For the past two decades the United States has largely focused on wars in Afghanistan, Iraq, and counterterrorism operations in response to the 9/11 attacks. Although the U.S. has adjusted its focus away from these conflicts and towards strategic competition, the national security institutions executing the policy change have been shaped by the Global War on Terror (GWOT) and the operational environment it produced. With the rebalance towards strategic competition, SOF practitioners and their partners must appreciate how the recent past shapes the present and forecast what changes are required to be effective in the future compound security environment. Embracing this reality, JSOU's 4th quarter, FY21 "Future of SOF" Forum will reflect on two important factors that shaped the GWOT operational environment and will continue to shape the compound security environment:  the expansion of the SOF/IC relationship and the technologies that inform and enable operations.

Nothing to show yet.

By clicking the event registration button above, I acknowledge JSOU's event attendee terms and conditions, and certify that I am who I say I am.
Nothing to show yet.

Compound Security as a Theory of Next: Part 1


Compound Security as a Theory of Next with Dr. Isaiah “Ike” Wilson III (Part 1 of 4) Join Dr. Ike Wilson in an exciting discussion that explores the relationship between compound security and the security needs of the future. This is the first of four installments. The opinions offered in this lecture are those of the presenters only and do not necessarily represent the views of any of the aforementioned organizations or parent institutions. Video footage provided by the JSOU multimedia team, Adobestock.com, iStock.com, shutterstock.com, Dvids.net, The National Archives, University of Texas Archives, and BTU.




Implications of CSD on Future of SOF Utility with Dr. Isaiah “Ike” Wilson III (Part 3 of 4)



Join Dr. Ike Wilson in an exciting discussion that explores the implications of CSD on Future of SOF Utility. This is the third of four installments. The opinions offered in this lecture are those of the presenters only and do not necessarily represent the views of any of the aforementioned organizations or parent institutions. Video footage provided by the JSOU multimedia team, Adobestock.com, iStock.com, shutterstock.com, Dvidshub.net, The National Archives, University of Texas Archives, and BTU.




Compound Security as a Theory of Next: Part 2


Join Dr. Ike Wilson in an exciting discussion that explores, what is compound security? This is the second of four installments. The opinions offered in this lecture are those of the presenters only and do not necessarily represent the views of any of the aforementioned organizations or parent institutions. Video footage provided by the JSOU multimedia team, Adobestock.com, iStock.com, shutterstock.com, Dvids.net, The National Archives, University of Texas Archives, and BTU.




Implications of CSD for SOF with Dr. Isaiah “Ike” Wilson III (Part 4 of 4)



Join Dr. Ike Wilson in an exciting discussion that explores the Implications of CSD for SOF. This is the last of four installments. The opinions offered in this lecture are those of the presenters only and do not necessarily represent the views of any of the aforementioned organizations or parent institutions. Video footage provided by the JSOU multimedia team, Adobestock.com, iStock.com, shutterstock.com, Dvidshub.net, The National Archives, University of Texas Archives, and BTU.