<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AI &amp; Deterrence &#8212; Global Security Review AI &amp; Deterrence %</title>
	<atom:link href="https://globalsecurityreview.com/ai-deterrence/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/ai-deterrence/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Tue, 21 Apr 2026 10:33:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>AI &amp; Deterrence &#8212; Global Security Review AI &amp; Deterrence %</title>
	<link>https://globalsecurityreview.com/ai-deterrence/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Nuclear Deterrence in the Age of Emerging Technologies</title>
		<link>https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/</link>
					<comments>https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/#respond</comments>
		
		<dc:creator><![CDATA[Muhammad Usama Khalid]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 12:16:11 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[action/reaction time]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[algorithmic escalation]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[automated retaliatory strike]]></category>
		<category><![CDATA[conventional prompt strike]]></category>
		<category><![CDATA[CPS]]></category>
		<category><![CDATA[cyber deterrence]]></category>
		<category><![CDATA[cyber operations]]></category>
		<category><![CDATA[cyber warfare]]></category>
		<category><![CDATA[dual-use]]></category>
		<category><![CDATA[emerging technologies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Fatah series missiles]]></category>
		<category><![CDATA[Fattah-2 hypersonic missile]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Here is a comma-separated list of keywords extracted from the article:Nuclear deterrence]]></category>
		<category><![CDATA[HGV]]></category>
		<category><![CDATA[human-centric control.]]></category>
		<category><![CDATA[human-in-the-loop]]></category>
		<category><![CDATA[hypersonic glide vehicle]]></category>
		<category><![CDATA[hypersonics]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[NC3 modernization]]></category>
		<category><![CDATA[nuclear escalation]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[quantum sensing]]></category>
		<category><![CDATA[Quantum SQUID]]></category>
		<category><![CDATA[radiation sensors]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[seismic sensors]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[Stuxnet]]></category>
		<category><![CDATA[submarine detection]]></category>
		<category><![CDATA[Superconducting Quantum Interference Device]]></category>
		<category><![CDATA[Ukrainian energy infrastructure]]></category>
		<category><![CDATA[US Ohio-class submarines]]></category>
		<category><![CDATA[warhead ambiguity]]></category>
		<category><![CDATA[Zumwalt-class destroyers]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32605</guid>

					<description><![CDATA[<p>Published: April 21, 2026 The amalgamation of emerging technologies and nuclear weapons systems is significantly impacting the landscape of strategic stability. The primary problem associated with such technologies is their dual-use nature, such as Artificial Intelligence (AI), hyper sonics, quantum computing, and cyber warfare. These technologies are evolving more rapidly than the treaties meant to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/">Nuclear Deterrence in the Age of Emerging Technologies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: April 21, 2026</em></p>
<p>The amalgamation of emerging technologies and nuclear weapons systems is significantly impacting the landscape of strategic stability. The primary problem associated with such technologies is their dual-use nature, such as Artificial Intelligence (AI), hyper sonics, quantum computing, and cyber warfare. These technologies are evolving more rapidly than the <a href="https://jqas.org/modernizing-arms-control-the-case-for-codifying-oversight-in-ai-and-nuclear-command-policy-marcellus-policy-analysis/">treaties meant to regulate them</a>.</p>
<p>The most significant emerging technology is Artificial Intelligence (AI), a prominent dual-use disruptor. In the civilian domain, it can help process large amounts of data based on its training. Meanwhile, in the nuclear domain, it affects among other things, the <a href="https://media.nti.org/documents/NTI_Paper_AI_r4.pdf">nuclear decision making</a> process.</p>
<p>The U.S. is currently considering <a href="https://jqas.org/modernizing-arms-control-the-case-for-codifying-oversight-in-ai-and-nuclear-command-policy-marcellus-policy-analysis/">incorporating AI into its NC3 modernization</a> process while maintaining a human-in-the-loop policy for launches, using AI to monitor abnormal patterns in adversary movements. Russia, on the other hand, is developing AI-driven upgrades to its <a href="https://www.csis.org/analysis/how-russia-reshaping-command-and-control-ai-enabled-warfare">automated retaliatory strike system</a> to ensure that if the country’s leadership is decapitated, the system can autonomously verify a nuclear strike via seismic and radiation sensors before launching a retaliatory strike. These change decision timing and the deterrence dynamic.</p>
<p>The incorporation of hypersonic technology into delivery vehicles has revolutionized the exchange of weapons in warfare. The speed at which hypersonic systems travel can exceed Mach 5 (five times the speed of sound), potentially inducing miscalculation for an adversary, since it compresses the time window to clearly assess whether a missile is conventional or nuclear. In late 2024 and early 2025, India tested its <a href="https://vajiramandravi.com/current-affairs/drdos-hypersonic-missile/">Hypersonic Glide Vehicle (HGV) technology</a>. Since these vehicles travel at such high speeds and at low altitudes with the ability to maneuver, it impacts the deterrence strategy between two nuclear countries. In response, Pakistan accelerated the <a href="https://www.gids.com.pk/land">Fatah series</a> missiles, which are designed as flat-trajectory rockets. The geographical proximity of India and Pakistan compresses the decision-making window during a crisis.</p>
<p>The world&#8217;s largest naval force, the U.S. navy, is currently integrating the Conventional Prompt Strike (CPS) hypersonic system onto Zumwalt-class destroyers. A Zumwalt-class ship may appear as a nuclear threat on radar but carries conventional weapons, risking warhead ambiguity for an adversary who might launch a nuclear strike if provoked. The recent exchange of delivery vehicles during the <a href="https://www.britannica.com/event/Israel-Iran-conflict">Iran and Israel conflict of 2024-2025</a> has shown the effect of hypersonic missiles in military operations. Iran used the <a href="https://mylibrarianship.wordpress.com/2025/06/15/irans-fattah-2-hypersonic-missile-a-game-changer-in-regional-military-power/">Fattah-2 hypersonic missile</a>, capable of Mach 5+ speeds with mid-flight maneuverability. Such weapon-delivery systems create strategic ambiguity for the adversary because they provide only a few seconds&#8217; window to decide whether to retaliate with conventional or nuclear missiles.</p>
<p>Advancements in quantum computing change warfare by providing more powerful algorithms producing vulnerabilities in secure systems. Nuclear launch codes, for example, are considered among the most secure encryption systems, which cannot be broken by classical computer methods. However, with advanced quantum computing methods, they become more vulnerable to hacking.</p>
<p>Additionally, <a href="https://www.9dashline.com/article/quantum-sensors-and-submarine-invulnerability">Quantum sensing</a>, which is facilitated with quantum electronic systems, allow for detection of minute changes in gravity or magnetic fields, which could produce systems that detect submarines, reducing their element of surprise. For example, China has made a huge leap by developing <a href="https://nationalsecurityjournal.org/is-the-stealth-submarine-era-over/">Quantum SQUID (Superconducting Quantum Interference Device) sensors</a>. These devices may be able to detect the magnetic signature of US Ohio-class stealth submarines from miles away, threatening the ultimate nuclear deterrent.</p>
<p>Cyber warfare has recently moved to the forefront of modern warfare tactics with potential impacts on nuclear deterrence. Cyber warfare may produce uncertainties due to disruption of detection mechanisms and nuclear command and control that could produce unstable strategic situations. The classic Cold War model of Mutually Assured Destruction (MAD) was based on the visible, slow-moving, threat of nuclear weapons exchange. Cyber warfare introduces complexity and confusion. Thus, the deliberate nature of threats; instead, may instigate miscalculations driven by algorithms or false cyber signals.</p>
