All Publications
Year
Results
Echoes of Little Bighorn: Insights for SOF Success
Leveraging Social Media Intelligence and Open-Source Intelligence for AI-Driven Predictive Analytics in Irregular Warfare
The Perils of Misconception: Why U.S. Strategy Misjudges the Nature of Proxy Resistance
Fading into the Background: From Risk Awareness to Technological Intuition
The Special Forces Identity Crisis and Rethinking All of Special Operations
Special Operations Forces Enterprise: Strategic Intelligence and Emerging Technology
From Guns for Hire to Military Doctrine: Russia’s Institutionalization of Influence in Africa—Implications and Recommendations for U.S. Special Operations Forces
The Emotionally Intelligent Leader: Applying the R.E.A.D. Technique in Military Leadership
Artificial Intelligence and Military Information Support Operations in Strategic Competition
Golden Dome: A Special Operations Forces Overview
Cognitive Warfare to Dominate and Redefine Adversary Realities: Implications for U.S. Special Operations Forces
Advancing the SOF Warrior Mind: Essays from the Academic Year 2025 JSOU Call for Special Operations Papers
Leveraging Contingent Capital as a Non-Traditional Discipline of Economic Warfare
Who Are the Green Berets Supposed to Be? Revisiting the Special Forces Identity Crisis
Biosensing Surveillance Technologies: A Quick Guide to Biological Operations Security
Resilience and Resistance: Interdisciplinary Lessons in Competition, Deterrence, and Irregular Warfare
Security Cooperation and Special Operations Forces: Training and Education Are Needed Now More than Ever
Special Operations Research Topics 2026
Mission or Meaning? Rethinking the Identity Crisis in U.S. Army Special Forces
Foreseeing Inroads to Instability: JNIM’s Expansion in West Africa
Tip of the Spear, Edge of the Mind: Neurotechnology’s Roles in the Future of Special Operations
Fertile Ground for Extremism: JNIM's Territorial Expansion from Mali into Burkina Faso Through a PMESII-PT Lens
Special Forces Does Not Have an Identity Crisis, SOF Has a Special Forces Identity Problem: A Response to Colonel Croot
Special Operations Forces Moral Injury Fact Sheet
Understanding Hybrid Warfare: Great Power Competition and Conflict in the New Era
SEEC and You Will Find: The Need for a SOF Enterprise Education Catalog
Reframing Homeland Defense: The Case for Restructuring an Outdated Security Construct
Developing a Special Operations Forces Multidimensional Ethics Scale
From Pirates to Power Plays: Geopolitical Strategies and Maritime Security in the Gulf of Guinea and Beyond
The Gulf of Guinea: A Primer
In Denied Areas: Lessons from the British Special Operations Executive and Jedburghs
The Northern Flank: The Arctic--Implications for SOF
Red Teaming: A Tool to Conduct Risk Assessment, Develop Critical Thinking, and Challenge SOF Strategic Planning Assumptions
Navigating the Transition: The Role of Purpose, Tribe, and Excitement for U.S. Special Operations Forces Veterans
SOF Effectiveness in Strategic Competition: Insights for West Africa and Beyond
Narrative Intelligence in Internet-Based Military Information Support Operations: A Cyberpsychology Perspective Under the Irregular Warfare Construct
There is an Identity Crisis in Special Forces: Who are the Green Berets Supposed to Be?
