Countering Threats and Challenges
Expertise
Divisions
Special Programs
Centers
The War on Terror, 18 Years Later

Five Myths About Cryptocurrencies
Proxy Warfare

Cryptocurrency: A Primer for Policy-Makers

Cryptocurrency: Implications for Special Operations Forces
What Does Kim Jong Un Want?

Great Power Competition in the Red Sea? Yes, and…

“The Cheapest Insurance in the World”? The United States and Proxy Warfare
The Iran-Iraq War
Iranian Action in Syria: Military Operations, Soft Power Influence, and Implications for the United States

SOF and the Future of Global Competition

Promoting Civilian Protection during Security Assistance: Learning from Yemen

Weighing the Costs of War and Peace in Afghanistan

Can Kim Jong Un Really Denuclearize?
U.S. Withdrawal From Syria
Domestic Terrorism in the United States

Exploring the Utility of Memes for U.S. Government Influence Campaigns

Great Power Competition in the Indian Ocean: The Past As Prologue?

Transnational Challenges and U.S. National Security: Defining and Prioritizing Borderless Threats
U.S. Strategy on Al-Qaeda

Future Policy Options for U.S. Efforts Against Al-Qaeda

Independent Assessment of U.S. Government Efforts against Al-Qaeda
Decade of War

Shining a Light on the Western Balkans: Internal Vulnerabilities and Malign Influence from Russia, Terrorism, and Transnational Organized Crime

Sources of Resilience in the Lord’s Resistance Army