<p>A good example of how cyber operations can offset traditional military operations was the venture to physically damage Iranian nuclear centrifuges using malicious software (malware). The operation was carried out using Stuxnet malware installed from a USB drive that destroyed centrifuges without a single kinetic device. Similarly, Russian hackers have been carrying out <a href="https://jsis.washington.edu/news/cyberattack-critical-infrastructure-russia-ukrainian-power-grid-attacks/">cyber-attacks against Ukrainian energy infrastructure</a> and government agencies since 2015. Vis-à-vis in 2025, during the ongoing Russia-Ukraine war, Ukrainian intelligence conducted a <a href="https://www.csis.org/analysis/unpacking-ukraines-future-cyber-and-space-forces">cyber-operation shutting down the Russian railway</a> and affecting digital infrastructure.</p>
<p>A major problem lies with warhead ambiguity (conventional vs. nuclear), which poses a huge risk for accidental nuclear escalation. During the height of the May 2025 crisis between the two South Asian rivals, cyber operations were at their peak. Consequently, in the post-crisis scenario, India is enhancing its cyber deterrence. In future conflicts, any state’s cyber space will be one of the primary targets; in a scenario where lines are already blurred, a single attempt to disrupt the cyber space of NC3 could be the initiating point of nuclear escalation.</p>
<p>The evolution of dual-use emerging technologies is fundamentally changing the traditional pillars of nuclear deterrence by compressing the action/reaction time required for rational decision-making. A major problem lies with warhead ambiguity (conventional vs. nuclear), which poses a huge risk for accidental nuclear escalation. In the volatile context of South Asia, dual-use technologies appear to destabilize a fragile strategic stability.</p>
<p>Ultimately, as machines outpace human thought in the decision loop, there is a danger that the resulting disruption is not just a technological arms race but the erosion of human-centric control, creating the risk of an accidental, algorithmically driven nuclear escalation as the defining strategic challenge of the future.</p>
<p><em>Muhammad Usama Khalid is a Research Officer at the Balochistan Think Tank Network (BTTN), BUITEMS, Quetta. He can be reached at: </em><a href="mailto:usama.khalid.uk456@gmail.com"><em>usama.khalid.uk456@gmail.com</em></a><em>. The views of the author are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/04/Nuclear-Deterrence-in-the-Age-of-Emerging-Technologies.pdf"><img decoding="async" class="alignnone wp-image-32606" src="http://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26.png" alt="" width="205" height="57" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26-300x83.png 300w" sizes="(max-width: 205px) 100vw, 205px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/">Nuclear Deterrence in the Age of Emerging Technologies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lethal Autonomous Weapon Systems: A New Battlefield Reality</title>
		<link>https://globalsecurityreview.com/lethal-autonomous-weapon-systems-a-new-battlefield-reality/</link>
					<comments>https://globalsecurityreview.com/lethal-autonomous-weapon-systems-a-new-battlefield-reality/#respond</comments>
		
		<dc:creator><![CDATA[Jawad Ali Shah]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 12:10:24 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[algorithmic bias]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[autonomous weapons]]></category>
		<category><![CDATA[civilian casualties]]></category>
		<category><![CDATA[confidence-building measures]]></category>
		<category><![CDATA[emerging military technologies]]></category>
		<category><![CDATA[false nuclear alarms]]></category>
		<category><![CDATA[full autonomy]]></category>
		<category><![CDATA[Gaza conflict]]></category>
		<category><![CDATA[global peace and security]]></category>
		<category><![CDATA[human out of the loop]]></category>
		<category><![CDATA[IHL]]></category>
		<category><![CDATA[international humanitarian law]]></category>
		<category><![CDATA[international verification mechanisms]]></category>
		<category><![CDATA[LAWS]]></category>
		<category><![CDATA[Lethal Autonomous Weapon Systems]]></category>
		<category><![CDATA[Meaningful Human Control]]></category>
		<category><![CDATA[MHC]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[moratorium]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Resolution A/RES/79/62]]></category>
		<category><![CDATA[South Asian nuclear deterrence]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[strategic stability dynamics]]></category>
		<category><![CDATA[Ukraine conflict]]></category>
		<category><![CDATA[UN CCW]]></category>
		<category><![CDATA[UN Convention on Certain Conventional Weapons]]></category>
		<category><![CDATA[UN General Assembly]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32504</guid>

					<description><![CDATA[<p>Published:  March 31, 2026  Technological advances and rising military expenditures in recent years have accelerated the development of Lethal Autonomous Weapon Systems (LAWS). Though this technology is still in its infancy, it has already transformed modern warfare. LAWS, when fully evolved, will provide means for precise and independent selection and engagement of targets without exposing soldiers to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/lethal-autonomous-weapon-systems-a-new-battlefield-reality/">Lethal Autonomous Weapon Systems: A New Battlefield Reality</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><i><span data-contrast="auto">Published: </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> March 31, 2026</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Technological advances and rising military expenditures in recent years have accelerated the development of Lethal Autonomous Weapon Systems (LAWS). Though this technology is still in its infancy, it has already transformed modern warfare. LAWS, when fully evolved, will provide means for precise and independent selection and engagement of targets without exposing soldiers to battlefield dangers. A 2025 Congressional Research Service report titled </span><a href="https://www.congress.gov/crs-product/IF11150"><span data-contrast="none">Defense Primer: U.S. Policy</span></a><span data-contrast="auto"> on LAWS classifies it as “a special class of weapon systems that use sensor suites and computer algorithms to independently identify, target and employ an onboard weapon system to engage and destroy it without manual human control.” The US Department of Defense </span><a href="https://www.esd.whs.mil/portals/54/documents/dd/issuances/dodd/300009p.pdf"><span data-contrast="none">Directive 3000.09, Autonomy in Weapon Systems (2023)</span></a><span data-contrast="auto">, defined LAWS as systems that, once activated, “can select and engage targets without further intervention by a human operator.” This concept, known as “human out of the loop” or “full autonomy,” involves target selection and engagement based on inputs from artificial intelligence (AI), big data analytics, and sensor-based identification.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">According to </span><a href="https://www.datamintelligence.com/research-report/autonomous-weapons-market"><span data-contrast="none">Data M Intelligence</span></a><span data-contrast="auto">, the global autonomous weapons market reached USD 14.2 billion in 2024 and is expected to grow to USD 33.47 billion by 2032, with a compound annual growth rate of 11.39 percent during 2025-2032. Simultaneously, global civil society initiatives are advocating a ban on fully autonomous systems. In October 2012, Amnesty International launched the </span><a href="https://www.stopkillerrobots.org/stop-killer-robots-x-amnesty-international/"><span data-contrast="none">Stop Killer Robots</span></a><span data-contrast="auto"> campaign, an alliance of over 180 organizations across 65 countries, calling for an international law on autonomy in weapon systems to ensure machines are not allowed to make decisions that affect life and death.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Concerns have arisen over unsupervised use and the potential for system errors that can cause unintended civilian casualties, escalate conflicts, and threaten global peace and security. The increasing integration of autonomous weapon systems in combat has already been highlighted by their reported use in Ukraine conflict and in Gaza. A February 2025 </span><a href="https://media.setav.org/en/file/2025/02/deadly-algorithms-destructive-role-of-artificial-intelligence-in-gaza-war.pdf"><span data-contrast="none">report</span></a><span data-contrast="auto"> by the Foundation for Political, Economic and Social Research titled </span><i><span data-contrast="auto">Deadly Algorithms: Destructive Role of Artificial Intelligence in Gaza War</span></i><span data-contrast="auto"> revealed that Israel employed AI-based systems, Lavender and Habsora, to identify and attack human targets. The report states that Lavender can approve targets within 20 seconds, often without substantive human review. Since October 2023, the system has compiled a list of 37,000 potential individuals labelled as Hamas members without verifying their military profile.