This article analyses the growing range of threats posed to military organizations by violent jihadists within the West.

An update on week 7 of Stanford University’s Hacking for Defense course.

An inside look at the Defense Attachés assigned to the US Embassy in Port-au-Prince and how they served on a diplomatic frontline alongside DoS diplomats and USAID...

At the national security and policy level of the United States government there is a gap in the theoretical underpinnings of special operations.

An update on week 6 of Stanford University’s Hacking for Defense course.

Small Wars Journal interview with Ambassador Zalmay Khalilzad.

Did the addition of former Warsaw Pact states, and in particular Poland, as members to the North Atlantic Treaty Organization make NATO a stronger or weaker alliance?

Colombia will likely remain on the negative side of the security spectrum unless a comprehensive series of preventative measures are put in place to restrict the...

A rebuttal to Gary Anderson’s ‘Time to Bring Counterinsurgency to Molenbeek’.

Three ghosts haunt the halls of the Pentagon and the central military administrations of most developed nations - three ghosts who drive policy in costly, counterproductive...

Political dissent smacks of religious transgression.  For these and other reasons, Iran should not be expected to survive in the long term in its current theocratic...

No matter how hard we think about the future, nor how many different versions of the future we posit, the future in reality will be different than we prognosticate.

This essay is an attempt to encapsulate lessons from the Long War beyond the timeframe operative in the NDU book Lessons Encountered: Learning from the Long War.

An update on week 5 of Stanford University’s Hacking for Defense course.

It wasn’t the trial of the century, but the strain of the pending verdict was apparent on the defendant’s face, a young, weary corporal.

According to Andrew Bacevich the central question to be investigated is how and where did we get our grand strategy for the Middle East wrong?

The Syrian Civil War is notable because communications and social technology have pervaded almost every aspect of this conflict.

A Redeye Man Portable Air Defense System seized was in the possession of armed personnel belonging to La Linea.

An update on week 4 of Stanford University’s Hacking for Defense course.

New ways of thinking must guide an evolving counterterror policy, lest we find ourselves perpetually threatened by extremism.

What we see in Belgium and Paris are first stage insurgencies that can still be handled by police and good intelligence efforts.

The time to put Libya back together is now; any delays will only further fragment the country and exacerbate the spread of ISIS.

An update on week 3 of Stanford University’s Hacking for Defense course.

As both national parties' primary campaigns have unfolded, “Mattis 2016” references have quickly shed their levity.

Conventional warfare is a dying platform by which asymmetric warfare and terrorism have replaced the conventional warfare dynamic.

While COIN doctrine might not be a magic bullet to end the war, it seems to be a better option than trying to kill one's way out.

An update on week 2 of Stanford University’s Hacking for Defense course.

The role of religion in peace operations is understudied and undertheorized. Needed by peace and stability operations leadership is a well-developed and...

Although the military must be prepared to fight a conventional state on state conflict, it is an insurgency that the United States Government is more likely to confront.

Due in part to the rapid digital penetration of the Internet and social media over the past decade, there are novel ways of tracking cartel and gang activity.