Feb. 2, 2025 How are Russia's military and security forces postured? Analyze the posture of Russia's military and security forces. (Russia Strategic Initiative (EUCOM))
Feb. 2, 2025 Russian Supply Chain Operations against the US/NATO How does Russia conduct supply chain operations against the US/NATO? Analyze Russia conduct supply chain operations against the US/NATO. (Russia Strategic Initiative)
Feb. 2, 2025 Deterrence in Era of Nuclear Proliferation How has increased nuclear proliferation affected the deterrence strategies and postures of the US and regional powers? (HAF A5SM)
Feb. 2, 2025 What is the Russian concept of use for space and counter-space operations? Analyze the Russian concept of use for space and counter-space operations. (Russia Strategic Initiative (EUCOM))
Feb. 2, 2025 Russian Views on Deterrence, Escalation Management & Conflict Termination What are the Russian views and theories of deterrence, escalation management, and conflict termination? (EUCOM - Russia Strategic Initiative)
Feb. 2, 2025 China's TTPs for cyber incidents What are CCP/PLA tactics, techniques, procedures, and standard operating procedures for military and civilian government responses to cyber incidents? How do CCP/PLA cyber teams cooperate with each other? (US Cyber Command)
Feb. 2, 2025 Directed Energy for De-escalating Conflicts How can directed energy be used for de-escalating conflict? What are some concepts of operations that meet demanding policy restrictions? (AFMC A9AQ)
Feb. 2, 2025 US Approach to Strategic Partnerships What are strategies that can be used to enhance the Department's approach to strategic security, economic, and technology partnerships in the Asia-Pacific region? (HAF A5SM)
Feb. 2, 2025 China's critical cyber vulnerabilities What are the critical cyber vulnerabilities and weaknesses of the CCP/PLA? What are critical weaknesses and vulnerabilities in Chinese military networks? (US Cyber Command)
Feb. 2, 2025 Chinese leadership tasking cyber-actors How does CCP/PLA senior leadership task the various cyber-actors: government and proxies? (US Cyber Command)