Category

Uncategorized
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/16727426/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, we have a wide ranging conversation with futurist, Brian David Johnson (or BDJ). Threastcasting is an innovative, interdisciplinary technique being used by a wide range of organizations and institutions to create actionable models to comprehend possible futures and  identify, track, disrupt, mitigate and...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/16470167/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Dr. Jacob Udo-Udo Jacob drops by the Cognitive Crucible to discuss with John Bicknell his strategic communications research as well as his work with the United Nations global program focused on disarmament, demobilization and reintegration (DDR) missions. Dr. Jacob observes that many...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/16804004/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]This is a special 90-minute bonus episode of the Cognitive Crucible. On October 29th 2020, IPA and AFCEA’s ALAMO Chapter co-hosted a Virtual Panel on Combatting Disinformation in a Competitive Information Environment. The star-studded panel of senior government personnel and thought leaders spotlights the current...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/16931822/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Steven Bradley discusses threat intelligence, Department of Homeland Security Information Sharing and Analysis Centers (ISACs), and the newly formed Cognitive Security Intelligence Center. Click here for full show notes & resources Steven Bradley works at the intersection of technology, security operations, and...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/16835834/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Dr. Boyd Brown discusses the history of military deception with examples. Then, the conversation shifts to current day deception technology in cyberspace. Dr. Brown describes new cyber defenses which place intruders into a hall of mirrors which wastes the enemy’s time while...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17072018/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, MAJ Ash Holzmann discusses psychological operations, the nature of propaganda, the philosophical underpinnings of propaganda, along with numerous historical examples. Click here for full show notes & resources MAJ Ash Holzmann is a horror writer, satirist, poet, artist, and Psychological Operations Officer...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/16932230/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, John Bicknell has a wide-ranging discussion with Tom Sear about his stunning piece on Xenowar–a fictionalized possible future rooted in philosophy, second order cybernetics, and state of the art digital weaponry. Xenowar provokes conversation about data stacks, sovereignty in the Digital Age,...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17847350/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Dr. Jan Kallberg and COL Stephen Hamilton of the Army Cyber Institute at West Point discuss their recent article, “How To Protect Troops From An Assault In The Cognitive Domain.” After reviewing some historical examples where the will to fight influenced decisively...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17956517/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, Dr. Chase Cunningham discusses the evolving nature of cyber. He asserts that cyber is a key component of national policy, national capability, and warfare. We touch on the concept of a perimeter and why he asserts the “perimeter is dead.” Additionally, Chase...
Read More
[iframe style=”border:none” src=”//html5-player.libsyn.com/embed/episode/id/17632232/height/100/width//thumbnail/yes/render-playlist/no/theme/custom/tdest_id/2957354/custom-color/87A93A” height=”100″ width=”100%” scrolling=”no” allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen]During this episode, James Farwell discusses his views on strategic communications and information warfare. He contrasts Russian and Chinese modern warfare strategies and uses many historic and modern vignettes to support his assertions. NIKE, he asserts, has mastered the art of strategic communications with their...
Read More
1 6 7 8 9 10 12
Brandt, J., Schafer, B., Aghekyan, E., Wirtschafter, V., & Danditya, A. (2022). Winning the web: How Beijing exploits search results to shape views of Xinjiang and COVID-19. Brookings Institute. https://www.brookings.edu/articles/winning-the-web-how-beijing-exploits-search-results-to-shape-views-of-xinjiang-and-covid-19/
Mankoff, J. (2020). With Friends Like These: Assessing Russian Influence in Germany. Center for Strategic & International Studies. https://www.csis.org/analysis/friends-these-assessing-russian-influence-germany
Babbage, R. (2019). Winning Without Fighting: Chinese and Russian Political Warfare Campaigns and How the West Can Prevail. Center for Strategic and Budgetary Assessments. https://csbaonline.org/research/publications/winning-without-fighting-chinese-and-russian-political-warfare-campaigns-and-how-the-west-can-prevail/publication/1
Singer, P. W. (n.d.). Winning the War of Words: Information Warfare in Afghanistan. Brookings. Retrieved April 26, 2024, from https://www.brookings.edu/articles/winning-the-war-of-words-information-warfare-in-afghanistan/
Koerner, B. I. (2016, March). Why ISIS Is Winning the Social Media War—And How to Fight Back. Wired. https://www.wired.com/2016/03/isis-winning-social-media-war-heres-beat/