ArticlesFrom Coal to Code to Reactors: How Wyoming’s State and Local Decisions Shape Irregular Warfare Connor T. ChristensenMay 14, 2026 Learn More
ArticlesMercenaries, Private Security, and the Civilian Cost of Outsourced Coercion Oluwaseyi Mike BamigboyeMay 12, 2026 Learn More
ArticlesNeutrality as Vulnerability: Russia’s Hybrid Playbook in Moldova Thomas Austin ThompsonMay 1, 2026 Learn More
ArticlesCredibility vs. Speed: Israel and Hamas in the Gaza Information War Ashraf AldmourApril 29, 2026 Learn More
ArticlesChinese Eyes, Iranian Missiles: Intelligence Cooperation in the US/Israel–Iran War 2026 Tahir Mahmood AzadApril 23, 2026 Learn More
ArticlesEconomic Warfare Reimagined: Insurance as a Tool of U.S. Strategic Influence Tom Johansmeyer, Matthew FlugApril 17, 2026 Learn More
ArticlesConflict Has Memory: Why Local Wars Follow Distinct Trajectories Steven M. Radil, Olivier J. WaltherApril 15, 2026 Learn More
ArticlesAl-Hol’s Collapse: How Syria’s Detention Crisis is Enabling Islamic State Resilience Sam DavidApril 10, 2026 Learn More
ArticlesThe Limits of Leadership Decapitation: Strategic Consequences of Overreliance on Military Force for Political Transformation Ron MacCammonApril 9, 2026 Learn More
ArticlesCommercial Pathways and Proxy Power: How Irregular Forces Acquire Advanced Capabilities Branko RuzicApril 3, 2026 Learn More
ArticlesClaimed or Unclaimed: Patterns of Attribution in Global Terrorism Mahmut CengizMarch 26, 2026 Learn More