Paper #39. Information Intelligence & Assessment for All-Effects Warfare: A Competition that Subsumes Combined Arms & Deterrence

  • Thomas A. Drohan, Ph.D., Brig Gen USAF ret.
  • Leadership, Security, Strategy
  • No Comments

Our previous paper offered an assessable definition of “information“ to address two persistent problems in US security strategy: (1) the mismatch between narrow military doctrine and its broad effects; and (2) a “competition continuum“ below armed conflict. Why does this matter? The Information Environment is expansive, accessible and dynamic, characteristics that enable competitors to exploit…

Paper #34. Cyber Security-Resilience: Compliance & Competitiveness in the Information Environment

  • Thomas A. Drohan, Ph.D., Brig Gen USAF ret.
  • Commercial, Cyber, Security, Strategy
  • No Comments

Manipulating information over cyber networks has become a societal weapon of choice. Compared to traditional military, diplomatic and economic instruments of state power, cyber information power has competitive advantages. 

Paper # 27. Aggregates, Supply Chains & Influence Maneuvers: Synthesis for Competition and Warfare

  • Thomas A. Drohan, Ph.D., Brig Gen USAF ret.
  • All Analysis and Planning, Asia-Pacific, Commercial, Cyber, Middle East & North Africa, Strategy
  • No Comments

Synthesis combines separate reactants into a new whole, releasing energy. In our highly interactive information environment, this process ranges from rules-based competition to totalitarian warfare.

Note #14. Machine-learning a Video: “The Corona Virus and the Impact on the Global Supply Chain”

  • Thomas A. Drohan, Ph.D., Brig Gen USAF ret.
  • Commercial, Leadership, Strategy
  • No Comments

This Note uses critical thinking to analyze complex linkages in a YouTube video from the MIT Center for Transportation and Logistics: The Corona Virus and the Impact on the Global Supply Chain.

Paper #15. Countering Cyber Attacks on Infrastructure

  • Will Miller, Major, US Army
  • Americas, Asia-Pacific, Commercial, Cyber, Eurasia, Leadership, Middle East & North Africa, Strategy
  • No Comments

State-sponsored cyber attacks against critical infrastructure are increasingly pervasive. Their global presence and effective methods are asymmetric, coercive, and debilitating.