Awareness
The Principal as Attack Surface
A targeting package on a (Ultra)high-net-worth principal can be assembled from open sources in an afternoon. No intrusion required. No technical expertise. Just patience and a network connection.
Influence operations shape what people believe is normal, true, and urgent through repetition, identity cues, emotion, and social proof. In protection, influence can prime hostility, inflate rumors, and enable coercion or targeting. This hub covers mechanisms of influence and how to detect and blunt them early.
Awareness
A targeting package on a (Ultra)high-net-worth principal can be assembled from open sources in an afternoon. No intrusion required. No technical expertise. Just patience and a network connection.
TikTok
A thesis-based reassessment of TikTok’s strategic risk profile: how the USDS (U.S. Digital Security) deal alters the foreign control threat model, and which influence and governance questions remain unresolved.
Cognitive domain
Storytelling has evolved from a branding tool into a strategic shield in contested perception spaces. It started with a Wall Street Journal article about companies paying serious money for storytellers. Most mornings, when I don’t work out, I meditate, then have my coffee and read the news. This one
Influence Operations
I remember a discussion we had during our international relations class, back when we still called the system “unipolar”. Someone asked what the world would look like if it slid back toward multipolarity. What framework would we use? How would we know we were already there? Looking back, one of
Disinformation
The real risk is not one big lie that everyone suddenly believes. It is a slow grind where people no longer trust that anything in their feed is solid. Truth does not vanish; it fragments. Trust does not suddenly disappear; it erodes and retreats into small islands: