0. Where War Actually Lives Now
Classical formula:
Current reality is messier:
- Politics itself has been absorbed into code, finance, media, and law.
- States, corporations, NGOs, protocols, and AI systems all exert power.
- War becomes the adversarial shaping of reality conditions:
- What money is.
- What law is.
- What counts as “truth.”
- Who eats, who works, who speaks, who is seen.
Three layers are always entangled:
- Material layer – energy, logistics, bodies, land, seas, orbits, hardware, cities.
- Institutional/operational layer – states, firms, NGOs, protocols, armies, sanctions, laws, police, militias.
- Symbolic/ontological layer – narratives, myths, legitimacy, identity, models, “science,” religion.
Instead of a clean binary, we have:
- Synthetic Stack – AI + bureaucracy + finance + media + law, oriented toward centralized prediction and control.
- Sovereign Stack – voluntary, decentralized, Bitcoin-native and FOSS-aligned infrastructures, oriented toward autonomy and local resilience.
- Hybrid reality – most real actors are mixtures; they use pieces of both stacks, are pulled by both, and are infiltrated by both.
War now is not a switch that flips “on” occasionally. It is a permanent, low-to-high-intensity contest over:
- Orientation (what people think is happening).
- Dependency (who they rely on for survival).
- Legitimacy (who they believe ought to rule or set norms).
The classical canon is not obsolete; it’s a codebase we refactor into this environment.
1. Classical Grammar of Conflict
1.1 Sun Tzu – Formlessness, Cost, Terrain
Core moves:
- Win before fighting – configure situation so that battle is unnecessary or trivial.
- Attack plans, alliances, and mind, not just armies.
- Formlessness – avoid presenting a stable, predictable target.
- War cost – prolonged campaigns destroy the attacker’s own strength and legitimacy.
Now:
- “Winning before fighting” means shaping infrastructure, finance, regulation, and narratives so that direct repression is:
- Too expensive.
- Too obviously unjust.
- Too likely to backfire.
- “Formlessness” becomes anti-model behavior:
- Organizational forms that are modular, redundant, and locally adapted.
- No single doctrine, leader, platform, or jurisdiction whose loss breaks the system.
- “Cost” becomes:
- For Synthetic actors: forcing them into expensive surveillance, policing, and narrative management.
- For Sovereign actors: avoiding vanity conflicts that drain scarce time, money, and emotional capital.
Sun Tzu’s terrain (difficult ground, focal ground, etc.) maps to:
- Regulatory terrain – favorable/unfavorable jurisdictions, gray zones, loopholes.
- Financial terrain – chokepoints like KYC gates, settlement rails, exchanges.
- Information terrain – platforms, protocols, search indices, local gossip networks.
Whoever understands and shapes these terrains best is “winning before fighting.”
1.2 Thucydides – Fear, Interest, Honor, and Traps
Thucydides decodes why the Peloponnesian War happened and how it ate its participants:
- Fear – Sparta’s fear of rising Athenian power.
- Interest – control over tribute, trade routes, strategic cities.
- Honor – prestige, status, mythic self-image (“we are the saviors of Greece”).
He also records:
- “Thucydides Trap” – dynamics where a rising power and a ruling power slide toward war.
- Civil war (stasis) – language and morality inverted; cruelty called courage, moderation called cowardice.
- Catastrophe accelerated by plague and crisis, exposing real character.
Now:
- Ruling powers fear the erosion of reality authority—their power to define money, truth, and law.
- Rising “powers” can be:
- States.
- Corporate-technocratic coalitions.
- Decentralized, Bitcoin-based and localist movements.
- Trap logic applies between:
- Large states vs large states.
- Synthetic Stack vs emergent Sovereign networks.
- Even between different Synthetic blocs.
Thucydides warns:
- Fear + prestige + misperception create self-fulfilling escalations.
- Crises (pandemics, financial shocks, climate events) accelerate moral inversion and empower emergency measures.
Understanding this trap logic is essential to not triggering catastrophic escalations or walking into them.
1.3 Carl von Clausewitz – Trinity, Friction, Center of Gravity
Clausewitz gives the deepest grammar of war as a human, political chaos:
- War = politics by other means – war always serves some political purpose, whether stated or hidden.
- Paradoxical Trinity:
- People – passion, hatred, emotion.
- Military – chance, friction, creativity.
- Government – reason, policy, calculation.
- Friction – everything that can go wrong between plan and execution.
- Fog of war – incomplete, conflicting information.
- Center of gravity (COG) – main source of strength that holds the enemy’s system together.
- Defense > offense – the defensive is inherently stronger; offense hits a culminating point beyond which it weakens itself.
Now:
- Synthetic Trinity:
- “People” – mass sentiment modulated by media and algorithms.
- “Military” – security services, intel, corporate security, cyber units.
- “Government” – state–corporate–AI policy core, rule-writing entities.
- Sovereign Trinity:
- People – individuals and communities committed to autonomy.
- “Military” – everything from legal defense funds to physical security and hardening of infrastructure.
- “Government” – voluntary law, contracts, protocols, codices.
Likely modern centers of gravity:
- Legitimacy of institutions, currencies, and narratives.
- Monetary spine – fiat systems vs Bitcoin-based and local systems.
- Infrastructure control – grids, chips, networks, satellites, cloud platforms.
- Perceived inevitability – belief that “this system has no alternative.”
Clausewitz’s emphasis on the strength of defense matters:
- A well-designed Sovereign Stack is defense-dominant:
- Hard to kill.
- Cheap to sustain.
- Costly to attack.
- Offensive moves in symbols, finance, and narrative must watch for the culminating point:
- Overextension, moral overreach, or provocation that summons disproportionate response.
1.4 Antoine-Henri Jomini – Geometry and Algorithmic Governance
Jomini tried to turn war into an almost algebraic system:
- Identify key points (capitals, fortresses) and lines (roads, rivers).
- Operate on interior lines, moving forces quickly between fronts.
- Mass superior force at decisive points.
Modern translation:
- “Key points and lines” → critical nodes and edges in:
- Financial networks (correspondent banks, clearinghouses).
- Communication (subsea cables, IXPs, DNS roots).
- Logistics (ports, rail hubs, industrial clusters).
- “Interior lines” → high-speed coordination through law, regulation, automation, AI inside large institutions.
Jomini’s mindset:
- Clean.
- Rule-based.
- Predictable.
It maps almost directly onto algorithmic governance and compliance systems. That’s powerful but brittle:
- Effective for routine management and simple crises.
- Vulnerable to non-linear, ambiguous, and culturally complex environments Clausewitz worried about.
Held lightly, Jomini gives us a useful map of chokepoints. Treated as gospel, he becomes Synthetic logic—vulnerable to irregular, symbolic, and cultural maneuvers.
1.5 Alfred Thayer Mahan – Sea Power to Infrastructure Power
Mahan’s thesis:
- Control of sea lanes = control of global commerce = major power.
- Requires:
- Blue-water fleets.
- Ports and coaling stations.
- Merchant marine and industrial base.
Modern generalization:
- Sea lanes → global supply chains (shipping lanes, key canals and straits, rail corridors, air routes).
- Ports and coaling stations → logistics hubs, data centers, IXPs, mining farms, satellite ground stations.
- Merchant marine → global shipping firms, telecoms, cloud providers, financial pipes.
Two roles of “sea power”:
- Protect own flows – ensure your goods, data, payments, and energy move.
- Deny enemy flows – sanctions, export controls, shipping interdiction, data blackouts.
For a Sovereign Stack, infrastructure power means:
- Distributed, resilient energy sources (local generation, diversified supplies).
- Compute sovereignty (hardware supply, secure chips, open designs).
- Redundant communication paths (mesh, multiple ISPs, satellite links).
- Trade and settlement channels (Bitcoin, local trade networks) that are not entirely at the mercy of a single empire’s infrastructure.
