Reference Resource

Irregular Warfare & Resistance
Glossary

The definitive reference for students, researchers, and practitioners of irregular warfare, guerrilla tactics, and resistance movements. Definitions draw on primary doctrine, T.E. Lawrence, Mao Zedong, and modern academic analysis.

134 Defined Terms
6 Categories
A–Z Indexed
Curated by The Resistance Hub Editorial Team
Sources: Public Domain
Regularly Updated · Living Resource
A–C Active Resistance through COIN

Active Resistance

Tactical Historical

Organized opposition involving direct action — sabotage, armed conflict, strikes, or civil disruption — taken openly against an occupying or oppressive force.

Key Characteristics
  • Involves overt confrontation with authorities or occupying forces
  • Takes violent (armed rebellion) or nonviolent (civil disobedience) forms
  • Often coordinated by underground networks or external sponsors
  • Distinguished from passive resistance by its direct, proactive nature
Historical Examples
WWII
French Resistance conducted sabotage, assassinations, and intelligence operations against Nazi occupation.
Cold War
Solidarity Movement (Poland, 1980s) used nonviolent resistance to achieve systemic political change.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Asymmetric Warfare

Tactical Strategic

Conflicts in which opposing forces differ significantly in strength, tactics, or technology, forcing the weaker party to exploit unconventional methods, deception, and terrain to offset the adversary’s advantages.

Key Characteristics
  • Weaker party uses terrain, deception, and mobility instead of brute force
  • Focuses on attrition, psychological impact, and sustained disruption
  • Often involves insurgencies, guerrilla campaigns, and cyber warfare
  • Seeks to make conflict unsustainable for the stronger party politically and materially
Historical Examples
1979–1989
Mujahideen used hit-and-run tactics to exhaust Soviet forces in Afghanistan.
2006
Hezbollah combined guerrilla tactics with missile warfare against Israeli conventional forces.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Attrition Warfare

Strategic

A strategy of gradually exhausting the enemy through sustained losses in personnel, materiel, and morale rather than seeking decisive battlefield engagement.

Key Characteristics
  • Seeks to exhaust opponent’s resources, will, and public support over time
  • Often leads to high casualties and protracted conflicts
  • Used when a decisive tactical victory is unachievable
  • Effective against democratic adversaries with limited political tolerance for casualties
Historical Examples
1914–1918
WWI Western Front — prolonged trench warfare became the archetypal attrition conflict.
1955–1975
Viet Cong deliberately prolonged conflict to erode American political will.
Related Terms
Further Reading on The Resistance Hub

Belligerency

Doctrine Historical

A legal status in international law recognizing an organized armed group as a party to a conflict, granting its members combatant protections including prisoner-of-war status under the Geneva Conventions.

Key Characteristics
  • Requires sustained, organized hostilities meeting a threshold of intensity and duration
  • The insurgent force must control territory and maintain a command structure
  • Recognition of belligerency may be granted by the standing government, third-party states, or international bodies
  • Distinguishes combatants from civilians, triggering law-of-armed-conflict protections
Historical Examples
1861–1865
The U.S. Civil War is a classic example of belligerency — the Confederacy controlled territory, maintained armies, and was recognized by foreign powers.
1990s
Iraqi Kurdistan approached belligerency status through sustained territorial control and organized governance under the KDP and PUK.
Related Terms
Further Reading on The Resistance Hub

Black Propaganda

Psyop Cyber

Propaganda that is deliberately attributed to a false source — typically the adversary itself — to deceive the target audience, sow internal distrust, and discredit the opposing side.

Key Characteristics
  • Source attribution is fabricated or misrepresented to appear as if it originates from the enemy
  • Designed to undermine morale, create confusion, or provoke internal divisions
  • Distinct from white propaganda (openly attributed) and gray propaganda (unattributed)
  • Modern applications include deepfakes, spoofed social media accounts, and fabricated leaks
Historical Examples
WWII
British PWE operated radio stations posing as German military broadcasts, spreading defeatist messages to Wehrmacht troops.
Cold War
CIA-backed publications mimicked Soviet sources to amplify internal contradictions within Warsaw Pact countries.
Related Terms
Recommended Reading

Cell Structure

Tactical

An organizational model in which a resistance network is divided into small, semi-independent units — typically 3–6 members — to limit exposure from infiltration and reduce cascading failures when one cell is compromised.

Key Characteristics
  • Members of one cell have limited knowledge of other cells (compartmentalization)
  • Reduces the “damage radius” when one element is captured or turned
  • Can be horizontal (flat network) or vertical (hierarchical pyramid)
  • Widely used by resistance movements, terrorist organizations, and intelligence services
Historical Examples
WWII Occupied Europe
French, Dutch, and Belgian underground networks used strict cell compartmentalization.
Modern
Al-Qaeda franchises operated through dispersed cells with minimal lateral communication.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Clandestine Operations

Tactical

Covert missions designed to conceal the identity of those executing them, used in espionage, sabotage, and resistance movements where deniability is operationally essential.

Key Characteristics
  • Requires secrecy, deception, and plausible deniability
  • Conducted by intelligence agencies, special forces, or underground networks
  • May involve assassination, sabotage, intelligence gathering, or cyber operations
  • Success depends heavily on counterintelligence and operational security (OPSEC)
Historical Examples
Operation Anthropoid, 1942
Czech resistance fighters assassinated SS officer Reinhard Heydrich in Prague.
Cold War
Both U.S. and Soviet intelligence services ran extensive clandestine programs globally.
Related Terms
Recommended Reading

Counterinsurgency (COIN)

Doctrine Strategic

A comprehensive civil-military campaign by a government or occupying authority to defeat an insurgency by addressing its political, social, and military dimensions simultaneously.

Key Characteristics
  • Combines military operations with governance reform, economic development, and information campaigns
  • Prioritizes separating insurgents from the civilian population
  • Codified in U.S. Army FM 3-24 (Petraeus/Mattis, 2006)
  • Success is measured politically, not militarily
Historical Examples
Malayan Emergency, 1948–60
British COIN in Malaya used resettlement, social programs, and intelligence to defeat Communist insurgents.
Iraq Surge, 2007
General Petraeus implemented population-centric COIN, temporarily stabilizing Iraqi security.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Auxiliary

Doctrine Tactical

The clandestine support element of a resistance organization whose members do not openly indicate their sympathy or involvement with the movement. Members are typically part-time volunteers with value because of their normal position in the community.

Key Characteristics
  • Provides logistics, safe houses, early warning, intelligence collection, and courier services
  • Members maintain civilian cover — their value lies in their legitimate community roles
  • Operates between the underground and the general population
  • Defined in JP 3-05 as a core component of unconventional warfare
Historical Examples
WWII
French civilians sheltered downed Allied airmen, stored weapons, and passed messages — all while maintaining their daily occupations.
Northern Ireland
Republican auxiliary networks provided safe houses, transport, and intelligence to PIRA active service units.
Related Terms
Recommended Reading

Ambush

Tactical

A surprise attack from a concealed position against a moving or temporarily halted target. One of the three core guerrilla tactical actions alongside the raid and reconnaissance.

Key Characteristics
  • Exploits terrain, timing, and intelligence to achieve tactical surprise
  • Designed to inflict maximum damage before the enemy can organize a response
  • Types include point, area, and L-shaped ambushes depending on terrain and objective
  • Success depends on withdrawal planning — the ambush force must break contact cleanly
Historical Examples
1920
IRA flying columns in Cork and Kerry conducted devastating roadside ambushes against British convoys, forcing dispersal of Crown forces.
2000s
Iraqi insurgents used IED-initiated ambushes against coalition patrols, combining explosive surprise with small-arms fire.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Area Assessment

Doctrine Tactical

A systematic evaluation of a geographic area’s physical, human, and operational characteristics to determine how they affect military or resistance operations. Covers terrain, population, infrastructure, threats, and potential support.

Key Characteristics
  • Foundational step in unconventional warfare planning — precedes infiltration
  • Covers PMESII factors: political, military, economic, social, information, infrastructure
  • Identifies potential allies, threats, safe areas, and lines of communication
  • Continuously updated as conditions change — not a one-time product
Historical Examples
UW Doctrine
SF teams conduct area assessments during Phase I (Preparation) to understand the operational environment before contact with resistance leadership.
2014
Ukrainian territorial defense volunteers conducted rapid area assessments of eastern oblasts to identify defensible terrain and sympathetic populations.
Related Terms
Further Reading on The Resistance Hub

Agitation

Psyop Strategic

Deliberate actions designed to arouse public dissatisfaction and provoke unrest against a governing authority. Follows propaganda messaging with observable, concrete actions that demonstrate the movement’s capability.

Key Characteristics
  • Takes two primary forms: service delivery (demonstrating insurgent capability) and retaliatory violence (punishing perceived traitors)
  • Bridges the gap between propaganda (words) and mobilization (mass action)
  • Targets specific grievances — economic hardship, political exclusion, state brutality
  • Distinguished from propaganda by its emphasis on immediate, observable action
Historical Examples
1960s
Viet Cong agitation combined land redistribution (demonstrating governance) with targeted assassination of government officials (demonstrating reach).
2011
Arab Spring agitation used social media to amplify specific incidents of police brutality, converting individual grievance into mass protest.
Related Terms
Recommended Reading

Coercion

Strategic Doctrine

The use of force, threats, or pressure to compel an actor to do something it would otherwise not do. In unconventional warfare, coercion is applied through supporting a resistance or insurgency to impose costs on the adversary.

Key Characteristics
  • Defined in JP 3-05.1 as a core method of unconventional warfare
  • Can be military, economic, political, or informational in nature
  • Distinguished from persuasion (voluntary compliance) and compellence (forcing action)
  • Effectiveness depends on the target’s perception that the threat is credible and the cost is unacceptable
Historical Examples
Cold War
Soviet-backed insurgencies in Africa and Southeast Asia coerced Western-aligned governments through sustained guerrilla pressure, forcing policy concessions.
2010s
Hezbollah’s rocket arsenal coerces Israeli strategic calculations without requiring conventional military parity.
Related Terms

Civil Disobedience

Strategic Historical

The deliberate, public, nonviolent refusal to obey laws or government demands as a form of political protest. Distinguished from criminal activity by its public nature, moral justification, and willingness to accept legal consequences.

Key Characteristics
  • A core tactic of passive resistance — operates within the legal/illegal boundary
  • Derives moral authority from accepting punishment rather than evading it
  • Can include sit-ins, blockades, refusal to pay taxes, draft resistance, and symbolic violations
  • Most effective when it provokes disproportionate state response, generating sympathy
Historical Examples
1930
Gandhi’s Salt March — mass civil disobedience against British salt taxes — mobilized millions and drew international attention to Indian independence.
1960s
U.S. Civil Rights sit-ins at segregated lunch counters provoked violent responses that shifted public opinion and accelerated desegregation.
Related Terms
Further Reading on The Resistance Hub

Compartmentalization

Tactical Doctrine

The practice of restricting information within an organization so that individuals or cells know only what they need to perform their specific function. The foundational security principle of underground and clandestine organizations.

Key Characteristics
  • Limits damage from compromise — if one cell is captured, it cannot expose others
  • Creates a trade-off between security and efficiency — more compartmentalization means slower coordination
  • Applies to personnel, operations, communications, logistics, and leadership identity
  • Cell members typically know only their immediate contacts, not the broader network
Historical Examples
WWII
SOE circuits in occupied France were compartmentalized so that the capture of one network did not compromise adjacent operations.
1970s–1990s
PIRA’s reorganization into small, compartmentalized active service units after early 1970s arrests dramatically improved operational security.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Coup d’État

Strategic Historical

The sudden, illegal seizure of government power by a small group — typically military officers or political insiders — through the rapid capture of key institutions, communications, and leadership rather than mass mobilization.

Key Characteristics
  • Distinguished from revolution by its elite-driven, top-down character — does not require popular support
  • Speed and surprise are essential — successful coups are typically decided within hours
  • Targets command nodes: presidential palace, broadcast stations, military headquarters, communications hubs
  • Can be followed by either authoritarian consolidation or transition to democratic governance
Historical Examples
2021
Myanmar military’s coup against Aung San Suu Kyi’s government — seized power through pre-dawn arrests and communications shutdown.
1998–1999
Guinea-Bissau military coup during civil war — illustrates the overlap between insurgency and coup as methods of regime change.
Related Terms
Further Reading on The Resistance Hub

Covert vs. Clandestine

Doctrine Tactical

Two distinct categories of secret activity: covert operations conceal the sponsor’s identity (the ‘who’), while clandestine operations conceal the activity itself (the ‘what’). The distinction carries significant legal and policy implications.

Key Characteristics
  • Covert: the operation may be visible, but attribution is denied or obscured (e.g., CIA-backed regime change)
  • Clandestine: the operation itself is hidden from detection (e.g., intelligence collection behind enemy lines)
  • Under U.S. law, covert action requires a presidential finding; clandestine military activity may fall under Title 10 authority
  • The ARIS Legal Status study examines this distinction at length in the context of UW and FID
Historical Examples
1953
CIA’s Operation AJAX in Iran — a covert operation where the U.S. role was concealed, but the coup itself was visible.
Cold War
Stay-behind networks in Europe conducted clandestine preparation — the networks themselves were hidden, not just the sponsor.
Related Terms
Further Reading on The Resistance Hub

Armed Component

Doctrine Tactical

The visible military element of a resistance or insurgent movement, organized to conduct overt armed operations using guerrilla, asymmetric, or conventional tactics.

