warontherocks.com Open in urlscan Pro
141.193.213.11  Public Scan

Submitted URL: http://warontherocks.com/
Effective URL: https://warontherocks.com/
Submission: On April 19 via manual from IN — Scanned from DE

Form analysis 2 forms found in the DOM

GET /index.php

<form id="searchform" method="get" class="searchbar" action="/index.php"><input type="text" placeholder="Search" name="s"
    id="s"><a href="#" class="expand-form"><img src="https://warontherocks.com/wp-content/themes/warontherocks/assets/home2019/assets/search.png" alt=""></a>
</form>

POST /

<form method="post" enctype="multipart/form-data" id="gform_2" action="/" data-formid="2">
  <div class="gform-body gform_body">
    <div id="gform_fields_2" class="gform_fields left_label form_sublabel_below description_below">
      <div id="field_2_1" class="gfield gfield--type-email field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_1"><label class="gfield_label gform-field-label" for="input_2_1">Sign Up
          For Our Newsletter</label>
        <div class="ginput_container ginput_container_email">
          <input name="input_1" id="input_2_1" type="text" value="" class="large" placeholder="youremail@domain.com" aria-invalid="false">
        </div>
      </div>
    </div>
  </div>
  <div class="gform_footer left_label"> <input type="submit" id="gform_submit_button_2" class="gform_button button" value="Subscribe" onclick="if(window[&quot;gf_submitting_2&quot;]){return false;}  window[&quot;gf_submitting_2&quot;]=true;  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_2&quot;]){return false;} window[&quot;gf_submitting_2&quot;]=true;  jQuery(&quot;#gform_2&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" class="gform_hidden" name="is_submit_2" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="2">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_2" value="WyJbXSIsIjc3YjExODQ4ZWY3YzE1MDQ0NjA0MGU2NzYzMWM4NGVkIl0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_2" id="gform_target_page_number_2" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_2" id="gform_source_page_number_2" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
</form>

Text Content

  National security.
For insiders. By insiders.

 * RUSSO-UKRAINIAN WAR
 * ABOUT
 * SIGN IN
 * BECOME A MEMBER
 * 




LATEST PODCASTS

POWERING AMERICAN RENEWAL WITH INNOVATION

David McCormick, Chris Brose, and Ryan Evans

War On The RocksApr 13

TECHNOLOGY, DEFENSE, AND AMERICAN-CHINESE COMPETITION

Christopher Preble, Zack Cooper, and Melanie Marlowe

Net AssessmentApr 13

RUSSIA WILL SOON BE ON THE DEFENSE, BUT THEN WHAT?

Michael Kofman and Ryan Evans

War On The RocksApr 3

THE BUREAU OF THINGS THAT KEEP YOU UP AT NIGHT

Ann Ganzer and Paul Edgar

Horns of a DilemmaMar 31

BETTER BURDEN SHARING WITH ALLIES

Christopher Preble, Zack Cooper, and Melanie Marlowe

Net AssessmentMar 30
MORE EPISODES >


GET MORE WAR ON THE ROCKS

SUPPORT OUR MISSION AND GET EXCLUSIVE CONTENT

BECOME A MEMBER


EUROPE AT A STRATEGIC DISADVANTAGE: A FRAGMENTED DEFENSE INDUSTRY


PAULA ALVAREZ-COUCEIRO


PRIME TIME FOR SOFTWARE: REIMAGINING THE FUTURE OF DEFENSE ACQUISITION

CHRISTINE H. FOX AND AKASH JAIN


MORE THAN A HOBBY: INFORMAL SECURITY ASSISTANCE TO UKRAINE

JAHARA MATISEK, WILLIAM RENO, AND SAM ROSENBERG


IRAQ: TWENTY YEARS ON, TWO NARRATIVES EMERGE

GREGORY A. DADDIS


IT’S TIME TO RE-EVALUATE THE OFFICER EVALUATION SYSTEM

BRENNAN RANDEL


LATEST FROM UT AUSTIN

PAYING THE DEFENSE BILL: FINANCING AMERICAN AND CHINESE GEOSTRATEGIC COMPETITION

Rosella Cappella Zielinski, Samuel Gerstle

THE ROLE OF U.S. DIPLOMACY IN COUNTERING RUSSIA’S NUCLEAR THREATS AND
MISBEHAVIOR

Rose Gottemoeller

IT MAY BE DIFFERENT THAN YOU THINK

Francis J. Gavin

THE PARADOX OF EUROPE’S DEFENSE MOMENT

Nathalie Tocci

THE ORGANIZATIONAL DETERMINANTS OF MILITARY DOCTRINE: A HISTORY OF ARMY
INFORMATION OPERATIONS

Sarah P. White

MORE FROM THE TEXAS NATIONAL SECURITY REVIEW >


IRAQ: TWENTY YEARS ON, TWO NARRATIVES EMERGE

GREGORY A. DADDIS


IT’S TIME TO RE-EVALUATE THE OFFICER EVALUATION SYSTEM

BRENNAN RANDEL


HOW LARGE-LANGUAGE MODELS CAN REVOLUTIONIZE MILITARY PLANNING

BENJAMIN JENSEN AND DAN TADROSS


IN BRIEF: TAIWANESE PRESIDENT VISITS UNITED STATES

WOTR STAFF


RENEWING DEMOCRACY THROUGH OATH EDUCATION AT THE AIR FORCE ACADEMY

MARYBETH ULRICH, LYNNE CHANDLER GARCIA, AND SYDNEY FITCH


BE SKEPTICAL OF REAGAN’S “OCTOBER SURPRISE”

WILLIAM INBODEN AND JOSEPH LEDFORD


AI’S INHUMAN ADVANTAGE

PAUL SCHARRE


MID-AFTERNOON MAP: BRITISH EMPIRE EDITION

NICK DANFORTH


HOW THE ANTI-WOKE CAMPAIGN AGAINST THE U.S. MILITARY DAMAGES NATIONAL SECURITY

RISA BROOKS


WHY THE MARINES MATTER

JOSLYN FLEMING, KATHERINE GUTHRIE, AND COLIN SMITH


MIND THE MIDDLE POWERS

TIM SWEIJS AND MICHAEL J. MAZARR


IN DEFENSE OF DENIAL: WHY DETERRING CHINA REQUIRES NEW AIRPOWER THINKING

MAXIMILIAN K. BREMER AND KELLY A. GRIECO


ABOUT

 * MISSION
 * PEOPLE
 * FOUNDER'S CLUB
 * CONTACT


MEMBERS

 * JOIN
 * WAR HALL


PODCASTS

 * WOTR
 * NET ASSESSMENT
 * JAW-JAW
 * HORNS OF A DILEMMA


GET MORE WAR ON THE ROCKS

SUPPORT OUR MISSION AND GET EXCLUSIVE CONTENT

BECOME A MEMBER


FOLLOW US


NEWSLETTER

Sign Up For Our Newsletter



Signing up for this newsletter means you agree to our data policy

 * PRIVACY POLICY
   |
 * TERMS & CONDITIONS
   |
 * SITEMAP
   |
 * COPYRIGHT © 2023 METAMORPHIC MEDIA. ALL RIGHTS RESERVED.

Notifications