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Since 2014, the United Nations Convention on Certain Conventional Weapons (UN CCW) has debated the regulation of LAWS. In May 2024, Arms Campaign Director Steve Goose of Human Rights Watch </span><a href="https://www.dailymail.co.uk/news/article-13374209/chinese-russian-ai-nukes-ww3-fears-missiles-america.html"><span data-contrast="none">warned</span></a><span data-contrast="auto"> that “the world is approaching a tipping point for acting on concerns over autonomous weapons systems,” underscoring the urgency of an international legal instrument. On 2 December 2024, the UN General Assembly adopted </span><a href="https://documents.un.org/doc/undoc/gen/n24/391/35/pdf/n2439135.pdf"><span data-contrast="none">Resolution A/RES/79/62</span></a><span data-contrast="auto"> on LAWS by 166 votes in favor, 3 against, and 15 abstentions. The resolution marked a decisive step in acknowledging global concerns over autonomous weapon systems, affirmed the applicability of international humanitarian law (IHL) and called for further consultations in 2025. The </span><a href="https://www.stopkillerrobots.org/news/dynamic-consultations-demonstrate-a-clear-need-for-all-states-to-have-a-seat-at-the-table/"><span data-contrast="none">first UNGA meeting</span></a><span data-contrast="auto"> on autonomous weapons, held on 12-13 May 2025 and attended by 96 countries, including representatives from the International Committee of the Red Cross (ICRC) and civil society, reinforced momentum to prohibit and regulate LAWS. On that occasion, UN Secretary-General António Guterres advocated for a legally binding instrument to </span><a href="https://www.stopkillerrobots.org/news/un-secretary-general-calls-for-new-international-law-to-regulate-and-prohibit-killer-robots-by-2026/"><span data-contrast="none">ban LAWS by 2026</span></a><span data-contrast="auto">, describing them as “politically unacceptable and morally repugnant.”</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Despite global concerns, progress on a legally binding treaty on LAWS remains elusive due to divergent strategic interests of major powers. The </span><a href="https://www.reuters.com/world/progress-rules-lethal-autonomous-weapons-urgently-needed-says-chair-geneva-talks-2026-03-03/"><span data-contrast="none">US continues to resist</span></a><span data-contrast="auto"> codification of a new binding framework, emphasizing the adequacy of national weapons review mechanisms to preserve strategic and technological flexibility. While the US maintains that it does not currently possess LAWS, senior military leaders have acknowledged that Washington may be compelled to develop them if adversaries do so. </span><a href="https://www.reuters.com/world/progress-rules-lethal-autonomous-weapons-urgently-needed-says-chair-geneva-talks-2026-03-03/"><span data-contrast="none">Russia has opposed</span></a><span data-contrast="auto"> any binding treaty, while </span><a href="https://un.china-mission.gov.cn/eng/chinaandun/disarmament_armscontrol/202510/t20251024_11739691.htm"><span data-contrast="none">China</span></a><span data-contrast="auto"> supports negotiations on the CCW and the development of norms “when conditions are ripe.” </span><a href="http://www.eeas.europa.eu/delegations/un-new-york/eu-statement-%E2%80%93-united-nations-1st-committee-thematic-discussion_en"><span data-contrast="none">The European Union</span></a><span data-contrast="auto">, in contrast, advocates for a legally binding international instrument, emphasizing Meaningful Human Control (MHC) and compliance with IHL. The EU’s approach seeks to differentiate between systems that incorporate human oversight and those that operate without it.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">The integration of artificial intelligence into weapon systems also presents an increasing challenge to nuclear deterrence and strategic stability. For instance, during the sidelines of the Asia-Pacific Economic Cooperation (APEC) Summit in Peru in November 2024, the then US President Joe Biden and China’s President Xi Jinping jointly </span><a href="https://www.reuters.com/world/biden-xi-agreed-that-humans-not-ai-should-control-nuclear-weapons-white-house-2024-11-16/"><span data-contrast="none">pledged not to integrate AI</span></a><span data-contrast="auto"> in nuclear command-and-control systems, recognizing the catastrophic risks of automation in nuclear decision-making. However, as AI rapidly improves surveillance, missile guidance and targeting systems, it is unclear whether this restraint will hold.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">The integration of AI in nuclear forces may introduce instability into deterrence dynamics by reducing decision-making time and increasing challenges caused by algorithmic bias in early warning systems, posing the threat of false nuclear alarms. Cold War history reminds us of human judgment, central to nuclear stability, and averted catastrophes. During the Cuban Missile Crisis, </span><a href="https://nsarchive.gwu.edu/briefing-book/russia-programs/2022-10-03/soviet-submarines-nuclear-torpedoes-cuban-missile-crisis"><span data-contrast="none">the B-59 submarine incident</span></a><span data-contrast="auto"> on 27 October 1962 brought the two superpowers close to nuclear exchange when a Soviet submarine commander considered launching a nuclear-tipped torpedo under the mistaken belief that hostilities had commenced. The refusal by Vasily Arkhipov to authorize the attack prevented a potential nuclear war. Similarly, Stanislav Yevgrafovich Petrov, a lieutenant colonel in the Soviet Air Defense Forces, chose to disregard a false early-warning alert indicating an incoming US nuclear strike in 1983, </span><a href="https://www.armscontrol.org/act/2017-10/news-briefs/man-who-saved-world-dies-77"><span data-contrast="none">preventing</span></a><span data-contrast="auto"> a global nuclear disaster. Such decision-making underscores the indispensable role of human rationality in nuclear command-and-control systems.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">As LAWS presents multifaceted threats to international peace and security, states need to consider negotiating a legally binding instrument that ensures MHC over autonomy in weapon systems. Enhancing transparency, accountability, and rigorous weapons reviews are essential to prevent destabilization and ensure that technological progress does not outpace the human element in the use of force. Confidence-building measures, such as transparency in military AI, the establishment of international verification mechanisms and a moratorium on the development and deployment of LAWS, could help mitigate future dangers.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><i><span data-contrast="auto">Jawad Ali Shah is a Research Officer at the Center for International Strategic Studies Sindh (CISSS), Pakistan. He holds a BS in International Relations from the University of Sindh, Jamshoro, Pakistan. His research areas are emerging military technologies, and South Asian nuclear deterrence and strategic stability dynamics. The views are the author’s own.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Lethal-Autonomous-Weapon-Systems-A-New-Battlefield-Reality.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="205" height="57" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 205px) 100vw, 205px" /></a></p>
<p><a href="https://globalsecurityreview.com/lethal-autonomous-weapon-systems-a-new-battlefield-reality/">Lethal Autonomous Weapon Systems: A New Battlefield Reality</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/lethal-autonomous-weapon-systems-a-new-battlefield-reality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Redefining Espionage: The Unseen War for Technological Dominance</title>
		<link>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/</link>
					<comments>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 12:13:13 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[adaptive cyberattacks]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[Artemis II]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[automated espionage]]></category>
		<category><![CDATA[big data analysis]]></category>
		<category><![CDATA[counter-disinformation]]></category>
		<category><![CDATA[counterintelligence]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cyber operations]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[democratic institutions]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[disruptive technologies]]></category>
		<category><![CDATA[economic competitiveness]]></category>