Key Characteristics
  • Performs the kinetic functions of a resistance — raids, ambushes, defensive operations
  • Organized along military lines with ranks, units, and command hierarchy
  • Guerrillas are neither militias nor mercenaries — they are indigenous irregular combatants
  • Operates in hostile or denied territory, often supported by auxiliary and underground elements
Historical Examples
1940s
Yugoslav Partisans under Tito grew from guerrilla bands into a conventional army capable of liberating territory.
2010s
Free Syrian Army formations served as the armed component of the Syrian opposition, though fragmentation limited effectiveness.
Related Terms

Assassination

Tactical Historical

The targeted killing of a specific individual — typically a political leader, military commander, intelligence operative, or collaborator — for strategic, political, or psychological effect.

Key Characteristics
  • Distinguished from indiscriminate violence by its precision and deliberate target selection
  • Can serve multiple functions: eliminate key leaders, punish collaborators, demonstrate reach, provoke overreaction
  • Carries significant strategic risk — may generate sympathy for the target or provoke harsh reprisals
  • Legal status depends on context: targeted killing in armed conflict vs. political murder in peacetime
Historical Examples
1920
Michael Collins’ Squad conducted targeted assassinations of British intelligence officers in Dublin on Bloody Sunday, crippling the Cairo Gang.
1940s
Czech resistance operatives assassinated SS-Obergruppenführer Reinhard Heydrich in Operation Anthropoid — triggering severe reprisals but eliminating a key Nazi leader.
Related Terms

Blockade

Strategic Tactical

The systematic denial of movement — of goods, people, or information — into or out of a territory, imposed by military force, naval power, economic sanctions, or civilian obstruction.

Key Characteristics
  • Can be naval (port blockade), land (siege), economic (trade embargo), or informational (internet shutdown)
  • Civilian blockades — roadblocks, human chains, port occupations — are a form of nonviolent resistance
  • Strategic blockades aim to exhaust resources and political will over time
  • Legality depends on context — declared blockades in armed conflict carry specific international law obligations
Historical Examples
2007–Present
Israel’s blockade of Gaza restricts movement of goods and people, functioning as both a security measure and economic pressure tool.
2014
Pro-democracy protesters in Hong Kong used human blockades of key intersections during the Umbrella Movement to paralyze government operations.
Related Terms

Cadre

Doctrine Tactical

A core group of trained, committed individuals who serve as the organizational backbone of a resistance movement — recruiting, training, and leading broader membership while maintaining ideological discipline.

Key Characteristics
  • Functions as the seed from which larger organizations grow — a trained cadre can rapidly expand a movement when conditions allow
  • In Leninist theory, the cadre forms the vanguard party; in Maoist practice, cadres embed within the population
  • Cadre members are typically the most ideologically committed and operationally experienced
  • Quality of cadre training directly determines the movement’s resilience under pressure
Historical Examples
1920s–1940s
Chinese Communist Party cadres spent decades building organizational capacity in rural areas before Mao’s forces could challenge the Nationalists.
1960s
Viet Cong cadres — political officers embedded in villages — were the backbone of the insurgency’s governance and recruitment apparatus.
Related Terms

Color Revolution

Strategic Historical

A wave of largely nonviolent, mass-mobilization movements in post-Soviet states and beyond that used coordinated civil resistance — often associated with a symbolic color or flower — to challenge disputed elections and authoritarian governance.

Key Characteristics
  • Typically triggered by fraudulent elections combined with pre-existing organizational capacity
  • Characterized by mass street protests, general strikes, and media campaigns with unified branding
  • Relied on youth movements, independent media, and international election monitoring as catalysts
  • Russian doctrine now treats color revolutions as a form of Western-backed hybrid warfare
Historical Examples
2003–2005
Georgia’s Rose Revolution, Ukraine’s Orange Revolution, and Kyrgyzstan’s Tulip Revolution toppled post-Soviet governments through mass peaceful protest.
2004
Ukraine’s Orange Revolution mobilized millions around electoral fraud, forcing a re-vote — though gains were later reversed.
Related Terms
Further Reading on The Resistance Hub

Command & Control (C2)

Doctrine Tactical

The exercise of authority and direction over assigned forces to accomplish a mission. In irregular warfare, C2 ranges from strict hierarchy to decentralized network structures depending on security requirements.

Key Characteristics
  • Trade-off between centralized control (coordination, discipline) and decentralized execution (resilience, initiative)
  • Underground organizations favor flat, networked C2 to survive leadership decapitation
  • Modern C2 leverages encrypted digital communications but faces surveillance risks
  • Mission-type orders (Auftragstaktik) — issuing intent rather than detailed instructions — suits dispersed resistance forces
Historical Examples
1970s
PIRA’s shift from a brigade structure to small active service units reflected a C2 adaptation — trading coordination for survivability.
2010s
Al Qaeda’s evolution from hierarchical command to a franchise model demonstrates how C2 adapts to decapitation campaigns.
Related Terms

Counterintelligence (CI)

Tactical Doctrine

Activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, sabotage, or intelligence collection directed at one’s own organization. The defensive complement to intelligence operations.

Key Characteristics
  • In resistance contexts, CI protects the underground from infiltration, surveillance, and compromise
  • Methods include vetting new members, monitoring for behavioral anomalies, and counter-surveillance
  • Offensive CI involves identifying and turning enemy agents or feeding disinformation
  • CI failures are historically the most common cause of resistance network destruction
Historical Examples
1919–1921
Michael Collins built an effective CI capability by recruiting agents within Dublin Castle’s British intelligence apparatus.
WWII
German Abwehr penetration of SOE networks in the Netherlands (Englandspiel) demonstrated catastrophic CI failure — 50+ agents captured.
Related Terms

Arms Trafficking

Tactical Strategic

The illicit trade in weapons, ammunition, and military equipment across borders or to unauthorized recipients. A critical enabler of insurgencies and resistance movements that lack state-sponsored supply chains.

Key Characteristics
  • Routes exploit porous borders, corrupt officials, conflict zones, and weak governance
  • Sources include captured enemy materiel, black market, state sponsors, and diaspora networks
  • Modern trafficking increasingly involves dual-use technology, commercial drones, and 3D-printed components
  • Disrupting arms flows is a primary counterinsurgency and counterterrorism objective
Historical Examples
1980s
CIA-facilitated arms trafficking to Afghan mujahideen through Pakistan — Stinger missiles proved decisive against Soviet air power.
2010s
Libyan weapons proliferated across North Africa and the Sahel after Gaddafi’s fall, fueling insurgencies from Mali to Syria.
Related Terms

Cease-Fire

Doctrine Strategic

A temporary or permanent halt to armed hostilities — agreed bilaterally or imposed unilaterally — that may serve as a step toward negotiation, a tactical pause, or a strategic repositioning measure.

Key Characteristics
  • Can be formal (signed agreement with monitoring) or informal (tacit de-escalation)
  • Resistance movements may use cease-fires to regroup, resupply, and consolidate political gains
  • Governments may use cease-fires to divide opposition or demonstrate willingness to negotiate
  • Enforcement requires verification mechanisms — without them, violations are common and destabilizing
Historical Examples
1994
PIRA’s cease-fire preceded the Good Friday Agreement — a strategic shift from armed campaign to political process.
2020
Taliban-U.S. cease-fire agreement at Doha preceded complete U.S. withdrawal — the Taliban used the pause to position for takeover.
Related Terms

Civil-Military Operations

Doctrine Strategic

Activities performed by military forces that establish, maintain, or exploit relationships between military forces, government agencies, and civilian populations in friendly, neutral, or hostile areas.

Key Characteristics
  • In COIN, CMO builds government legitimacy through service delivery, infrastructure, and governance support
  • In UW, CMO-like activities build relationships with resistance-sympathetic populations
  • Effectiveness depends on genuine improvement in civilian conditions — not just perception management
  • Failed CMO creates cynicism that benefits the insurgent narrative
Historical Examples
2000s
Provincial Reconstruction Teams in Afghanistan combined military security with development projects — with mixed results.
1960s
U.S. CORDS program in Vietnam integrated civil and military counterinsurgency efforts — one of the more effective COIN innovations.
Related Terms

Clandestine Press

Historical Psyop

Underground printing and distribution networks that produce newspapers, leaflets, pamphlets, and instructional materials in defiance of censorship or occupation — a foundational propaganda tool of resistance movements.

Key Characteristics
  • Requires secure facilities, paper supplies, printing equipment, and distribution networks
  • Content includes news (countering state propaganda), instructions, morale material, and political education
  • Discovery of a clandestine press typically results in severe punishment — making security paramount
  • Modern equivalents include encrypted messaging channels, anonymous blogs, and social media coordination
Historical Examples
WWII
Over 1,200 clandestine newspapers operated in occupied France — sustaining morale and coordinating resistance activities.
1980s
Polish Solidarity’s underground press produced thousands of publications, creating a parallel information ecosystem outside state control.
Related Terms
Further Reading on The Resistance Hub

Collective Punishment

Doctrine Historical

The imposition of penalties on an entire community or population for the actions of individuals — prohibited under international humanitarian law but frequently employed by occupying powers and authoritarian regimes.

Key Characteristics
  • Prohibited under Article 33 of the Fourth Geneva Convention
  • Includes home demolitions, curfews, food restrictions, mass detention, and infrastructure destruction
  • Intended to turn the population against insurgents — but often has the opposite effect, driving recruitment
  • Research shows collective punishment frequently increases rather than decreases resistance activity
Historical Examples
WWII
Nazi reprisal policies — executing civilians in ratio to German casualties — drove populations toward rather than away from resistance.
2000s
Israeli demolition of Palestinian homes as collective punishment became a recruitment driver for militant organizations.
Related Terms

Attribution (Cyber)

Cyber Doctrine

The process of identifying the responsible actor behind a cyber attack or digital operation. A fundamental challenge in cyber conflict because the internet’s architecture enables anonymity and misdirection.

Key Characteristics
  • Technical attribution traces attacks through IP addresses, malware signatures, infrastructure, and TTPs
  • Political attribution involves assessing motive, capability, and geopolitical context beyond technical evidence
  • State actors invest heavily in obscuring attribution — using proxies, false flags, and compromised infrastructure
  • The difficulty of attribution creates strategic ambiguity that benefits offensive cyber operators
Historical Examples
2010
Stuxnet attribution to the U.S. and Israel was never officially confirmed — though technical analysis strongly indicated state-level capability.
2016
Attribution of DNC hack to Russian intelligence services (GRU) required months of forensic analysis and was still politically contested.
Related Terms
Further Reading on The Resistance Hub

Censorship Circumvention

Cyber

Technologies and techniques used to bypass government-imposed internet censorship and surveillance — enabling access to blocked content, anonymous communication, and secure information exchange in repressive environments.

Key Characteristics
  • Tools include VPNs, Tor, proxy servers, mesh networks, and steganography
  • Represents a constant cat-and-mouse game between censors (DPI, DNS poisoning, IP blocking) and circumventors
  • Critical for resistance movements operating under authoritarian regimes with comprehensive internet control
  • Trade-off between usability and security — the most secure tools are often the hardest to use
Historical Examples
2011
Arab Spring protesters used Tor, VPNs, and mirror sites to bypass government internet shutdowns and share information.
2022
Iranian protesters during the Woman, Life, Freedom movement used VPNs and Starlink to circumvent comprehensive internet shutdowns.
Related Terms
Further Reading on The Resistance Hub

Cognitive Warfare

Psyop Strategic

Operations targeting the human mind as the domain of warfare — seeking to alter how people think, decide, and act by exploiting cognitive biases, emotional triggers, and information processing vulnerabilities.

Key Characteristics
  • Goes beyond traditional PSYOP by targeting cognitive processes themselves, not just attitudes or beliefs
  • Leverages neuroscience, behavioral economics, and AI to design precision influence campaigns
  • NATO has recognized the cognitive domain as a sixth operational domain alongside land, sea, air, space, and cyber
  • Defensive cognitive warfare includes media literacy, critical thinking, and institutional resilience
Historical Examples
2010s
Russian information operations exploited social media algorithms and cognitive biases to amplify division within Western democracies.
2020s
Deepfake technology and AI-generated content create new cognitive warfare capabilities — undermining trust in all information sources.
Related Terms
Further Reading on The Resistance Hub

Counter-Narrative

Psyop Strategic

A message, story, or framework specifically designed to challenge and undermine an adversary’s narrative — delegitimizing their claims, exposing contradictions, and offering an alternative interpretation of events.

Key Characteristics
  • Must directly address the target narrative’s core claims and emotional appeal — not just assert the opposite
  • Effective counter-narratives offer a compelling alternative story, not just criticism of the existing one
  • Requires understanding why the original narrative resonates — what needs it fulfills for the audience
  • Government counter-narratives often lack credibility — third-party and peer voices are more effective
Historical Examples
2010s
U.S. counter-ISIS messaging struggled because government-produced content lacked authenticity — defector testimonials proved more effective.
Cold War
Radio Free Europe’s counter-narrative didn’t just criticize communism — it provided truthful reporting that contrasted with state propaganda.
Related Terms
Further Reading on The Resistance Hub
D–G Deep Battle through Guerrilla

Deep Battle Doctrine

Doctrine Strategic

A Soviet military strategy that simultaneously attacks enemy forces at tactical, operational, and strategic depths to prevent reserves from reaching the front, paralyze command, and achieve rapid collapse.

