Home : Research : Threatcasting

THREATCASTING

 

​The Threatcasting Method brings together a diverse, interdisciplinary collection of people and organizations to model possible future threats and specific actions that can be taken to disrupt them. We foster dialogues across a wide range of audiences (e.g. military, industry, academia, policy makers, trade associations, law enforcement, etc.) with a diverse set of deliverables (e.g. Threatcasting Reports, briefings, articles, podcasts, videos, science fiction, etc.).


Click here to download and save a fillable Excel workbook that you can use for your own Threatcasting event.


 

THREATCASTING PUBLICATIONS
 
 
 
Cyber Competition in the Indo-Pacific Gray Zone 2035
(SHA256:
c808ecac84d28edf7ca860b33877c41b7c179171bf7812979296bed38d560965)
 
 
 
Future Implications of Emerging Disruptive Technologies on Weapons of Mass Destruction
(SHA256:
47c1654bf265168ae8ad830212d42793d5226cb21afea1789d553d80e386e3be)
 
 
Microtargeting Unmasked: Safeguarding Law Enforcement, the Military, and the Nation in the Era of Personalized Threats
(SHA256:
17e2a80d7d8d3289d99cf6f43f461075f0cd1cd5526cacd9476aff0d005f35a5)
 
 
6G Systems and the Future of Multidimensional Attack Planes
(SHA256:
8afea665f062b46f6bfc4d363352e6ad1916033beccc490d297eca285e2b2463)
 
 
The Future of Cyber Enabled Financial Crime
(SHA256:
b716f751d74119622d4829e2bd9043b102483b3b7a39b7b127a6467280c8eacd)
 
 
The Future of Extremism and Extremist Narratives in America
(SHA256:
813d4acdc9a60cc570a370ee301af14566f390acf697cf358e3c0f2c3458bd81)
 
 
Powerful Narratives: Weaponized Harmony and the Soft Power Tools of China’s Rise to Global Primacy
(SHA256:
b1886d232b6307a27766ebee683be90573eb0bdb4308abdd99a9b67ac6b5ee0a)
 
 
Phalanx
(SHA256:
8c3c92cff17162da5fcc6c114465db71f5feba1dc8e507626d243fcc0e9e16e3)
 
 
The Inside Enemy: Weaponisation of your logistical footprint
(SHA256:
ece1c27f345181601bcdf12841a713bfb60889108e91cff94fad7db7b1137704)
 
 
Threatcasting: A framework and process to model future operating environments
(SHA256:
841edbd6ca00c87756c1afa468021832c264a48d1c34ab0eccef199c29ad3dd0)
 
 
Digital Weapons of Mass Destabilization
(SHA256:
45c725e6c80a5c2bd99638af9b4fc47203f2c1f41654401e5a2eb94510196625)
 
 
Information Disorder Machines
(SHA256:
df1310ac2af6d0b62ce5709444fb9c5ffc5364c76a4a07e5df69e64846b07615)
 
 
Information Warfare and The Future of Conflict
(SHA256:
a313739c61b9dbd9cf6c159ce92e5b850c8e339694e3777ed2325462dccfcde8)
 
 
A Widening Attack Plain
(SHA256:
21957f6bf841b03709535c3cad84d3f5c27a5e67a21bef331b8d7d37fd43673d)
 
 
The Future of Weaponized Artificial Intelligence
(SHA256:
2be36329da258392e5a4ff3ed9e9f444d73338865ae13827188fe80edf7466e9)
 
 
Envisioning the Future to Empower Action
(SHA256:
a69be79133d117e3fda79902a548256fe5d32cbc6efff89ed4b4d427b93c0d7e)
TALKS ON THREATCASTING

Chicago Ideas Week: Lt. Col. Natalie Vanatta of the Army Cyber Institute discusses "Threatcasting"

Check out the ShmooCon Presentation (Jan '17):

Check out the CyCON 2016 Presentation (Oct '16):