Complete Archive
Explore the complete archive of Irregular Threat products and articles created by T2COM G2, Partners, and Other Contributors.
Understanding Sociocultural Exploitation: How Internal Vulnerabilities Allow for External Influence While this country remains one of East Africa’s most influential…
KEY TAKEAWAYS • Pro-Russia sentiment has become widespread in northern Nigeria, as evidenced by the August 2024 #EndBadGovernance movement. The…
T2COM, along with other security partners, faces elevated Homeland threats following recent hostilities between the United States, Israel, and Iran.…
China China Steps Up Claims of Quantum Radar Production China Shows Footage of ASN-301 Loitering Munitions System Chinese Policy Paper…
This report is not an official T2COM product. It was written by graduate student analysts as an independent assessment at…
China Russia Assists China’s Military in Potential Taiwan Invasion China Expands Economic Influence in Nicaragua Political Purges, Information Security, and…
Articles in this release include: China China’s 82nd Group Army Brigade Enhances Red-Blue Training To Improve Combat Readiness Chinese Victory…
Articles in this release include: China China’s Army Newspaper Stresses Loyalty to Political Party Chinese Exercise Featuring “Robot Wolves”…
T2COM, Directorate of Intelligence and Security (G-2), is producing this Fiscal Year 2025 (FY25) Operational Environment (OE) Running Estimate to…
This analysis, based on the Exploitable Conditions Framework (ECF), examines the systemic vulnerabilities in Bangladesh that allow state and non-state…