Russia's Syria Policy: From the Soviet Union to the Russian Federation
Unveiling Pervasive Patterns of Violence in West Africa
China and Russia in West Africa: A Tale of Two Powers and Their Quest for Dominance
The New Way of Limited Warfare: The Value of the Afghan Model of Warfare After the Fight Against ISIS
Counterintelligence Quick Look
Improving SOF Ethics Education
Competing for Advantage: The Chinese Communist Party, Statecraft, and Special Operations
Special Operations Research Topics 2024
The Fourth Age: The Future of Special Operations
Stress: New Approaches to Managing Stress
Stress: Understanding Its Mechanisms and Impacts
The Compound Era of U.S. Counterterrorism
Operating on the Margins: SOF in the Gray Zone
Moral Injury: Implications for U.S. SOF and Ethical Resiliency
SOF Quills for the Porcupine: Applying Lessons from Ukraine to Taiwan
Disruptive Technology in SOF-Peculiar Environments: Promises and Challenges in Development, Management, and Acquisition and Procurement
ArcticNEXT: Compound Security Threats in Strategic Competition
A Perilous Future: High-Intensity Conflict and the Implications for SOF
Special Operations Forces Transformation in the Future Operating Environment
The Fourth Age of SOF: The Use and Utility of Special Operations Forces in a New Age
Big Data for Generals... and Everyone Else over 40
Trained to Win? Evaluating Battlefield Effectiveness and Sociopolitical Factors among Partnered Forces
Barriers to Special Operations Forces-Led Counterterrorism Effectiveness
Muqtada al Sadr and Neo-Iraqi Nationalism: Implications and Opportunities
On Competition: Adapting to the Contemporary Strategic Environment
Special Operations Research Topics 2022
Cryptocurrency
Big Data Conflict Forecasting: Operationalizing the Data Science Team
Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF
Cyber Supply Chain Risk Management: Implications for the SOF Future Operating Environment
Artificial Intelligence (AI) Factsheet
Mazar-e Sharif: The First Victory of the 21st Century Against Terrorism
Cyber Fundamentals for SOF
The Blurred Battlefield: The Perplexing Conflation of Humanitarian and Criminal Law in Contemporary Conflicts
Intelligence Support to Special Operations
Iranian Proxy Groups in Iraq, Syria, and Yemen: A Principal-Agent Comparative Analysis
JSOU Press Sample Paper
Special Operations Forces Civil Affairs in Great Power Competition
Informal Governance as a Force Multiplier in Counterterrorism: Evidence for Burkina Faso
Special Operations Research Topics 2020 (Revised Edition for Academic Year 2021)
Special Operations Forces Interagency Reference Guide (Fourth Edition)
Resistance Operating Concept (ROC)
Village Stability Operations and the Evolution of SOF Command and Control in Afghanistan: Implications for the Future of Irregular Warfare
Decision-Making Considerations in Support to Resistance
Re-Evaluating Special Operations Forces-Led Counterterrorism Efforts
Strategic Communication
Ethics
Defense Institution Building ... by Design
How Civil Resistance Works (And Why It Matters to SOF)
Tickling the Dragon’s Tail: The Destabilizing Effects of an Irregular Warfare Critical Mass
Current Trends in Small Unmanned Aircraft Systems: Implications for U.S. Special Operations Forces
Information Age Proxy Warfare
Special Operations Research Topics 2020
Support to Resistance: Strategic Purpose and Effectiveness
Political Strategy in Unconventional Warfare: Opportunities Lost in Eastern Syria and Preparing for the Future
Exploitation of Big Data for Special Operations Forces
ISIS 2.0: South and Southeast Asia Opportunities and Vulnerabilities
Countering Transregional Terrorism
The Enemy is Us: How Allied and U.S. Strategy in Yemen Contributes to AQAP’s Survival
Special Operations Research Topics 2018 (Revised Edition for Academic Year 2019)
Complexity, Organizational Blinders, and the SOCOM Design Way
Growing SOLO: Expanding the Spectrum of SOF Advisory Capabilities
Structural Violence and Relative Deprivation: Precursors to Collective Political Violence in Sierra Leone
Resistance Views: Essays on Unconventional Warfare and Small State Resistance, Tartu Resistance Seminar
How Do SOF Contribute to Comprehensive Deterrence?
