38 North
- Europe’s Stalled North Korea Policy
- Recognizing Separation, Creating Peace: Rethinking ROK Constitutional Assumptions
- Yongbyon Nuclear Scientific Research Center: Modernization and Expansion in 2025
- Africa’s Unresolved Conflicts Drive Acute Food Insecurity
- Assessing Progress on Africa’s Agenda 2063
- Beyond the
Moonshot: Apollo’s Hidden Lessons
for Managing Complex Technological Projects
- Why Europe Needs Its Defense Industry—and How the United States Can Help
- The Corporate Crimes
Handbook: Lessons Learned by
Practitioners, Communities, and Law Enforcement Seeking to Hold Corporate
Actors Accountable for Human Rights Abuses
- A Decade of Exploitation on the Riyadh Metro Project
- Human Rights Violations in Conflicts Between Herders and Farmers in Chad
- Tech-facilitated Violence Against Young Activists in Kenya
- Army History Magazine, Summer 2025, no. 136
- “This We’ll Defend”:
The Birth of the U.S. Army
- Sidney Simon’s World
War II Art: A New Perspective
- Heraldry: Symbols of
Valor, Service, and Unit Pride
- Cyber Defense Review, 2025, v. 10, no.2
- Widening the
Aperture: A Global Perspective on Cyber Resilience of Critical
Infrastructure
- Cyber Resilience and
Power Projection - Introduction to the Special Issue
- Resilient
Dependencies: Preparing to Fight Through Cyber Disruption
- Beyond the Fence
Line: Operationalizing Civil-Military Cyber Coordination at U.S. Military
Installations
- Defending Health
Security: Securing Healthcare Infrastructure against Ransomware
- Autonomous Vehicles
in Critical Infrastructure: Technologies, Vulnerabilities, and
Implications
- Pulling the Thread:
A Campaign Approach to Mission Thread Defense of Force Projection
- Toward a Global
Framework for Cyber Threat Intelligence Sharing
- Ensuring the Cyber
Resilience of Critical Infrastructure Serving Domestic Military
- Installations:
Questions for Senior Leadership
- Voices from Cyber
Yankee: Lessons for Strengthening Critical Infrastructure Cyber Protection
- Access Denied and
Sector Down: Introducing Resilience Games for Critical Infrastructure
Preparedness
- Preparedness
Wargaming for Critical Infrastructure Resilience: Taiwan Digital
- Blockade Wargame
- Strengthening Cyber
Resilience by Building Critical Infrastructure Communities: The C-CIC
Pilot Study
- A Human-AI Teaming
Approach to Closing the Talent Gap in Critical Infrastructure
- Protecting
Communities while Training Future Cybersecurity Professionals: Lessons
from the Consortium of Cybersecurity Clinics
- Journal of Military
Learning,
v. 9, no, 3 September 2025
- The West Point
Talent-Based Branching Program: Predictors of Performance at
FABLOC—Results and Recommendations
- Improving Cadet
Success at the U.S. Air Force Academy by Identifying Factors Associated
with Persistence among STEM Graduating Seniors
- An Eye for AI:
Integrating Generative AI Imagery in Graduate PME
- Developing Strategic
Empathy and Perspective Taking in Military Leaders
- Military Review, November-December 2025, v. 105, no. 6
- A Critical Link: The
Field Army and Command and Control in LSCO
- Meeting Mass with
Mass: Why NATO Matters to the U.S. Army
- Tarawa and the
Seventh Crusade: Combat Multipliers, Lethality, and the True Cross
- Operation Iraqi
Freedom: The New Forgotten War?