Key Characteristics
  • Disrupts enemy at multiple levels simultaneously rather than sequentially
  • Uses combined arms integration: armor, artillery, airborne, and special operations
  • Modern Russian hybrid warfare incorporates Deep Battle concepts via cyber and electronic warfare
Historical Examples
WWII Eastern Front
Operation Bagration (1944) applied Deep Battle to shatter German Army Group Centre in weeks.
Modern Hybrid
Russia’s 2022 invasion incorporated Deep Battle concepts through layered long-range strike systems.
Related Terms

Direct Action (DA)

Tactical Doctrine

Short-duration, high-intensity strikes or raids — typically executed by special operations forces — to seize, destroy, capture, exploit, or recover a designated target.

Key Characteristics
  • Short-duration, high-intensity operations requiring precise intelligence
  • Conducted behind enemy lines or in denied/restricted access areas
  • One of the seven core SOF activities defined in U.S. doctrine
  • Requires specialized training, rehearsal, and counterintelligence support
Historical Examples
Operation Neptune Spear, 2011
U.S. SEAL Team 6 raid on Osama bin Laden’s compound in Abbottabad, Pakistan.
SAS WWII
British SAS conducted numerous DA missions against German airfields and supply lines in North Africa.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Distributed Denial of Service (DDoS) Attack

Cyber

A cyberattack that floods a network or system with traffic from multiple sources simultaneously, rendering it unavailable — used in hybrid warfare to disable critical infrastructure, financial systems, or government communications.

Key Characteristics
  • Targets government, financial, media, or military networks
  • Deployed by hacktivists, cyber militias, and state-sponsored actors
  • Can be temporary (to distract during kinetic operations) or sustained (to disable infrastructure)
  • Increasingly used as a component of hybrid and gray-zone warfare
Historical Examples
Estonia, 2007
Massive DDoS campaign crippled Estonian banks, media, and government websites — attributed to Russian actors.
Ukraine, 2014–Present
Russian cyber forces regularly deployed DDoS alongside kinetic operations as a hybrid warfare tool.
Related Terms
Further Reading on The Resistance Hub

Espionage

Tactical Strategic

The covert collection of intelligence through human sources, infiltration, or surveillance, conducted in denied or hostile territory without the knowledge or consent of the target.

Key Characteristics
  • Agents operate under cover identities or clandestine arrangements
  • Captured spies are not entitled to prisoner-of-war status but must receive a fair trial
  • Integral to resistance undergrounds — provides early warning, maps enemy dispositions, and identifies vulnerabilities
  • Distinct from reconnaissance, which is conducted by uniformed military personnel
Historical Examples
WWII
SOE and OSS networks placed agents across occupied Europe to gather intelligence and support resistance cells.
Cold War
CIA officers John Downey and Richard Fecteau were captured during covert operations in China and held for over 20 years.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Evasion & Escape Networks

Tactical Historical

Clandestine infrastructure — safe houses, guides, forged documents, and transport routes — established to move personnel out of denied territory, including downed pilots, escaped prisoners, and compromised operatives.

Key Characteristics
  • Operated by underground or auxiliary elements with deep local knowledge
  • Requires compartmentalized security — each node knows only its immediate links
  • Often among the first capabilities established by a resistance underground
  • Critical for maintaining morale and protecting compromised personnel
Historical Examples
WWII
The Comet Line and Pat O’Leary Line moved hundreds of Allied airmen from occupied Belgium and France to neutral Spain.
Vietnam
U.S. SERE training drew directly on lessons from WWII evasion networks to prepare personnel for capture scenarios.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Foreign Internal Defense (FID)

Doctrine Strategic

Participation by civilian and military agencies of a government in programs taken by another government to protect its society from subversion, lawlessness, insurgency, terrorism, and other threats to its security.

Key Characteristics
  • Defined in JP 3-22 as a core special operations mission
  • Encompasses training, advising, equipping, and institutional capacity building
  • Addresses root causes — governance, rule of law, economic development — not just military threats
  • Distinct from COIN in that FID is conducted by invitation to support a host nation
Historical Examples
1960s
U.S. Special Forces advisors in El Salvador conducted FID to support government counterinsurgency against FMLN.
2010s
U.S. FID programs in the Philippines supported AFP operations against Abu Sayyaf and other militant groups.
Related Terms
Further Reading on The Resistance Hub

Flying Columns

Tactical Historical

Highly mobile guerrilla units specializing in hit-and-run attacks, ambushes, and rapid maneuver that exploit speed and terrain knowledge to strike and disperse before the enemy can respond effectively.

Key Characteristics
  • Operates independently or semi-independently from larger resistance forces
  • Maximizes speed, flexibility, and surprise in engagements
  • Relies on local knowledge and decentralized command to evade pursuit
  • Sustains itself through the population — food, intelligence, and safe houses
Historical Examples
IRA, 1919–1921
Michael Collins’ flying columns ambushed British forces throughout rural Ireland, famously at Kilmichael.
FARC, Colombia
Mobile units deployed for decades to evade Colombian government counterinsurgency operations.
Related Terms

Gray Zone Operations

Strategic Doctrine

State or non-state activities that fall between peace and conventional war — coercive actions designed to achieve strategic objectives while staying below the threshold that would trigger a significant military response.

Key Characteristics
  • Exploits ambiguity to deny attribution and avoid escalation
  • Combines economic coercion, cyber operations, disinformation, and proxy forces
  • Challenges traditional deterrence frameworks built around conventional warfare
  • Intentionally prolongs conflict to exhaust adversary resolve
Historical Examples
Crimea, 2014
Russia used unmarked troops, local militias, and information operations to annex Crimea without triggering NATO response.
South China Sea
China deploys fishing fleets and coast guard vessels to assert territorial claims below the threshold of armed conflict.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Guerrilla Warfare

Tactical Historical

A form of irregular warfare where small, mobile units use ambushes, sabotage, and hit-and-run tactics to harass, attrit, and ultimately exhaust a conventionally superior enemy force over an extended campaign.

Key Characteristics
  • Decentralized command structure — small units operating with significant autonomy
  • Exploits terrain advantages: jungle, urban, mountain, and rural environments
  • Depends on popular support for sustainment, intelligence, and recruitment
  • Focuses on making occupation politically and materially unsustainable
Historical Examples
Arab Revolt, 1916–1918
T.E. Lawrence leveraged Bedouin mobility and psychological warfare against Ottoman supply lines.
Vietnam, 1955–1975
The Viet Cong mastered tunnel networks, jungle ambushes, and political mobilization against U.S. forces.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Denied Area

Doctrine Tactical

Territory under adversary control where friendly forces cannot operate openly. The operational environment in which unconventional warfare, resistance movements, and clandestine operations are conducted.

Key Characteristics
  • Defined in joint doctrine as the space where UW operates ‘through or with’ indigenous forces
  • Access requires clandestine infiltration, indigenous partnerships, or cyber/information means
  • Security forces, surveillance, and population control make denied areas inherently hostile
  • The concept drives the requirement for underground, auxiliary, and guerrilla structures
Historical Examples
WWII
Occupied Europe was the archetypal denied area — SOE and OSS could only operate through resistance networks.
2022–Present
Russian-occupied territories in southern and eastern Ukraine function as denied areas requiring partisan and underground operations.
Related Terms
Further Reading on The Resistance Hub

Disruption

Tactical Strategic

Actions that prevent or impede an adversary from doing what it wants to do. A core method of unconventional warfare that degrades enemy capability without requiring decisive engagement.

Key Characteristics
  • Defined in JP 3-05.1 alongside coercion as a primary UW method
  • Can be small-scale (individual acts of sabotage) or large-scale (coordinated regional resistance)
  • Targets logistics, communications, governance, morale, and decision-making processes
  • Cumulative disruption creates disproportionate costs relative to resources expended
Historical Examples
2022
Ukrainian partisans disrupted Russian logistics in occupied Kherson through targeted sabotage of rail lines and supply depots.
WWII
SOE’s economic warfare campaign disrupted German war production through targeted industrial sabotage across occupied Europe.
Related Terms
Further Reading on The Resistance Hub

Force Multiplier

Tactical Doctrine

A capability, technology, or tactic that dramatically increases the combat effectiveness of a force beyond what its size alone would suggest. In irregular warfare, indigenous knowledge, terrain, and population support are the primary force multipliers.

Key Characteristics
  • Special operations forces are often described as force multipliers because they enable indigenous forces
  • Technology (IEDs, drones, encrypted communications) can multiply small-unit effectiveness
  • In resistance warfare, popular support is the ultimate force multiplier — it provides intelligence, logistics, and concealment
  • The concept explains how guerrillas with limited resources can contest conventional armies
Historical Examples
2020s
Commercial drones used by Ukrainian forces and resistance networks demonstrate how inexpensive technology multiplies small-unit combat power.
1980s
Stinger missiles provided to Afghan mujahideen by the CIA were a decisive force multiplier — neutralizing Soviet air superiority.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Government-in-Exile

Doctrine Strategic

A government displaced from its country of origin that continues to claim legitimate sovereign authority from abroad. Typically takes sanctuary in an allied nation-state and serves as the political focal point for resistance.

Key Characteristics
  • Distinct from a shadow government, which operates inside denied territory
  • Provides diplomatic recognition, international advocacy, and external resource mobilization
  • May coordinate with internal resistance elements but operates in the open
  • Legitimacy depends on international recognition and continued connection to the domestic population
Historical Examples
WWII
The Free French government under de Gaulle operated from London, coordinating with internal resistance and Allied forces.
1959–Present
The Tibetan Government-in-Exile in Dharamsala, India, maintains the claim to Tibetan sovereignty and coordinates nonviolent resistance.
Related Terms
Further Reading on The Resistance Hub

Dead Drop

Tactical

A pre-arranged concealed location used to pass messages, materials, or funds between operatives without requiring direct personal contact — reducing the risk of surveillance detection.

Key Characteristics
  • Eliminates the need for face-to-face meetings, which are the most vulnerable point in clandestine communication
  • Locations are pre-selected, marked with signals (chalk marks, tape, positioned objects) indicating status
  • Digital dead drops use shared cloud storage, steganography, or draft email folders as virtual equivalents
  • Requires disciplined tradecraft — timing, counter-surveillance routes, and fallback procedures
Historical Examples
Cold War
Soviet intelligence services used physical dead drops extensively in Washington, D.C. — Aldrich Ames used a chalk signal on a mailbox to trigger exchanges.
2010s
Resistance networks in authoritarian states adapted dead drops to digital — using shared cloud accounts and encrypted file-sharing platforms.
Related Terms
Further Reading on The Resistance Hub

Decentralized Operations

Tactical Doctrine

An operational approach where subordinate units execute independently based on commander’s intent rather than detailed centralized direction. Essential for resistance forces operating in denied areas with degraded communications.

Key Characteristics
  • Trades coordination for survivability and initiative — no single node failure collapses the network
  • Requires well-trained, ideologically committed operators who understand the mission’s intent
  • Enabled by mission-type orders, pre-planned contingencies, and shared operational culture
  • Modern encrypted communications partially mitigate the coordination penalty of decentralization
Historical Examples
2000s
Al Qaeda’s shift to inspired attacks by autonomous cells demonstrates extreme decentralization — minimal coordination, maximum resilience.
2022
Ukrainian territorial defense units operated with significant autonomy in the early days of the Russian invasion, executing local defense without centralized orders.
Related Terms

Deception Operations

Tactical Strategic

Deliberate measures to mislead adversary decision-makers by manipulating, distorting, or falsifying evidence to induce the enemy to react in a manner prejudicial to their interests.

Key Characteristics
  • Types include feints, demonstrations, ruses, displays, and disinformation campaigns
  • Effective deception exploits the adversary’s existing assumptions and cognitive biases
  • Requires understanding how the enemy collects and processes intelligence
  • Resistance forces use deception to appear stronger, weaker, or differently positioned than they are
Historical Examples
WWII
The Ghost Army used inflatable tanks, sound effects, and fake radio traffic to deceive German forces about Allied dispositions in Europe.
1944
Operation Fortitude convinced Germany that the D-Day invasion would target Pas-de-Calais, not Normandy — one of history’s most consequential deceptions.
Related Terms
Recommended Reading

Exfiltration

Tactical

The removal of personnel or materiel from a denied or hostile area through clandestine, covert, or low-visibility means. The operational complement to infiltration.

Key Characteristics
  • Methods include overland routes, maritime extraction, air pickup, and diplomatic channels
  • In resistance warfare, exfiltration networks move compromised operatives, downed pilots, and escaped prisoners
  • Requires pre-planned routes, safe houses, guides, and communications along the extraction corridor
  • Modern exfiltration may leverage commercial aviation, false documentation, and digital identity management
Historical Examples
WWII
MI9 and MIS-X coordinated exfiltration of Allied airmen from occupied Europe through escape lines like the Comet Line and Pat O’Leary Line.
1979
CIA’s Canadian Caper — exfiltrating six American diplomats from Tehran using false Canadian identities — a classic covert exfiltration.
Related Terms

False Flag Operation

Tactical Psyop

A covert operation designed to appear as though it was carried out by a party other than the actual perpetrator — to deceive observers, provoke a desired reaction, or shift blame.

Key Characteristics
  • The term originates from naval warfare — ships flying enemy flags to approach without suspicion
  • Modern false flags include staged attacks, planted evidence, and fabricated digital trails
  • Used by both state actors (to justify intervention) and non-state actors (to provoke overreaction)
  • Detection requires careful forensic analysis, multiple source verification, and awareness of cui bono
Historical Examples
1939
The Gleiwitz incident — Nazi operatives staged a fake Polish attack on a German radio station to justify the invasion of Poland.
2014
Unattributed attacks in eastern Ukraine were used by multiple parties to justify escalation and intervention.
Related Terms

Fifth Column

Strategic Historical

A clandestine group within a country that sympathizes with and works for an enemy power, undermining the state from within while it faces external threat. Named during the Spanish Civil War.

