China’s Approach to Irregular Warfare: The Three Warfares
| | |

China’s Approach to Irregular Warfare: The Three Warfares

China’s strategy for irregular warfare is both ancient and modern, rooted in the philosophies of Sun Tzu but adapted for the information age. Central to this strategy is the concept of the Three Warfares: Media (Public Opinion), Legal (Lawfare), and Psychological Warfare. These interlocking tools are designed to shape perceptions, control narratives, and undermine adversaries—often without…

US Embassy Iraq – Evacuation Order – It’s time
| |

US Embassy Iraq – Evacuation Order – It’s time

The United States has begun a partial evacuation of its embassy in Baghdad, Iraq, and is authorizing the voluntary departure of military dependents from several locations across the Middle East. This move comes amid rapidly escalating tensions with Iran and growing concerns about the safety of American personnel in the region. Why Are Evacuations Happening…

Beyond Operation Doppelgänger: A Capability Assessment of the Social Design Agency
| | | |

Beyond Operation Doppelgänger: A Capability Assessment of the Social Design Agency

Authors: James Pamment & Darejan TsurtsumiaPublished by: Psychological Defence Agency & Lund University (MPF Report Series 8/2025)Date: May 2025 Background and Purpose “Beyond Operation Doppelgänger” is a comprehensive assessment of the Russian Social Design Agency (SDA) and its role in orchestrating large-scale information influence operations, particularly those known collectively as the ‘Doppelgänger campaign.’ Drawing on over 3,000 leaked…

Beijing’s Assassin’s Mace Program: A Strategic Approach to Asymmetric Warfare
| | | |

Beijing’s Assassin’s Mace Program: A Strategic Approach to Asymmetric Warfare

I do not claim to be a China expert, however, I have been working in China for over 30 years. During these three decades, I learned many valuable lessons about Chinese culture, politics, and so much more. China’s strategic vision extends far beyond the short-term thinking typical of many nations, encompassing a remarkable 100-year plan…

De-Pins: Decentralized Physical Infrastructure Networks
| | | |

De-Pins: Decentralized Physical Infrastructure Networks

Decentralized Physical Infrastructure Networks (DePINs) represent a groundbreaking approach to managing and operating physical infrastructure by leveraging blockchain technology and decentralized frameworks. As of February 2025, DePINs have gained significant traction, with over 650 projects in development and a collective valuation exceeding $20 billion What are DePINs? DePINs are innovative systems that combine the strengths…

The DeepSeek Disruption: How a Chinese AI Startup Shook the US Stock Market
| | | | |

The DeepSeek Disruption: How a Chinese AI Startup Shook the US Stock Market

The artificial intelligence (AI) landscape experienced a seismic shift on January 27, 2025, when DeepSeek, a relatively unknown Chinese startup, unveiled its R1 AI model. This groundbreaking development sent shockwaves through the global tech industry and caused significant turbulence in the US stock market. Let’s delve into the details of this disruptive event and its…

| | |

The Collapse of the Syrian Regime: Implications for Middle Eastern Stability and Security

It’s been a long time coming and for most of us, it was no surprise. In recent weeks, the Syrian regime has faced an unprecedented collapse, a seismic event that is reshaping the geopolitical landscape of the Middle East. After more than a decade of civil war, economic instability, and external pressures, the fall of…

| | | | |

Salt Typhoon Part II: A Growing Threat in Cyber-Espionage

Recent investigations and updates have shed more light on Salt Typhoon, a sophisticated Chinese state-sponsored hacking group that has been targeting critical telecommunications infrastructure and other sectors worldwide. The group’s activities, already labeled as one of the most severe cyber threats of the decade, continue to unfold with new revelations about their operations, methods, and…

| | |

Understanding Game Theory and Its Real-Life Applications in Life and Business

Game theory might sound like it’s all about video games, but it’s actually a fascinating field of study that applies to decision-making in real life. Developed in the 1940s by mathematicians John von Neumann and Oskar Morgenstern, game theory explores how people make choices when the outcome depends not only on their actions but also…

| | |

In our invasive world of “Privacy” is there really Secure Email?

This is a conversation I hear more and more frequently and almost on a daily basis. I had a conversation this week with my friend Stefan regarding the latest data breach’s with Telegram which was previously thought by many to be a very secure chat application. In mid-2024, a massive data breach was revealed, involving…