Conclusion
Our work is not a panacea, but it should add multiple dimensions to a strategy that sometimes focuses too much on the product of the system and not enough on the system itself. To
disrupt the importation of energy,
shape the environment and
attack the environment/organization boundary. To
destroy through-put, have a process-oriented
attack plan. To
attack export,
meet the product head-on before it has been fully deployed. To
interfere with the cyclic pattern of activities,
interfere with internal activities that are critical, well-connected, or consist of exponential feedback loops. Attack negative entropy by disrupting or destroying critical stores.
Disrupt the feedback and coding process by
engaging in counter-intelligence and influence operations designed to increase uncertainty and disrupt communication.
Destroy homeostasis by
attacking critical nodes and
disrupting system congruity. While doing these things, keep in mind our newly formulated principles of war for countering VNSAs, as they should inform all actions whether directed at input, conversions, or output. Our inter-disciplinary application of open systems theory provides a powerful framework for diagnosing adversaries, shaping their development and structuring an effects-based strategy for coercion and conquering. It is a global approach to a global challenge.
Bookmarks