Key Characteristics
  • Origin: General Mola claimed four columns marched on Madrid while a ‘fifth column’ of sympathizers operated inside the city
  • Operates through espionage, sabotage, propaganda, and subversion of military and government institutions
  • The concept is used (and abused) to justify domestic surveillance, loyalty tests, and persecution of minorities
  • Modern equivalents include state-sponsored diaspora networks and cyber-enabled influence operations
Historical Examples
1936
Nationalist sympathizers inside Republican Madrid conducted sabotage and intelligence collection during the siege — the original fifth column.
WWII
Fear of fifth column activity drove internment of Japanese Americans, German Americans, and others — often with little evidence of actual subversion.
Related Terms

Deterrence

Strategic Doctrine

The use of threats — explicit or implied — to prevent an adversary from taking an unwanted action by convincing them the costs will outweigh any potential gains.

Key Characteristics
  • Requires capability (ability to carry out the threat), credibility (willingness to act), and communication (adversary awareness)
  • In resistance contexts, deterrence works both ways — states deter resistance; resistance deters collaboration
  • Nuclear deterrence between states differs fundamentally from sub-conventional deterrence in IW
  • Deterrence fails when the adversary miscalculates, is irrational, or values objectives more than costs
Historical Examples
Cold War
Mutual assured destruction deterred direct superpower conflict but did not prevent proxy wars and insurgencies.
2010s
Hezbollah’s rocket arsenal deters Israeli ground operations in southern Lebanon — a non-state deterrence model.
Related Terms

Diaspora Support

Strategic

Financial, political, logistical, and informational assistance provided by expatriate communities to resistance or insurgent movements in their homeland. A critical external resource for sustained operations.

Key Characteristics
  • Provides funding through remittances, charitable organizations, and direct contributions
  • Political advocacy in host countries can generate diplomatic pressure and international support
  • Diaspora networks facilitate arms procurement, recruitment, and information operations
  • Host country legal frameworks may constrain or enable diaspora support activities
Historical Examples
1970s–1990s
Irish-American diaspora provided significant financial and political support to Republican movements through organizations like NORAID.
2000s
Tamil diaspora communities in Canada, UK, and Australia funded LTTE operations through front organizations and remittances.
Related Terms

Economic Warfare

Strategic

The deliberate targeting of an adversary’s economic capacity — through sanctions, blockades, sabotage of economic infrastructure, trade disruption, or financial system attacks — to degrade their ability to sustain conflict.

Key Characteristics
  • Can be conducted by states (sanctions, embargoes) or non-state actors (infrastructure sabotage, extortion)
  • Targets include energy infrastructure, financial systems, trade routes, and key industries
  • Resistance movements may conduct economic warfare to make occupation unprofitable
  • Modern economic warfare increasingly involves cyber attacks on financial systems and cryptocurrency disruption
Historical Examples
WWII
Allied strategic bombing of German industrial capacity and SOE sabotage of economic targets constituted comprehensive economic warfare.
2022
Western sanctions against Russia following the Ukraine invasion represent the largest coordinated economic warfare campaign in modern history.
Related Terms
Further Reading on The Resistance Hub

External Support

Strategic Doctrine

Assistance provided to a resistance movement by foreign states, organizations, or diaspora communities — including weapons, training, funding, intelligence, diplomatic recognition, and sanctuary.

Key Characteristics
  • Historically, few resistance movements have succeeded without some form of external support
  • Types include state sponsorship, diaspora funding, NGO assistance, and international advocacy
  • External support carries risks: dependency, loss of autonomy, and foreign agenda imposition
  • UW doctrine is built around the premise of U.S. external support to resistance movements
Historical Examples
1980s
U.S. support to Afghan mujahideen — weapons, training, intelligence — was decisive in imposing unsustainable costs on Soviet occupation.
2022
Western military aid to Ukraine — including advanced weapons systems, intelligence sharing, and training — enabled resistance against a conventional invasion.
Related Terms
Further Reading on The Resistance Hub

Grievance

Strategic

A perceived injustice, deprivation, or violation of rights that motivates individuals and groups to resist authority. The raw material from which resistance movements are built — necessary but not sufficient for mobilization.

Key Characteristics
  • Types include economic (poverty, inequality), political (exclusion, repression), social (discrimination), and security (violence, threat)
  • Grievance alone does not produce resistance — organization, leadership, and opportunity are also required
  • Both real and perceived grievances drive mobilization — perception matters as much as objective conditions
  • Addressing legitimate grievances is the most effective long-term counterinsurgency strategy
Historical Examples
2011
Arab Spring grievances accumulated over decades — corruption, unemployment, repression — but erupted only when organizational capacity and political opportunity aligned.
1960s
Civil rights movement in the U.S. channeled grievances over systemic racism into organized nonviolent resistance that transformed national policy.
Related Terms
Further Reading on The Resistance Hub

Disinformation

Psyop Cyber

Deliberately false or misleading information created and spread with the intent to deceive, confuse, or manipulate a target audience. Distinguished from misinformation (unintentionally false) by the element of deliberate intent.

Key Characteristics
  • A core tool of information warfare — used by state actors, non-state groups, and commercial entities
  • Modern disinformation leverages social media algorithms, bot networks, and AI-generated content for scale
  • Effective disinformation exploits existing social divisions and cognitive biases rather than creating new ones
  • Counter-disinformation requires media literacy, platform regulation, and rapid fact-checking infrastructure
Historical Examples
2016
Russian Internet Research Agency’s social media campaigns in the U.S. combined fabricated content with authentic grievances to amplify domestic division.
2020s
AI-generated deepfakes and synthetic media have dramatically lowered the cost and increased the scale of disinformation production.
Related Terms
Further Reading on The Resistance Hub

Digital Resistance

Cyber Strategic

The use of digital tools and platforms to organize, communicate, and conduct resistance activities — from encrypted messaging and social media coordination to hacktivism and cyber sabotage.

Key Characteristics
  • Lowers barriers to participation — enables coordination without physical proximity
  • Includes secure communications, online fundraising, digital propaganda, and cyber operations
  • Creates new vulnerabilities: surveillance, de-anonymization, platform shutdown, and state-sponsored cyber attacks
  • Effective digital resistance combines online coordination with offline action — digital tools alone rarely produce political change
Historical Examples
2011
Arab Spring movements used Facebook for organizing, Twitter for broadcasting, and YouTube for documenting — creating a model for digitally-enabled resistance.
2022
Ukrainian digital resistance included IT Army cyber operations, social media documentation of war crimes, and civilian intelligence collection via smartphone apps.
Related Terms
Further Reading on The Resistance Hub

Foco Theory

Strategic Historical

A revolutionary strategy developed by Che Guevara and Régis Debray holding that a small guerrilla nucleus (foco) can catalyze mass revolution without waiting for objective conditions to mature — the armed vanguard creates the conditions through action.

Key Characteristics
  • Rejects Marxist orthodoxy that revolution requires proletarian class consciousness as a precondition
  • The guerrilla foco operates from rural base areas, demonstrating state weakness and inspiring popular uprising
  • Success in Cuba convinced Guevara the model was universally applicable — subsequent attempts proved otherwise
  • Failed applications in Bolivia, Argentina, and elsewhere demonstrated the theory’s dependence on specific local conditions
Historical Examples
1956–1959
Castro and Guevara’s campaign in Cuba appeared to validate foco theory — a small band in the Sierra Maestra catalyzed national revolution.
1966–1967
Guevara’s attempt to replicate the foco model in Bolivia failed completely — local conditions, population support, and political context were fundamentally different.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

📚 Go Deeper: Essential Reading List

These terms come alive in the primary texts. Our curated reading list includes Mao, Lawrence, Che Guevara, and modern doctrine — with expert annotations explaining what each book teaches practitioners today.

Browse the Bookshelf →
H–L Hearts & Minds through Lawrence

Hearts and Minds Strategy

Strategic Doctrine

A counterinsurgency approach that prioritizes winning civilian loyalty and addressing political grievances over purely military operations, recognizing that population support is decisive in irregular conflicts.

Key Characteristics
  • Combines military action with humanitarian aid, governance reform, and economic development
  • Aims to delegitimize insurgents by offering security and opportunity to the population
  • Originated with British General Gerald Templer in Malaya, 1952
  • Requires long-term commitment — effects measured in years, not months
Historical Examples
Malayan Emergency, 1948–60
British resettlement programs and economic incentives eroded Communist insurgent support base.
Iraq, 2003–2011
U.S. combined military operations with Provincial Reconstruction Teams — mixed results.
Related Terms

Hybrid Warfare

Strategic Cyber

A modern strategy that blends conventional military force, irregular tactics, cyber operations, economic coercion, and information warfare to achieve strategic goals while avoiding direct state-to-state conflict.

Key Characteristics
  • Simultaneously employs conventional, irregular, cyber, and psychological operations
  • Uses proxy forces and non-state actors to maintain deniability
  • Exploits legal, political, and informational ambiguities
  • Designed to operate below the threshold of NATO Article 5 activation
Historical Examples
Crimea, 2014
Russia used “little green men,” cyber attacks, and information operations in a coordinated hybrid campaign.
Iran Proxy Network
Iran funds and directs Hezbollah, Houthis, and Iraqi militias as proxies to project regional power.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Insurgency

Doctrine Strategic

The organized use of subversion and violence to seize, nullify, or challenge political control of a region. An insurgency can also refer to the group itself.

Key Characteristics
  • Defined in JP 3-24 as a core concept in irregular warfare doctrine
  • Typically involves an underground, auxiliary, guerrilla force, and sometimes a public political component
  • Seeks to erode government legitimacy while building an alternative power base
  • May be ideological, ethno-nationalist, religious, or driven by grievance
Historical Examples
1946–1954
The Viet Minh conducted a protracted insurgency combining guerrilla warfare, political mobilization, and conventional operations to defeat French colonial forces.
2004–2011
The Iraqi insurgency comprised multiple factions — Sunni nationalist, Al Qaeda-aligned, and Shia militia — each with distinct political aims.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Information Operations

Cyber Psyop

The integrated employment of capabilities — including PSYOP, electronic warfare, cyber operations, and deception — to influence, disrupt, or corrupt adversary decision-making while protecting one’s own.

Key Characteristics
  • Targets the cognitive dimension — perceptions, beliefs, and decision processes
  • Combines offensive and defensive information capabilities into unified campaigns
  • In irregular warfare, often the decisive line of effort — shaping legitimacy and popular support
  • Modern IO integrates social media, AI-generated content, and algorithmic manipulation
Historical Examples
2014
Russian IO during the annexation of Crimea combined cyber attacks, social media manipulation, and broadcast propaganda to paralyze Ukrainian decision-making.
2014–2017
ISIS built a global IO apparatus using slick media production, encrypted messaging, and platform manipulation to recruit and terrorize.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Insurgent Logistics

Tactical

The methods through which irregular forces sustain operations — drawing on local populations, external sponsors, captured materiel, and shadow economies to maintain combat effectiveness over extended campaigns.

Key Characteristics
  • Relies on local population for food, medical aid, shelter, and intelligence
  • Involves smuggling routes, black markets, and foreign sponsorship
  • Captures enemy equipment and repurposes civilian infrastructure
  • Vulnerability: logistics nodes are primary counterinsurgency targeting priorities
Historical Examples
Ho Chi Minh Trail
A 1,000-mile logistics network through Laos and Cambodia sustaining Viet Cong and NVA operations.
ISIS, 2014–2019
Funded operations through oil smuggling, extortion, taxation, and looted antiquities.
Related Terms

Lawrence of Arabia’s Strategy

Tactical Historical

T.E. Lawrence’s irregular warfare doctrine — emphasizing mobility, psychological pressure, and disruption of enemy supply lines rather than pitched battle — remains foundational to modern unconventional warfare thinking.

Key Characteristics
  • Leveraged tribal alliances rather than imposing foreign command structures
  • Attacked Ottoman morale and logistics rather than seeking direct engagement
  • Exploited vast desert terrain for mobility and evasion
  • Described his approach: an “unassailable base” and an “entirely fluid” battle
Historical Examples
Arab Revolt, 1916–1918
Lawrence led Bedouin forces against Hejaz Railway — disrupting Ottoman supply to Medina throughout the war.
Soviet-Afghan War
Mujahideen tactics closely echoed Lawrence’s principles — mobility, popular support, and logistics targeting.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Leaderless Resistance

Doctrine Tactical

A form of decentralized insurgency where autonomous cells or individuals operate independently — guided by shared ideology rather than command hierarchy — making the network highly resilient to leadership decapitation.

Key Characteristics
  • No central command — reduces vulnerability to infiltration and decapitation
  • Relies on ideological motivation, manifestos, and online radicalization
  • Used by extremist movements, cyber activist networks, and modern resistance cells
  • Concept popularized by Louis Beam’s 1983 essay in the context of white nationalist strategy
Historical Examples
Animal Liberation Front
Operates as a leaderless network — cells take autonomous action guided by published communiqués.
Lone Actor Terrorism
Individuals self-radicalize online and act independently, complicating traditional intelligence interdiction.
Related Terms
Recommended Reading

Human Network Analysis

Tactical Cyber

The systematic mapping and analysis of relationships, communication patterns, and influence flows within human organizations to identify key nodes, vulnerabilities, and operational patterns.