The Death of the Golden Hour and the Return of the Future Guerrilla Hospital
Transitioning from War to Peace: Post-Deployment Support for Special Operations Forces
Countering the Islamist Insurgency
Unconventional Warfare as a Strategic Force Multiplier: Task Force Viking in Northern Iraq, 2003
Special Operations Research Topics 2018
Special Operations Theory
Special Operations Contracting: 21st Century Approaches for Service and Technology Acquisition
Outside the Box: A New General Theory of Special Operations
Tunisia, Algeria, and Morocco: Change, Instability, and Continuity in the Maghreb
Preserving Sovereignty in a Borderless World
A Social Marketing Analysis for Suicide Prevention Initiatives in USSOCOM: A Framework for Future Research and Success
A Unified Theory for Special Operations
Enhancing the Global SOF Enterprise: A Consortium Concept
U.S. Special Operations Forces in a Period of Transition
Preventing Weapons of Mass Destruction Proliferation-Leveraging Special Operations Forces to Shape the Environment
The Geopolitics of Mediterranean Security: Assessing Regional Threats in Middle East and North Africa (MENA) in the Post–Arab Spring
SOF and a Theory of Modern Terrorism
Training Surrogate Forces in International Humanitarian Law: Lessons from Peru, Colombia, El Salvador, and Iraq
The Asia Pivot: Implications for U.S. Special Operations Forces
Military Innovation in War: It Takes a Learning Organization - A Case Study of Task Force 714 in Iraq
A Comprehensive and Proactive Approach to Unconventional Warfare
Unconventional Economics: Operational Economics in Unconventional Warfare
2016 Special Operations Essays
The War Within: A Look Inside al-Qaeda’s Undoing
Rethinking Special Operations Leadership: Process, Persuasion, Pre-existing, and Personality
SOF Role in Combating Transnational Organized Crime
Improving the Sustainment of SOF Distributed Operations in Access-Denied Environments
Special Operations Research Topics 2017
SOF Role in Combating Transnational Organized Crime (en Espanol)
The Collapse of Iraq and Syria: The End of the Colonial Construct in the Greater Levant
Sun Tzu and Machiavelli in Syria: Attacking Alliances
Maskirovka 2.0: Hybrid Threat, Hybrid Response
Countering Violent Extremism in Mali
Tactical Operations for Strategic Effect: The Challenge of Currency Conversion
The 2005 Iraqi Sunni Awakening: The Role of the Desert Protectors Program
Academic Year 2025 JSOU Call for Special Operations Papers Memorandum
Saudi Arabia: Modernity, Stability, and the Twenty-First Century Monarchy
2015 Special Operations Essays
Building Partner Capacity
Special Operations Research Topics 2016
Islam: Ideology and Conflict
Village Stability Operations and the Afghan Local Police
Challenges in the Asia-Pacific Theater for U.S. and Partner Nation Special Operations Forces
Counterinsurgency in Somalia: Lessons Learned from the African Union Mission in Somalia, 2007-2013
U.S. Military Deployments to Africa: Lessons from the Hunt for Joseph Kony and the Lord's Resistance Army
Persistent Engagement in Colombia
Partners or Competitors? The Evolution of the Department of Defense/Central Intelligence Agency Relationship since Desert Storm and its Prospects for the Future
Countering the al-Shabaab Insurgency in Somalia: Lessons for U.S. Special Operations Forces
Special Operations Research Topics 2015
Piracy: The Best Business Model Available
The Role of the Global SOF Network in a Resources Constrained Environment
The Nexus of Extremism and Trafficking: Scourge of the World or So Much Hype?
Security Force Assistance and Security Sector Reform
Hybrid Warfare
Smart Power and U.S. National Strategy
Retooling for the Future
21st Century SOF: Toward an American Theory of Special Operations
Special Operations Forces Interagency Counterterrorism Reference Manual, Third Edition
Special Operations Research Topics 2014
Irregular Warfare: The Maoist Challenge to India's Internal Security
Iran: Illusion, Reality, and Interests
Knowing Your Partner: The Evolution of Brazilian Special Operations Forces
2012 JSOU and NDIA SO/LIC Division Essays
Confronting the Terrorism of Boko Haram in Nigeria
Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations
"We Will Find a Way": Understanding the Legacy of Canadian Special Operations Forces
WHAM: Winning Hearts and Minds in Afghanistan and Elsewhere
USSOCOM Research Topics 2013
JSOU Report of Proceedings: The OSS Model and the Future SOF Warrior
Oman: The Present in the Context of a Fractured Past
Report of Proceedings- JSOU SOF-Power Workshop: A Way Forward for Special Operations Theory and Strategic Art
2011 JSOU and NDIA SO/LIC Division Essays
Special Operations Forces Interagency Counterterrorism Reference Manual, Second Edition
The Challenge of Nonterritorial and Virtual Conflicts: Rethinking Counterinsurgency and Counterterrorism
USSOCOM Research Topics 2012
Report of Proceedings- 6th Sovereign Challenge Conference: Borders and Security- Similarities, Differences, and Shared Affinities
