
Intelligence and National Security announces a special issue dedicated to sources and archives for Cold War European intelligence history. Editors Matteo Giurco and Christopher Moran seek papers that examine institutional archives, open‑source material, memoirs, and the gaps left by classified or missing records. Submissions must include a title/abstract by March 15, 2026 and a full manuscript by November 1, 2026, limited to roughly 8,000 words. The call emphasizes comparative national case studies, especially from former Soviet‑bloc states, and invites methodological reflections on archival reliability.
Lawfare’s new article argues that judicial review of executive national‑security claims enhances democratic legitimacy and strengthens defense outcomes. The authors contend courts can competently assess sensitive security matters without compromising classified information, preventing abuse and improving decision‑making. They link judicial...

The essay argues that conspiracy theories function as cognitive environments that can be weaponized in modern conflict, influencing threat perception, trust, and identity before overt actions occur. It presents the Existential Threat Model, detailing five structural elements—pattern, agency attribution, meaningful...

The essay warns that Western reliance on the Internet is underpinned by Amphibious Critical and Defensive Infrastructure (ACADI)—the global network of undersea and landing‑station fiber‑optic cables. Roughly 900,000 miles of cable move $22.4 trillion of data daily, and a 24‑hour outage...

The Joint Special Operations University (JSOU) has reopened its Call for Special Operations Papers, targeting concise, high‑impact research that bridges education and operational practice. Submissions must focus on one of ten technology‑centric topics, ranging from AI‑driven targeting to space‑cyber‑STRATCOM integration,...

The United Nations Office of Counter‑Terrorism released a 2026 Practice Guide on artificial intelligence for Preventing and Countering Violent Extremism (PCVE). It warns that extremist groups are exploiting AI to produce multilingual propaganda, deepfakes, and synthetic media, while only about...

The United States unveiled its 2026 National Defense Strategy, placing the Western Hemisphere at the forefront of homeland defense and branding the approach as a “Trump Corollary” to the Monroe Doctrine. The strategy calls for merging U.S. Southern Command and...

Cheryl Yu’s report maps more than 2,000 organizations in the United States, Canada, the United Kingdom and Germany that are linked to the Chinese Communist Party’s United Front Work Department. The dataset classifies 2,294 groups into eight functional types, with...

David Maxwell’s latest commentary offers a sweeping roundup of current national security and Korean Peninsula developments. Highlights include the U.S. deploying MQ‑9 drones to track China’s Pacific maneuvers, a looming Trump decision on Iran that could define his legacy, and...

Over the past two decades extreme weather events have surged in frequency and intensity, directly threatening U.S. military installations across coastal, inland, and western regions. Hurricanes such as Katrina, Sandy, and Michael have inflicted multibillion‑dollar damage, while wildfires, floods, and...

Afghanistan has re‑emerged as a venue for great‑power competition below the threshold of war, with China pursuing cautious economic engagement focused on mineral extraction and limited infrastructure projects. U.S. analysis shows Chinese contracts have underperformed and remain exploratory, leaving a...

The Center for Strategic and International Studies hosted a panel examining the escalating crisis between the United States and Iran after Tehran’s harsh suppression of recent protests. President Trump responded by dispatching an aircraft carrier strike group to the Persian...

The Texas National Security Review podcast features Nathan Wood discussing how the principle of distinction must evolve for autonomous warfare. Wood argues that debate should shift from abstract concerns to the legal and operational specifics of existing systems, ensuring human...

The 2026 National Defense Strategy re‑elevates homeland defense from a background condition to a contested, central mission. It argues that securing the interior—through legitimacy, endurance, and protection of economic lifelines—is essential for sustaining power projection abroad. The article draws on...

In April 2025, an autonomous racing drone equipped with a neural‑network AI outperformed three human FPV champions at the A2RL Drone Championship in Abu Dhabi. The AI‑controlled craft completed the complex aerial course faster than the pilots, marking the first...

The article argues that U.S. Army human intelligence (HUMINT) collectors remain essential despite a post‑GWOT shift toward interrogation‑only roles. It highlights how the Army has fragmented and down‑scaled its HUMINT training pipeline, risking a loss of scalable, mid‑level “human sensors”...

The February 17, 2026 Special Operations News roundup highlights a photo of candidates completing a ruck march during the U.S. Army John F. Kennedy Special Warfare Center and School’s Special Forces Assessment and Selection (SFAS) at Camp Mackall. The three‑week...

The NATO Strategic Communications Centre of Excellence released a report that tests the Information Influence Attribution Framework (IIAF) against real‑world Russian information influence operations aimed at Ukraine, neighboring states, and European pro‑Kremlin groups. Using data from the Ukrainian Centre for...

