Strengthening the Future of the AUKUS Partnership

New threats and domains for warfare continually emerge. These include cyber and space along with disruptive technologies like artificial intelligence (AI) and quantum. Dealing with these threats necessitates an enhanced partnership across governments and within industry.

Managing the New Era of Deterrence and Warfare: Visualizing the Information Domain

Additional authors include: Leendert van Bochoven, Stephen Gordon, Tim Hofmockel, Frederick Kagan, Nils Peterson, and Noah Ringler

The three events gathered experts and practitioners to discuss the topic from a theoretical perspective, as it pertains to the case of Russia, and finally of China.

Delivering on the Vision of Multi-Domain Command and Control

Across the defence and national security landscape, all involved are grappling with the speed of technological change and the deteriorating strategic context. Everyone, from capability development to planning to operations, is aware that Western Allies no longer have a technological advantage over peer adversaries. This means to win the future battle, we must be focused on gaining situational advantage—making decisions better and faster than the enemy. Multi-Domain Command and Control (MDC2) is focused on gaining that decision superiority.

Achieving Mission Outcomes Through DevSecOps

DevSecOps—short for development, security, and operations—is an approach to IT security based on the principles of the scientific method of experimentation: observe, question, hypothesize, predict, test, and iterate. This solid foundational methodology has served the STEM (science, technology, engineering, and math, including computer science) community well, and has resulted in some of the most impactful innovations and scientific breakthroughs of our time.

This report addresses the critical role that DevSecOps plays to support the DoD mission.  It highlights the:

Integrating and Analyzing Data Across Governments - the Key to 21st Century Security

The authors address how stakeholders in the U.S. and Europe can increase the understanding of effective ways to leverage channels involving technology, human capital, organizations, and private sector coordination that meet strategic, mission, and operational needs. The report highlights opportunities for governments to leverage data integration and analytics to support better decision making around cyber and homeland security.

Adapting the Incident Command Model for Knowledge-Based Crises: The Case of the Centers for Disease Control and Prevention

The federal government has developed increasingly sophisticated approaches to addressing emergencies and crises. One successful management model is the incident command system (ICS), which was initially developed in the 1970s as a command-and-control approach for fighting forest fires, but has since been adapted to other policy domains. The Department of Homeland Security adopted the ICS model—which it renamed the National Incident Management System (NIMS)—and required its use at all levels of government in emergency and crisis situations.

Five Methods for Measuring Unobserved Events: A Case Study of Federal Law Enforcement

Measuring program performance is relatively straightforward in many areas of government, such as social services, visa processing, and air traffic control.  But there are instances where assessing performance and success is much harder.  One particularly difficult area involves law enforcement, where a key goal is to prevent or deter bad outcomes – which can often happen without the knowledge of law enforcement officials.

Putting Irregular Warfare in Perspective Preparing for the New Norm of Conflict

Declared wars start and stop, but the conflicts between nations and groups around the world simmer continuously and boil over frequently. Speaking to the Air War College class in 1992, then CIA Director Robert Gates said, “We must expect continuing radical change and upheaval around the world – at times promising, at times frightening – before the form and patterns of a new era settle into place.” Two decades later, it is not entirely clear what the form and patterns of this new century are.

Irregular Warfare at Sea: A Case Study on National Defense Choices

National defense choices can leave a country vulnerable.  Military organizations routinely deal with risk and trade-offs.  But longer-term strategic defense choices—shaped by multiple factors including uncertainty about the future, the pressure of dominant current constituencies, and fiscal constraints that are difficult to “get right.”  Once a conflict begins a new set of options and trades emerge but the uncertainties, the pressure of constituencies and resource constraints remain (even in a national level mobilization).  In the United States, we are currently dealing with strategic choic

A Best Practices Guide to Information Security

Organizations take great pains to use technology to defend against outside attacks; they work hard to spot and stop the malicious insider who is willfully trying to do ill to systems. However, most organizations fall short in equipping their workers with best practices to make them part of the solution to information security.

Pages