Despite ISIS releasing a map identifying areas where the Caliphate will be established in Asia, its ability to do so is substantially limited.

This paper was developed through the TRADOC G-2 Mad Scientist E-Intern Pilot in 2016.

Proxy selection in Syria will have a profound impact on the post-war political order: who wins, who loses, and how they govern.

If countering VNSAs such as ISIL will be a long-term campaign, we will need long-term goals and objectives.

The differences in how Mao, Guevara, and Al Qaeda tailored their approaches to suit the unique needs of the rebellions they led and the strategic environments in which they...

The phrase “best and brightest” is frequently used but ambiguously defined. SecDef’s Force of the Future aims to recruit and retain this group, but fails to...

It is time to unleash US irregular warfare capabilities. All the controversy over today’s “gray zone” challenges leads one to believe that the US is an...

The mass use of inghamasi/inghamasiyinis an innovation on previously understood jihadi tactics seen in Afghanistan and Iraq.  

This article analyses the growing range of threats posed to military organizations by violent jihadists within the West.

An update on week 7 of Stanford University’s Hacking for Defense course.

An inside look at the Defense Attachés assigned to the US Embassy in Port-au-Prince and how they served on a diplomatic frontline alongside DoS diplomats and USAID...

At the national security and policy level of the United States government there is a gap in the theoretical underpinnings of special operations.

An update on week 6 of Stanford University’s Hacking for Defense course.

Small Wars Journal interview with Ambassador Zalmay Khalilzad.

Did the addition of former Warsaw Pact states, and in particular Poland, as members to the North Atlantic Treaty Organization make NATO a stronger or weaker alliance?

Colombia will likely remain on the negative side of the security spectrum unless a comprehensive series of preventative measures are put in place to restrict the...

A rebuttal to Gary Anderson’s ‘Time to Bring Counterinsurgency to Molenbeek’.

Three ghosts haunt the halls of the Pentagon and the central military administrations of most developed nations - three ghosts who drive policy in costly, counterproductive...

Political dissent smacks of religious transgression.  For these and other reasons, Iran should not be expected to survive in the long term in its current theocratic...

No matter how hard we think about the future, nor how many different versions of the future we posit, the future in reality will be different than we prognosticate.

This essay is an attempt to encapsulate lessons from the Long War beyond the timeframe operative in the NDU book Lessons Encountered: Learning from the Long War.

An update on week 5 of Stanford University’s Hacking for Defense course.

It wasn’t the trial of the century, but the strain of the pending verdict was apparent on the defendant’s face, a young, weary corporal.

According to Andrew Bacevich the central question to be investigated is how and where did we get our grand strategy for the Middle East wrong?

The Syrian Civil War is notable because communications and social technology have pervaded almost every aspect of this conflict.

A Redeye Man Portable Air Defense System seized was in the possession of armed personnel belonging to La Linea.

An update on week 4 of Stanford University’s Hacking for Defense course.

New ways of thinking must guide an evolving counterterror policy, lest we find ourselves perpetually threatened by extremism.

What we see in Belgium and Paris are first stage insurgencies that can still be handled by police and good intelligence efforts.

The time to put Libya back together is now; any delays will only further fragment the country and exacerbate the spread of ISIS.