ACLED
- Behind the Lines: How Ukraine Has Outgunned Russia in Sabotage
- Violence Has Gone Down During Xiomara Castro’s term, But Has Security Improved in Honduras?
- Abandoned by Fashion: The Urgent Need for Fashion Brands to Champion Workers’ Rights; Brand Responses to Amnesty International Survey
- Stitched Up: Denial of Freedom of Association for Garment Workers in Bangladesh, India, Pakistan and Sri Lanka
- Carbon Markets and Climate Finance for Ukraine’s Recovery
- How the Baltic Sea Nations Have Tackled Suspicious Cable Cuts
- Why Ankara’s Rising Power in the Sahel Could Benefit the West
- Efficiency and Distribution in the European Union’s Digital Deregulation Push
- Shifting Priorities, Slow Progress: An Analysis of EU Tax Recommendations
- Embodied AI: China’s Big Bet on Smart Robots
- Governance Compared: Autocracy and Democracy in Latin America
- Redundancy, Resiliency, and Repair: Securing Subsea Cable Infrastructure
- The Unfinished Plan for Peace in Ukraine: Provision by Provision
- Digital Money and Payments Infrastructure
- From NAFTA to Surveillance Capitalism: USMCA’s Digital Order
- Intellectual Property Is Economic and National Security
- 2023-2024 Survey of Public Attitudes on US Intelligence
- Americans Fear Weakening Democracy in the United States
- Americans Grow More Supportive of Aiding Taiwan in a China Crisis
- Chinese Public Values Global Leadership More than Americans Do
- Egypt: ICT as a Driver for Growth
- Remote Hires, Stronger Ties: ICT Nearshoring In Bilateral Migration Partnerships
- CTC Sentinel, November/December 2025, v. 18, no. 11
- Rise of the
E-Militias: Designated Terrorist Groups Infest Iraq’s Digital Economy
- Danger Zone:
Terrorism Risk – Theory, Practice, and Evolution
- A View from the CT
Foxhole: Admiral Frank Bradley, Commander, U.S. Special Operations
Command
- The Changing
Character of Terrorism and U.S. Counterterrorism
- The Best of Times,
the Worst of Times: The Repressed Islamic State Affiliates
- Burden-Sharing with
Non-Traditional Counterterrorism Partners
- Foreign Terrorist
Fighters: A Threat in Stasis
- Climate Adaptation in High-Security Risk Countries
- Preventing Water-Related Conflict to Promote US National Security and Build Global Stability
- Drafting the Gender Equality Script: African Women Between “Liberal” and “Liberatory” Gender Discourses in the 1980s
- Vacuum of Peace: Lebanon After UNIFIL
- DODIG-2026-013 Audit
of the DoD’s Management of Data Remaining After the Retirement of DoD
Financial Management Systems
- DODIG-2026-014 Audit
of the U.S. Army’s Processes for Providing Supplies and Equipment Funded
Through the Ukraine Security Assistance Initiative
- DODIG-2026-016 Audit
of DoD Efforts to Remediate Financial Statement Material Weaknesses
Related to Government Property in the Possession of Contractors
- Diplomatic Pursuits
- The Middle East and Central Asia Now Bound to the US by the Abrahamic Accords: Is Syria the US’ New Backyard?
