Insights.

Insights

A collection of Irregular Warfare content authored by the Center’s Academic Chairs and subject matter experts.

Build from the Shadows, Not the System – Disruptive Medicine for Denied Battlespaces: A Grounded Framework for Irregular and Clandestine Warfare

The People’s Republic of China (PRC) is using illicit drug markets – particularly fentanyl and marijuana – to conduct irregular warfare (IW) against the United States. To counter this action, the United States must not only understand the nature of the threat but also enact a whole of society initiative to increase societal resiliency.

[ Read More... ]

Blueprint to Counter China’s Criminal State Actions: Leveling the Playing Field for Strategic Competition

The People’s Republic of China (PRC) is leveraging rogue, unconventional espionage to target U.S. civilian companies and critical infrastructure. By straying from the international norms surrounding espionage, the PRC has gained asymmetric strategic advantage that must be countered. To do so, the United States needs to engage in international action to create a comprehensive response across the range of U.S....

[ Read More... ]

Critical Minerals, U.S. National Security, and Africa

United States industry and national security supply chains are vulnerable because they are reliant on adversaries for critical materials necessary for advanced technology and high-end weapons systems. However, the Department of Defense (DoD), American industry, and African partners can implement coordinated measures to reduce these deficiencies.

[ Read More... ]

The Emerging Potential for Quantum Computing in Irregular Warfare

Quantum computing represents a paradigm shift in computational technology, poised to revolutionize industries including national security and defense. While the abilities of quantum computing still remain largely theoretical, significant progress is being made. Notably, experiments from companies like Google and IBM have demonstrated early examples of quantum supremacy, where quantum computers outperform classical systems on specific tasks. These breakthroughs suggest...

[ Read More... ]

Publication Disclaimer

The views expressed in these articles are those solely of the authors and do not reflect the policy or views of the Irregular Warfare Center, Department of Defense, or the U.S. Government.

Subscribe

Subscribe to our distribution list to be notified when new publications are posted.

Submit Your Work

The IWC will publish original and thoroughly researched commentary and analyses that span the range of security topics associated with irregular warfare.

Publication Disclaimer

Per 5 CFR § 3601.108 - the views presented are those of the speaker or author and do not necessarily represent the views of DoD or its components