top of page


Dive headfirst into the strategic vortex of global insurgency with our freshly minted 'Strategy Reports'. This compact, yet enlightening section of our database explores and dissects the military strategies employed by insurgent groups worldwide.

Offering a unique lens to appreciate the underpinnings of political struggles, 'Strategy Reports' is your gateway to understanding the delicate dance between tactics, resistance, and the ceaseless drumbeat of rebellion.

Table of Contents




Exploring the intricate world of assassinations, this report delves into the historical context, strategic implications, and technical aspects of targeted killings. From renowned cases by insurgent groups like the LTTE and ETA to recent high-profile individual assassinations, the report examines the purpose, methods, and countermeasures associated with assassinations.

Discover the motivations behind this tactic, the impact on societies, and the ongoing challenges in protecting prominent figures. Uncover the complexities of assassinations and gain insights into the ever-evolving strategies used by insurgent groups seeking to achieve political, military, and ideological objectives.


Human shields have served as one of the most controversial tactics in modern conflicts, particularly used by Jihadi terror and insurgent groups. Human shields involve the strategic placement of civilians to shield military targets from attacks. This tactic creates a complex dilemma for counterinsurgency forces, as attacking the shielded military objective risks causing civilian casualties and violating international law, while refraining from attacking may allow the enemy to operate with impunity.

This issue of our Strategy Reports explores the legal and ethical issues surrounding human shields, and it mentions the concept of "lawfare", whereby insurgents exploit the legal constraints of counterinsurgency forces to their advantage.




This article explores the emergence of 3D printed weapons as a disruptive force in modern warfare and insurgencies. With advancements in consumer-grade 3D printers, reduced production costs, and widespread distribution of blueprints, these weapons have proliferated in different areas, ranging from warzones to households.

In this piece, we examine notable cases of 3D printed firearms, such as their use by armed student and ethnic organisations in Myanmar and paramilitary groups in Northern Ireland. We highlight the challenges faced by state actors in countering this threat and the potential implications for future conflicts.


Suicide bombings involve individuals willingly sacrificing their lives to inflict destruction and loss, driven by political, religious, or ideological motives. Examining notable cases like Hezbollah's 1983 attacks, as well as Al-Qaeda's 9/11, underscores the strategy's potency. Suicide bombing campaigns serve dual purposes: strategic, aimed at expelling occupiers and destabilising regimes; and organisational, shifting conflict dynamics by leveraging self-sacrifice to defy military inferiority.

Ultimately, comprehending the multifaceted nature of suicide bombing is crucial to understanding its impact and shaping effective responses within insurgent conflicts.

Copy of Untitled.jpg

Recoilless weapons are direct-fire support weapons that mitigate excessive recoil by expelling propellant gasses or another counter mass from the rear, balancing the forward momentum of the projectile. They are commonly used by armed forces, insurgent groups, and non-state actors due to their portability, versatility, and effectiveness in conflict zones. These weapons are especially prevalent in the Middle East and Africa, and have been used against armored vehicles, enemy infantry, and fortified positions with various tactics and munitions

This article takes a deep dive into the history and the gradual integration of these weapons within arsenals of global insurgencies and militaries.

SR Graphics Sketches.jpg

Anti-Tank Guided Missiles (ATGMs) are precision-guided munitions designed for targeting and neutralizing armored vehicles, including tanks. They play a critical role in modern warfare by providing infantry and light units the capability to engage and destroy heavily armored threats from a distance, often with top-attack profiles that exploit the weaker armor on the top of vehicles. Their use has proliferated across various conflict zones, significantly influencing the dynamics of ground combat by enhancing the lethality and strategic flexibility of non-armored forces.




This incredible report provides an overview of the evolution and tactics of snipers in modern warfare, with a focus on their use by insurgent groups. By continuously incorporating OSINT, we examine three levels of insurgent snipers, their objectives, and the psychological effects of their attacks. Evidently, we link these levels to real insurgencies and real organised movements around the world.

The technical analysis includes a breakdown of the capabilities and strategies employed by each level of insurgent snipers. The article concludes by outlining countermeasures used by conventional militaries to detect and neutralize snipers.

BioT Graphic.jpg

Bioterrorism is a strategy involving the deliberate release of harmful biological agents to create fear and chaos within populations. Historical instances include the 2001 US anthrax attacks and the 1984 Rajneeshee bioterror attack in Oregon.

The primary purpose of bioterrorism is to instill widespread fear and instability. Unlike conventional terrorism, it exploits the characteristics of biological agents, such as delayed symptom onset, making detection and response challenging. Countermeasures include vaccination programs, surveillance, and intelligence efforts, but budget constraints can hinder these responses, leaving populations vulnerable to bioterror threats.

Tunnel Warfare Graphic.jpg

Tunnel warfare has seen a resurgence in recent times, notably with the Hamas attack on October 7th 2023. Tunnels vary from sophisticated structures to simple hand-dug passageways and are used for diverse purposes like smuggling, storing supplies, and military offensives. Historically, extensive tunnel networks were used in the Vietnam War and Afghanistan, facilitating stealth movements and surprise attacks.

These tunnels offer strategic advantages in movement, storage, and communication while minimizing detection risk. However, combat in tunnels is fraught with dangers like limited visibility, structural hazards, and environmental risks. 

bottom of page