Complete Archive
Explore the complete archive of Irregular Threat products and articles created by T2COM G2, Partners, and Other Contributors.
This analysis, based on the Exploitable Conditions Framework (ECF), examines the systemic vulnerabilities in Bangladesh that allow state and non-state…
LEARN MORE  
The U.S. Army Training and Doctrine Command (TRADOC), Directorate of Intelligence and Security (G-2), is producing this Fiscal Year 2025…
LEARN MORE  
Articles in this release include: China China Conducts First Western Pacific Dual Aircraft Carrier Drill China Develops Capabilities for Anti-AI…
LEARN MORE  
CHINA China’s Drone Industry Projected To Reach $140 Billion by 2030 China expects to be the first nation to achieve…
LEARN MORE  
Iran Overview & The 12-Day War – discussing Iran’s recent history and lead up to war with Israel, potential U.S.…
LEARN MORE  
Ongoing conflicts show how subterranean infrastructure is capable of delaying enemy forces and allowing tenacious defense of urban areas, while…
LEARN MORE  
The OE Watch provides translated selections with background from a diverse range of foreign media that our analysts and expert…
LEARN MORE  
This infographic offers insights into Mexican Cartels EW and Cyber Capabilities. Mexican cartels are increasingly leveraging technology, including electromagnetic warfare…
LEARN MORE  
The OE Watch provides translated selections with background from a diverse range of foreign media that our analysts and expert…
LEARN MORE  
This Foreign Perspectives Brief contains an assessment of Indonesia’s counterterrorism efforts, highlighting the success of Densus 88 in reducing terrorist…
LEARN MORE