.
Paper # 27. Aggregates, Supply Chains & Influence Maneuvers: Synthesis for Competition and Warfare
-
July 13, 2020
-
Thomas A. Drohan, Ph.D., Brig Gen USAF ret.
-
All Analysis and Planning, Asia-Pacific, Commercial, Cyber, Middle East & North Africa, Strategy
Synthesis combines separate reactants into a new whole, releasing energy. In our highly interactive information environment, this process ranges from rules-based competition to totalitarian warfare.
Note #14. Machine-learning a Video: “The Corona Virus and the Impact on the Global Supply Chain”
-
March 24, 2020
-
Thomas A. Drohan, Ph.D., Brig Gen USAF ret.
-
Commercial, Leadership, Strategy
This Note uses critical thinking to analyze complex linkages in a YouTube video from the MIT Center for Transportation and Logistics: The Corona Virus and the Impact on the Global Supply Chain.
Paper #15. Countering Cyber Attacks on Infrastructure
-
November 24, 2019
-
Will Miller, Major, US Army
-
Americas, Asia-Pacific, Commercial, Cyber, Eurasia, Leadership, Middle East & North Africa, Strategy
State-sponsored cyber attacks against critical infrastructure are increasingly pervasive. Their global presence and effective methods are asymmetric, coercive, and debilitating.