- Iraq After Invasion:
A Reckoning
- On Lesson Learning
and Wisdom: Rethinking the Failures of the Early Phases of the Iraq War
- Survivability of
Space Control Assets in a Dynamic Threat Environment: Planning
Implications for Success in the Indo-Pacific
- The Escalating
Stakes of Proxy Wars
- Steppes of
Resistance: Mongolian Nationalism as a Strategic Resistance to Chinese
Revanchism in the Indo-Pacific
- Operational Art and
the Chaco War
- Bond, Bots, and
Bioweapons: “No Time to Die” and the Future of Assassinations, Warfare,
and Genocide
- Revisiting Humility
as a Leadership Attribute in the Army
- The Unlikely War
Hero: A Vietnam War POW’s Story of Courage and Resilience in the Hanoi
Hilton
- Australian Army
Journal,
2025, v. 21, no. 3
- Auftragstaktik: The
Prussian-German Origins and Application of Mission Command
- Mission Command at
Sea and Command by Veto
- ‘Anything but simple
and clear cut’: The Utility of Mission Command within Domestic
- Security and
Response Operations
- Brits on a Mission
- Mission Command and
the Australian Army
- Paying the Mission
Command Bill
- Moral Framing in the
Profession of Arms Across Military Life Stages
- Does the Profession
of Arms Exist? Alternative Views on the Nature of the Profession Towards
a Deeper Understanding of Military Planning
- Developing the Army
Mind
- A Central Pillar of
the Army Profession: The Conceptual Evolution of the Australian Army’s
and Australian Defence Force’s Operational and Tactical Planning
Processes
- Stopgap Weapons as a
Feature of Warfare: Theorising from the Past to
- Prepare for Future
Wars
- An Adaptive,
Innovative ADF: Lessons from the Military Innovation Literature
- The Military
Profession, Professional Mastery and Military Thinking: Lessons from
Morris Janowitz’s The Professional Soldier
- Mission Culture: The
Professional Revolution to Transform Army into
- an Integrated
Enabler
- Preparing the Army
as a Profession for Mobilisation
- Australian Operations to Degrade the Islamic State—2014–2024
- Translating Ukraine Lessons for the Pacific Theatre
- Aligning for Advantage: Integrating Autonomous Systems into the Australian Defence Force
- The Party’s AI: How China’s New AI Systems Are Reshaping Human Rights
- The Dismantling of US Refugee Resettlement and Its Impacts
- How Policy and Competition Can Boost Mexico’s Economic Growth
- Deficit Tracker
[updated August 2025]
- Building Greater Resilience and Capacity in the U.S. National Security Industrial Base
- How Many People Can the Federal Government Lose Before It Crashes?
- The Challenge of AI Encroachment Into Online Search and Advertising
- From Strategy to Doctrine: The Next Steps for European Economic Security
- Analyses in Security
Policy
- No. 369: Pax
Transactionalis: The Trump Foreign Policy Agenda
- Between Two
Reefs: Indonesia’s Strategic
Culture in the Twenty-First Century
- The Depleting Missile Defense Interceptor Inventory
- Escalating Japan-China Tensions: Insights from the Past and Prospects for the Future
- Fulcrums of
Order: Rising States and the
Struggle for the Future
- India’s Future
Strategic Choices: Complications of
Mass
- Mexico: A Pivotal State on the Global Stage
- Project Atom
2025: Escalation Management in
Acute and Protracted Conflicts in the Indo-Pacific
- Saudi Arabia’s Strategic Vision
- Sovereign Cloud–Sovereign AI Conundrum: Policy Actions to Achieve Prosperity and Security
- Strategic
Ambiguity: Erdoğan’s Turkey in a
Multipolar World
- Striving for
Seriousness: Brazil’s Inclusion and
Exclusion from the World Order
- Syria’s Promise and Challenges One Year After Assad’s Fall
- United Arab
Emirates: From Footnote to
Sophisticated Global Partner
- Weight of History and Alliances in South Africa’s Geopolitical Turbulence
- A Milestone in Standards for CRSV Investigations: The Open-Source Practitioners Guide to the Murad Code /
- Aerial Refueling Added to Flight Academies’ Transition Training Curriculum
- ITOW: Lectures from
