by Thomas Doherty
September 15, 2016 11:35 PM | Comments (11)
Islamic extremist ideology has become a pandemic super-infection resistant to current counter-ideological methodologies.
by Vince Tumminello
September 15, 2016 09:03 AM | Comments (0)
A red team assessment of Syrian prospects for counterinsurgency written in December of 2015. It is a blueprint for Syrian military, economic, and political success in the...
by Jason M. Bender
September 14, 2016 10:02 AM | Comments (0)
This monograph is a revision of a paper submitted for consideration during the 2008 U.S. Army Command and General Staff College historical writing competition for CGSC Course...
by George M. Schwartz
September 13, 2016 10:37 AM | Comments (0)
Mad Scientist # 20: The demand for cybersecurity professionals is exceeding the number available, and some estimate that more than 200,000 positions are currently unfilled....
by Robert Zager and John Zager
September 13, 2016 12:34 AM | Comments (2)
Mad Scientist # 19: We are losing the cyberwar because cyber defenses apply the wrong philosophy to the wrong operating environment.
by Brian Schultz and Blake Rhoades
September 12, 2016 11:25 PM | Comments (0)
Mad Scientist # 18: The purpose of this paper is to highlight the need for strategic broadening and policy education for mid-career Cyberspace leaders.
by Drew Calcagno
September 12, 2016 01:39 PM | Comments (0)
An Empirical look at drivers of terrorism, ventures to determine whether Abadie’s findings in “Poverty, Political Freedom, and the Roots of Terrorism”...
by Thammy Evans
September 12, 2016 07:34 AM | Comments (0)
This essay explores one of the key and most underemphasized components of building successful fighting power, namely the moral component.
by Gordon Richmond
September 11, 2016 05:08 AM | Comments (4)
Though the training scenario was an imperfect reflection of a real-world UW mission, our success could be replicated in other environments by any ODA.
by John P. Sullivan and Robert Bunker
September 10, 2016 08:37 AM | Comments (0)
Continue on for a Small Wars Journal-El Centro update and call for papers.
September 10, 2016 06:18 AM | Comments (0)
El Salvador’s Attorney General is concerned that the maras, Mara Salvatrucha (MS-13) in particular, are developing armed commando battalions that are designed...
by Kurtis M. Hout Jr.
September 10, 2016 05:07 AM | Comments (0)
Mad Scientist # 17: The Army is allocating proportional resources to the cyber domain as it is to the success or failure of key weapon systems.
by Andrew Schoka
September 10, 2016 04:52 AM | Comments (0)
Mad Scientist # 16: The US Army is moving to field the next generation of cyber warfighters, and the need to identify, train, and develop these cyber professionals is...
by Chris Telley
September 4, 2016 02:55 PM | Comments (1)
The US can enable novel gains in the information environment by collecting on, operating in, and collaborating through indigenously produced economic media.
by Mathew Fukuzawa
September 3, 2016 07:44 AM | Comments (0)
While many of the Army’s great leaders have blossomed on the battlefield without systematic development, there are doctrinal references that define leader development...
by Malcolm Beith
September 2, 2016 10:56 AM | Comments (1)
A UN departure could cause more than just trouble in terms of quelling rebels. The 20,000 peacekeepers are now a backbone of the nation’s struggling economy.
by Octavian Manea
September 2, 2016 02:10 AM | Comments (1)
Small Wars Journal interview with Karsten Friis, Senior Adviser and Head of the Norwegian Institute of International Affairs’ Research Group on Security and...
by Ryan Harmon, Mark Holden and Brandon Sasnett
September 1, 2016 02:59 PM | Comments (0)
This article uses the C-UAS problem set as a case study to highlight some of the challenges the Army faces responding to the increased use of innovative technologies by our...
by Rick Chersicla
September 1, 2016 08:37 AM | Comments (0)
An often-overlooked part of the conflict in Southeast Asia, the formation of and lessons learned by the MRF can serve as the groundwork of a future joint riverine force.
by Gary E. Phillips
August 31, 2016 06:12 PM | Comments (0)
As weapons platforms become increasingly digital, the risk from electronic interference becomes increasingly troublesome—including hacking, jamming, and even hijacking...
by Jack McCain
August 31, 2016 05:28 AM | Comments (0)
The war saw the engagement of South African, Namibian, Angolan, Cuban, Soviet, Chinese and even American forces in an array of operations and offensives.
by Ashley Holzmann and Whitney O’Connell
August 30, 2016 10:57 AM | Comments (0)
This article addresses Psychological Operations Measures of Effectiveness pitfalls and fixing the measurement and reporting problems.
by Daniel E. Ward
August 30, 2016 04:59 AM | Comments (2)
The US must ensure it is not simply being responsive to Chinese moves, but instead base decisions on strategic objectives.
by Timothy Clark
August 29, 2016 11:54 AM | Comments (0)
This study gives policy makers, scholars, law enforcement practioneers and planners a greater understanding on the degree and nature of Mexican drug trafficking organization...
by Jacqueline L. Hazelton
August 27, 2016 06:19 AM | Comments (0)
Do we actually know much about drone strikes' political effects? No.
by Nicholas Fedyk
August 25, 2016 06:45 AM | Comments (3)
In an era of expanding popular engagement and attention to foreign conflicts, a strategic appreciation of people-centric dimensions is more important now than ever.
by Matthew E. Miller
August 24, 2016 03:33 PM | Comments (28)
FID is failing now. The solution is to create a mid-career SOF FID specialization for SOF Officers.
by Frank Prautzsch
August 24, 2016 07:42 AM | Comments (0)
Mad Scientist # 15: As an Army “Mad Scientist”, I am both intellectually mad and emotionally mad about the armor/force protection topic.
by Douglas Farah
August 23, 2016 09:05 AM | Comments (0)
The chances the government’s ongoing peace negotiations with FARC will end with the guerrillas morphing into a political party willing and participating in the...
by John Zager and Robert Zager
August 22, 2016 02:41 AM | Comments (0)
This article discusses an alternative defensive strategy which addresses human performance capabilities and limitations to disrupt spearphishing attacks.