Article Search

Research Articles

  • Historical Battle Networks

    Analyze battle networks as integrated systems of sensors, analytics, and strike, including their evolution, effectiveness in previous conflicts. (HAF A5SM)

  • Counter Drone Operational Art and Practice

    What counter-drone strategies have been adopted to increase force protection, deny adversary surveillance, and attack through the employment of drones? (JSOU) 

  • Successful Resistance Movements

    What are the political-military parameters that lead to the success of resistance movements? What constraints (legal or otherwise) contribute to government failure in such conflicts? (JSOU) 

  • Chinese use of resistance groups

    What foreign irregular armed groups have the PRC supported in the past or continue to support? What nonviolent civil resistance movements have the PRC supported in the past? (JSOU)

  • The Utility of SOF in Strategic Competition

    Within the realm of strategic competition, what are SOF activities that could support the overall joint force in the deterrence of large-scale armed conflict and/or escalation of crisis?  (JSOU)

  • Emerging Cyber Powers

    What states are investing in military cyber capabilities and may emerge in the next 5-10 years as new advanced threats to the U.S. and our allies? (US Cyber Command)

  • Hacktivists

    How might the emergence of hacktivists impact state dynamics in cyberspace during a conflict?  (US Cyber Command) 

  • Iran's Cyber Policy

    What are Iran's policy, strategy and mission objectives for conducting cyberspace operations? What does Iran perceive as U.S. or partner red lines regarding cyberspace operations? What geopolitical events and/or actions would drive an Iranian retaliatory cyberspace attack against the U.S.

  • Iran's cyber capabilities

    What are Iranian cyber tactics, techniques, and procedures? What are the trends in Iranian cyber operations? (US Cyber Command)