Journal Articles are typically longer works with more more analysis than the news and short commentary in the SWJ Blog. We accept contributed content from serious voices across the small wars community, then publish it here as quickly as we can, per our Editorial Policy, to help fuel timely, thoughtful, and unvarnished discussion of the diverse and complex issues inherent in small wars.

NATO is one of the bulwarks of strength to avert war, as long as the commitment of its members to honor Article V is believed by any potential threat.

Mad Scientist # 21: This is a first sketch of an initiative that will help to make sure we keep on being those precious few nanoseconds ahead of our opponents.

Continue on for all the details.

Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?

In the short term, issues of humanitarian relief are critical, but in the long term the deals that are made between local actors and the two larger players.

The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.

For naval intelligence to effectively support the Chief of Naval Operation’s new strategy, it must first adapt to the realities of the digital information age.

Named Operation Euphrates Shield, this ongoing Turkish military operation demonstrates the continued relevance of land power for achieving strategic objectives.

Love or hate the Centre of Gravity concept, it is here to stay.

A diverse set of policies is needed to unify a diverse set of peoples against a diverse set of threats - NATO should reorganize itself.

Both of us served in Kunduz from 2011-12, at a time when it seemed as though the province would continue on a trajectory of increasing stability.

Like any other organization, NATO has made mistakes. What is crucial is that the Alliance recognizes what went wrong and why, thus preventing these same mistakes in the...

NATO must adopt hybrid models of national defense, coordinate efforts on economic and electronic warfare, and secure its space-based infrastructure.

There are multiple reasons for the surprise outcome, but largely missing from the discussion is the fact that the FARC is perhaps the most reviled insurgency that ever arose...

Despite its centrality to the contemporary way of war, the days of joint operations are numbered.

European Union ambitions for a military force distinct from NATO are absurd. The list of challenges to forming such a force are legion.

Capturing the buildings of Mosul are secondary to conducting the battle in a way that secures the greater key to stability - the loyalty and support of the population of...

The five cases examined in this study show that a long-term solution must be aimed at preventing self-radicalization in the first place.

Transitions to democracy following forced regime change via military intervention require a last military dictator.

This paper discusses how Mexican cartel tunnels have evolved during the last five years while addressing specific uses.

This monograph uses the backdrop of Fehrenbach’s classic to investigate how militaries build preparedness, primarily among their infantry ranks.

Excerpted from "The Embassy: A Story of War and Diplomacy" © 2016 by Dante Paradiso, to be published by Beaufort Books (New York).

This paper explores how the similarities between covert action and UW activities have led to a negative perception of UW and lengthy delays in its use.

How many troops are needed to defeat an insurgency? This deceptively innocuous question is laden with political and military peril. The answer is, of course, that it depends...

Iran is destined to remain a “victim” because its leaders have determined it is in their best interest to do so. 

One must ask why Civil Affairs specialists, the purported experts of the civilian domain are so ill-trained and equipped to reconnoiter the civil space?

Continue on for all the details.

Many political analysts and historians referred to the war as one for independence or as a civil war. This characterization is incomplete and contributes to numerous...

Hacking for Defense is a battle-tested problem-solving methodology that runs at Silicon Valley speed. We just held our first Hacking for Defense Educators Class with...

The best way to defeat terrorism motivation rooted in religious convictions is not through a continuation of government-sponsored, Madison-Avenue-style advertising and PSYOP...