IRREGULAR THREATS

Contributors,

Products, & More

Other Contributors

T2Com Separator
Play Video

Irregular Warfare: U.S. Army’s IW Doctrine

Army University Press

This short film joins the Army’s ongoing effort to refresh Irregular Warfare doctrine, spotlighting the core principles that still work and proposing smart updates for today’s fight. Even as Great-Power competition dominates strategy, it underscores why mastering irregular tactics remains vital for countering peer nation-state adversaries.

Play Video

The Future of Irregular Warfare

Center for Strategic & International Studies (CSIS)

Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict joins CSIS’s Defense and Security Department President to explore how irregular warfare and the SOF enterprise are evolving. Their discussion spotlights shifting priorities and emerging technologies poised to reshape special-operations missions.

DOCUMENTS AND ARTICLES

WITT program focuses on the activities and capabilities of countries like China, Russia, and Iran as well as the threat and evolution of paramilitary groups and terrorist networks

ISW’s Terrorist Networks Project delivers concise, expert analysis that maps and tracks global extremist organizations, giving you actionable insight into evolving threats.

Research focused on identifying and analyzing the complex challenges of conflict, violent extremism and terrorism.

RAND Corporation is a global policy think tank that provides research and analysis to inform policymakers on crucial issues, including international security and homeland security.

Complete Archive

T2Com Separator

Explore the complete archive of Irregular Threat products and articles created by T2COM G2, Partners, and Other Contributors.

Exploiter Series: Sociocultural Exploitation

By Mica Hall | 04/22/2026 | Comments Off on Exploiter Series: Sociocultural Exploitation

Understanding Sociocultural Exploitation: How Internal Vulnerabilities Allow for External Influence While this country remains one of East Africa’s most influential…

Rising Russian Influence in the Sahel Spilling Over to Nigeria

By David Anderson | 04/13/2026 | Comments Off on Rising Russian Influence in the Sahel Spilling Over to Nigeria

KEY TAKEAWAYS • Pro-Russia sentiment has become widespread in northern Nigeria, as evidenced by the August 2024 #EndBadGovernance movement. The…

Recent Spike in Lone-Actor Incidents Represents Most Likely Threat to T2COM

By David Anderson | 03/25/2026 | Comments Off on Recent Spike in Lone-Actor Incidents Represents Most Likely Threat to T2COM

T2COM, along with other security partners, faces elevated Homeland threats following recent hostilities between the United States, Israel, and Iran.…

OE Watch Issue 2 2026

By David Anderson | 03/18/2026 | Comments Off on OE Watch Issue 2 2026

China China Steps Up Claims of Quantum Radar Production China Shows Footage of ASN-301 Loitering Munitions System Chinese Policy Paper…

An Era of Hybrid Collusion: A Threat Assessment of International Violent Non-State Actors (VNSAs) and State Actors to the United States

By David Anderson | 02/27/2026 | Comments Off on An Era of Hybrid Collusion: A Threat Assessment of International Violent Non-State Actors (VNSAs) and State Actors to the United States

This report is not an official T2COM product. It was written by graduate student analysts as an independent assessment at…

OE Watch Issue 1 2026

By Kevin O'Connell | 01/14/2026 | Comments Off on OE Watch Issue 1 2026

China  Russia Assists China’s Military in Potential Taiwan Invasion  China Expands Economic Influence in Nicaragua  Political Purges, Information Security, and…

OE Watch Issue 9 2025

By Kevin O'Connell | 12/30/2025 | Comments Off on OE Watch Issue 9 2025

Articles in this release include: China China’s 82nd Group Army Brigade Enhances Red-Blue Training To Improve Combat Readiness Chinese Victory…

OE Watch Issue 8 2025

By Kevin O'Connell | 12/18/2025 | Comments Off on OE Watch Issue 8 2025

Articles in this release include:   China China’s Army Newspaper Stresses Loyalty to Political Party Chinese Exercise Featuring “Robot Wolves”…

FY 2025 Operational Environment Running Estimate

By Kevin O'Connell | 11/10/2025 | Comments Off on FY 2025 Operational Environment Running Estimate

T2COM, Directorate of Intelligence and Security (G-2), is producing this Fiscal Year 2025 (FY25) Operational Environment (OE) Running Estimate to…

Exploiter Series: Sociocultural Exploitation of Bangladesh

By Kevin O'Connell | 09/26/2025 | Comments Off on Exploiter Series: Sociocultural Exploitation of Bangladesh

This analysis, based on the Exploitable Conditions Framework (ECF), examines the systemic vulnerabilities in Bangladesh that allow state and non-state…