Course Book on the Taiwan Strait's Military Geography
- Albania’s EU Accession Sprint: Balancing Momentum, Reform, and EU Scrutiny
- How Dutch Companies Deal with Economic Security
- Human Rights Violations by Mozambican Security Forces in the Context of the Mozambique LNG Project
- DODIG-2026-021
Evaluation of the Secretary of Defense’s Reported Use of a Commercially
Available Messaging Application for Official Business
- DODIG-2026-022
Evaluation of DoD Policy and Oversight Reports Related to Using
Non–DoD-Controlled Electronic Messaging Systems to Conduct Official
Business
- Fiscal Year 2026 Oversight Plan for the Department of Defense Office of Inspector General
- Fiscal Year 2026 Top DoD Management and Performance Challenges
- Navy releases Harry S. Truman Carrier Strike Group Investigations
- FOIA Reports
- USS Gettysburg (CG
64) Friendly Fire Incident, (Dec. 22, 2024)
- Harry S. Truman (CVN
75) collision with Merchant Vessel BESIKTAS-M, (Feb. 12, 2025)
- Loss of F/A-18E
Super Hornet and Tow Tractor, (Apr. 28, 2025)
- Failure of Arresting
Wire Leading to Aircraft Loss, (May 6, 2025)
- Australia Country Analysis Brief
- Hurricanes in 2024 Led to the Most Hours Without Power in the United States in 10 Years
- Between Stability and Stagnation: The Performance and Openness of International Organisations in a Changing Global Order
- The Global Governance
of Sex and Gender: Women's and LGBTQI+ Rights Amid Regress, Reform, and
Resilience
- Global Supply Chain Pressure Index (GSCPI) [as of November 2025]
- NATO’s Extended Frontline: Towards Subregional Strongholds and Aggregated Deterrence
- The Strategic Dilemma Facing Russia’s Political Exiles: Is There a Way Out of the Credibility Gap?
- China’s People’s Liberation Army Heavy Infantry Company Positional Defense Threat Template
[infographic]
- Central Asia Has a Drug Problem, and It Is Growing Worse
- Czech Elections: Back to the Future as Andrej Babiš Sweeps to Victory
- Criminal Currents: Climate Change and Organized Crime Threats in the Pacific Islands
- Environmental Crime in the Western Balkans: Unveiling Green Crimes
- Violent Extremist Threats to Northern Ghana’s Gold Sector
- VA Health Care:
Status of Key Recommendations Related to Mental Health and Medication
Management GAO-26-108786
- Military Strategy
Magazine,
Fall 2025, v. 10, no. 3
- Nuclear Deterrence
Reconsidered: The Emerging Threat of Limited Nuclear Warfare
- Strategy and the
Last Manager: The Case for Dissenting War Studies
- Lasers and the
Limits of Strategic Change
- Colin Gray, the RMA,
and the Rise of Drone Warfare
- Security Force
Assistance without Strategy: A Clausewitzian Reassessment
- Inchon’s Real Story:
A Misalignment of Policy, War Aims, and War Plans
- Case Study: Millions of Dollars’ Worth of Tier One Common High Priority Items Exported from China to Russia
- Monthly Analysis of Russian Shahed 136 Deployment Against Ukraine
- Information
Warfare: How Emerging Technologies
Threaten Europe and Taiwan
- Taiwan in Limbo: Challenges and Prospects for
Participation in the United Nations System
- Taiwan’s Sports Diplomacy: Expanding Nation Branding Beyond Politics and Technology
- Africa File
- December 4, 2025 Fresh M23 Offensives amid
Trump DRC Peace Talks; Guinea-Bissau Coup; Sudan-Russia Naval Base
- China-Taiwan Weekly
Update
- Iran Update
- Russian Occupation
Update
- Russian Offensive
Campaign Assessment
- Dark Clouds over the Digital Euro
- Strategic Boundaries and Limitations of Iran-Russia Partnership
- Taking Stock of Canada’s 2025 G7 Presidency in the Digital Domain
- Strategic Studies, Summer 2025, 45, no. 1
- China’s Rise and the
Geopolitical Transformation in South Asia: Options for Regional States
- From Euro-Atlantic
to the Indo-Pacific: Assessing NATO’s Evolving Policy on China
- Militarisation of AI
and the U.S.-China Competition: The Future Frontlines
- Changing Global
Order: Rise of Techno-Nationalism and Pakistan
- Navigating the U.S.
