AI and Influence Operations: The Threat of Manipulation at Scale
This week saw the publication of Stanford’s report “Generative Language Models and Automated Influence...
How to create a maritime crisis – The Australian Crisis Simulation Summit
As a Head Crisis Writer for the Australian Crisis Simulation Summit (ACSS), my key role has been to...
The Australian Crisis Simulation Summit: Moving from ideation to final draft
The Australian Crisis Simulation Summit (ACSS) is a ground-breaking student event held in December 2022...
Recipe for a cyber attack on a bank
All the latest horizon scanning reports reveal that every organization has a severe threat of cyber...
Simulating Iranian Hybrid Warfare
Intelligence group Treadstone 71 released this report on Iranian Hybrid Operations and it’s such a...
Simulating Information Dispersal through Social Networks
With the race underway for who will become the next Conservative party leader, we looked at how Penny...
How to Simulate the DRAGONBRIDGE Campaign Against Lynas
Threat intelligence company Mandiant published this report on an influence campaign known as...
Proxemics: Using distances in information environments
Using space and non-verbal communication in immersive training
DUSTS Hybrid Warfare Model
Conducttr’s hybrid warfare training environment allows training audiences to attack and defend...
What is a tabletop exercise and how to make it more engaging
A tabletop exercise is a managed walk-through of response plans and a check to see if the response team...