by Shawn Woodford
September 27, 2016 09:09 AM | Comments (0)
How many troops are needed to defeat an insurgency? This deceptively innocuous question is laden with political and military peril. The answer is, of course, that it depends...
by Frank Kisner
September 25, 2016 07:02 AM | Comments (0)
Iran is destined to remain a “victim” because its leaders have determined it is in their best interest to do so.
by Stephen Goto
September 22, 2016 09:11 AM | Comments (0)
One must ask why Civil Affairs specialists, the purported experts of the civilian domain are so ill-trained and equipped to reconnoiter the civil space?
by SWJ Editors
September 21, 2016 10:34 AM | Comments (0)
Continue on for all the details.
by Zdravko Matic and Frano Stojic
September 20, 2016 09:30 AM | Comments (0)
Many political analysts and historians referred to the war as one for independence or as a civil war. This characterization is incomplete and contributes to numerous...
by Steve Blank
September 19, 2016 11:16 AM | Comments (0)
Hacking for Defense is a battle-tested problem-solving methodology that runs at Silicon Valley speed. We just held our first Hacking for Defense Educators Class with...
by William M. Darley
September 19, 2016 10:05 AM | Comments (0)
The best way to defeat terrorism motivation rooted in religious convictions is not through a continuation of government-sponsored, Madison-Avenue-style advertising and PSYOP...
by Driss Ghali
September 18, 2016 04:13 PM | Comments (0)
Galula was a self-made man in various aspects; born into a relatively modest environment, he rose to positions where no one expected him to.
by Kyle Borne
September 17, 2016 05:31 AM | Comments (1)
This paper explores current recruiting practices, its shortfalls, and offers solutions tied to a thorough job analysis and restructured recruiting strategy.
by Thomas Doherty
September 16, 2016 12:35 AM | Comments (0)
Islamic extremist ideology has become a pandemic super-infection resistant to current counter-ideological methodologies.
by Vince Tumminello
September 15, 2016 10:03 AM | Comments (0)
A red team assessment of Syrian prospects for counterinsurgency written in December of 2015. It is a blueprint for Syrian military, economic, and political success in the...
by Jason M. Bender
September 14, 2016 11:02 AM | Comments (0)
This monograph is a revision of a paper submitted for consideration during the 2008 U.S. Army Command and General Staff College historical writing competition for CGSC Course...
by George M. Schwartz
September 13, 2016 11:37 AM | Comments (0)
Mad Scientist # 20: The demand for cybersecurity professionals is exceeding the number available, and some estimate that more than 200,000 positions are currently unfilled....
by Robert Zager and John Zager
September 13, 2016 01:34 AM | Comments (2)
Mad Scientist # 19: We are losing the cyberwar because cyber defenses apply the wrong philosophy to the wrong operating environment.
by Brian Schultz and Blake Rhoades
September 13, 2016 12:25 AM | Comments (0)
Mad Scientist # 18: The purpose of this paper is to highlight the need for strategic broadening and policy education for mid-career Cyberspace leaders.
by Drew Calcagno
September 12, 2016 02:39 PM | Comments (0)
An Empirical look at drivers of terrorism, ventures to determine whether Abadie’s findings in “Poverty, Political Freedom, and the Roots of Terrorism”...
by Thammy Evans
September 12, 2016 08:34 AM | Comments (0)
This essay explores one of the key and most underemphasized components of building successful fighting power, namely the moral component.
by Gordon Richmond
September 11, 2016 06:08 AM | Comments (4)
Though the training scenario was an imperfect reflection of a real-world UW mission, our success could be replicated in other environments by any ODA.
by John P. Sullivan and Robert Bunker
September 10, 2016 09:37 AM | Comments (0)
Continue on for a Small Wars Journal-El Centro update and call for papers.
September 10, 2016 07:18 AM | Comments (0)
El Salvador’s Attorney General is concerned that the maras, Mara Salvatrucha (MS-13) in particular, are developing armed commando battalions that are designed...
by Kurtis M. Hout Jr.
September 10, 2016 06:07 AM | Comments (0)
Mad Scientist # 17: The Army is allocating proportional resources to the cyber domain as it is to the success or failure of key weapon systems.
by Andrew Schoka
September 10, 2016 05:52 AM | Comments (0)
Mad Scientist # 16: The US Army is moving to field the next generation of cyber warfighters, and the need to identify, train, and develop these cyber professionals is...
by Chris Telley
September 4, 2016 03:55 PM | Comments (1)
The US can enable novel gains in the information environment by collecting on, operating in, and collaborating through indigenously produced economic media.
by Mathew Fukuzawa
September 3, 2016 08:44 AM | Comments (0)
While many of the Army’s great leaders have blossomed on the battlefield without systematic development, there are doctrinal references that define leader development...
by Malcolm Beith
September 2, 2016 11:56 AM | Comments (1)
A UN departure could cause more than just trouble in terms of quelling rebels. The 20,000 peacekeepers are now a backbone of the nation’s struggling economy.
by Octavian Manea
September 2, 2016 03:10 AM | Comments (1)
Small Wars Journal interview with Karsten Friis, Senior Adviser and Head of the Norwegian Institute of International Affairs’ Research Group on Security and...
by Ryan Harmon, Mark Holden and Brandon Sasnett
September 1, 2016 03:59 PM | Comments (0)
This article uses the C-UAS problem set as a case study to highlight some of the challenges the Army faces responding to the increased use of innovative technologies by our...
by Rick Chersicla
September 1, 2016 09:37 AM | Comments (0)
An often-overlooked part of the conflict in Southeast Asia, the formation of and lessons learned by the MRF can serve as the groundwork of a future joint riverine force.
by Gary E. Phillips
August 31, 2016 07:12 PM | Comments (0)
As weapons platforms become increasingly digital, the risk from electronic interference becomes increasingly troublesome—including hacking, jamming, and even hijacking...
by Jack McCain
August 31, 2016 06:28 AM | Comments (0)
The war saw the engagement of South African, Namibian, Angolan, Cuban, Soviet, Chinese and even American forces in an array of operations and offensives.