Strategic Interests in South Asia Amid Global Shifts: Critical Appraisal
of Second Tenure of Donald Trump
- Leveraging Regional
Supply Chains for Strategic Connectivity: Pakistan’s Path to Middle Power
Status
- Blurred Boundaries: Legal, Ethical, and Practical Limits in Detecting and Moderating Terrorist, Illegal and Implicit Extremist Content Online while Respecting Freedom of Expression
- Defending Europe: Transatlantic and European Security from Truman to Trump
- China Brief, December 6, 2025, v. 25, no. 22
- Internet Censorship
Tools Exported Along Belt and Road
- Beijing Dance
Academy Dances to the Tune of Zhongnanhai
- Consular Pop-Ups in
Canada Advance Local United Front Work
- PRC–Russia–DPRK
Relations Grow Closer
- Johns Hopkins APL
Technical Digest, v. 37, no. 4, 2025
- Simulants for
Chemical and Explosive Threats
- Large-Scale
Production of Radiopure 135Xe from Bremsstrahlung γ-Irradiation of Solid
Xenon Difluoride
- APL’s Contributions
to the Odor Detection Canine Community
- MLM: Machine
Learning for Threat Characterization of Unidentified Metagenomic Reads
- Assessment of
Sequencing for Pathogen-Agnostic Biothreat Diagnostics, Detection, and
Actionability for Military Applications
- Wearables-Based
Disease Surveillance: SIGMA+ Human Sentinel Networks Concept of
Operations
- Using Knowledge
Graphs to Counter Weapons of Mass Destruction
- APL Achievement
Awards and Prizes: The Lab’s Top Inventions, Technical Breakthroughs, and
Staff Achievements for 2023 and 2024
- Asia Power Index
2025: Key Findings Report
- Shared History,
Shared Future: The Next 50 Years of
Australia–Papua New Guinea Relations
- Journal of Security,
Intelligence, and Resilience Education, 2025, v. 19
- No. 1 Teaching the
Code of Ethics to Advance Emergency Management Practice
- No. 2 Teaching
Cases: A Pedagogical Article for Promoting Rigorous Ethics Teaching with
Cases
- No. 3 Educating for
Emerging Threats: A Model for Integrating Fentanyl and Other Emerging
Issues into Homeland Security Curricula
- No. 4 Balancing the
Liberal Arts and Artificial Intelligence
- No. 5 Elephant in
The Classroom: How Ethical AI Can Improve Student Success
- No. 6 Teaching
Professional Military Education Using Generative Artificial Intelligence
- No. 7 Homeland
Security Reflections 2025
- Actionable Directions for the U.S. Army, the U.S. Navy, and the U.S. Air Force to Enhance Mid-Scale Manufacturing: Issue Paper
- Machine Learning for Safety-Critical Applications: Opportunities, Challenges, and a Research Agenda
- International Law
Studies,
2025, v. 106
- Circular Blue Economy: From Waste to Wealth
- India-Middle East-Europe Economic Corridor: Potential for Increasing Energy Flows
- Americans’ Social Media Use 2025
- German Views of the U.S.-Germany Relationship Turn Sharply Negative
- Assessment of
Military Child Development Program Staffing: Initial Findings Regarding the Workforce
- Can Technological
Adaptation Maintain Ukraine's Battlefield Edge? [video]
- Invisible Defender?:
Opportunities and Challenges for Integrating DEWs into Ukraine's C-UAS
Framework
- Is China’s Economic Plan Changing? [video]
- Looking Ahead: Enablers of Innovation and Scale for the
Future of Ukraine’s Defense-Industrial Base
- Manipulating Minds: Security Implications of AI-Induced Psychosis
- Mapping the Informal Bioeconomy: Assessing the Current Landscape and Opportunities for Reinforcing Biosafety and Biosecurity
- Military Exposures and Mental, Behavioral, and Neurologic Health Outcomes Among Post-9/11 Veterans [video]
- A Prisoner’s Dilemma in the Race to Artificial General Intelligence
- Strategies to Improve Detection of Novel Pandemic Pathogens: Cost Versus Detection Performance for Promising Pathogen-Agnostic Detection Workflows
- Tooling Up Together: How Europe and Ukraine Can Improve Defence Industrial Collaboration
- Toward Comprehensive Benchmarking of the Biological Knowledge of Frontier Large Language Models
- Journal for
Deradicalization, Fall 2025, no. 44
- Moro Voices from
Mindanao: Addressing extremism in the Bangsamoro Autonomous Region
- Preventing Violent
Extremism through Mentoring? Outcomes and Insights from a Quebec-Based
Program
- Importance of
Dialogicality in Professional Development of Social and Health Care
Workers: A Case of Preventing Radicalization
- Guardians of Peace,
Victims of Betrayal: An Interpretative Phenomenological Analysis of
Military Personnel Navigating Scepticism, Trust, and Hope in Nigeria’s
Operation Safe Corridor
- Preventing
Radicalization at the Local Level: Municipal Perspectives on State-Civil
Society Collaboration in Germany
- Journal of Online
Trust and Safety, 2025, v. 3, no. 1
- Untrustworthy
Website Exposure and Election Beliefs: Selective Exposure and Ideological
Asymmetry
- “Information Modes”
: A Framework for Trust and Information Seeking
- Scaling Human
Judgment in Community Notes with LLMs
- Problematic Media
Use as a Content-Agnostic, Enforceable Harm
- Should Social Media
Platforms Permit Violating Content that is “Newsworthy”?