- Space & Defense
Journal,
Fall 2025, v. 16, no. 2
- Costly Signals in
Space: Increasing Credibility via Strategic Disclosure
- Raising Public
Awareness on Space Themes: Analysis of Brazilian Space Policy Using Data
from Google Trends
- In Defense of Space
Offense
- Allied Abandonment
and Nuclear Proliferation: Lessons from South Korea’s Secret Nuclear
Program
- Space, Law, and
National Security
- Enabling the
Decisive Advantage
- Earth’s Orbital
Prison: Codifying Customary Law to Prevent Environmental Catastrophe in
Space
- Plan to Fail by
Failing to Plan: Deterring PRC Nuclear Force Expansion
- Moving Global Biodiversity Governance Forward: How to Strengthen the Convention on Biological Diversity
- Reforming Global Tax Governance: OECD and UN Paths to Effective and Participatory Tax Reform
- Middle Power Dreaming: The Geopolitics of Angola’s Emergence
- The Taiwan Test: Why Europe Should Help Deter China
- Europe’s Competitiveness Challenge: Ensuring Patient Access to Transformative Therapies in Europe
- Towards a Fairer EU Asylum Policy: Lessons from the Dublin System for the EU’s Solidarity Mechanism
- Two Tales in a City: The European Union in 2025
- Collateral Circuits:
The Impact of the Sudan's War on Arms Markets and Mercenary Networks in
Chad and Libya
- Illicit Finance and Africa: A Regional Assessment
- Digital Surveillance:
Potential Effects on Workers and Roles of Federal Agencies GAO-25-107126
- Defense Budget:
Clearer Guidance Is Needed to Improve Visibility into Resourcing of
Pacific Deterrence Efforts GAO-26-107698
- Offshore Patrol
Cutter: Coast Guard Should Gain Key Knowledge Before Buying More Ships
GAO-26-107583
- VA Leasing: VA Should
Systematically Identify and Address Challenges in Its Efforts to Lease
Space from Academic Affiliates GAO-26-107821
- China Leadership
Monitor,
Winter 2025, no. 86
- Punching Down:
Beijing’s Playbook for Unwinding “Involutionary Competition”
- Same Strategy, But
Different Emphasis: Main Takeaways from the Central Committee’s Proposals
for the 15th Five-Year Plan
- China’s
Middle-Income Class, Macroeconomic Growth, and Common Prosperity
- The Dictator’s
Dilemma toward the 21st Party Congress: Elite Reshuffling and Power
Restructuring
- China’s National
Security: The People’s Liberation Army’s Shrinking Role in Protecting the
Nation’s Core Interests
- CLM Insights
Interview with Minxin Pei
- Defending American Tech in Global Markets
- The United States Needs Data Centers, and Data Centers Need Energy, but That Is Not Necessarily a Problem
- Assertion of Religion in Sri Lankan Politics: A Critical Analysis
- China–Afghanistan Relations: Hope, Hype and More
- China’s Role in Afghanistan and Pakistan Post US-Nato Withdrawal: Implications for India
- Gulf Cooperation Council: Cohesion, Conflicts and Engagement with External Powers
- Iran’s ‘Pivot’ to Asia: Quest for Survival and Regional Cooperation
- Addressing Illegal Harms on Small and Emerging Platforms: Regulatory Challenges and Gaps
- Assessing and Mitigating Conflict-Related Online Risks: Challenges for Governments, Regulators and Online Platforms
- Assessment of Foreign Information Manipulation and Interference in the 2025 Czech Parliamentary Election
- Czechia: Country Election Risk Assessment | FIMI Response Team Report
- Networks of Harm: A Victim-Centric Information Resource on the 764 Sextortion Network
- Online Domestic Extremism in Canada Data Briefing – March to May 2025
- Africa File
- China-Taiwan Weekly
Update
- Iran Update
- Russian Occupation
Update
- Russian Offensive
Campaign Assessment
- From Resolution to Practice: 25 Years of the Women, Peace and Security Agenda
- The Kremlin Sets Its Sights on Kyiv: The Bluff behind Russia’s “Peace Plan”
- The Mattei Plan for Africa: From Aid to Partnership?
- The US-Russia Peace Plan: A Colonial Deal in 28 Points
- China Brief, November 3, 2025, v. 25, no. 21
- Talent Policies
Drive Tech Race While Party Courts Sinologists
- PRC Elites Voice
AI-Skepticism
- Political
Purification and Strategic Realignment in the PLA
- China’s Foreign
Affairs Apparatus Grapples with Succession Challenges
- A Five-Year Plan for
Managed Confrontation
- Terrorism Monitor, November 20, 2025, v. 23, no. 9
- RSF Establishes
Rival Government as Sudan’s War Spirals
- Cameroon Rattled by
Twin Insurgencies Amid Presidential Elections
- Iraqi Militia
Releases Israeli Hostage Following U.S. Pressure
- JNIM Edges into
Nigeria Through Bandit Collusion
- Journal of Policy
& Strategy, 2025, v. 5, no. 3
- Responsive
Infrastructure
- Why Does America
Need a Golden Dome?
- Why Arms Control
Must Fail
- A “One-War”
Warfighting Construct No Longer Applies to U.S. Nuclear Strategy
- Tailoring
Deterrence: What and Why?
- Assessing China’s
Belt and Road Initiative: A Societal Framework
- Tailoring Deterrence: What and Why?