Innovate or Die: Innovation and Technology for Special Operations
Terrorist-Insurgent Thinking and Joint Special Operational Planning Doctrine and Procedure
Convergence: Special Operations Forces and Civilian Law Enforcement
Hezbollah: Social Services as a Source of Power
2010 JSOU and NDIA SO/LIC Division Essays
Afghanistan, Counterinsurgency, and the Indirect Approach
Report of Proceedings- 5th Annual Sovereign Challenge Conference: Regional Issues, Global Implications
U.S. Military Engagement with Mexico: Uneasy Past and Challenging Future
USSOCOM Research Topics 2011
Hunter-Killer Teams: Attacking Enemy Safe Havens
Pakistan's Security Paradox: Countering and Fomenting Insurgencies
Report of Proceedings- JSOU & OSS Society Symposium: Irregular Warfare and the OSS Model
Irregular Warfare: Brazil's Fight Against Criminal Urban Guerrillas
Manhunting: Counter-Network Organization for Irregular Warfare
Information Warfare: Assuring Digital Intelligence Collection
Africa: Irregular Warfare on the Dark Continent
The Arabian Gulf and Security Policy: The Past as Present, the Present as Future
Special Operations Forces Interagency Counterterrorism Reference Manual, First Edition
Report of Proceedings- 4th Annual Sovereign Challenge Conference: Global Threats, Sovereign Solutions
Contemporary Security Challenges: Irregular Warfare and Indirect Approaches
Policing and Law Enforcement in COIN--the Thick Blue Line
USSOCOM Research Topics 2010
Guerrilla Counterintelligence: Insurgent Approaches to Neutralizing Adversary Intelligence Operations
Scoring the Long War
Keeping COIN Simple
What Really Happened in Northern Ireland's Counterinsurgency: Revision and Revelation
India's Northeast: The Frontier in Ferment
Disrupting Threat Finances: Using Financial Information to Disrupt Terrorist Organizations
USSOCOM Research Topics 2009
Is Leaving the Middle East a Viable Option?
Intelligence in Denied Areas: New Concepts for a Changing Security Environment
Private Security Infrastructure Abroad: Criminal-Terrorist Agendas and the Operational Environment
Block by Block: Civic Action in the Battle of Baghdad
A Theory of Special Operations: The Origins, Qualities, and Use of SOF
Hunting Leadership Targets in Counterinsurgency and Counterterrorism Operations: Selected Perspectives and Experience
Executive Report- JSOU Second Annual Symposium: Irregular Warfare
2007 JSOU and NDIA SO/LIC Division Essays
Psychological Operations: Learning is Not a Defense Science Project
The Israeli Approach to Irregular Warfare and Implications for the United States
Educating for Strategic Thinking in the SOF Community: Considerations and a Proposal
Filling Special Operations Gaps with Civilian Expertise
Beyond Draining the Swamp: Urban Development and Counterterrorism in Morocco
Special Operations Aviation in NATO: A Vector to the Future
2006 JSOU/NDIA SO/LIC Chapter Essays
One Valley at a Time
Blogs and Military Information Strategy
Executive Report- JSOU First Annual Symposium: Countering Global Insurgency
Narcoterrorism in Latin America: A Brazilian Perspective
Implications for Network-Centric Warfare
Civil-Military Operations and Professional Military Education
The Changing Nature of Warfare, the Factors Mediating Future Conflict, and Implications for SOF
The War on Terrorism: Countering Global Insurgency in the 21st Century
Coast Guard SOF
Dividing Our Enemies
Logistic Support and Insurgency: Guerrilla Sustainment and Applied Lessons of Soviet Insurgent Warfare: Why It Should Still Be Studied
Theoretical Perspectives of Terrorist Enemies as Networks
Operationalizing COIN
The Evolving Requirements of the Canadian Special Operations Forces: Future Concept Paper
Russian Special Forces: Issues of Loyalty, Corruption and the Fight Against Terror
2004-2005 JSOU/NDIA Essays
JSOU Press House Style Guide
JSOU Press Author Submission and Publication Process
JSOU Press Peer Review Process
JSOU Press Manuscript Submission Format Guidance
JSOU Press Product Definitions, Purposes, and Parameters
DoD Dictionary
AY2026 JSOU Call for Special Operations Papers Memorandum
Force Multiplier: Utilization of SOF from a Small State Perspective
Threat and SOF/Special Operations Response
Classification and Public Release Review Memorandum
ARTIFICIAL INTELLIGENCE (AI) POLICY
JSOU copyright and plagiarism guidance protects original and creative works, both published and unpublished, which have been fixed in tangible medium. It is unacceptable to submit generative AI as one’s own work. Anyone submitting a paper for JSOU Press publication consideration, including JSOU students, faculty, and staff, MUST disclose use of generative AI in their work, including text generation and image generation, and cite it properly. An AI tool (e.g., ChatGPT, Gemini, CoPilot) is not considered an author but rather a source and should be cited as such. Authors should verify AI output with credible sources and cite those sources, not the generative AI. Failure to properly attribute the use of generative AI is considered plagiarism.