By

John Bicknell
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17847350/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Dr. Jan Kallberg and COL Stephen Hamilton of the Army Cyber Institute at West Point discuss their recent article, “How To Protect Troops From An Assault In The Cognitive Domain.” After reviewing some historical examples where the will to fight influenced decisively...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17956517/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Dr. Chase Cunningham discusses the evolving nature of cyber. He asserts that cyber is a key component of national policy, national capability, and warfare. We touch on the concept of a perimeter and why he asserts the “perimeter is dead.” Additionally, Chase...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17632232/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, James Farwell discusses his views on strategic communications and information warfare. He contrasts Russian and Chinese modern warfare strategies and uses many historic and modern vignettes to support his assertions. NIKE, he asserts, has mastered the art of strategic communications with their...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17721377/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]This is a very special dual release episode of the Cognitive Crucible. Our friends over at the PSYWAR podcast are also releasing this via their channel. During this episode, IPA founding member, Austin Branch, is joined by COL Jeremy Mushtare, who commands the US Army’s 8th Psychological Operations Group....
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17585843/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]Prioritizing and funding cognitive and information-related capability is challenging. During this episode, Mark Mitchell recaps recent efforts within the Department of Defense as well as other United States government interagency efforts which have not reached their full potential. Bio: Mark Mitchell is a former senior...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17333996/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Dr. James Mulvenon of SOSI compares and contrasts Russian and Chinese information operations. After describing his robust team of linguists, James discusses collections efforts, sovereignty and the Chinese diaspora, and sharing of tactics, techniques, and procedures between Russia and China. Click here...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17400965/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]What influence plays are being run against us? How do they work? And how are they countered or co-opted? During this episode, Alan Kelly discusses strategic communications and how his Taxonomy of Influence Strategies may be used to see past the messaging and into the motives of competitors. His...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17400443/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, John Davis draws on many decades of special operations, information operations and cyber-related experiences and passes along advice to today’s military information professionals who are on the front lines of modern warfare. Since the mid-1980s, information operators have worked hard to gain trust within...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17302349/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]On behalf of IPA, thank you for being part of the community and listening to The Cognitive Crucible podcast. This episode recaps the book and other online material recommendations from the Cognitive Crucible guests so far. See the show notes page for links to these...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17179568/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Pete Villano discusses US Congressional oversight and authorities. During his time as Professional Staff with the House Armed Services Committee from 2010 through 2020, Pete helped politicians and other governmental leaders grapple with new national security threats and the new era of great power...
Read More
1 10 11 12 13 14 15
Brandt, J., Schafer, B., Aghekyan, E., Wirtschafter, V., & Danditya, A. (2022). Winning the web: How Beijing exploits search results to shape views of Xinjiang and COVID-19. Brookings Institute. https://www.brookings.edu/articles/winning-the-web-how-beijing-exploits-search-results-to-shape-views-of-xinjiang-and-covid-19/
Mankoff, J. (2020). With Friends Like These: Assessing Russian Influence in Germany. Center for Strategic & International Studies. https://www.csis.org/analysis/friends-these-assessing-russian-influence-germany
Babbage, R. (2019). Winning Without Fighting: Chinese and Russian Political Warfare Campaigns and How the West Can Prevail. Center for Strategic and Budgetary Assessments. https://csbaonline.org/research/publications/winning-without-fighting-chinese-and-russian-political-warfare-campaigns-and-how-the-west-can-prevail/publication/1
Singer, P. W. (n.d.). Winning the War of Words: Information Warfare in Afghanistan. Brookings. Retrieved April 26, 2024, from https://www.brookings.edu/articles/winning-the-war-of-words-information-warfare-in-afghanistan/
Koerner, B. I. (2016, March). Why ISIS Is Winning the Social Media War—And How to Fight Back. Wired. https://www.wired.com/2016/03/isis-winning-social-media-war-heres-beat/