Without that material spine, ontological war collapses into empty rhetoric.
2. Material Spine: Logistics, Economy, Demography, Environment
Strategy that ignores logistics is fantasy.
2.1 Logistics and Economy
Key categories:
- Energy – oil, gas, hydro, solar, wind, nuclear; access and control.
- Production – agriculture, industry, fabrication, repair.
- Supply chains – ports, warehouses, trucking, rail, containers, customs.
- Hardware & compute – chip fabs, foundries, servers, device supply, firmware and hardware integrity.
Economic warfare and logistics are fused:
- Sanctions, embargoes, asset freezes, export bans = attacks on logistics and productive capacity.
- Debt, inflation, and monetary policy shape who can invest in resilient infrastructure or who is kept perpetually dependent.
2.2 Demography and Environment
Demographic structure:
- Youth bulges – high risk of unrest, recruitment to armed groups.
- Aging societies – high dependency ratios, risk aversion, fiscal stress.
- Migration – pressure on systems, propaganda fodder, demographic bargaining chips.
Environment:
- Droughts, floods, storms, fires, water scarcity.
- These provoke:
- Food insecurity.
- Displacement.
- State failures.
- Opportunities for both Synthetic and Sovereign actors to claim protector status.
Any doctrine that ignores demography and environment misreads what war is fought over and where people will actually move and align.
2.3 Logistics ↔ Legitimacy
This is why:
- States obsess over stability and basic services.
- Insurgencies and sovereign initiatives must provide at least minimal security and basic needs, or their narrative power is hollow.
Logistics isn’t just a technical problem; it’s a legitimacy engine.
3. Maneuver vs Attrition in Three Domains
3.1 Attrition – Grinding Capacity
Attrition:
- Destroy enemy capacity faster than they can regenerate it.
- Classic measures:
- Casualties.
- Equipment losses.
- Territory, factories, infrastructure destroyed.
Now attrition also applies to:
- Economic capacity – sanctions, capital flight, inflation.
- Attention – overloading populations into apathy or hysteria.
- Legitimacy – scandals, hypocrisy, corruption eroding trust step by step.
Attrition is still very real, but:
- Expensive.
- Slow.
- Dangerous in a nuclear world.
- Politically and morally exhausting.
3.2 Maneuver – Collapsing Orientation
Maneuver seeks systemic dislocation, not just body counts.
B. H. Liddell Hart’s “indirect approach”:
- Attack enemy plans, not just positions.
- Threaten what they must defend, force them to react, exhaust them mentally.
John Boyd’s OODA loop:
- Observe
- Orient
- Decide
- Act
Victory goes to whoever:
- Cycles this loop faster and more accurately, and
- Corrupts the opponent’s orientation.
Boyd distinguishes:
- Physical level – kinetic moves.
- Mental level – perception, understanding, options.
- Moral level – legitimacy, trust, cohesion.
He insists the moral level is highest: lose that, and physical wins collapse into long-term defeat.
In our setting:
- Physical maneuver: mobility, dispersion, infrastructural repositioning.
- Economic maneuver: shifting flows, suppliers, and jurisdictions faster than regulators and adversaries adjust.
- Cognitive maneuver: exposing contradictions, forcing overreactions, revealing truth in ways that undermine Synthetic legitimacy.
3.3 Combined Logic
Real campaigns are:
- Maneuver to open favorable positions.
- Focused attrition where it counts (critical assets, attention, credibility).
- Protection of your own moral and logistical base.
The Sovereign Stack must accept some attrition (lost platforms, accounts, reputations) while prioritizing maneuver in orientation and infrastructure.
4. Irregular Conflict and Guerrilla Logic
Irregular war is about asymmetry:
- One side: more money, institutions, firepower, information dominance.
- Other side: better adaptation, local knowledge, time, and often deeper cause.
4.1 David Galula and David Kilcullen – Population as Center of Gravity
Galula: in insurgency, the population is the main center of gravity.