- Resilient PNT is Vital to Golden Dome Success
- Skyfall: The Day After We Lose Critical Infrastructure to a Nuclear Detonation in Space
- The Global Race for Talent: Other Nations are Outpacing the U.S. on High-Skill Immigration
- Mapping America’s Immigration Needs: A County-Level Model for Matching Migrants to Local Economies
- The 2035 Agenda for a 7-Trillion-Dollar Africa
- Diplomacy, Sanctions, and Military Might: India’s Post-Galwan Strategies in Managing China Diplomacy, Sanctions, and Military Might: India’s Post-Galwan Strategies in Managing China
- China’s Expanding Aircraft Carrier Capabilities: From a Carrier Gap to the Electric-Catapult Age
- The Historical Roots of Indian Intelligence
- The Legal Basis for
India’s Claim to Pakistan-Occupied Jammu & Kashmir
- Pakistan-Saudi Arabia Ties: Explaining the Shifts in Proximity
- The Saudi Arabia-Pakistan Defence Agreement: Perspectives from India and the Middle East
- South Africa’s G20 Presidency: Solidarity, Equality, and Sustainability in an Era of Discord
- Adopting a Systems Approach to Police Staffing
- CRI-TAC Spotlight: Metropolitan Nashville (TN) Police Department’s Professional Wellness Section
- Additive Manufacturing in the Military Technology Sector. Application and Proliferation of an Emerged Technology
- Cultural Targeted Killings: Cultural Legitimacy and the Normalization of Lethal Violence in the Philippines
- Façades of Security Sector Reform in Guinea-Bissau: Simulating Norm Translation
- German Views of the U.S.-Germany Relationship Turn Sharply Negative
- Majorities of Latinos Disapprove of Trump and His Policies on Immigration, Economy
- From Policy to Victory: Recommendations to Ukraine for Harnessing Defence Technology
- Mapping the Informal Bioeconomy: Assessing the Current Landscape and Opportunities for Reinforcing Biosafety and Biosecurity
- Tooling Up Together: How Europe and Ukraine Can Improve Defence Industrial Collaboration
- Combatting Cybercrime against Mobile Devices
- The Financial Dimension of EU Internal Security Threats
- An Illusion of Legality: Wildlife Laundering in Colombia and Mexico
- Policy Implications for Wildlife Laundering in Colombia and Mexico - Summary Briefing
- The Authorized Trade in Small Arms: Latin America from a Global Perspective
- Pathway to Policy: Firearms Trafficking and Public Health in the Caribbean
- Unequal Partners: Consequences of the Power Shift in Sino-Russian Relations
- What Would Security Guarantees for Kyiv Mean?
- African
Security, 2025
- Strategic Partnership or Strategic Expansionism? NATO’s Out-Of-Area Operations on Peacekeeping with the African Union [open access article]
- Global
Security: Health, Science and Policy, 2025
- The UAE’s Niche Diplomacy in the Middle East: Authoritarian Strategies of a Middle Power [open access article]
- Journal
of Strategic Studies, 2025
- Building Mutual
Reassurance on the Korean Peninsula: Coordinating Japan, ROK, and US
Approaches to North Korea's Nuclear Challenge
- Toward Mutual Reassurance on the Korean Peninsula and in Northeast Asia
- Weaponisation of Law: Assault on Democracy
- Government’s Use of External Consultants: Lessons Learned
- Using Consultants in Government: Good Practice Guidance
- Closing Gaps: Strengthening the Women, Peace and Security Agenda through Arms Control and Disarmament
- Combating Conflict Related Sexual Violence Against Men and Boys: Challenges and Opportunities
- Exposure, Not Identity? Understanding Victimization by Bandits in Nigeria’s North West
- Farming Amid Conflict: Agricultural Challenges and their Impact on the Reintegration of Former Boko Haram Associates in the North East of Nigeria
- Leveraging Data to Reduce Civilian Harm during Military Operations in Populated Areas: Practical, Data-Driven Steps to Implement the Political Declaration on Explosive Weapons in Populated Areas
- Neurotechnology in the Military Domain: A Primer
- Afghanistan Opium Survey 2025
- Emerging Threats: The Intersection of Criminal and Technological Innovation in the Use of Automation and Artificial Intelligence in the Cybercrime Landscape of Southeast Asia
- FEMICIDES IN 2024 - Global Estimates of Intimate Partner/Family Member Femicides
- Myanmar Opium Survey 2025
- Transnational Organized Crime Brief 2025 - Special Points of Interest