Key Characteristics
  • Used by both insurgents (to identify recruitment targets) and counterinsurgents (to map threat networks)
  • Identifies critical nodes — leaders, financiers, facilitators — whose removal degrades network function
  • Modern applications combine social media analysis, signals intelligence, and pattern-of-life data
  • Network topology (hierarchy vs. distributed) determines which analysis methods are most effective
Historical Examples
2000s
U.S. JSOC used network analysis to map and dismantle Al Qaeda in Iraq’s leadership structure through targeted operations.
2010s
Open-source network analysis of social media revealed command relationships within ISIS that traditional intelligence had missed.
Related Terms
Further Reading on The Resistance Hub

Irregular Warfare (IW)

Doctrine Strategic

A violent struggle among state and non-state actors for legitimacy and influence over relevant populations. The umbrella concept encompassing unconventional warfare, counterinsurgency, foreign internal defense, counterterrorism, and stability operations.

Key Characteristics
  • Favors indirect and asymmetric approaches over direct conventional engagement
  • Recognizes that legitimacy and population support — not territorial control — are the decisive terrain
  • Includes both U.S. support to resistance (UW) and efforts to counter resistance (COIN, CT, FID)
  • DOD acknowledges IW is not an aberration but an essential component of contemporary conflict
Historical Examples
2001–2021
The U.S. campaign in Afghanistan encompassed the full spectrum of IW — UW with the Northern Alliance, COIN in Helmand, FID with ANDSF, and CT against al Qaeda.
2014–Present
Russian operations in Ukraine combine hybrid warfare, proxy forces, information operations, and conventional elements — a modern IW campaign.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Legitimacy

Strategic Doctrine

The perceived right to govern — the degree to which a population and the international community accept an authority as rightful, lawful, and worthy of obedience. The central object of competition in irregular warfare.

Key Characteristics
  • Both insurgents and governments compete for legitimacy — it determines who the population supports
  • Sources include tradition, legal authority, performance (service delivery), and charismatic leadership
  • Legitimacy is granted by the population, not claimed by the authority
  • Loss of legitimacy through corruption, brutality, or incompetence is the primary driver of resistance movements
Historical Examples
2010–2011
The Arab Spring erupted when multiple governments lost legitimacy through decades of corruption, repression, and failure to deliver basic services.
1960s–1970s
The Viet Cong built legitimacy in rural areas through land reform, dispute resolution, and security — competing directly with the Saigon government.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Ideology

Strategic

A coherent system of beliefs, values, and ideas that provides the intellectual framework for a political movement — defining goals, justifying methods, identifying enemies, and motivating participants.

Key Characteristics
  • Functions as the binding narrative that holds a movement together across geography, time, and setbacks
  • Can be secular (nationalism, communism, liberalism) or religious (jihadism, liberation theology)
  • Effective ideology simplifies complex reality into clear us-vs-them frameworks that motivate action
  • Resistance movements without coherent ideology typically fragment under pressure
Historical Examples
20th Century
Marxist-Leninist ideology provided a universal framework adopted by revolutionary movements across three continents — from Cuba to Vietnam to Mozambique.
2000s
Salafi-jihadist ideology unified disparate groups under al Qaeda’s banner despite geographic separation and local variation.
Related Terms

Improvised Explosive Device (IED)

Tactical

A makeshift bomb constructed from available materials — military ordnance, commercial explosives, or homemade compounds — designed to destroy, incapacitate, or harass. The signature weapon of modern insurgency.

Key Characteristics
  • Types include roadside (command-detonated or victim-activated), vehicle-borne (VBIED), and person-borne (PBIED)
  • Asymmetric advantage: low cost to produce, high cost to counter — IED defense consumed billions in Iraq and Afghanistan
  • Employment requires intelligence (target patterns), engineering (construction), and operational planning (emplacement)
  • Countermeasures include route clearance, electronic jamming, intelligence-driven targeting of bomb-makers, and population engagement
Historical Examples
2003–2011
IEDs accounted for the majority of U.S. casualties in Iraq, driving massive investment in MRAP vehicles and counter-IED technology.
1970s–1990s
PIRA refined IED design over decades — from simple pipe bombs to sophisticated radio-controlled and infrared-triggered devices.
Related Terms
Further Reading on The Resistance Hub

Indoctrination

Psyop Strategic

The systematic process of instilling a specific set of beliefs, values, and behavioral norms in new members of an organization — creating ideological commitment and group cohesion.

Key Characteristics
  • Resistance movements use indoctrination to ensure reliability, discipline, and willingness to accept risk
  • Methods include political education, study groups, mentorship, ritual, and gradual escalation of commitment
  • Effective indoctrination creates internalized motivation — members act from conviction, not just orders
  • The process often involves identity transformation — adopting new names, cutting ties, embracing group norms
Historical Examples
1960s
Viet Cong recruits underwent extensive political education emphasizing class struggle, anti-imperialism, and collective responsibility.
2010s
ISIS recruitment pipelines moved individuals from passive online consumption to active commitment through escalating stages of indoctrination.
Related Terms

Infrastructure Attack

Tactical Strategic

Deliberate targeting of critical civilian or military infrastructure — power grids, water systems, transportation networks, communications — to degrade an adversary’s capacity to govern, fight, or sustain its population.

Key Characteristics
  • Blurs the line between sabotage (physical) and cyber attack (digital) as infrastructure becomes networked
  • Targets are selected for cascading effects — a single node failure can collapse dependent systems
  • Raises significant legal and ethical questions about distinction and proportionality under LOAC
  • Both state and non-state actors increasingly target infrastructure as a gray-zone warfare tool
Historical Examples
2015–2016
Russian cyber attacks on Ukraine’s power grid — first confirmed cyber attacks to cause physical infrastructure failure.
2022
Systematic Russian strikes against Ukrainian energy infrastructure during winter — weaponizing civilian suffering as strategic pressure.
Related Terms
Further Reading on The Resistance Hub

Intelligence Collection

Tactical Doctrine

The systematic gathering of information about adversaries, terrain, and conditions through human sources (HUMINT), signals (SIGINT), imagery (IMINT), open sources (OSINT), and other means to support decision-making.

Key Characteristics
  • In resistance warfare, HUMINT is primary — underground members with access collect through observation, conversation, and infiltration
  • Modern resistance intelligence integrates commercial technology: smartphones, drones, social media monitoring
  • The intelligence cycle — requirements, collection, processing, analysis, dissemination — applies regardless of scale
  • Collection discipline is critical: what you collect, how you store it, and who accesses it are all OPSEC concerns
Historical Examples
1940s
French Resistance intelligence networks provided crucial order-of-battle information for D-Day planning — including beach defenses and troop dispositions.
2022
Ukrainian civilians used smartphones and social media to report Russian military movements to defense forces in real time.
Related Terms

Kinetic Operations

Tactical Doctrine

Military actions involving the use of lethal force — direct fire, explosives, strikes — as distinguished from non-kinetic activities such as information operations, civil affairs, and diplomatic engagement.

Key Characteristics
  • In irregular warfare, kinetic operations are typically a supporting effort — not the main effort
  • Includes raids, ambushes, targeted strikes, and defensive combat operations
  • Over-reliance on kinetic action without addressing political root causes is a recurring COIN failure
  • Must be precisely calibrated — excessive force alienates the population and generates new recruits for the enemy
Historical Examples
2000s
JSOC’s kinetic targeting campaign against al Qaeda in Iraq was effective only when paired with the political awakening of Sunni tribes.
1960s
U.S. body-count metrics in Vietnam incentivized kinetic operations at the expense of political and governance efforts — contributing to strategic failure.
Related Terms

Liberation Movement

Strategic Historical

An organized political and often military campaign to free a people or territory from colonial rule, foreign occupation, or systemic oppression. Distinguished by its claim to self-determination as a legal and moral right.

Key Characteristics
  • Derives legitimacy from international recognition of self-determination under the UN Charter
  • Typically combines armed resistance with diplomatic campaigns for international recognition
  • Historical liberation movements shaped post-WWII decolonization across Africa, Asia, and the Middle East
  • The label is politically contested — one side’s liberation movement is another’s terrorist organization
Historical Examples
1950s–1970s
African liberation movements — ANC, FRELIMO, PAIGC — combined guerrilla warfare with international advocacy to end colonial and apartheid rule.
1948–Present
Palestinian liberation organizations illustrate the contested nature of the term — recognized as liberation by some states, as terrorism by others.
Related Terms

Human Terrain

Doctrine Tactical

The social, cultural, economic, and political environment of a population within an operational area. Understanding human terrain is the prerequisite for effective counterinsurgency and unconventional warfare.

Key Characteristics
  • Includes tribal structures, religious affiliations, economic networks, political allegiances, and historical grievances
  • Mapping human terrain requires HUMINT, cultural expertise, and sustained engagement — not just technical collection
  • In UW, understanding human terrain identifies potential resistance partners, supporters, and vulnerabilities
  • Critics argue the concept risks instrumentalizing local populations for military purposes
Historical Examples
2000s
U.S. Human Terrain System deployed social scientists with combat units in Iraq and Afghanistan to improve cultural understanding — with controversial results.
1960s
British success in Malaya depended on detailed understanding of Chinese squatter communities’ social dynamics and grievances.
Related Terms

Insurrection

Doctrine Historical

A violent uprising against an established authority — typically spontaneous or loosely organized, shorter in duration and less structured than an insurgency. May be a precursor to broader rebellion.

Key Characteristics
  • Distinguished from insurgency by its lower level of organization and shorter duration
  • Often triggered by a specific event — election fraud, police killing, food price spike — rather than sustained grievance campaign
  • May be suppressed quickly or escalate into sustained insurgency depending on state response and movement organization
  • Legal response typically falls under domestic criminal law rather than law of armed conflict
Historical Examples
2021
The January 6 U.S. Capitol breach exhibited characteristics of insurrection — a violent action against government authority, loosely organized and event-triggered.
2011
Initial Syrian protests escalated from insurrection to rebellion to full insurgency as the Assad regime’s violent response radicalized the opposition.
Related Terms

Junta

Strategic Historical

A military or political group that seizes and holds power through force, typically after a coup d’état. Governs through collective military leadership rather than constitutional civilian authority.

Key Characteristics
  • Derives power from control of the military rather than popular mandate or legal succession
  • Often justifies seizure of power through claims of restoring order, fighting corruption, or preventing state collapse
  • Historical pattern: juntas suppress political opposition, restrict media, and eventually face resistance movements
  • Transition from junta rule to civilian governance is a critical — and often violent — political process
Historical Examples
2021
Myanmar’s military junta (Tatmadaw) seized power and faced sustained armed and civilian resistance from across the country’s ethnic groups.
1973–1990
Chile’s military junta under Pinochet ruled through systematic repression before eventually yielding to democratic transition.
Related Terms

Law of Armed Conflict (LOAC)

Doctrine

The body of international law governing the conduct of armed hostilities — regulating the means and methods of warfare, protecting civilians and prisoners, and defining combatant status. Also known as International Humanitarian Law (IHL).

Key Characteristics
  • Primary sources: Geneva Conventions (1949), Hague Conventions (1907), Additional Protocols, and customary international law
  • Core principles: military necessity, distinction, proportionality, and humanity
  • In irregular warfare, LOAC application is complicated by the blurring of combatant and civilian status
  • Status of resistance participants depends on their position on the resistance continuum — from criminal to combatant
Historical Examples
1949–Present
The Geneva Conventions establish the legal framework governing treatment of prisoners, wounded, and civilians in armed conflict.
2000s
Debates over detainee status at Guantánamo Bay highlighted LOAC ambiguity in conflicts against non-state actors.
Related Terms
Further Reading on The Resistance Hub

Hacktivist

Cyber

An individual or group that uses computer hacking for politically motivated purposes — website defacement, data leaks, DDoS attacks, and other cyber operations conducted in support of a political cause.

Key Characteristics
  • Bridges activism and cyber warfare — using technical skills for ideological rather than criminal or state objectives
  • Organizations like Anonymous pioneered decentralized hacktivist operations with minimal formal structure
  • Methods range from website defacement (propaganda) to data exfiltration (intelligence) to DDoS (disruption)
  • Hacktivist groups may be co-opted or instrumentalized by state intelligence services
Historical Examples
2010s
Anonymous conducted operations against ISIS, Scientology, and various governments — demonstrating decentralized hacktivist capability.
2022
Ukraine’s IT Army coordinated thousands of volunteer hacktivists to conduct DDoS attacks against Russian government and media targets.
Related Terms
M–P Maoist Warfare through Proxy Warfare

Maoist Warfare

Doctrine Historical

Mao Zedong’s revolutionary strategy of protracted people’s war — a three-phase progression from guerrilla defense through strategic stalemate to conventional counteroffensive, built on rural mass mobilization and political indoctrination.

Key Characteristics
  • Phase 1 — Strategic Defense: Small-scale guerrilla warfare to build base areas and weaken the enemy
  • Phase 2 — Strategic Stalemate: Expansion, larger attacks, consolidation of liberated zones
  • Phase 3 — Strategic Counteroffensive: Transition to conventional warfare and final victory
  • Political work inseparable from military work — “political power grows from the barrel of a gun”
Historical Examples
Chinese Revolution, 1927–1949
Mao’s forces implemented the three-phase strategy against Kuomintang over 22 years.
Naxalite Insurgency, India
Communist insurgents in central India continue applying Maoist doctrine in forest-based operations.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Mass Mobilization

Strategic

The large-scale organization of civilians for political or military action — the conversion of popular grievance into organized resistance through propaganda, grassroots networks, and ideological commitment.

Key Characteristics
  • Uses propaganda, charismatic leadership, and social networks to recruit
  • Can be violent (armed uprisings) or nonviolent (civil resistance campaigns)
  • Often supported by external actors providing funding and training
  • Social media has dramatically accelerated mobilization timelines
Historical Examples
Arab Spring, 2010–2012
Social media-enabled popular uprisings against authoritarian regimes across North Africa and the Middle East.
Cuban Revolution, 1953–1959
Castro leveraged rural and urban grievances to build a mass movement that toppled Batista.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Michael Collins’ Tactics

Tactical Historical

A model of urban guerrilla warfare combining intelligence penetration, selective assassination, and political strategy to systematically dismantle British control in Ireland — arguably the first modern insurgency campaign.