Questions:
- Who protects them?
- Who resolves disputes fairly?
- Who gives them a future?
- Who seems inevitable?
Kilcullen:
- Insurgencies as complex adaptive networks, not just hierarchies.
- Many fighters are “accidental guerrillas,” pushed into conflict by foreign interventions and ham-fisted repression.
- Local grievances + global narratives + digital coordination = powerful mix.
In our environment:
- Population = dependency network + identity + memory:
- Who people rely on daily.
- What group they feel part of.
- How past trauma is framed (betrayals, losses, humiliations).
Any Sovereign project that ignores trauma, everyday needs, and identity will be irrelevant.
4.2 Guerrilla Patterns and Ethical Red Lines
Classical guerrilla patterns (in abstraction):
- Long war, not quick victory.
- “Swimming among the people” as a protective environment.
- Political work (education, organization) as central, not ancillary.
These patterns can be:
- Used by decentralized movements seeking autonomy.
- Corrupted into terrorism when civilians are primary targets and fear is the main instrument.
Targeting civilians as a deliberate strategy is rejected. Initiating violence for political ends violates non-aggression and voluntaryism. Kinetic force, if ever used, is strictly defensive, against immediate unjust aggression, in proportion, and as a last resort.
Irregular logic for a Sovereign Stack is:
- Resilience, not revolution.
- Parallel provision, not coercive takeover.
- Protected spaces, not campaigns of terror.
4.3 Human Factor: Trauma, Burnout, Limits
Irregular conflict corrodes:
- Psyches: PTSD, paranoia, numbness.
- Communities: distrust, factionalism, revenge cycles.
- Movements: burnout, dogmatism, internal purges.
If the Sovereign Stack doesn’t:
- Account for human limits and need for rest, beauty, and ordinary life.
- Provide rituals and practices for healing and reconciliation.
…then its own people will break long before Synthetic structures do.
War must be bounded, not glorified as an identity.
5. William Lind and 4GW / Hybrid / Cognitive Conflict
Lind’s Fourth Generation Warfare (4GW):
- State loses near-monopoly on organized violence.
- Non-state actors, ideologies, and networks become main protagonists.
- Battle lines blur:
- War/peace.
- Soldier/civilian.
- Domestic/foreign.
Features:
- Decentralized, networked enemies.
- Legitimacy and narrative central.
- Cultural and religious dimensions prominent.
Hybrid war extends:
- Simultaneous use of:
- Conventional force.
- Irregular units and militias.
- Economic and financial pressure.
- Cyber attack.
- Lawfare.
- Information and psychological operations.
Cognitive / “fifth-generation” layers:
- Target: individual minds.
- Tools:
- Personalized feeds, recommended content.
- Deepfakes, synthetic media.
- Behavioral nudging.
- Gamified engagement.
Synthetic actors are heavily invested in this spectrum:
- Managing perception to preempt resistance.
- Using law, finance, and media to keep conflict “below the threshold” of conventional war but constant.
Sovereign actors must recognize:
- They are treated as 4GW-type actors by states and corporations.
- They must not internalize the nihilistic or terroristic playbook often associated with 4GW.
- Their power will come from legitimacy, service, and moral coherence, not from destructive spectacle.
6. Psyops, Memetics, and Ontological Armor
Psychological operations:
- Aim: influence emotions, beliefs, and behavior of target audiences.
- Tools:
- Framing and language choice.
- Selective revelation and omission.
- Credible messengers.
- Rumors, leaks, staged events.
- Memes and story arcs (threat → conflict → resolution).
At Synthetic scale:
- Psyops become ambient environment design:
- Feeds tuned to emotional states.
- News cycles engineered for desired sentiments.
- Narratives of “safety,” “responsibility,” and “progress” used to justify control.
The ethical fault line:
- Using these tools to inform, warn, and build agency is one thing.
- Using them to deceive and coerce—even for a “good cause”—puts the operator back inside Synthetic logic.