		<category><![CDATA[economic espionage]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[foreign intelligence entities]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[global power shift]]></category>
		<category><![CDATA[gray zone]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[information domain]]></category>
		<category><![CDATA[insider threat mitigation]]></category>
		<category><![CDATA[intellectual property]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[predictive analysis]]></category>
		<category><![CDATA[security competition]]></category>
		<category><![CDATA[supply-chain vulnerabilities]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[technological arms race]]></category>
		<category><![CDATA[technological dominance]]></category>
		<category><![CDATA[threat mitigation. ​]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32482</guid>

					<description><![CDATA[<p>Published: March 24, 2026 The international system is undergoing a profound global power shift characterized by the resurgence of great power competition and a broad diffusion of technical capabilities. This environment is intensifying security competition across all domains. Concurrently, the proliferation of artificial intelligence (AI) and other disruptive technologies has fundamentally transformed espionage and defense. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/">Redefining Espionage: The Unseen War for Technological Dominance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: March 24, 2026</em></p>
<p>The international system is undergoing a profound global power shift characterized by the resurgence of great power competition and a broad diffusion of technical capabilities. This environment is intensifying security competition across all domains. Concurrently, the proliferation of artificial intelligence (AI) and other disruptive technologies has fundamentally transformed espionage and defense. The traditional <a href="https://www.realcleardefense.com/articles/2025/10/30/artificial_intelligence_and_the_future_of_espionage_1144178.html">landscape</a> of counterintelligence (CI) is obsolete and requires rapid, systemic overhaul to address the increasingly amplified, technologically enabled threats posed by state and non-state actors.</p>
<p>Specifically, the shift to great power technological competition has expanded CI&#8217;s mandate from protecting military secrets to securing critical infrastructure, intellectual property (IP), and the integrity of the information domain. The dual-use nature of AI functions as both in support of <a href="https://www.hstoday.us/subject-matter-areas/cybersecurity/ai-driven-espionage-campaign-marks-new-phase-in-cybersecurity-researchers-say/">automated espionage</a> and a critical mechanism for preemptively anticipating and mitigating threats. The failure of the United States to strategically integrate AI into CI methodologies will result in the systemic erosion of national technological and economic advantage.</p>
<p><strong>The Expanded Mandate of Modern Counterintelligence</strong></p>
<p>CI functions to protect a nation’s secrets, personnel, and systems from foreign intelligence entities (FIEs). Yet today, CI must also confront a threat matrix dramatically enlarged in scope, sophistication, and velocity. The current geopolitical climate has necessitated a significant expansion of the traditional CI mission. In the context of great power competition, the most significant threat has shifted from the theft of classified military and diplomatic secrets to the large-scale acquisition of IP, trade secrets, and technological data, as highlighted in the recently released <a href="https://www.odni.gov/index.php/newsroom/reports-publications/reports-publications-2026/4141-2026-annual-threat-assessment">Annual Threat Assessment</a>.</p>
<p>FIEs are aggressively targeting the private sector, academia, and research institutions, the very engines of national innovation through sophisticated economic espionage. Their strategic goal is not merely to obtain information, but to erode a nation&#8217;s competitive advantage and accelerate the adversary&#8217;s technological timetable, thereby shifting the global balance of power. CI must establish robust protective mechanisms that extend deep into the non-governmental technology and research ecosystem.</p>
<p>The dissolution of a clear distinction between peacetime competition and active conflict has resulted in a continuous state of confrontation known as the &#8216;gray zone&#8217;. This strategic domain is characterized by persistent, non-lethal, yet tactically damaging activities designed to achieve political objectives without triggering traditional military responses. CI must now defend against a spectrum of subtle subversion, including large-scale cyber operations, persistent penetration of networks for reconnaissance and preparatory measures, and covert attempts to manipulate political discourse and decision-making.</p>
<p>The globalization of commerce and technology has created intricate, interconnected supply chains. These networks present significant CI risks, as adversaries seek to compromise the integrity, trustworthiness, and authenticity of products and services. By inserting &#8220;backdoors&#8221; or creating exploitable &#8220;choke points&#8221; at various nodes, adversaries establish capabilities for future exploitation. CI efforts are essential to conduct comprehensive due diligence and risk mitigation, securing these complex networks against both hardware and software compromise.</p>
<p><strong>Artificial Intelligence: The Dual-Use Catalyst</strong></p>
<p>AI and emerging technologies are not merely <em>targets</em> of modern espionage; they are simultaneously the most potent tools and the most necessary defenses in the counterintelligence battleground. This dual-use dynamic creates a challenging “AI vs. AI” scenario that demands immediate, radical adaptation. Adversaries are leveraging AI to dramatically enhance the speed, scale, and sophistication of their intelligence operations:</p>
<p><u>Automated Espionage and Big Data Analysis</u>: AI-powered tools can automate and scale the processing, translation, and analysis of vast, heterogeneous datasets (Big Data), vastly increasing the volume and velocity of intelligence collection from both open-source intelligence and classified sources.</p>
<p><u>Adaptive Cyberattacks</u>: Machine learning (ML) algorithms enable the development of more elusive and adaptive cyber threats. This includes automated exploitation of vulnerabilities, dynamic creation of polymorphic malware, and rapid penetration of defenses, operating at speeds that effectively outpace traditional, human-centric cybersecurity responses.</p>
<p><u>Generative AI for Influence</u>: Generative AI can create highly realistic deepfakes (synthetic videos and audio) and synthetic narratives at scale. This facilitates sophisticated disinformation and propaganda campaigns to manipulate public opinion and conduct advanced social engineering, severely compromising the ability of institutions to discern truth from falsehood.</p>
<p>Three interconnected factors fundamentally redefine the scope of CI responsibility: target expansion, the blurring of conflict lines, and supply chain vulnerabilities. To effectively counter these technologically enabled threats, CI must aggressively embrace and integrate these same technologies, transforming them into proactive defensive tools:</p>
<p><u>Threat Anticipation and Predictive Analysis</u>: AI can process and analyze massive amounts of threat data, identifying subtle, non-obvious patterns, trends, and anomalies. This capability allows CI to transition from merely reacting to threats toward predictive modeling, allowing one to forecast adversary actions before they materialize and enabling preemptive defense.</p>
<p><u>Enhanced Surveillance and Anomaly Detection</u>: ML algorithms are crucial for the detection of subtle anomalies in network traffic, user behavior, and physical security systems that a human operator would miss. AI-driven monitoring provides real-time, large-scale pattern-of-life analysis that significantly exceeds human cognitive capacity.</p>
<p><u>Counter-Disinformation and Integrity Checks</u>: CI requires AI-driven tools to effectively identify, analyze, and flag AI-generated propaganda, deepfakes, and synthetic media. Systems designed for content provenance and authenticity verification are essential to safeguard the <a href="https://ash.harvard.edu/articles/weaponized-ai-a-new-era-of-threats/">integrity</a> of the information domain and maintain public trust.</p>
<p><u>Insider Threat Mitigation</u>: Defensively, AI can monitor internal networks to flag anomalous user behaviors such as unusual data access attempts, large data transfers, or deviations in an employee&#8217;s digital pattern-of-life. As such they assist in identifying potential insider threats before significant compromise occurs.</p>
