mobileLogo logo
logo logo
  • TDHJ
  • Special Editions
  • Podcast
  • Submit
  • Donate
  • About
    • Editorial Office
    • Peer Board
    • Contact
    • Partners
  • Languages
    • German
    • English

English Articles

Source: shutterstock.com/Pixel Shot
Articles

Japan’s Place In Moderating The U.S.-China Strategic Competition In The Indo-Pacific

Read More
Source: shutterstock.com/Shutterstock AI
Articles

A Shift Of The Collective Security Architecture In West Africa

Read More
Source: shutterstock.com/Sandra Sanders
Articles

Human Rights, Counter-Terrorism, And Violent Extremism, And The Uyghur Minority In Xinjiang

Read More
Source: shutterstock.com/TSViPhoto
Articles

Unravelling Warfare In The Age Of AI

Read More
Source: shutterstock.com/Ali _Cobanoglu
Articles

The F-16’s Limited Impact On Russia’s War In Ukraine

Read More
Source: shutterstock.com/Fly Of Swallow Studio
Articles

Pakistan’s Nuclear Datum Point

Read More
Source: shutterstock.com/Gorodenkoff
Articles

AI Integration And Revolutionising Aerospace

Read More
Source: shutterstock.com/esfera
Articles

U.S. And West Asia: An Enduring Obsession

Read More
Source: shutterstock.com/Mohammed al-wafi
Articles

Decoding Houthi Hypersonic Missile Attack Claims On MSC Sarah V In The Arabian Sea

Read More
Source: shutterstock.com/Fly of Swallow Studio
Articles

The Wagner Group And Russian Foreign Policy Objectives in Sub-Saharan Africa

Read More
Source: shutterstock.com/Elnur
Articles

How The Public Was Misled By The Promoters Of Pyramid Schemes

Read More
Source: shutterstock.com/Longfin Media
Articles

Resilient Diplomacy Against The Populist Capture

Read More

Posts navigation

1...678...29
blank

Categories

  • selected covers of TDHJ Special Edition issues
    Special Editions
  • a network of computer chips in blue lighting illustrates cognitive warfare
    Cognitive Warfare
  • photo of a Russian radar station in snowy conditions
    Russia
  • map of the Middle East as an example of geopolitics
    Geopolitics
  • many screens and lines of code exemplify Cyber Warfare
    Cyber

Languages

  • blank
    blank
    blank

Sign Up For Our Newsletter

Get the content you need, just when you need it

/* real people should not fill this in and expect good things - do not remove this or risk form bot signups */


Intuit Mailchimp

Sign me up!

Recent Posts

  • The Ultimate Human-Machine Fusion?
  • Unfolding the Rationale Behind Suicide Terrorism as a Weapon of Choice
  • Additive Manufacturing: A Key Enabler Of Low-Cost Modern Warfare
  • Describing The Security Cooperation Dilemma
  • From An Engineering Perspective: Small Drones Affecting The Course Of Warfare

Recent Comments

No comments to show.
logo logo

Imprint | Privacy Policy | TDHJ © 2024

logo logo

✕
  • TDHJ
  • Special Editions
  • Podcast
  • Submit
  • Donate
  • About
    • Editorial Office
    • Peer Board
    • Contact
    • Partners
  • Languages
    • German
    • English