- The Future Russian
Way of War
- Climate, Peace and Security Fact Sheet: Abyei (2025)
- The Militarization of Technology: Preventing Diversion and Misuse Through Export Controls
- The SIPRI Top 100 Arms-producing and Military Services Companies, 2024
- China's Foothold in
Türkiye's Digital Ecosystem
- Postal Services in Wartime: Lessons from Ukraine
- The Role of
Conventional Arms Control in Sweden's 'Near Abroad'
- Steady Under Fire: the Central Bank of Russia and the Wartime Economy
- Why is There No International Military Mission in Sudan?
- Conflict, Security
& Development, 2025
- Agentive Minorities: Place-Memory, Identity and Ontological Security in Post-War Sri Lanka
[open access article]
- The Political Economy of Civil Wars and the Future of UN Peacekeeping [open access article]
- Critical Studies on
Terrorism
- What Makes an Incel? An Interview Study of Current and Former Incels [open access article]
- Intelligence and
National Security, 2025
- The Journey of Digital Transformation in Intelligence Organizations [open access
article]
- International Journal
of Intelligence and CounterIntelligence, 2026
- Hybrid Threats and the Intelligence Community: Priming for a Volatile Age [open access
article]
- Intelligence in Asymmetric Conflict: South African Perspectives [open access article]
- Trolling for Terrorism: Searching for Signals and Noise in Internet Research Agency Messaging [open access article]
- Journal of Risk
Research,
2025
- A Risk Science Review of the WEF Global Risk Reports [open access article]
- Small Wars &
Insurgencies
- Clicks, Links &
Tricks, Oh My! How Serious Organized Criminals Exploit Digital Trust
Pathways
- Level Up – Gaming and Violent Extremism in Africa
- Made in China
2025: Evaluating China’s
Performance
- Vying for Quantum Supremacy: U.S.-China Competition in Quantum Technologies
- Apogee, 2025, v. 2, no. 3
- The Need for
Strengthened Space Traffic Management: Navigating Crowded LEO and the
Future of Global Governance in Space
- Enduring Challenge:
U.S., Allies Must Learn to Operate in a Congested Space Debris
Environment
- Going After Space
Junk: Debris-Removal Missions Will Use Claws and Magnets to Find, Grab
and Drop Dangerous Objects from Orbit
- How to Bury the
Space Station: ‘Graveyards’ on Earth and in Space Help Keep Working
Orbits Cleaner
- Risk vs Reward:
Military Weighs On-Orbit Satellite Refueling
- A Hazardous Pattern
in Space: Orbital debris is the Latest Chinese Behavior Raising Concern
- Governing Orbital
Debris Mitigation: Can Binding International Guidelines Ensure
Sustainability in Space?
- Small Debris, Big
Problem: Public, Private Sectors Try to Tackle the Barely Detectable:
Tiny Space Objects
- ‘Normalizing Space
Power’: U.S. Space Force Operations Leader Brings Indo-Pacific Experience
to New Role