For a Sovereign Stack:
- Truth and voluntary consent are structural constraints, not branding.
- Propaganda that knowingly distorts reality corrodes signal integrity and moral authority.
Ontological armor consists of:
- Independent information channels and cross-checking.
- Transparent corrections when wrong; willingness to say “we don’t know.”
- Teaching people to recognize manipulative patterns, not just feeding them counter-propaganda.
- Refusing to weaponize lies, even when expedient.
7. Alliances, Proxies, and Compromise Systems
7.1 Alliances and Coalitions
Conflict rarely happens alone:
- States ally with states.
- States ally with corporations and NGOs.
- Movements and communities form coalitions.
Alliance dynamics:
- Common enemies are not the same as common values.
- Trust, reputation, and consistent behavior matter as much as formal treaties.
- Thomas Schelling’s insights on:
- Focal points.
- Commitments.
- Credible threats and promises.
For Sovereign actors:
- Alliances with states, corporations, or larger movements can:
- Provide cover, resources, and leverage.
- Also create routes for capture, compromise, and betrayal.
Questions that must be asked:
- What happens if this ally turns on us?
- How do we exit cleanly?
- Are we becoming someone’s proxy without realizing?
7.2 Proxy Warfare
Synthetic stacks often fight via proxies:
- Militias.
- Extremist groups.
- “Independent” NGOs or think tanks.
- Corporate fronts and contractors.
Risks for Sovereign nodes:
- Being cast as proxies of foreign powers, even when not.
- Actually becoming proxies if funding or support is not carefully structured and bounded.
Avoiding proxy capture requires:
- Transparency within the community about who funds what.
- Refusal of “no-strings” resources that obviously come with invisible strings.
- Capacity to say “no” to powerful patrons.
7.3 Compromise and Blackmail Infrastructures
Control not only flows via law and money but via compromise:
- Sexual blackmail.
- Financial crimes and secrets.
- Embarrassing private behavior.
- Ideological kompromat (past statements and alliances).
These systems:
- Keep elites obedient.
- Steer media, corporations, and institutions.
- Are often deliberately engineered (trap situations, honeypots).
For Sovereign nodes:
- Personal discipline is not just morality, it’s counterintelligence.
- Cultures of:
- Minimizing exploitable secrets.
- Supporting confession and repair instead of shame and exile.
- Resisting celebrity glamour traps.
Without this, promising nodes become levers for Synthetic influence.
8. Herman Kahn, Escalation, and Strategic Signaling
Kahn’s work on nuclear strategy centered on escalation ladders:
- Many rungs between calm and total catastrophe.
- Each action shifts perception and options.
Combined with Schelling:
- Strategy is about:
- Shaping expectations.
- Clarifying or obscuring red lines.
- Making some actions clearly off-limits.
For our environment:
- There are escalation ladders in:
- Media conflict (smear → deplatform → criminalize speech).
- Economic measures (soft pressure → sanctions → seizures).
- Legal realm (investigations → prosecutions → extraordinary measures).
- Kinetic realm (policing → paramilitary → open war).
Sovereign doctrine must:
- Map likely sequences of reactions to its moves.
- Avoid actions that invite escalations it cannot survive or that would demand abandoning its own ethics.
- Use signaling to:
- Show willingness to stand firm on core principles.
- Show restraint where conflict would only feed Synthetic narratives.
9. Intelligence and Counterintelligence as Orientation OS
Intelligence = adversarial sense-making.
9.1 Intelligence Cycle
Direction → Collection → Processing → Analysis → Dissemination.
Key points:
- Direction: choosing the right questions, not the convenient ones.
- Collection: mixing OSINT, local human reports, and technical sensing.
- Processing: de-duplicating, cleaning, marking uncertainty.
- Analysis:
- Considering multiple hypotheses.
- Red teaming your own conclusions.
- Avoiding theory worship.
- Dissemination:
- Right level of detail to the right people.
- Protecting sources and methods.
Failure modes:
- Groupthink.