Key Characteristics
  • Deep penetration of British intelligence networks — Collins had sources inside Dublin Castle
  • Small-unit flying columns for rural ambushes, Squad assassinations in urban areas
  • Selective violence targeting intelligence officers rather than indiscriminate attacks
  • Understood the political dimension — shaped British public opinion toward negotiation
Historical Examples
Bloody Sunday, 1920
Collins’ Squad assassinated 14 British intelligence officers in a single morning, crippling British intelligence operations in Ireland.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Narrative Warfare

Psyop Cyber

The deliberate use of storytelling, propaganda, and information operations to shape public perception, delegitimize adversaries, and frame conflict in terms favorable to one’s strategic objectives.

Key Characteristics
  • Combines psychological manipulation with media, social platforms, and cultural production
  • Seeks to control the frame — who is legitimate, who is the aggressor
  • Operates in peacetime, conflict, and post-conflict phases
  • Increasingly executed through AI-generated content and social media amplification
Historical Examples
Cold War
U.S. and Soviet Union ran competing global information operations through media, cultural programs, and front organizations.
ISIS, 2014–2019
Sophisticated digital propaganda (Dabiq magazine, video productions) recruited thousands internationally.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Passive Resistance

Strategic Historical

Organized opposition through nonviolent, non-cooperative methods — strikes, boycotts, civil disobedience, go-slows, and symbolic acts — designed to erode the occupier’s or regime’s authority without direct confrontation.

Key Characteristics
  • Distinguished from active resistance by the absence of armed action
  • Research shows nonviolent campaigns succeed more often than violent ones at achieving political objectives
  • Effective at undermining regime legitimacy and imposing economic and political costs
  • Often precedes or operates alongside armed resistance as part of a broader movement
Historical Examples
1950s–1960s
The U.S. Civil Rights Movement used sit-ins, marches, and boycotts to challenge segregation without armed force.
1980s
Poland’s Solidarity movement used strikes and civil disobedience to challenge communist rule, eventually forcing free elections.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Propaganda

Psyop Strategic

Any form of communication — especially of a biased or misleading nature — designed to influence the opinions, emotions, attitudes, or behavior of a target audience in order to benefit the sponsor.

Key Characteristics
  • Classified as white (source acknowledged), gray (source unattributed), or black (falsely attributed)
  • Used by both state and non-state actors to shape perceptions and mobilize populations
  • In resistance movements, propaganda builds legitimacy and recruits support
  • Modern propaganda exploits algorithms, social media virality, and AI-generated content
Historical Examples
1940s
BBC broadcasts to occupied Europe served as white propaganda, sustaining morale and delivering coded instructions to resistance networks.
2010s
Russian Internet Research Agency operations demonstrated industrial-scale gray and black propaganda targeting Western democracies.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Proxy Warfare

Strategic

A conflict in which external powers support local surrogate forces to fight on their behalf — pursuing strategic objectives while avoiding direct military engagement and maintaining plausible deniability.

Key Characteristics
  • Surrogate forces receive arms, training, funding, and intelligence support
  • Reduces direct risk for the sponsoring power politically and militarily
  • Often prolongs conflicts by sustaining losing sides that would otherwise collapse
  • Creates blowback risk — proxies may pursue independent agendas
Historical Examples
Soviet-Afghan War, 1979–89
The U.S. armed Mujahideen through Operation Cyclone — contributing to Soviet withdrawal.
Syria, 2011–Present
Multiple external actors (U.S., Russia, Iran, Turkey, Gulf states) support different factions, extending the conflict.
Related Terms
Further Reading on The Resistance Hub

Psychological Operations (PSYOP)

Psyop

Planned operations to convey selected information to targeted audiences to influence their emotions, reasoning, and behavior in ways that support the operational objectives of the commander or movement.

Key Characteristics
  • Targets enemy forces, civilian populations, and allied nations simultaneously
  • Uses leaflets, broadcasts, social media, and direct interaction
  • Aims to demoralize opponents, encourage defection, and build friendly support
  • Most effective when reinforced by credible military and political actions
Historical Examples
WWII Pacific
U.S. “Tokyo Rose” and leaflet campaigns targeted Japanese troop morale throughout the Pacific theater.
Gulf War, 1991
Coalition leaflet operations contributed to mass Iraqi surrenders during Operation Desert Storm.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

No-Go Zone

Tactical

An area where government or occupying forces cannot safely operate due to resistance activity, hostile terrain, or loss of population control. Often represents de facto territorial control by insurgent forces.

Key Characteristics
  • Indicators include inability to patrol, IED-saturated routes, and withdrawn police/government services
  • May be urban (neighborhood-level) or rural (entire districts or provinces)
  • Creates space for shadow governance, training, logistics staging, and recruitment
  • Government acknowledgment of no-go zones represents a significant propaganda loss
Historical Examples
1970s
Republican-controlled areas of West Belfast and Derry became effective no-go zones for British Army patrols during the early Troubles.
2010s
Large swaths of Afghanistan’s rural Pashtun south functioned as no-go zones for ANDSF, effectively ceded to Taliban governance.
Related Terms
Further Reading on The Resistance Hub

Operational Security (OPSEC)

Tactical Doctrine

The process of identifying, controlling, and protecting information about friendly operations that could give an adversary an advantage. In resistance contexts, OPSEC failures are often fatal.

Key Characteristics
  • Follows a five-step process: identify critical information, analyze threats, analyze vulnerabilities, assess risk, apply countermeasures
  • In underground organizations, OPSEC governs communications, movement, meetings, and identity management
  • Digital OPSEC includes device security, encrypted communications, metadata discipline, and social media hygiene
  • The most common cause of resistance network compromise is human error, not technical penetration
Historical Examples
WWII
SOE’s security failures in the Netherlands — Operation North Pole — allowed German counterintelligence to control captured radio operators for years.
2010s
ISIS operatives were geolocated through metadata in uploaded images and social media check-ins, demonstrating fatal digital OPSEC failures.
Related Terms
Further Reading on The Resistance Hub

Public Component

Doctrine Strategic

The overt political arm of a resistance or insurgent movement — responsible for public negotiations, diplomatic engagement, international advocacy, and legitimate interface with civilian populations.

Key Characteristics
  • Distinguished from the underground by its openly visible, public-facing nature
  • Not synonymous with shadow government or government-in-exile — serves a distinct function
  • May represent strategic leadership or function as an interest section of the broader movement
  • If the state suppresses the public component, it may dissolve and go underground
Historical Examples
1990s
Sinn Féin operated as the public component of the Republican movement — conducting political negotiations while PIRA conducted armed operations.
2010s
The Syrian National Coalition functioned as the public component of the Syrian opposition — seeking international recognition and support.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Militia

Tactical Doctrine

An armed force composed of civilian volunteers who are not part of the regular military establishment. May serve defensive, offensive, or auxiliary roles depending on legal status and organizational allegiance.

Key Characteristics
  • Distinct from guerrillas (who fight as part of an insurgent movement) and regular military (who serve the state)
  • Legal status varies enormously — from state-sanctioned territorial defense to illegal armed groups
  • Can be pro-government (paramilitaries, home guard) or anti-government (armed opposition)
  • Modern territorial defense forces blend militia tradition with professional military training
Historical Examples
2014–Present
Ukrainian territorial defense battalions evolved from volunteer militia into formalized units integrated with the armed forces.
2000s
Iraqi Shia militias — some state-supported, some Iran-backed — operated across the spectrum from legitimate security to sectarian violence.
Related Terms

Mobilization

Strategic Doctrine

The process of assembling, organizing, and activating resources — human, material, and institutional — for conflict. In resistance contexts, mobilization transforms latent popular support into active participation.

Key Characteristics
  • Resistance mobilization requires converting grievance into organized action — grievance alone is insufficient
  • Factors include organizational infrastructure, resource access, political opportunity, and effective framing
  • Can be rapid (crisis-triggered mass mobilization) or gradual (sustained underground recruitment)
  • Digital tools accelerate mobilization speed but can also enable surveillance and countermobilization
Historical Examples
2011
The Arab Spring demonstrated rapid mobilization — decades of grievance activated within weeks by social media amplification and regime vulnerability.
1980s
Solidarity’s mobilization of Polish workers was gradual — years of underground organization preceded the mass strikes that challenged communist rule.
Related Terms
Further Reading on The Resistance Hub

Night Letter

Psyop Tactical

A threatening or instructive message distributed clandestinely — typically at night — to a target population, officials, or potential collaborators. A classic psychological operations tactic used by underground movements.

Key Characteristics
  • Serves multiple functions: intimidation, instruction, warning, and demonstration of presence
  • The anonymity and nocturnal delivery amplify the psychological impact — implying the movement can reach anyone
  • Content ranges from death threats against collaborators to instructions for civil disobedience
  • Modern equivalents include anonymous SMS campaigns, social media threats, and cyber intimidation
Historical Examples
2000s
Taliban night letters (shabnamah) warned Afghan villagers against cooperating with coalition forces or sending girls to school.
1940s
European resistance movements distributed night letters threatening collaborators and encouraging passive resistance among occupied populations.
Related Terms

Order of Battle (ORBAT)

Tactical Doctrine

A detailed accounting of an adversary’s military units, strength, disposition, command structure, equipment, and capabilities. The foundational intelligence product for planning operations.

Key Characteristics
  • Includes unit identification, location, strength, equipment, leadership, and assessed combat effectiveness
  • In resistance warfare, ORBAT intelligence on occupying forces enables targeting, avoidance, and exploitation of gaps
  • Building ORBAT requires sustained collection from multiple sources — HUMINT, observation, captured documents, SIGINT
  • Modern ORBAT tracking integrates satellite imagery, social media monitoring, and electronic emissions analysis
Historical Examples
WWII
Resistance networks across occupied Europe provided London with detailed ORBAT intelligence on German garrison forces — essential for invasion planning.
2022
Open-source intelligence analysts built near-real-time ORBAT assessments of Russian forces in Ukraine using social media, satellite imagery, and intercepted communications.
Related Terms
Further Reading on The Resistance Hub

Non-State Actor

Doctrine Strategic

Any entity that exercises political influence or employs organized violence but is not a sovereign state — including insurgent groups, terrorist organizations, militias, criminal networks, NGOs, and multinational corporations.

Key Characteristics
  • The rise of non-state actors is the defining feature of contemporary irregular warfare
  • May possess capabilities — cyber, financial, military — that rival or exceed those of weak states
  • Legal status is ambiguous — non-state actors generally fall outside the traditional state-centric framework of international law
  • Can be proxies for state actors, independent operators, or hybrid entities with both state and non-state characteristics
Historical Examples
2010s
ISIS at its peak controlled territory, collected taxes, provided services, and fielded conventional military forces — a non-state actor functioning as a proto-state.
2020s
Private military companies like Russia’s Wagner Group blur the line between state and non-state — operating with state backing but deniable accountability.
Related Terms

Occupation

Doctrine Historical

The effective control of territory by a foreign military force that is not the sovereign authority. Under international law, occupation triggers specific legal obligations regarding the civilian population, governance, and use of force.

Key Characteristics
  • Legally defined by effective control — not by formal declaration or treaty
  • Occupying power must maintain public order, respect existing laws, and protect the civilian population
  • Occupation is historically the primary catalyst for armed resistance movements
  • Prolonged occupation generates grievances that compound over time — making sustained resistance increasingly likely
Historical Examples
1940–1945
German occupation of Western Europe triggered resistance movements in every occupied country — from Norway to Greece.
1967–Present
Israeli occupation of Palestinian territories has generated continuous resistance in various forms over more than five decades.
Related Terms

Pacification

Doctrine Historical

Military and political operations designed to establish government control over a population and territory contested by insurgents — combining security operations, governance, development, and population control measures.

Key Characteristics
  • Combines kinetic operations (clearing) with holding forces and governance (building)
  • Historical usage carries negative connotations — associated with colonial suppression and forced population control
  • Modern COIN doctrine reframes pacification as ‘population-centric’ operations focused on winning legitimacy
  • Effectiveness depends on the government’s willingness to address root grievances — not just impose security
Historical Examples
1960s
U.S. pacification programs in Vietnam — Strategic Hamlet, CORDS — attempted to separate the population from Viet Cong influence with limited success.
1950s
British pacification in Malaya combined population resettlement, food control, and political engagement — one of the few successful models.
Related Terms
Further Reading on The Resistance Hub

Political Warfare

Strategic Doctrine

The employment of all means short of war — diplomatic, informational, economic, and covert — to achieve political objectives that would otherwise require military force. George Kennan defined it as the logical application of Clausewitz in peacetime.

Key Characteristics
  • Encompasses propaganda, covert action, economic pressure, support to friendly factions, and diplomatic isolation
  • Operates in the space between diplomacy and armed conflict — the gray zone
  • Requires whole-of-government coordination — military, intelligence, diplomatic, and economic instruments
  • Adversaries like Russia, China, and Iran conduct political warfare continuously; Western democracies often struggle to respond in kind
Historical Examples
Cold War
U.S. political warfare included covert support to anti-communist movements, radio broadcasting (Voice of America, Radio Free Europe), and economic aid.
2010s
Russian political warfare against Western democracies combined cyber operations, social media manipulation, financial influence, and support to extremist movements.
Related Terms
Further Reading on The Resistance Hub

Protracted War

Strategic

A strategic approach in which the weaker side deliberately extends the duration of conflict to exhaust the stronger adversary’s political will, economic resources, and military capacity — trading time for strategic advantage.

