Complete Archive
This template outlines a potential threat scenario involving a China’s People’s Liberation Army heavy infantry company employing a positional defense…
LEARN MORE  
China employs warfighting approaches centered on achieving information dominance, disaggregating the U.S. Joint Force, and exploiting strengths in sense, strike,…
LEARN MORE  
T2COM, Directorate of Intelligence and Security (G-2), is producing this Fiscal Year 2025 (FY25) Operational Environment (OE) Running Estimate to…
LEARN MORE  
This paper is the first in a series that builds upon the work presented in T2COM Pamphlet 525-92, The Operational…
LEARN MORE  
This analysis, based on the Exploitable Conditions Framework (ECF), examines the systemic vulnerabilities in Bangladesh that allow state and non-state…
LEARN MORE  
This analysis examines China’s growing influence in the Southwest Pacific and New Zealand’s strategy to counter it, offering valuable insights…
LEARN MORE  
This template outlines a potential threat scenario involving a China’s People’s Liberation Army heavy infantry company attacking a fortified enemy…
LEARN MORE  
This threat template details the anticipated tactics of a Chinese PLA heavy combined arms battalion attacking a fortified enemy position,…
LEARN MORE  
This analysis examines the significant development of North Korea’s deployment of combat forces to Russia in support of the Ukraine…
LEARN MORE  
This threat template details the expected tactics of a People’s Liberation Army (PLA) heavy combined arms brigade attacking a fortified…
LEARN MORE