- Politicization (forcing analysis to fit desired narratives).
- Metric worship and dashboard addiction.
- Overclassification and silos.
- Blind reliance on Synthetic feeds.
9.2 Counterintelligence and Epistemic Security
Counterintelligence defends your capacity to know and coordinate:
- Human threats:
- Infiltrators.
- Turned insiders.
- Agents of influence.
- Technical threats:
- Malware.
- Supply-chain backdoors.
- Compromised hardware or protocols.
- Social threats:
- Grooming of leaders.
- Manufactured “scandals.”
- Controlled opposition.
Epistemic security:
- Clear provenance of key claims.
- Cultural permission to challenge leadership and doctrine.
- Regular “assumptions audits”:
- What could make us wrong?
- Who benefits if we accept this story?
- How would our adversary like us to see this?
Intelligence and counterintelligence here are not spy-movie tropes; they are disciplines of staying outside the simulation.
10. Internal Governance and Metrics of the Sovereign Stack
External conflict is only half the story.
10.1 Internal Irregular Conflict
Within any Sovereign network:
- Factions will arise.
- Ambitious people will seek influence.
- Psychological fragility, trauma, ego, and paranoia will appear.
Without structures for:
- Dispute resolution.
- Mediation and arbitration.
- Norm enforcement (for those who repeatedly violate agreed principles).
…the Stack decays from the inside.
Mechanisms may include:
- Voluntary courts or councils.
- Transparent processes for:
- Complaint.
- Investigation.
- Correction or expulsion.
- Rotating responsibilities to avoid entrenched power.
10.2 Avoiding Self-Myth Capture
This can justify:
- Manipulation “for their own good.”
- Suppression of dissent “to protect the mission.”
- Blindness to internal abuse.
Countermeasures:
- Formalized self-critique protocols.
- Periodic external review by trusted but not fully embedded peers.
- Norm: principles > personalities, even if that costs short-term strength.
10.3 Metrics Without Idols
Some measurement is necessary, but must not become an idol.
Potential “health metrics”:
- Degree of local resilience:
- Days of independent survival if Synthetic infrastructure vanished.
- Diversity and redundancy:
- Multiple energy, food, communications, and monetary channels.
- Voluntary participation:
- Are people joining and staying, or being coerced by dependence?
- Reduction of Synthetic dependency over time:
- Not absolute, but trending.
Metrics are diagnostic, not a scoreboard for ego.
11. Integrated Sovereign Doctrine in an Irregular, Ontological War
Bringing everything together:
11.1 Centers of Gravity
For Sovereign actors, three true centers of gravity:
- Signal integrity – ability to see clearly and tell the truth, even when costly.
- Logistical resilience – capacity to ensure basic survival (food, water, shelter, health, energy, communication) without total Synthetic dependency.
- Moral legitimacy – living the principles of voluntaryism, non-aggression, and responsibility in ways that are visible and testable.
Lose any two, and the project collapses. Lose one badly, and it becomes Synthetic under a new name.
11.2 Structural Laws
- Mixed Terrain, Not Pure Stacks
- Assume hybridity. You will rely on parts of the Synthetic Stack, and it will exploit parts of your Stack. Design with that in mind.
- Defense First, Maneuver as Edge
- Build systems hard to break and cheap to maintain.
- Use maneuver in narrative, infrastructure, and law to exploit Synthetic brittleness, but don’t depend on constant attack.
- Win Before Fighting, Accept Some Bleeding
- Shape terrain (legal, economic, social) to make direct attack on you costly and self-discrediting.
- Accept limited attrition as the price of not compromising on core principles.
- Population as Network, Not Mass
- See people as nodes with autonomy and limits, not raw material.
- Serve real needs: food, safety, justice, meaning.
- Respect that many will choose Synthetic comfort; your task is to build coherent alternatives, not force them.
- Moral Level Dominates
- Lie, terrorize, or coerce, and you’ve already lost at the ontological level.
- Non-aggression is not a slogan; it is a hard constraint.