Key Characteristics
  • Core concept in Maoist theory — the weaker force avoids decisive engagement while building strength over time
  • Three phases: strategic defensive, strategic stalemate, strategic offensive
  • Success depends on the adversary having limited political tolerance for sustained costs — democracies are particularly vulnerable
  • Requires a durable support base, ideology that sustains commitment, and leadership that manages expectations
Historical Examples
1946–1975
Vietnamese resistance against France and then the United States is the textbook case — three decades of protracted war that exhausted two major powers.
2001–2021
The Taliban’s 20-year campaign against coalition forces in Afghanistan demonstrated protracted war against a technologically superior adversary.
Related Terms
Recommended Reading

Open Source Intelligence (OSINT)

Cyber Tactical

Intelligence derived from publicly available information — including media, social media, commercial satellite imagery, public records, and academic publications — collected and analyzed for operational purposes.

Key Characteristics
  • The democratization of intelligence — no longer requires state-level resources to collect meaningful intelligence
  • Sources include social media, commercial satellites, shipping data, flight tracking, financial records, and news media
  • OSINT played a transformative role in the Ukraine conflict — providing near-real-time battlefield intelligence
  • Requires analytical skill to verify, contextualize, and fuse disparate open sources into actionable intelligence
Historical Examples
2014
Bellingcat used OSINT to attribute the MH17 shootdown to a Russian BUK missile system — demonstrating investigative-quality open source analysis.
2022
Commercial satellite imagery and social media analysis provided unprecedented public visibility into Russian force dispositions and operations in Ukraine.
Related Terms

Partisan

Tactical Historical

An irregular combatant fighting behind enemy lines, typically as part of an organized resistance movement against foreign occupation. The term carries strong WWII-era associations but applies across conflicts.

Key Characteristics
  • Distinguished from regular military by operating without uniforms, in small units, using guerrilla tactics
  • Partisan legitimacy depends on connection to a broader resistance organization or recognized authority
  • Historical partisans combined military operations (sabotage, ambush) with intelligence collection and civilian protection
  • Legal status is contested — partisans may or may not qualify for combatant protections depending on organization and conduct
Historical Examples
1941–1945
Soviet partisans operated behind German lines in massive numbers — conducting sabotage, intelligence collection, and tying down occupation forces.
1941–1945
Yugoslav Partisans under Tito grew into a major military force, liberating territory and establishing governance structures during occupation.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

People’s War

Strategic Historical

Mao Zedong’s strategic concept in which the entire population is mobilized as participants in revolutionary warfare — the guerrilla army draws from, hides within, and is sustained by the people, who are the ‘sea’ in which guerrilla ‘fish’ swim.

Key Characteristics
  • Three phases: strategic defensive (guerrilla warfare), strategic stalemate (mobile warfare), strategic offensive (conventional operations)
  • The population provides intelligence, logistics, recruits, concealment, and political legitimacy
  • Requires extensive political organization — cadres embedded in villages building parallel governance
  • Distinct from foco theory in its emphasis on patient, bottom-up political mobilization before armed action
Historical Examples
1937–1949
Mao’s protracted people’s war against Japan and then the Nationalists is the defining case — decades of patient political and military mobilization.
1960s–1970s
Vietnamese resistance adopted and adapted people’s war — combining Maoist political mobilization with innovative military tactics against U.S. forces.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Propaganda of the Deed

Historical Psyop

A political theory holding that dramatic acts of violence or resistance communicate a message more powerfully than words alone — the action itself is the propaganda, designed to inspire followers and demonstrate the vulnerability of the state.

Key Characteristics
  • Originated in 19th-century anarchist movements as justification for assassinations and bombings
  • The logic: a single spectacular act generates disproportionate psychological impact and media attention
  • Modern manifestations include terrorist spectaculars, self-immolation protests, and symbolic occupations
  • Critics argue it invites repression, alienates potential supporters, and is ethically indefensible when targeting civilians
Historical Examples
1880s–1900s
Anarchist assassinations of heads of state across Europe — the original propaganda of the deed — inspired fear but failed to produce systemic change.
2001
The September 11 attacks were propaganda of the deed at its most extreme — a spectacular act designed to communicate a strategic message through violence.
Related Terms
R–S Revolutionary Warfare through Swarming

Rebellion

Doctrine Historical

Armed opposition to a standing government that has not yet reached the sustained intensity, organization, or territorial control required for recognition as an insurgency or belligerency under international law.

Key Characteristics
  • Rebels are generally subject to domestic criminal law and not entitled to combatant protections
  • Represents an early stage on the resistance continuum between civil disobedience and insurgency
  • May involve sporadic violence, armed clashes, or localized uprisings
  • Can escalate to insurgency if the movement gains organization, territory, and sustained capability
Historical Examples
2012
The Tuareg rebellion in northern Mali — the MNLA seized territory before being overtaken by jihadist factions, escalating to insurgency.
2011
Early Syrian opposition began as rebellion — localized defections and armed clashes — before fragmenting into full-scale insurgency and civil war.
Related Terms
Further Reading on The Resistance Hub

Subversion

Tactical Strategic

Actions designed to undermine the authority, integrity, or functioning of a government or institution from within, including infiltration of security forces, corruption of officials, and exploitation of legal or bureaucratic systems.

Key Characteristics
  • One of the three pillars of underground operations alongside sabotage and espionage
  • Often invisible and deniable — targets institutional trust rather than physical infrastructure
  • Can be conducted by state actors, non-state movements, or foreign intelligence services
  • Success is measured by degradation of regime cohesion, not territory seized
Historical Examples
1980s
Solidarity activists in Poland infiltrated state institutions and media, eroding the communist regime’s ability to govern effectively.
1919–1921
Michael Collins systematically penetrated British intelligence in Dublin, turning informants and neutralizing the regime’s information advantage.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Shadow Governance

Strategic Doctrine

Governmental functions — security, taxation, justice, health services — performed by an irregular organization to replace or compete with the existing regime’s governance in contested or denied areas.

Key Characteristics
  • Members can originate from any element — underground, auxiliary, or guerrilla force
  • Builds legitimacy through service delivery, demonstrating the movement can govern
  • Distinct from a government-in-exile, which operates from outside the denied area
  • Often a prerequisite for transitioning from insurgency to recognized political authority
Historical Examples
1960s–1970s
The Viet Cong maintained parallel governance structures across rural South Vietnam — collecting taxes, administering justice, and running schools.
2010s
Taliban shadow governors operated in every Afghan province, providing dispute resolution and security that competed with the Kabul government.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Revolutionary Warfare

Strategic Historical

A strategy of long-term ideological conflict combining guerrilla military tactics with political mobilization to overthrow an existing state or occupying power and replace it with a new order.

Key Characteristics
  • Military operations subordinate to political objectives — war is politics by other means
  • Seeks total systemic change, not negotiated reform
  • Combines armed struggle with propaganda, political organization, and mass mobilization
  • Often requires external ideological or material support to survive early phases
Historical Examples
Chinese Revolution, 1949
22-year campaign combining Maoist protracted war with political education produced complete regime change.
Cuban Revolution, 1959
Castro and Guevara combined guerrilla warfare with political mobilization to overthrow Batista in 25 months.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Sabotage

Tactical

The deliberate destruction, disruption, or obstruction of enemy infrastructure, supply chains, communication networks, or morale — a core irregular warfare capability employed by resistance movements throughout history.

Key Characteristics
  • Targets supply chains, transport, communications, and industrial production
  • Can be physical (explosives, arson) or cyber (hacking, malware)
  • Often conducted by underground resistance groups or SOF
  • Strategic sabotage targets nodes of enemy logistical dependency
Historical Examples
French Resistance, WWII
Railway sabotage slowed German troop movements following D-Day — critical to Allied breakout from Normandy.
Stuxnet, 2010
U.S.-Israeli cyber weapon sabotaged Iranian centrifuges at Natanz — first destructive cyber sabotage operation.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Selective Terror

Tactical

The use of targeted violence against specific individuals — military commanders, intelligence officers, collaborators — to undermine enemy control while preserving civilian support for the resistance.

Key Characteristics
  • Eliminates high-value targets while avoiding civilian alienation
  • Aims to destabilize leadership and create institutional paralysis
  • Contrasted with indiscriminate terror which typically backfires politically
  • Requires precise intelligence — wrong targets accelerate resistance collapse
Historical Examples
IRA, 1919–1921
Collins’ Squad specifically targeted British intelligence officers — crippling the G-Division and Cairo Gang.
Operation Wrath of God
Israeli Mossad targeted PLO operatives responsible for Munich 1972 massacre — selective, global campaign.
Related Terms
Further Reading on The Resistance Hub

Special Operations Forces (SOF)

Doctrine Tactical

Elite military units trained and organized for unconventional warfare, direct action, reconnaissance, and foreign internal defense — often operating in small teams deep inside denied territory.

Key Characteristics
  • Operates in small, highly skilled teams with significant autonomous authority
  • Seven core activities: DA, SR, UW, FID, COIN, CT, IO
  • Works by, with, and through local resistance forces
  • Selection and training pipeline far more demanding than conventional forces
Historical Examples
U.S. Army Special Forces
Green Berets specialise in Foreign Internal Defense — building partner nation forces and supporting resistance movements.
British SAS, WWII–Present
Conducted behind-enemy-lines operations since WWII — deep raids, partner force training, and hostage rescue.
Related Terms
Further Reading on The Resistance Hub

Swarming Tactics

Tactical

Coordinated attacks by multiple dispersed units converging from different directions simultaneously to overwhelm an adversary’s ability to respond — applicable from Mongol cavalry to modern drone swarms.

Key Characteristics
  • Speed and maneuverability are decisive advantages over brute force
  • Distributed command — units operate semi-autonomously toward shared objectives
  • Applied in cyber warfare (coordinated DDoS), drone operations, and ground tactics
  • Analyzed by RAND (2000) as a key future warfare mode
Historical Examples
Mongol Warfare
Genghis Khan’s cavalry operated in dispersed formations converging on targets — standard for the era.
Ukraine Drone War, 2022–
Both sides deploy drone swarms to overwhelm air defenses and strike dispersed targets simultaneously.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Raid

Tactical

A swift, surprise attack against a specific target followed by planned withdrawal. One of the three core guerrilla tactical actions alongside the ambush and reconnaissance. Unlike an ambush, a raid targets a fixed position.

Key Characteristics
  • Characterized by detailed planning, violent execution, and rapid disengagement
  • Targets include supply depots, command posts, communications nodes, and enemy personnel
  • Success depends on intelligence preparation, rehearsal, and pre-planned withdrawal routes
  • Can serve tactical (destroy materiel), strategic (demonstrate capability), or psychological (undermine morale) objectives
Historical Examples
1943
Norwegian commandos raided the Vemork heavy water plant — Operation Gunnerside — disrupting German nuclear weapons development.
2011
The Bin Laden raid in Abbottabad demonstrated how surgical raid operations can achieve strategic-level effects.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Reconnaissance

Tactical

The systematic observation and collection of information about enemy forces, terrain, weather, and civilian activity to support operational planning. The third leg of the guerrilla tactical triad alongside raid and ambush.

Key Characteristics
  • Types include route, zone, area, and force-oriented reconnaissance
  • In resistance warfare, conducted by underground members with legitimate access to target areas
  • Modern reconnaissance integrates physical observation with OSINT, drone surveillance, and cyber collection
  • The quality of reconnaissance directly determines the success of raids and ambushes
Historical Examples
1919–1921
Michael Collins’ intelligence network conducted detailed reconnaissance of British intelligence officers in Dublin, enabling targeted operations.
2022
Ukrainian resistance conducted reconnaissance of Russian logistics and command positions in occupied areas, feeding targeting data to conventional forces.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Resistance Continuum

Doctrine Strategic

A framework categorizing resistance activities along a spectrum from nonviolent legal action to armed belligerency, based on increasing intensity, duration, and organization. Used to analyze how movements evolve and at what legal thresholds protections change.

Key Characteristics
  • Stages: nonviolent legal → nonviolent illegal (civil disobedience) → rebellion → insurgency → belligerency
  • Each threshold carries distinct legal implications for the status of participants and responding forces
  • Movements can escalate, de-escalate, or occupy multiple positions simultaneously
  • Central concept in the ARIS Legal Status study — governs analysis of intervention and combatant protections
Historical Examples
2011
Syria’s resistance moved rapidly across the continuum — from peaceful protests to civil disobedience to rebellion to full insurgency within months.
1950s–1990s
South Africa’s anti-apartheid movement operated across the entire continuum simultaneously — legal challenges, civil disobedience, and armed resistance.
Related Terms
Further Reading on The Resistance Hub

Resistance Movement

Doctrine Strategic

An organized effort by some portion of the civil population of a country to resist the legally established government or an occupying power and to disrupt civil order and stability. The foundational concept of unconventional warfare.

Key Characteristics
  • Defined in JP 3-05 as the core entity that UW seeks to enable
  • Composed of underground, auxiliary, guerrilla forces, public component, and potentially shadow governance
  • Can be violent, nonviolent, or a combination — the defining feature is organized opposition
  • Research shows nonviolent resistance campaigns succeed more often than violent ones at achieving political objectives
Historical Examples
WWII
European resistance movements — French, Polish, Norwegian, Yugoslav — represented the full spectrum of organized civilian opposition to occupation.
2022–Present
Ukrainian national resistance combines conventional defense, territorial defense forces, partisan operations, and civilian support networks.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Safe Haven

Tactical Strategic

Any space — physical, legal, financial, or virtual — that enables an irregular organization to plan, organize, train, conduct operations, or rest with limited interference from enemy or counterinsurgent forces.

