(2) | " (9) | ' (2) | 1 (1) | 3 (1) | 8 (1) | 9 (1) | A (252) | B (92) | C (180) | D (99) | E (45) | F (77) | G (42) | H (64) | I (147) | J (12) | K (12) | L (46) | M (93) | N (40) | O (59) | P (91) | Q (3) | R (92) | S (147) | T (496) | U (45) | V (21) | W (110) | Y (7) | Z (1) | ¿ (2) | (4) | (12)
I Can't Believe We Are Losing To These Guys by Vegetius I Can't Believe We Are Losing To These Guys (Full PDF Article) "The greatest threat to the Afghan government is the Afghan government." This...
IBOLC: Platoon Leader Decision Making for the 21st Century by Major Michael Fortenberry, Small Wars Journal IBOLC: Platoon Leader Decision Making for the 21st Century (Full PDF article) In the...
Common Analytic Standards Intelligence Community Directive # 203 and U.S. Marine Corps Intelligence by Lieutenant Colonel Von H. Pigg, Small Wars Journal Common Analytic Standards (Full PDF Article)...
Mad Scientist series - In light of the contemporary operating environment, terrorist activity and political violence will continue to have direct and indirect effects on European security.
Identity, Insurgency & Healing by Dianna Wuagneux See Full Article: Identity, Insurgency & Healing A constant challenge faced by the Coalition Forces in Afghanistan is the ability of the Anti...
President Obama is repeating three key strategic mistakes that President Johnson made in Vietnam.
Asian support for ISIL will largely be based in Southeast Asia, which possesses the largest Muslim population in the region and will manifest through Asian nationals traveling to the Middle East.
From the outset, the U.S. treated Al Qaeda as a military objective instead of an organization to be understood, penetrated, and permanently dismantled. 
Knowing how insurgencies last so long can help to understand why they last so long
Implementing a Population-Centric Counterinsurgency Strategy Northeast Afghanistan, May 07 -- July 08 by Major Nathan Springer Download the full article: Implementing a Population-Centric COIN...
Implementing COIN Doctrine in the Absence of a Legitimate State by David C. Ellis and James Sisco Download the Full Article: Implementing COIN Doctrine in the Absence of a Legitimate State The...
It is time to unleash US irregular warfare capabilities. All the controversy over today’s “gray zone” challenges leads one to believe that the US is an amateur player in this game.
Improving Information Operations in Iraq and the Global War on Terror by Farook Ahmed and Oubai Shahbandar, Small Wars Journal Download interim version of article as PDF The Surge of US military...
This essay provides an examination of current thought on how to build a team capable of performing at a high level.
In Afghanistan, Less is More by David Malet Download the Full Article: In Afghanistan, Less is More Two recent developments have brought optimism to some Afghanistan-watchers. The first is the...
On 16 January 2013 the BP and Statoil ASA In Amenas gas facility in Algeria was attacked by al Qaeda linked terrorists resulting in the deaths of 40 workers.
In Marja: Lead, Follow, or Get Out of the Way by Colonel Gary Anderson Download the full article: In Marja: Lead, Follow, or Get Out of the Way It never ceases to amaze me how quick we are to lecture...
Recent budget debates have featured emotional discussions about reforming the military retirement system. This is not a new phenomenon; there have been more than a dozen official studies on...
As India’s ambitions and might grow, attachments to the UN and to UNPKOs are eroding in favor of more hard-headed assessments
This essay focuses on analyzing the different human security threats present in the region followed by an analysis of the traditional policy approach followed by the government.
This article thus aims to bring back to light India’s national security policies following the 2008 Mumbai attacks.
Indigenous Forces and Sanctuary Denial Enduring Counterinsurgency Imperatives by LTC Robert M. Cassidy Download interim version of article as PDF
Transitional justice, within a short period, has become one of the most dominating debates in rule of law, human rights protection, democracy and nation building.
Using interviews as background and Afghanistan as a case study, this article captures tactics that may allow future commanders to build the basis for sustainable governance.
Information Counterrevolution by Adam Elkus, Small Wars Journal Information Counterrevolution (Full PDF Article) When Iranians took to the streets to protest vote-rigging by their nation's theocratic...
Information Operations on the Counterinsurgency Battlefield by Azriel Peskowitz, Small Wars Journal Information Operations on the Counterinsurgency Battlefield (Full PDF Article) Terrorism has always...
Information Sharing for Irregular Warfare by Lieutenant Colonel Ehsan Mehmood Khan Download the full article: Information Sharing for Irregular Warfare A sturdy string of irregular warfare is the...
Strategic, operational, and tactical actions the US should take in each dimension of the information environment to counter the ISIL's asymmetric, and apparently dominant, information campaign.
Should we focus more on creating ink spots and less on defeating the Taliban?
The defense establishment must embrace the energy and ideas already being produced and provide a way for them to have real impact - an innovation program that seeks true offsets.
We have no more real control over conflict (or the universe) than anyone else, in fact, sometimes we now have less.  If we cannot control, we must adapt.
Times of crisis can be a brief window of opportunity for large institutional bureaucracies to overcome jurisdictional boundaries and make changes to business as usual. 
Inside the Surge 1-5 Cavalry in Ameriyah by Lieutenant Colonel Dale Kuehl, Small Wars Journal Inside the Surge: 1-5 Cavalry in Ameriyah (Full PDF Article) I had the privilege of commanding the 1st...
The Human Terrain System has found itself in the news again. A feat of considerable effort as the program ceased operations in September 2014.
In 2012, the U.S. Border Patrol transitioned from a resource-based to a new, risk-based approach for measuring border security and informing planning efforts along U.S. borders.
Imperatives for Confronting Irregular Challenges