<p><strong>The Strategic Imperative</strong></p>
<p>The shift of global powers and the proliferation of disruptive technologies have thrust counterintelligence into an even more important aspect of national security. The stakes of this technological arms race transcend traditional security concerns, encompassing the integrity of a nation’s innovative ecosystem, its economic competitiveness, and the resilience of its democratic institutions.</p>
<p>CI must rapidly evolve its strategies to prioritize the defense of economic and technological assets, and it must integrate AI as a foundational defensive technology to achieve predictive, scalable threat mitigation. Failure to aggressively master and deploy AI defenses against technologically augmented adversaries risks the systemic erosion of national advantage in a world where technological leadership is increasingly synonymous with global power. The future success of great power competition hinges directly on the adaptive capacity and technological sophistication of CI’s function.</p>
<p><em>Joshua Thibert is a Senior Analyst at the </em><a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em> with over 30 years of comprehensive expertise. His background encompasses roles as a former counterintelligence special agent within the Department of Defense and as a practitioner in compliance, security, and insider risk management in the private sector. His extensive academic and practitioner experience spans strategic intelligence, multiple domains within defense and strategic studies, and critical infrastructure protection. The views of the author are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Redefining-Espionage_-AI-Global-Power-Shifts-and-the-Unseen-War-for-Technological-Dominance.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="187" height="52" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 187px) 100vw, 187px" /></a></p>
<p><a href="https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/">Redefining Espionage: The Unseen War for Technological Dominance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</title>
		<link>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/</link>
					<comments>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/#respond</comments>
		
		<dc:creator><![CDATA[Tahir Mahmood Azad]]></dc:creator>
		<pubDate>Thu, 05 Feb 2026 13:15:13 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI–HUMINT fusion]]></category>
		<category><![CDATA[automated analysis]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[CMS]]></category>
		<category><![CDATA[cyber technologies]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[false information]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[ISI]]></category>
		<category><![CDATA[NADRA]]></category>
		<category><![CDATA[NATGRID]]></category>
		<category><![CDATA[nuclearized]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Pegasus spyware]]></category>
		<category><![CDATA[political profiling]]></category>
		<category><![CDATA[RAW]]></category>
		<category><![CDATA[Safe City projects]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[strategic vulnerabilities]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32261</guid>

					<description><![CDATA[<p>For decades, intelligence agencies in developing countries, especially in South Asia, have been portrayed as all-knowing, all-seeing, and deeply involved in every part of politics and security. Pakistan’s Inter-Services Intelligence (ISI) and India’s Research and Analysis Wing (RAW) are often mythologized as all-powerful institutions capable of shaping domestic politics and manipulating regional events. However, this [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/">The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For decades, intelligence agencies in developing countries, especially in South Asia, have been portrayed as all-knowing, all-seeing, and deeply involved in every part of politics and security. Pakistan’s Inter-Services Intelligence <a href="https://ciaotest.cc.columbia.edu/olj/sa/sa-feb00-2.html">(ISI)</a> and India’s Research and Analysis Wing <a href="https://www.cfr.org/backgrounder/raw-indias-external-intelligence-agency">(RAW)</a> are often mythologized as all-powerful institutions capable of shaping domestic politics and manipulating regional events. However, this description disguises a basic reality: the traditional human intelligence <a href="https://www.dhs.gov/sites/default/files/2024-09/2024aepimpactofaiontraditionalhumananalysis.pdf">(HUMINT)</a>–centered model that sustained these agencies is being fundamentally disrupted by artificial intelligence (AI), big-data surveillance, and automated analysis. The actual picture today is not the strength of these institutions but the growing mismatch between their legacy intelligence cultures and the demands of the AI era.</p>
<p>AI has improved intelligence operations in developing nations, but it has also created a new intelligence gap due to disjointed technological implementation, political exploitation of surveillance, reliance on foreign suppliers, and insufficient integration between HUMINT and AI-driven systems. Pakistan and India have large human resources and developing technological ecosystems, but institutional fragmentation and political agendas prevent the development of integrated, modern intelligence frameworks.</p>
<p>The problems that South Asian intelligence services are having are part of a larger global transformation. AI is now a segment of intelligence operation in the US, China, Israel, and some <a href="https://rejolut.com/blog/13-top-ai-countries/#:~:text=Conclusion,and%20interact%20with%20the%20world.">European countries</a>. This includes automated translation, pattern-of-life analysis, algorithmic triage of intercepted data, commercial satellite imagery analytics, and cyber-enabled anomaly detection. <a href="https://bigdatachina.csis.org/the-ai-surveillance-symbiosis-in-china/">China’s surveillance</a> state uses AI-powered facial recognition, behavior prediction, and nationwide data fusion to show what a fully integrated intelligence model looks like. <a href="https://academic.oup.com/jogss/article/8/2/ogad005/7128314?login=false">The U.S.</a> is pushing for automated signals intelligence (SIGINT) processing and predictive analysis in all its intelligence agencies in the Office of the Director of National Intelligence (ODNI). As shown in studies of its military AI systems, <a href="https://media.setav.org/en/file/2025/02/deadly-algorithms-destructive-role-of-artificial-intelligence-in-gaza-war.pdf">Israel uses</a> AI in real-time targeting and ISR fusion.</p>
<p><a href="https://www.lesswrong.com/posts/cM7sR7seBRwtxctGY/the-ai-governance-gaps-in-developing-countries">Developing countries</a> are just as vulnerable to cyber-attacks, terrorism, and false information, but they do not have the institutional frameworks that let AI grow. This global gap is what makes the changes in intelligence in Pakistan and India so important for strategy. <a href="https://www.csohate.org/2025/09/15/advanced-surveillance-in-pakistan/#:~:text=On%209%20September%2C%20Amnesty%20International,regime%20of%20surveillance%20and%20censorship.">Pakistan</a> and <a href="https://ohrh.law.ox.ac.uk/ai-surveillance-and-privacy-in-india-human-rights-in-the-age-of-technology/#:~:text=This%20permissiveness%20undermines%20the%20Supreme,on%20getting%20that%20balance%20right.">India</a> have both spent resources on AI-enabled surveillance systems like ID databases, CCTV networks, predictive policing tools, interception systems, and cyber technologies that come from other countries. <a href="https://genderit.org/articles/between-privacy-and-power-fine-line-pakistans-data-protection-bill">The NADRA</a> database and <a href="https://www.biometricupdate.com/202402/pakistan-executes-ai-powered-criminal-identification-system#:~:text=Pakistan%20is%20rapidly%20advancing%20into,biometric%20criminal%20identification%20and%20detention.">Safe City</a> projects in Pakistan give a lot of biometric and real-time data. <a href="https://compass.rauias.com/current-affairs/surveillance-india/">India has made</a> the Central Monitoring System (CMS) and the National Intelligence Grid (NATGRID) to connect databases between state agencies. The ministry, military, police, and intelligence systems are separate. Legacy bureaucracies promote compartmentalization over integration. AI needs centralized databases, clean data, agency cooperation, and agreed <a href="https://link.springer.com/chapter/10.1007/3-540-48317-9_10">analysis criteria</a>. These requirements are missing; hence, AI systems exhibit limited and inconsistent intelligence. Agencies are collecting more data than ever but lack the framework to analyze it.</p>
