Complete Archive
T2COM, Directorate of Intelligence and Security (G-2), is producing this Fiscal Year 2025 (FY25) Operational Environment (OE) Running Estimate to…
LEARN MORE  
This paper is the first in a series that builds upon the work presented in T2COM Pamphlet 525-92, The Operational…
LEARN MORE  
This analysis, based on the Exploitable Conditions Framework (ECF), examines the systemic vulnerabilities in Bangladesh that allow state and non-state…
LEARN MORE  
This analysis examines China’s growing influence in the Southwest Pacific and New Zealand’s strategy to counter it, offering valuable insights…
LEARN MORE  
This template outlines a potential threat scenario involving a China’s People’s Liberation Army heavy infantry company attacking a fortified enemy…
LEARN MORE  
This threat template details the anticipated tactics of a Chinese PLA heavy combined arms battalion attacking a fortified enemy position,…
LEARN MORE  
This analysis examines the significant development of North Korea’s deployment of combat forces to Russia in support of the Ukraine…
LEARN MORE  
This threat template details the expected tactics of a People’s Liberation Army (PLA) heavy combined arms brigade attacking a fortified…
LEARN MORE  
Articles in this release include: China China Conducts First Western Pacific Dual Aircraft Carrier Drill China Develops Capabilities for Anti-AI…
LEARN MORE  
China’s PLA Accelerates Modernization, Learning from Ukraine The People’s Liberation Army (PLA) is rapidly modernizing, leveraging insights from the Russia-Ukraine…
LEARN MORE