- Escalation Literacy and Trap Avoidance
- Map likely reactions to your moves; avoid being maneuvered into violent or extreme acts that justify repression.
- Design actions that make extreme Synthetic responses obviously unjust to observers.
- Alliance Caution
- Work with others, but keep exit options.
- Treat every major ally as a potential future adversary and design boundaries accordingly.
- Radical Anti-Simulation Discipline
- Doctrine is a tool, not a cage.
- Regularly test your own narratives against reality and against adversarial critique.
- Be willing to discard or revise cherished frames in light of evidence.
- Bounded War, Protected Humanity
- Refuse to normalize permanent psychic war as an identity.
- Protect space for ordinary life, beauty, family, and rest.
- Invest in healing as deeply as you invest in resistance.
- Exit Over Capture
- The goal is not to seize control of Synthetic systems and run them “better.”
- The goal is to build, inhabit, and defend parallel, voluntary structures resilient enough that people can exit control architectures without entering chaos.
12. Closing
Read the canon this way and it converges on a single pattern:
- Thucydides shows how fear, honor, and interest drive powers to self-destruction.
- Clausewitz shows that war is political, friction-filled, and that defense and legitimacy are core.
- Sun Tzu shows how shaping terrain and remaining formless can win without battle.
- Jomini and Mahan show how routes and infrastructure define power.
- Liddell Hart and Boyd show that orientation and moral cohesion decide outcomes more than raw strength.
- Lind, Galula, and Kilcullen show that population and legitimacy are the decisive terrain in irregular conflict.
- Schelling and Kahn show that threats, commitments, and escalation ladders structure choices under danger.
Recast through this lens, war is no longer just about armies and fronts. It is about:
That—rather than domination, revenge, or purity—is the only form of “victory” that makes sense in an ontological war.
Resource Index (Full, but still grouped by where it appears)
You asked to avoid dumping everything only at the end—so the lecture above embeds links at the moment each topic appears. This index is the clean roll-up for reference and auditing.
Canonical Core Texts (Grammar)
- Sun Tzu — The Art of War (Wikipedia) · Wikisource
- Thucydides — History of the Peloponnesian War (Wikipedia) · Perseus text
- Clausewitz — On War (PDF) · Project Gutenberg
- Jomini — Summary of the Art of War (overview)
- Mahan — Influence of Sea Power (overview) · Project Gutenberg
- Liddell Hart — Strategy (page) · Search
Maneuver / Orientation
- Boyd — A Discourse on Winning & Losing (PDF)
- Boyd — Patterns of Conflict (PPT→PDF)
- Chet Richards — Boyd’s OODA Loop (PDF)
- Critique of Boyd — ResearchGate
Irregular Conflict / COIN / 4GW
- Galula — Counterinsurgency Warfare (search)
- Kilcullen — The Accidental Guerrilla (search)
- William S. Lind — 4GW Handbook (search)
- FM 3-24 COIN — FM 3-24 (PDF mirror)
- IWI Podcast — “Hindsight and Foresight…”
- Urban Warfare Project — “Out of the Mountains, Revisited”
- Janes — World of Intelligence episode page
Psyops / Narrative / Media Operations
- FM 33-1 PSYOP (1979) — PDF
- FM 3-05.301 — PDF
- PSYOP case studies — GovInfo PDF
- Century of the Self — Overview
- IWI Podcast — Subversion & narrative weaponization
Intelligence Tradecraft
- Heuer — Psychology of Intelligence Analysis (CIA PDF)
- War Studies Primer — Site · PDF (WarStudiesPrimer2026.pdf)
Escalation / Deterrence / Strategic Studies
- Schelling — Arms and Influence
- Kahn — On Thermonuclear War (overview) · Search
Films / Case Simulations
- The Battle of Algiers — Overview
- The War Game (Watkins) — Overview
- Threads — Overview · Rotten Tomatoes
- Dr. Strangelove — Overview · Rotten Tomatoes