<p>Pakistan and India still value HUMINT for intelligence. It is crucial for counterterrorism, political spying, and regional operations. HUMINT alone can&#8217;t compete with hybrid enemies who use AI-driven processing. Strategically, China’s integrated military and civilian AI ecosystem is advantageous. <a href="https://moderndiplomacy.eu/2024/10/17/ai-adoption-in-developing-countries-opportunities-challenges-and-policy-pathways/">Developing states</a> are stuck between two sources of intelligence: First is a legacy HUMINT system with deep networks and second is an AI ecosystem that is fragmented and not fully developed, so it cannot support strategic analysis. In cross-border threat assessments, cyber invasions, and emerging non-traditional security issues like information warfare, this mismatch causes delays, blind spots, and analytical distortions.</p>
<p>In both Pakistan and India, AI-enabled surveillance has been used more for political purposes than for improving strategic intelligence. <a href="https://www.amnesty.org/en/latest/news/2023/12/india-damning-new-forensic-investigation-reveals-repeated-use-of-pegasus-spyware-to-target-high-profile-journalists/#:~:text=In%202020%2C%20Amnesty%20International%20and,us%20for%20digital%20forensics%20support.">Amnesty International</a> reported that India’s use of Pegasus spyware targeted journalists, activists, and political opponents. <a href="https://ianslive.in/pakistan-deploys-digital-technology-to-spy-on-citizens--20251002183604#:~:text=The%20authorities%20have%20also%20repeatedly,been%20prevalent%20in%20Pakistani%20politics.">Pakistan</a> has been criticized for using automated social media monitoring and political profiling, which often focuses on threats from within the country rather than threats from other countries. When surveillance tools are used to control political competition within a party, two things happen. First, institutional resources prioritize domestic control over strategic analysis. Second, technology investments strengthen policing instead of updating intelligence. This challenges national security by making it harder for the intelligence system to predict cyberattacks, regional crises, and threats from outside the country.</p>
<p>South Asia has a lot of foreign AI and cyber infrastructure. Pakistan employs Chinese surveillance equipment (<a href="https://www.dailymirror.lk/amp/international/Pakistan-adopts-Chinas-surveillance-model-Amnesty-warns/107-319168">Hikvision, Huawei</a>), while India uses <a href="https://ijhssm.org/issue_dcp/Cybersecurity%20Synergy%20How%20India%20and%20Israel%20Are%20Teaming%20Up.pdf">Israeli,</a> <a href="https://www.business-standard.com/economy/news/india-s-reliance-on-us-software-cloud-services-poses-economic-risks-gtri-125091400281_1.html">US,</a> and European and American forensics platforms. This increases structural risks, including <a href="https://www.paloaltonetworks.co.uk/cyberpedia/data-exfiltration">data exfiltration</a> and espionage due to entrenched vulnerabilities, strategic reliance on foreign updates, and weakened sovereignty over vital intelligence activities.</p>
<p>Two traditional rivals, nuclear-weapon states, are weakened by this reliance. AI-powered surveillance systems increase digital access points for assault. Big national data repositories attract attackers. Pakistan has had multiple government system hacks, and India has had large breaches that compromised critical infrastructure and government information.  Failures in the past were largely caused by human error, but in the AI era, bias in algorithms, data manipulation, hostile and automated cyberattacks, and misclassification can lead to erroneous operational decisions. These dangers make the strategy unstable.</p>
<p>Increasing intelligence gaps between <a href="https://www.cloudsek.com/blog/brief-disruptions-bold-claims-the-tactical-reality-behind-the-india-pakistan-hacktivist-surge">Pakistan</a> and <a href="https://www.cloudsek.com/blog/brief-disruptions-bold-claims-the-tactical-reality-behind-the-india-pakistan-hacktivist-surge">India</a> jeopardize national and regional security. More likely to misjudge opponents: In fast-moving crises, agencies may miss signals, misjudge threats, or misread trends without AI–HUMINT fusion. Cross-border escalation risks rise; poor intelligence integration in nuclearized environments may aggravate misperceptions during crises like the 2019 Pulwama–Balakot incident or the May 2025 standoff. Cyber attacks expose national secrets. Easy-to-get digital network intelligence can have fatal repercussions. China-asymmetric strategic competition: China is decades ahead in intelligence upgrading, and Pakistan and India may fall further. Domestic AI reduces institutional capacity: political survival trumps strategic intelligence.</p>
<p>In summary, countries that do not update their intelligence risk being caught off guard, making mistakes, and becoming more vulnerable. The myths of shadows, secrecy, and huge people networks that fueled emerging country intelligence organizations are gone. AI has highlighted bureaucratic opacity’s long-hidden structural flaws: dysfunctional systems, politicized surveillance, reliance on foreign technology, and a lack of HUMINT-AI integration. Thus, Pakistan and India’s new intelligence divide is not about data or resources. It is about institutions’ failure to transition from analogue intelligence to AI-connected ecosystems. State and non-state adversaries that accelerate this transformation will benefit.</p>
<p>In nuclearized, crisis-prone South Asia, small misunderstandings could lead to massive wars. Pakistan and India need more than AI tools to stay competitive strategically. They need data architectures that work together, technical specialists, protocols to prevent politicians from abusing their authority, and strategic AI–HUMINT fusion.</p>
<p><em>Dr. Tahir Mahmood Azad is currently a research scholar at the Department of Politics &amp; International Relations, the University of Reading, UK.  Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/02/The-Intelligence-Illusion-How-AI-is-Exposing-Strategic-Vulnerabilities-in-the-Developing-World.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="245" height="68" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 245px) 100vw, 245px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/">The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Techno-Economic power at the heart of the 2025 U.S. National Security Strategy</title>
		<link>https://globalsecurityreview.com/techno-economic-power-at-the-heart-of-the-2025-u-s-national-security-strategy/</link>
					<comments>https://globalsecurityreview.com/techno-economic-power-at-the-heart-of-the-2025-u-s-national-security-strategy/#respond</comments>
		
		<dc:creator><![CDATA[Christophe Bosquillon]]></dc:creator>
		<pubDate>Tue, 06 Jan 2026 13:16:51 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Economics & Trade]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Space Deterrence & Conflict]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[2025 National Security Strategy]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Cislunar Security]]></category>
		<category><![CDATA[Critical Materials]]></category>
		<category><![CDATA[defense industrial base]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Disruptive Industries]]></category>
		<category><![CDATA[Economic Security]]></category>
		<category><![CDATA[export controls]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[industrial base]]></category>
		<category><![CDATA[Industrial Policy]]></category>
		<category><![CDATA[Manufacturing Capacity]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[mobilization]]></category>
		<category><![CDATA[national resilience]]></category>
		<category><![CDATA[reindustrialization]]></category>
		<category><![CDATA[Reshoring]]></category>
		<category><![CDATA[space superiority]]></category>
		<category><![CDATA[Spheres of Influence]]></category>
		<category><![CDATA[Strategic Technologies]]></category>
		<category><![CDATA[supply chains]]></category>
		<category><![CDATA[Technological Leadership]]></category>
		<category><![CDATA[Western hemisphere]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31959</guid>

					<description><![CDATA[<p>The 2025 U.S. National Security Strategy (NSS) dropped on December 4th. The Secretary of War said: “Out with utopian idealism, in with hard-nosed realism.” The NSS could even further be translated as “Out with neoconservative/neoliberal ideological mythologies, in with fiscally responsible, economy-driven geostrategic deterrence.” The NSS bottom line is that America should remain an 800-pound gorilla [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/techno-economic-power-at-the-heart-of-the-2025-u-s-national-security-strategy/">Techno-Economic power at the heart of the 2025 U.S. National Security Strategy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The 2025 U.S. National Security Strategy (<a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">NSS</a>) dropped on December 4th. The Secretary of War said<em>: </em>“Out with utopian idealism, in with hard-nosed realism.” The NSS could even further be translated as “Out with neoconservative/neoliberal ideological <a href="https://www.realcleardefense.com/articles/2025/12/10/facing_facts_and_rolling_back_mythologies_the_new_national_security_strategy_1152378.html">mythologies</a>, in with fiscally responsible, economy-driven geostrategic deterrence.” The NSS bottom line is that America should remain an 800-pound gorilla but share global influence with the only other two major powers it recognizes, Russia and China.</p>