Ian Murphy’s Spring 2026 commentary argues that irregular‑warfare analysis overlooks institutions, treating them as a secondary concern. Using Russia’s occupation of the Donbas, the piece shows how governance tools—passportization, education reform, and economic extraction—function as bureaucratic weapons that reshape identities and...

China’s People’s Liberation Army Navy is modeling AI‑intelligentized seabed mines that could hide in the Paracel Islands’ acoustic shadow zones, creating a persistent anti‑access/area‑denial (A2/AD) field. The concept builds on an estimated 50,000‑100,000 existing Chinese naval mines, adding adaptive target...

The paper reviews chemical weapon use by violent non‑state actors, highlighting the Tamil Tigers’ 1990 chlorine attack and Islamic State’s 76 documented chlorine and mustard strikes between 2014‑2017. It notes the relative ease of acquiring industrial chemicals and the primitive...

Veteran journalist Jason Burke will discuss his new book, *The Revolutionists*, in a New America webinar on Feb. 24, 2026. The book chronicles the surge of international terrorism in the 1970s, from plane hijackings to hostage crises, and traces the ideological...

The Sheinbaum administration inherits a record‑high homicide baseline of over 190,000 deaths, reflecting entrenched violence from the López Obrador era. While the Sinaloa Cartel and CJNG remain the dominant criminal coalitions, organized crime has diversified into extortion, fuel theft, kidnapping, and...

The NCITE research center documented 221 weaponized drone incidents in Mexico between 2021 and 2025, with 27 attacks killing 77 people. The Jalisco New Generation Cartel (CJNG) accounted for the largest share, linked to 42 attacks, while La Nueva Familia...

The article critiques the emerging label “cognitive warfare,” arguing it is merely a re‑branding of traditional political warfare. It traces the concept’s roots to Cold‑War era strategies and highlights a persistent “Maginot mentality” that over‑emphasizes military solutions while sidelining diplomatic,...

The U.S. Army Command and General Staff College has overhauled its Asynchronous Distance Learning Common Core, slashing the program from 36 months to 12 months and introducing a three‑phase, scaffolded curriculum. The redesign adds multimodal instruction, cohort advisors, and a...

A new study documents 270 harassment, assault and ICAD incidents by China’s People’s Armed Forces Maritime Militia (PAFMM) in the South China Sea between 2012 and 2025. The research shows that nearly half of these events occurred alongside Chinese Coast...

The Department of Justice announced an indictment of eleven individuals accused of operating a marriage‑fraud and bribery ring that targeted U.S. service members, primarily at Jacksonville Naval Air Station. The scheme paired Chinese nationals with servicemen to secure permanent residency,...

The Small Wars Journal roundup highlights a surge of geopolitical flashpoints, from the United States covertly shipping thousands of Starlink terminals into Iran and deploying its largest warship to the Middle East, to Germany’s preparation for offensive cyber operations and...

The article examines how Taiwan could incorporate foreign volunteers into a resistance movement if the island were occupied by the PLA, drawing lessons from Ukraine’s International Legion. It outlines recruitment channels, clandestine infiltration methods, and integration challenges such as language...

Security analyst David Maxwell discussed North Korea’s hybrid strategy, combining conventional forces with social‑warfare tactics, in a recent podcast. He examined the Pentagon’s new report, highlighting its impact on South Korea’s defense posture and the broader alliance framework. Maxwell warned...

Cognitive warfare expands conflict into the human mind, targeting perception, judgment, and belief formation. The paper argues the United States is unprepared for adversaries leveraging AI‑driven disinformation, deepfakes, and social‑media algorithms. It highlights China and Iran’s use of cognitive contagions...

U.S. forces captured Venezuelan President Nicolás Maduro, prompting comparisons to the 1989 U.S. operation that removed Panamanian leader Manuel Noriega. Scheffer’s brief outlines Justice Department memoranda that justify extraterritorial arrests under a self‑defense rationale against narcotics trafficking. The analysis highlights...

Canadian Prime Minister Mark Carney, speaking at Davos, warned that the international system is experiencing a rupture rather than a gradual transition, urging middle powers to reduce reliance on the United States. He called for diversified partnerships and collective action...
On February 19, the Irregular Warfare Initiative and CACI DarkBlue will host a half‑day convening in Reston, Virginia titled “Turning OSINT Chaos into Strategic Clarity: Countering Malign Chinese Influence.” The event gathers senior irregular‑warfare practitioners from government, intelligence, and the...