mobileLogo logo
logo logo
  • TDHJ
  • Special Editions
  • Podcast
  • Submit
  • Donate
  • About
    • Editorial Office
    • Peer Board
    • Contact
    • Partners
  • Languages
    • German
    • English

English Articles

Source: shutterstock.com/Alexandros Michailidis
Articles

La Manoeuvre In Diplomacy And Defence

Read More
Source: shutterstock.com/Solor4260
Articles

Manoeuvre Warfare: A Self-Inflicted Lack Of Common Understanding

Read More
Source: shutterstock.com/Pixel Shot
Articles

Japan’s Place In Moderating The U.S.-China Strategic Competition In The Indo-Pacific

Read More
Source: shutterstock.com/Shutterstock AI
Articles

A Shift Of The Collective Security Architecture In West Africa

Read More
Source: shutterstock.com/Sandra Sanders
Articles

Human Rights, Counter-Terrorism, And Violent Extremism, And The Uyghur Minority In Xinjiang

Read More
Source: shutterstock.com/TSViPhoto
Articles

Unravelling Warfare In The Age Of AI

Read More
Source: shutterstock.com/Ali _Cobanoglu
Articles

The F-16’s Limited Impact On Russia’s War In Ukraine

Read More
Source: shutterstock.com/Fly Of Swallow Studio
Articles

Pakistan’s Nuclear Datum Point

Read More
Source: shutterstock.com/Gorodenkoff
Articles

AI Integration And Revolutionising Aerospace

Read More
Source: shutterstock.com/esfera
Articles

U.S. And West Asia: An Enduring Obsession

Read More
Source: shutterstock.com/Mohammed al-wafi
Articles

Decoding Houthi Hypersonic Missile Attack Claims On MSC Sarah V In The Arabian Sea

Read More
Source: shutterstock.com/Fly of Swallow Studio
Articles

The Wagner Group And Russian Foreign Policy Objectives in Sub-Saharan Africa

Read More

Posts navigation

1...456...28

Categories

  • selected covers of TDHJ Special Edition issues
    Special Editions
  • a network of computer chips in blue lighting illustrates cognitive warfare
    Cognitive Warfare
  • photo of a Russian radar station in snowy conditions
    Russia
  • map of the Middle East as an example of geopolitics
    Geopolitics
  • many screens and lines of code exemplify Cyber Warfare
    Cyber

Languages

  • blank
    blank
    blank

Sign Up For Our Newsletter

Get the content you need, just when you need it

/* real people should not fill this in and expect good things - do not remove this or risk form bot signups */


Intuit Mailchimp

Sign me up!

logo logo

Imprint | Privacy Policy | TDHJ © 2024

logo logo

✕
  • TDHJ
  • Special Editions
  • Podcast
  • Submit
  • Donate
  • About
    • Editorial Office
    • Peer Board
    • Contact
    • Partners
  • Languages
    • German
    • English