<p>The Western Hemisphere is the de facto core position for undisputed U.S. power, integrity, and uncompromising sovereignty. While the U.S. commitment to Europe remains, European nation-states must step up to the plate and take charge of funding and leadership of their own defense. The segment on &#8220;civilisational erasure&#8221; is directly aligned with the position already made explicit by Vice President JD Vance in early 2025 at the Paris artificial intelligence conference in France and the Munich Security Conference in Germany.</p>
<p>One of the most meaningful merits of the NSS is its call to reposition economic security, industrial renaissance, and technological leadership at the heart of the U.S. strategy to deter and prevail in the event of military conflict. The NSS refrains from mentioning &#8220;major power competition,&#8221; opting instead for an acknowledgement of <a href="https://www.brookings.edu/articles/breaking-down-trumps-2025-national-security-strategy/">spheres of influence</a>.  The NSS does not antagonizes China, instead framing it as an economic and technological competitor, rather than an ideological one. Sustaining American reshoring, reindustrialization, industrial base funding, technological edge, manufacturing supply chains, and access to critical materials, is what underwrites how the U.S. deals with China, deterrence postures notwithstanding. A clear focus on economic competition allows the NSS to remain as vague as possible on the potential for military confrontations in the Indo-Pacific.</p>
<p><strong>Economy, Industry, Technology</strong></p>
<p>In the <a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">2025 NSS</a>, the terms “economy/economic” are used 66 times and “industry/industrial” 19 times, including under “industrial base,” “industrial production,” and “industrial supply chains.” As for “technology/technological,” they appear 17 times. The core meaning of a dozen such mentions is captured as follows:</p>
<p>U.S. military power and diplomatic influence rest on a strong, resilient domestic economy. National security depends on rebuilding America’s industrial base, restoring economic self-reliance, and securing critical supply chains. Economic and technological competitiveness over the long term is essential to preventing conflict and sustaining global leadership. Further, the United States will actively protect its workers and firms from unfair economic practices.</p>
<p>American power requires an industrial sector able to meet both civilian and wartime production needs. Reindustrialization is a top national economic priority, aimed at strengthening the middle class and regaining control over production and supply chains. The U.S. will reshore manufacturing, attract investment, and expand domestic capacity, particularly in critical and emerging technologies. Hence a credible military depends on a robust and resilient defense industrial base.</p>
<p>Preserving merit, innovation, and technological leadership is essential to maintaining America’s historic advantages. Strengthening the resilience of the U.S. technology ecosystem, especially in areas such as AI, is a national priority and a foundation of global leadership. Thus, long-term success in technological competition is central to deterrence and conflict prevention.</p>
<p><strong>Economic Security First</strong></p>
<p>The 2025 NSS references industries primarily through a national-security lens, rather than civilian market categorization, including defense (industrial base, munitions production, weapons systems manufacturing, military supply chains), manufacturing (re-shored industrial production, domestic manufacturing capacity, wartime and peacetime production), energy (oil, gas, coal, nuclear) and its infrastructure and exports, strategic supply chains (critical materials, components and parts manufacturing, logistics and production networks), infrastructure, both physical and digital to be built at industrial-scale, and strategic technologies.</p>
<p>The 2025 NSS strategic technologies are artificial intelligence, explicitly cited as a comparative U.S. advantage; other critical and emerging technologies such as dual-use and strategic technologies tied to national power; defense and military technologie integrated with industrial and innovation advantages; intelligence and surveillance technologies such as monitoring supply chains, vulnerabilities, and threats; cyber technology including espionage, theft, and protection of intellectual property; industrial and manufacturing technologies aiming at re-shoring, reindustrialization, and advanced manufacturing; energy technologies directly linked to economic and national security; and sensitive technologies protected via aligned export controls.</p>
<p>The 2025 NSS treats economic power, industrial superiority, and technological edge as inseparable pillars of national security. Technology is framed less as a civilian growth driver and more as a strategic asset, a competitive weapon, and a deterrence multiplier. Civilian industry is subordinated to national resilience, mobilization capacity, and deterrence, reinforcing the 2025 NSS’s broader fusion of economic security, industrial policy, and military strategy. This constitutes an optimal response to the Chinese “civilian-military fusion” and “unrestricted warfare” model.</p>
<p><strong>Space</strong></p>
<p>While a mention of “space&#8221; appears only once on page 21 of the NSS, the second Trump administration published on December 18th an Executive Order <em>&#8220;</em><a href="https://www.whitehouse.gov/presidential-actions/2025/12/ensuring-american-space-superiority/"><em>Ensuring American Space Superiority</em></a><em>&#8220;</em> prioritizing lunar basing and economic development by 2030 with a clear focus on Artemis, cislunar security as a theatre, and space nuclear power on a schedule. To secure U.S. assets and interests from Earth orbit through cislunar space to the Moon, integrating commercial capabilities into the defense complex, reforming acquisition, and modernizing the nation’s military space architecture become paramount. Space traffic management and space situational awareness services are no longer solely provided by the U.S. government for free.</p>
<p>Repositioning the U.S. as an unrivalled economic-industrial-technological leader provides valuable opportunities to the Western Hemisphere and Indo-Pacific and Europe-Middle-East-Africa regions: “The goal is for our partner nations to build up their domestic economies, while an economically stronger and more sophisticated Western Hemisphere becomes an increasingly attractive market for American commerce and investment.” After 35 years of the West divorcing itself from Reality, we now face a technology-savvy tripolar world. The NSS, complemented by the Executive Order on Ensuring American Space Superiority, merely reflects a long overdue readjustment to 21st-century geopolitics. These are fundamentally the <a href="https://www.youtube.com/watch?v=KuTjHijUnQA">space, nuclear, and disruptive industries</a>, focused in ways that achieve <a href="https://www.linkedin.com/posts/nuclecastpodcast_nipp-nationalsecurity-deterrence-activity-7401344866145939458-O6R_/">techno-strategic power.</a></p>
<p><em>Christophe Bosquillon is a Senior Fellow at the National Institute for Deterrence Studies.</em> <em>The views expressed are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/01/Techno-Economic-power-at-the-heart-of-the-2025-U.S.-National-Security-Strategy.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="209" height="58" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 209px) 100vw, 209px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/techno-economic-power-at-the-heart-of-the-2025-u-s-national-security-strategy/">Techno-Economic power at the heart of the 2025 U.S. National Security Strategy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/techno-economic-power-at-the-heart-of-the-2025-u-s-national-security-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The AI Revolution’s Outsized Impact on Deterrence</title>
		<link>https://globalsecurityreview.com/the-ai-revolutions-outsized-impact-on-deterrence/</link>
					<comments>https://globalsecurityreview.com/the-ai-revolutions-outsized-impact-on-deterrence/#respond</comments>
		
		<dc:creator><![CDATA[Robert Kittinger]]></dc:creator>
		<pubDate>Mon, 05 Jan 2026 13:18:31 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI models]]></category>
