The resistance Hub logo
  • HOME
  • NEWS
    • Resources
    • Archived Posts
  • RESISTANCE CORE CONCEPTS
    • KEY THINKERS
      • Mao Zedong
      • T.E. Lawrence
      • Che Guevara
    • SOCIAL DYNAMICS
      • Social Movement
      • Mobilization
      • Human Networks
    • GUERRILLA TACTICAL TRIAD
      • Raid
      • Ambush
      • Recon
    • RESISTANCE TACTICAL TRIAD
      • Sabotage
      • Subversion
      • Espionage
    • RELATED DISCIPLINES
      • Counterinsurgency
      • Influence
      • International Law
      • Essential Books
      • Glossary
  • RESISTANCE TOOLKIT
    • Digital Security & Privacy
    • Countering Misinformation
    • ARIS Studies
    • OSS Manuals
    • The Distillery Press
  • RESILIENCE TOOLKIT
    • Physical Resilience
  • ABOUT US
    • Editorial Team
    • Editorial Policy
  • SHOP
    • Cart
    • Checkout
  • SUPPORT US

Archived Posts

The Resistance Hub Archive

Explore our Archived Posts and past articles covering resistance movements, irregular warfare, sabotage tactics, and strategic insights. This archive offers a curated look at previous investigations and case studies for readers seeking deeper context.

  • 10.10
    2025

    What Large States Can Learn from Small States’ Total Defense Strategies

  • 09.23
    2025

    Political Will: The Secret Weapon in Great-Power Competition

  • 09.16
    2025

    Irregular Warfare in the Arctic: Why the High North Matters

  • 08.31
    2025

    Introducing “The Resistance Hub” Podcast—Now Streaming on Spotify

  • 08.10
    2025

    Deceived and Deployed: How Russia Lures Foreign Nationals Into Its War in Ukraine

  • 07.29
    2025

    The Power of Symbols: Why Iconography Matters in Resistance Movements

  • 07.4
    2025

    Revolution in Our Roots: America’s Founding as a Case Study in Irregular Warfare

  • 06.24
    2025

    Iran’s Global Irregular Warfare Apparatus

  • 06.18
    2025

    Ghost Unions of Belarus: Civil Resistance in the Shadows

  • 06.2
    2025

    A Tale of Two Campaigns: Domain Dominance and Divergent Doctrines in the War for Ukraine

  • 05.28
    2025

    Rail Signaling Attacks in Finland Reveal a New Front in Hybrid War

  • 05.14
    2025

    Tripoli Erupts: Power Struggles and Civilian Impact in Libya’s Fragmented Capital

  • 05.8
    2025

    Crossing the Line of Control: How Irregular and Hybrid Warfare Could Shape a Renewed India-Pakistan Confrontation

  • 05.5
    2025

    From Protest to Resistance: Turkey’s May Day Crackdown and the Erosion of Civic Space

  • 04.29
    2025

    The Silent Weapon: The Role of Sabotage in Hybrid Warfare Today

  • 04.23
    2025

    Australia’s Strategic Role in Irregular and Hybrid Warfare Across the Indo-Pacific

  • 04.23
    2025

    Tragedy in Pahalgam: India Responds to Deadliest Civilian Attack in Kashmir Since 2019

  • 04.22
    2025

    The French Prison Attacks: A New Front in Irregular Warfare?

  • 04.17
    2025

    India at the Crossroads of Modern Conflict: From Jungle Warfare to Cyber Frontlines

  • 04.13
    2025

    Why Politicized Militaries Like China’s and Russia’s Are Vulnerable to Irregular Warfare

  • 04.13
    2025

    Shadow Over the Grid: A Surge of Sabotage in Venezuela’s Electrical Infrastructure

  • 04.10
    2025

    Irregular, Asymmetric, Hybrid, and Guerrilla Warfare: Sorting the Terms That Shape Modern Conflict

  • 04.8
    2025

    Much Ado About Drones

  • 04.3
    2025

    Revolutionary Spirits Explores the Enduring Legacy of Che Guevara’s Guerrilla Doctrine

  • 04.3
    2025

    Romania’s Militant Democracy Movement: Defending the System, or Undermining It?

  • 04.1
    2025

    Sabotage in the Shadows: Pipeline Warfare and Resistance in West Africa

  • 03.28
    2025

    Urban Resistance: Tactics for Fighting in Occupied Cities

  • 03.18
    2025

    The Weaponization of Information: How Disinformation Fuels Modern Warfare

  • 03.14
    2025

    Pipeline Wars: Why Energy Infrastructure Is the Next Battlefield

  • 03.10
    2025

    Underreported Struggles: Movements the World Forgot

  • 03.9
    2025

    Syria’s Transitional Government: From Victory to Insurgency

  • 03.9
    2025

    The White Rose Movement: Defying the Nazi Regime with Words

  • 03.6
    2025

    Rwanda’s Support for M23 Rebels: Congo’s Counterinsurgency Response and Regional Implications