Key Characteristics
  • Physical safe havens include cross-border sanctuaries, mountainous terrain, and urban neighborhoods
  • Legal safe havens exploit jurisdictional boundaries and legal protections that constrain government action
  • Virtual safe havens include encrypted platforms, dark web, and cyber infrastructure in permissive jurisdictions
  • Denial of safe havens is a primary objective of counterinsurgency and counterterrorism
Historical Examples
1980s
Pakistan’s tribal areas served as a physical safe haven for Afghan mujahideen — providing sanctuary, logistics, and training space beyond Soviet reach.
2010s
ISIS used encrypted messaging platforms as virtual safe havens for recruitment, planning, and command — outside the reach of conventional surveillance.
Related Terms

Social Movement Theory

Strategic Doctrine

Academic frameworks explaining how, why, and when collective action emerges and sustains itself. Provides analytical tools for understanding resistance mobilization, framing, resource dynamics, and political opportunity.

Key Characteristics
  • Key frameworks include resource mobilization theory, political process theory, and framing theory
  • Explains how grievance alone is insufficient — movements require organization, resources, and opportunity
  • Framing theory examines how movements construct narratives that resonate with potential supporters
  • Applied in both UW (enabling movements) and COIN (understanding and countering them)
Historical Examples
1980s
Poland’s Solidarity movement is a textbook case — latent grievance combined with organizational structure (trade unions), external support, and political opening.
2011
Arab Spring mobilization patterns closely match political process theory — decades of grievance erupted when regime vulnerability became apparent.
Related Terms
Further Reading on The Resistance Hub

Regime Change

Strategic Doctrine

The replacement of one government or political system with another — achieved through revolution, coup d’état, foreign intervention, negotiated transition, or election. A potential objective of both resistance movements and external powers.

Key Characteristics
  • Methods range from nonviolent (elections, mass protest) to violent (armed revolution, military intervention)
  • U.S. history includes regime change through UW (covert support to opposition), conventional military action, and diplomatic pressure
  • Post-regime-change stabilization is often harder than the initial overthrow — the ‘day after’ problem
  • International law restricts foreign-imposed regime change but does not prevent support to indigenous movements
Historical Examples
2003
U.S. invasion of Iraq achieved rapid regime change but generated a decade of insurgency and instability — illustrating the ‘day after’ challenge.
2011
Libyan regime change through NATO intervention and indigenous uprising succeeded militarily but left a power vacuum filled by competing armed groups.
Related Terms
Further Reading on The Resistance Hub

Self-Determination

Strategic Doctrine

The right of peoples to determine their own political status and governance — a foundational principle of international law enshrined in the UN Charter that provides legal and moral justification for many resistance movements.

Key Characteristics
  • Recognized in the UN Charter (Article 1) and the International Covenant on Civil and Political Rights
  • Provides the legal basis for decolonization movements and separatist claims
  • Tension between self-determination and territorial integrity creates persistent international disputes
  • Application is politically contested — who constitutes a ‘people’ and what ‘self-determination’ means in practice are debated
Historical Examples
1945–1970s
Decolonization across Africa and Asia was driven by self-determination — the principle that colonial peoples had the right to independent governance.
2014
Crimean ‘self-determination’ referendum demonstrated how the principle can be instrumentalized — Russia claimed self-determination while critics cited illegal annexation.
Related Terms
Further Reading on The Resistance Hub

Stay-Behind Network

Tactical Historical

A pre-positioned clandestine organization designed to operate in territory after it is overrun by an adversary — conducting intelligence collection, sabotage, and resistance support from within occupied areas.

Key Characteristics
  • Established during peacetime and activated upon invasion or occupation
  • Members are recruited, trained, and equipped in advance — with hidden caches of weapons, communications, and supplies
  • Requires extreme compartmentalization — networks must survive initial occupation sweeps and remain dormant until activated
  • Cold War NATO stay-behind programs (e.g., Gladio) prepared for Soviet occupation of Western Europe
Historical Examples
Cold War
NATO’s Gladio network placed stay-behind operatives across Western Europe — trained to conduct guerrilla operations and intelligence collection in case of Soviet invasion.
2022
Ukraine’s pre-war preparation of resistance networks in southern and eastern oblasts demonstrated modern stay-behind principles applied to a real invasion scenario.
Related Terms
Further Reading on The Resistance Hub
T–Z Underground Network through Zero-Sum

Underground Network

Tactical

The clandestine infrastructure — safe houses, couriers, forgers, intelligence collectors, and civilian supporters — that sustains a resistance movement’s covert activities beneath the surface of daily life.

Key Characteristics
  • Operates invisibly within the civilian population — “the sea in which the fish swim”
  • Provides logistics, intelligence, recruitment, and safe passage for active fighters
  • Compartmentalized to limit damage from penetration by enemy intelligence
  • The underground is often more critical than the armed wing — it’s the foundation
Historical Examples
WWII Dutch Resistance
Hid over 300,000 Jews and Allied airmen, produced forged documents, and gathered intelligence at enormous personal risk.
Viet Cong Infrastructure
Provincial and village networks provided food, intelligence, and recruitment across South Vietnam.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Terrorism

Doctrine Tactical

The unlawful use or threat of violence against civilians or noncombatants for political, ideological, or religious purposes, intended to coerce governments, intimidate populations, or provoke disproportionate responses.

Key Characteristics
  • Distinguished from guerrilla warfare by its deliberate targeting of noncombatants
  • Seeks psychological impact disproportionate to the physical damage inflicted
  • No universally accepted legal definition exists — classification is often politically contested
  • Can be employed by state actors, non-state groups, or individuals
Historical Examples
1970s–1990s
PIRA’s bombing campaign in Northern Ireland and England targeted both military and civilian infrastructure to pressure British withdrawal.
2001
The September 11 attacks demonstrated how non-state terrorism could trigger global strategic consequences far beyond the act itself.
Related Terms
Further Reading on The Resistance Hub

Total Resistance

Strategic Doctrine

A comprehensive national defense concept in which the entire population is prepared to resist occupation through coordinated military, paramilitary, and civilian resistance across all domains — armed, political, economic, and informational.

Key Characteristics
  • Concept popularized by Swiss Major Hans von Dach in his 1957 manual Total Resistance
  • Integrates conventional defense with pre-planned guerrilla, underground, and auxiliary structures
  • Assumes that conventional defeat does not end the fight — resistance continues by other means
  • Modern applications seen in Nordic, Baltic, and Ukrainian national defense concepts
Historical Examples
Cold War
Switzerland, Sweden, and Finland maintained total resistance doctrines — training civilians in guerrilla tactics and pre-positioning materiel for occupation scenarios.
2022–Present
Ukraine’s territorial defense forces and civilian resistance embody total resistance principles, combining regular forces with widespread civilian participation.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Vanguardism

Strategic Historical

A revolutionary theory holding that a small, disciplined elite — the vanguard — must lead and direct the broader population toward political transformation, as the masses cannot independently develop revolutionary consciousness.

Key Characteristics
  • Rooted in Leninist theory — the Communist Party as the vanguard of the proletariat
  • Adapted by Guevara’s foco theory: a small guerrilla nucleus can ignite mass revolution
  • Contrasts with Maoist people’s war, which emphasizes bottom-up mass mobilization
  • Critiqued for producing authoritarian movements that substitute elite control for popular participation
Historical Examples
1917
The Bolshevik Party exemplified Leninist vanguardism — a disciplined cadre that seized power on behalf of a broader revolutionary movement.
1959
Castro and Guevara’s 26th of July Movement demonstrated foco-style vanguardism — a small guerrilla band catalyzing national revolution in Cuba.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Unconventional Warfare (UW)

Doctrine Tactical

As defined in U.S. SOF doctrine: activities conducted to enable a resistance movement or insurgency to coerce, disrupt, or overthrow a government or occupying power by operating through or with underground, auxiliary, and guerrilla forces.

Key Characteristics
  • Relies on local resistance forces to conduct operations — “by, with, and through”
  • Combines military, psychological, and economic tactics over extended timelines
  • Supported by external actors providing intelligence, training, and logistics
  • One of the original SOF core activities — the reason Green Berets were created
Historical Examples
Operation Jedburgh, WWII
Allied teams infiltrated into occupied France to organize, arm, and direct French resistance sabotage operations.
Cold War
U.S. Green Berets trained resistance forces across Latin America, Africa, and Southeast Asia.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

Cyber Warfare

Cyber Strategic

The use of digital attacks against adversary networks, infrastructure, and information systems to achieve military or political objectives — an increasingly central domain of both conventional and hybrid conflict.

Key Characteristics
  • Targets critical infrastructure: power grids, financial systems, communications, military C2
  • Offers strategic effects without kinetic engagement — attribution is frequently deniable
  • Non-state actors (hacktivists, criminal groups) increasingly operate alongside state actors
  • U.S. CYBERCOM formally recognized cyber as a fifth domain of warfare in 2009
Historical Examples
Stuxnet, 2010
First publicly confirmed destructive cyber weapon — damaged Iranian nuclear centrifuges without physical intrusion.
Ukraine Power Grid, 2015–16
Russian Sandworm team used malware to cut power to 230,000 Ukrainians — first confirmed cyberattack on a power grid.
Related Terms
Further Reading on The Resistance Hub
Recommended Reading

War of the Flea

Strategic

Robert Taber’s metaphor describing how a small guerrilla force can exhaust a vastly superior army — like a flea on a dog, the guerrilla is never where the dog bites, but the dog cannot stop scratching.

Key Characteristics
  • Focuses on attrition rather than territorial conquest
  • Uses hit-and-run tactics to exhaust enemy resources and political will
  • Sustainability depends on population support and ungoverned terrain
  • The guerrilla wins by not losing; the conventional force wins only by decisively defeating the guerrilla
Historical Examples
Vietnam, 1955–1975
The Viet Cong used prolonged attrition to outlast U.S. political will despite massive military disparity.
Taliban, 2001–2021
Endurance strategy against NATO forces ultimately succeeded as political support for the mission eroded.
Related Terms
Recommended Reading

Zero-Sum Conflict

Strategic

A conflict in which one party’s gains directly translate to the other’s losses — typically characteristic of revolutionary wars, total insurgencies, and existential conflicts where negotiated settlement is considered unacceptable by at least one party.

Key Characteristics
  • No middle ground — victory for one side means complete defeat for the other
  • Often tied to ideological, ethnic, or existential stakes
  • Resistance to compromise makes negotiated resolution extremely difficult
  • Frequently drives escalatory dynamics and atrocities against civilians
Historical Examples
Chinese Revolution, 1949
Mao’s victory resulted in total displacement of the Kuomintang government to Taiwan — no power-sharing outcome.
Syrian Civil War, 2011–
Multiple factions engage in zero-sum competition for total control, preventing durable settlement.
Related Terms

Troll Farm

Cyber Psyop

An organized operation employing paid personnel to post inflammatory, divisive, or misleading content on social media and online forums — typically at the direction of a state actor or political organization.

Key Characteristics
  • Operates at industrial scale — hundreds of operators managing thousands of fake accounts
  • Content strategy exploits platform algorithms and human psychology to maximize engagement and division
  • Techniques include persona management, coordinated amplification, hashtag hijacking, and astroturfing
  • Attribution is difficult by design — operations use VPNs, stolen identities, and local-language native speakers
Historical Examples
2013–Present
Russia’s Internet Research Agency in St. Petersburg employed hundreds of operatives targeting U.S. and European social media with divisive content.
2010s
Multiple state actors — Iran, China, Saudi Arabia — established troll farm operations to influence domestic and international online discourse.
Related Terms
Further Reading on The Resistance Hub

Territorial Defense Force

Tactical Doctrine

A military or paramilitary organization composed of local volunteers tasked with defending their home territory — typically operating alongside regular forces with lighter equipment and focused on area security, rear-area defense, and resistance.

Key Characteristics
  • Blends militia tradition with professional military training and state authorization
  • Members often serve part-time while maintaining civilian occupations — similar to the auxiliary concept
  • Provides local knowledge, population access, and area defense that regular forces cannot efficiently replicate
  • Modern territorial defense concepts are central to Nordic, Baltic, and Ukrainian national defense strategies
Historical Examples
2022
Ukraine’s Territorial Defense Forces (TrO) mobilized over 100,000 volunteers in the opening weeks of the Russian invasion — securing rear areas and conducting local defense.
Present
Finland, Sweden, Estonia, Latvia, and Lithuania maintain territorial defense organizations as integral components of total defense strategies.
Related Terms
Further Reading on The Resistance Hub

White Propaganda

Psyop

Propaganda that is openly attributed to its true source — the audience knows who produced it and can evaluate it accordingly. Distinguished from gray (unattributed) and black (falsely attributed) propaganda by its transparency.

Key Characteristics
  • Derives credibility from acknowledged authorship and factual accuracy — even if selectively presented
  • Government communications, official media, and military broadcasting are typical forms of white propaganda
  • In resistance contexts, white propaganda builds movement legitimacy through truthful reporting and open advocacy
  • Most effective when it contrasts with adversary disinformation — credibility becomes a strategic asset
Historical Examples
Cold War
Voice of America and BBC World Service operated as white propaganda — their acknowledged Western sponsorship was transparent, but factual reporting built credibility.
2022
Ukrainian government communications during the Russian invasion — President Zelensky’s public addresses — functioned as highly effective white propaganda.
Related Terms
↑ Back to Top