
Sign up to save your podcasts
Or


Ret. Lt. Gen. Bob Ashley's career spans the complete transformation of military intelligence, from alcohol pens and map boards in 1987 to tactical Internet access at the squad level today. He witnessed and shaped how intelligence operations evolved across six combat tours and two decades of conflict.
His insights highlight critical vulnerabilities in our communications-dependent approach to warfare and the fundamental relationship dynamics that determine intelligence effectiveness. Bob's framework for commander-analyst relationships challenges conventional wisdom about information flow in military organizations.
Bob also emphasizes that commanders must brief analysts before analysts brief commanders, establishing mission context that drives effective intelligence collection and analysis. His perspective on the flattening of intelligence hierarchies exposes both opportunities and risks in modern warfare, particularly the tension between information accessibility and operational security in contested environments.
Topics Discussed:
By DefenseDisruptedRet. Lt. Gen. Bob Ashley's career spans the complete transformation of military intelligence, from alcohol pens and map boards in 1987 to tactical Internet access at the squad level today. He witnessed and shaped how intelligence operations evolved across six combat tours and two decades of conflict.
His insights highlight critical vulnerabilities in our communications-dependent approach to warfare and the fundamental relationship dynamics that determine intelligence effectiveness. Bob's framework for commander-analyst relationships challenges conventional wisdom about information flow in military organizations.
Bob also emphasizes that commanders must brief analysts before analysts brief commanders, establishing mission context that drives effective intelligence collection and analysis. His perspective on the flattening of intelligence hierarchies exposes both opportunities and risks in modern warfare, particularly the tension between information accessibility and operational security in contested environments.
Topics Discussed: