Countering Threats and Challenges
Expertise
Divisions
Special Programs
Centers
- Critical Incident Analysis
- Data Management Analytics
- Emergency Management and Operations
- Enterprise Systems Modernization
- Homeland Security and Infrastructure Resilience
- Justice Research and Innovation
- Military Advisory Board
- Public Health Preparedness and Resilience
- Vulnerable Population Protection

Maritime Sabotage: Lessons Learned and Implications for Strategic Competition

The Psychology of (Dis)information: A Primer on Key Psychological Mechanisms

Learning from the Past: US Domestic Counterterrorism from 1970 to 1985
The U.S. Departs Afghanistan
September 11, 2021

6 Ways the U.S. Can Counter Extremist Groups in the COVID-19 Era

Why Pandemics Are National Security Threats
Viral Extremism

To Counter Domestic Extremism, Avoid Extremism
No Risk Free Option in Afghanistan

Viral Extremism: COVID-19, Nontraditional Threats, and US Counterterrorism Policy
Analysis in Combat: The Legacy of Desert Storm

Understanding Gender and Violent Extremism
Analysis in Combat: Operation Desert Saber
Analysis in Combat: First to the Front
Analysis in Combat: Desert Storm at Sea
Analysis in Combat: The Story of Desert Storm
The Congo Crisis: The Assassination of Patrice Lumumba

Why Are Special Operations Ever Conducted?
The Mujahideen: From Allies To Menace
Apartheid in South Africa: Project Coast

Why Special Operations? A Risk-Based Theory

Social Media Bots: Implications for Special Operations Forces

Social Media Bots: Laws, Regulations, and Platform Policies
Setting the Night on Fire: Right-Wing Terrorism in the U.S.