  • 03.5
    2025

    The Rise of Sudan’s Civilian Resistance: A People’s Fight for Survival

  • 03.4
    2025

    The July Revolution in Bangladesh: A Youth-Led Fight for Democracy

  • 03.3
    2025

    The “Woman, Life, Freedom” Movement in Iran: A Struggle for Rights and Resistance

  • 02.27
    2025

    If The Shoe Fits…

  • 02.26
    2025

    German Warships Targeted: Investigating the Recent Naval Sabotage Incidents

  • 02.13
    2025

    Introducing Mao Zedong’s Principles of People’s War

  • 02.13
    2025

    Introducing The Distillery Press

  • 02.11
    2025

    Breaking Free: How the Baltic States Disconnected from Russia’s Power Grid and What It Means for Security

  • 02.5
    2025

    Recent Acts of Sabotage in Russia and Eurasia

  • 02.2
    2025

    Student-Led Protests in Serbia: A Case Study in Resistance Mobilization

  • 01.30
    2025

    OSS Simple Sabotage Manual: A Guide to Covert Disruption

  • 01.18
    2025

    Irregular Warfare Solutions for Wildfire Response

  • 01.15
    2025

    Martin Luther King Jr. and the Civil Rights Movement

  • 01.15
    2025

    Indicators of Invasion Preparations

  • 01.14
    2025

    January 1991 Events in Lithuania: A Historical Reflection

  • 01.12
    2025

    Protecting Critical Infrastructure from Sabotage

  • 01.11
    2025

    Recent Developments in Guerrilla Warfare: A Global Perspective

  • 01.9
    2025

    Irregular Warfare During Jimmy Carter’s Presidency

  • 01.9
    2025

    Undersea Sabotage: The Hidden Threat to Global Infrastructure

  • 01.8
    2025

    Operation Gunnerside: The Mission That Changed the Course of World War II

  • 01.5
    2025

    Georgian Protest Movements

  • 12.30
    2024

    Applying International Law to Resistance and Irregular Combatants

  • 12.29
    2024

    Resistance Movements in Occupied Territories: A Historical Perspective

  • 12.28
    2024

    Influence: Insights from Edward Bernays’ Propaganda

  • 12.22
    2024

    Subversion: Unseen Forces That Reshape History

  • 12.22
    2024

    Sabotage in Warfare: A Brief History

  • 12.21
    2024

    The Revolutionary Strategies of Che Guevara

  • 12.21
    2024

    T.E. Lawrence

  • 12.21
    2024

    Mao Zedong’s Guerrilla Strategies

  • 12.18
    2024

    The Three Most Influential Thinkers in Counterinsurgency Theory

  • 12.10
    2024

    The Use of Espionage by Resistance Movements

  • 12.10
    2024

    Subversion

  • 12.10
    2024

    Sabotage

  • 12.10
    2024

    What’s Next For Syria

  • 12.10
    2024

    Georgia Protests

  • 12.10
    2024

    Turmoil In South Korea

  • 12.7
    2024

    Reconnaissance 

  • 12.7
    2024

    The Guerrilla Ambush

  • 12.7
    2024

    Guerrilla Raids: Lessons from History for Irregular Warfare

  • 12.5
    2024

    Social Network Analysis

  • 12.4
    2024

    Resistance Mobilization

  • 12.3
    2024

    Social Movement Theory

  • 11.29
    2024

    Sabotage on the Rise

At The Resistance Hub, we maintain a living archive of our own analyses on protest, civil resistance, irregular warfare, and dissent in repressive environments. This collection serves as a trusted resource for researchers, strategists, and practitioners, reflecting our commitment to carefully sourced reporting and documenting resistance in its many forms. By consolidating past work, the archive helps readers revisit analyses, track patterns, and draw lessons from historical and contemporary cases. If there are themes or regions you’d like us to explore in future coverage, share your suggestion with our editorial team at the bottom of the page.

  • HOME
  • NEWS
    • Resources
    • Archived Posts
  • RESISTANCE CORE CONCEPTS
    • KEY THINKERS
      • Mao Zedong
      • T.E. Lawrence
      • Che Guevara
    • SOCIAL DYNAMICS
      • Social Movement
      • Mobilization
      • Human Networks
    • GUERRILLA TACTICAL TRIAD
      • Raid
      • Ambush
      • Recon
    • RESISTANCE TACTICAL TRIAD
      • Sabotage
      • Subversion
      • Espionage
    • RELATED DISCIPLINES
      • Counterinsurgency
      • Influence
      • International Law
      • Essential Books
      • Glossary
  • RESISTANCE TOOLKIT
    • Digital Security & Privacy
    • Countering Misinformation
    • ARIS Studies
    • OSS Manuals
    • The Distillery Press
  • RESILIENCE TOOLKIT
    • Physical Resilience
  • ABOUT US
    • Editorial Team
    • Editorial Policy
  • SHOP
    • Cart
    • Checkout
  • SUPPORT US

contact@theresistancehub.com

Connect

  • LinkedIn
  • Instagram
  • Spotify
  • RSS Feed
  • Amazon

The Resistance Hub | Privacy Policy | EU Cookie Policy | Disclaimer | Editorial Policy | About Us | © 2024 All rights reserved. The Resistance Hub is not responsible for the content of external sites. 

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}