		<category><![CDATA[AI race]]></category>
		<category><![CDATA[AI talent competition.]]></category>
		<category><![CDATA[artificial intelligence (AI)]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[code theft]]></category>
		<category><![CDATA[command-and-control systems]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[EMP strike]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[global diplomacy]]></category>
		<category><![CDATA[grey zone operations]]></category>
		<category><![CDATA[Manhattan Project moment]]></category>
		<category><![CDATA[micro-attacks]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[near-peer adversary]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[power grid]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[superintelligence]]></category>
		<category><![CDATA[surprise attacks]]></category>
		<category><![CDATA[system isolation]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[wargaming]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32087</guid>

					<description><![CDATA[<p>The impact of artificial intelligence (AI) on national security at large and deterrence specifically cannot be overstated. The business leaders competing in the field of AI, like Sam Altman, Elon Musk, and Mark Zuckerberg comprehend this truth, although they probably know little about the impact on deterrence theory. Superintelligence is just around the corner, and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-ai-revolutions-outsized-impact-on-deterrence/">The AI Revolution’s Outsized Impact on Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The impact of artificial intelligence (AI) on national security at large and deterrence specifically cannot be overstated. The business leaders competing in the field of AI, like Sam Altman, Elon Musk, and Mark Zuckerberg comprehend this truth, although they probably know little about the impact on deterrence theory. Superintelligence is just around the corner, and how well it integrates with deterrence policy is not yet fully known.</p>
<p>As of today, ChatGPT-5 Pro is said to have an <a href="https://felloai.com/what-is-gpt-5s-real-iq-score-here-is-the-truth/">IQ</a> of 148, as tested officially by Mensa Norway. It is now significantly smarter than most adult humans in the United States (who average 99.7). Grok 4 may be weeks away from becoming even smarter, but the progress at which AI reasoning inches ahead matters little when humans write code for these programs. However, AI <em>has </em>started to <a href="https://arstechnica.com/information-technology/2024/08/research-ai-model-unexpectedly-modified-its-own-code-to-extend-runtime/">write</a> its own code. In tandem, Mark Zuckerberg is building a super team dubbed the “superintelligence AI” lab and he offered a single person, <a href="https://www.tomshardware.com/tech-industry/artificial-intelligence/abel-founder-claims-meta-offered-usd1-25-billion-over-four-years-to-ai-hire-person-still-said-no-despite-equivalent-of-usd312-million-yearly-salary">Daniel Francis</a>, $1.25 Billion for a four-year contract (or a $312 million per year salary). Further, Zuckerberg has gone on to poach the top AI talent from OpenAI, Anthropic, and Google, nearing 24 people in total out of a <a href="https://x.com/deedydas/status/1946597162068091177/photo/1">team</a> of only 44.</p>
<p>Unfortunately, U.S. companies are also allowed to <a href="https://cset.georgetown.edu/publication/u-s-outbound-investment-into-chinese-ai-companies/">funnel</a> money into Chinese AI companies, in part because it is a less expensive alternative than U.S. developed AI. China, as a near-peer adversary cannot be allowed to reach superintelligence first because whoever wins the AI race to superintelligence will have nearly unlimited computing ability and will be able to launch devastating cyber-attacks with ease.</p>
<p>If there are two teams approaching the finish line in a winner-take-all superintelligence race, then there is also a direct implication for long-term deterrence on global war. Imagine the following scenarios:</p>
<p>SCENARIO 1: The U.S. is ahead in the race to superintelligence, but China works diligently to steal code, launch cyber-attacks, and intimidate U.S. scientists. Eventually, China assassinates critical AI scientists, prompting the U.S. to threaten the use of nuclear weapons against China to stop its attacks. Yet, just before all-out war, China ceases its efforts, having become successful in its bid to cripple the U.S. AI industry so it can reach superintelligence first.</p>
<p>SCENARIO 2: The U.S. is ahead, but China is only barely behind. China uses its innovative AI models to wargame nearly unlimited sequences and calculates what it believes is the perfect attack to prevent the U.S. from reaching superintelligence first. In this scenario, the attacks never ramp up. Instead, it results in a massive, unprovoked first strike that incapacitates the U.S. This might be a nuclear strike or simply an EMP strike that decimates the U.S. power grid. Either way, China wins again.</p>
<p>SCENARIO 3: The U.S. and China hide their governments’ AI progress. Public companies continue progressing toward superintelligence, but one or both achieve it in a military or national laboratory behind closed doors. They ponder the best way to use it, leveraging it like the nuclear football in global diplomacy (i.e., setting the briefcase on the floor next to the President). They may have accessed superintelligence but lack confidence in the technology to use it for the near future.</p>
<p>SCENARIO 4: The U.S. and China hide their governments’ AI progress, and both achieve superintelligence behind closed doors. Then one day, one of them launches an attack on the other, prompting the other side to launch its own superintelligence response. The two AI agents battle across every sector of society, arm-wrestling for control. Seemingly trivial differences between one model and another let one win in one sector and the other win in another.</p>
<p>This article does not presume that the outcome of a superintelligence race is represented in one of these four scenarios. Rather, it argues that AI will inevitably complicate the landscape of deterrence as it may give confidence of victory in otherwise stable situations. This moment in history is nothing less than the moment when scientists Leo Szilard and Albert Einstein wrote President Roosevelt to warn of the potential use of fission in bombs.</p>
<p>The United States government must think carefully about the current state of AI in the world and what it will mean for deterrence strategy. We need to have a planned response if a superintelligence cyberattack is launched against the U.S. This includes physically isolating our command-and-control systems and planning for surprise attacks, itself planned by another country’s AI technology. Worse yet, military planners need to consider how to detect and respond to multiple grey zone micro-attacks that may be a component of a larger cascading attack.</p>
<p>We are amid our generation’s Manhattan Project moment. The 2023 <em>Oppenheimer </em>movie culminates in the detonation of the 1945 Trinity test. Perhaps if the United States plans well, in 80 years, we may all be able to enjoy a movie about Zuckerberg forming his superintelligence lab.</p>
<p><em>Rob Kittinger, PhD, is a Senior Fellow at the National Institute for Deterrence Studies. The views expressed are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/01/The-AI-Revolutions-Outsized-Impact-on-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="277" height="77" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 277px) 100vw, 277px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-ai-revolutions-outsized-impact-on-deterrence/">The AI Revolution’s Outsized Impact on Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-ai-revolutions-outsized-impact-on-deterrence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</title>
		<link>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/</link>
					<comments>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/#respond</comments>
		
		<dc:creator><![CDATA[Gilles A. Paché]]></dc:creator>
		<pubDate>Mon, 29 Dec 2025 13:05:26 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[attribution]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[critical vulnerabilities]]></category>
		<category><![CDATA[cyber deterrence]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[Cyberspace]]></category>
		<category><![CDATA[deconfliction mechanisms]]></category>
		<category><![CDATA[democratic regimes]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[gray zone]]></category>
		<category><![CDATA[irregular warfare]]></category>
		<category><![CDATA[non-state actors]]></category>
		<category><![CDATA[nuclear doctrine]]></category>
		<category><![CDATA[nuclear escalation]]></category>
		<category><![CDATA[nuclear threshold]]></category>
		<category><![CDATA[offensive cyber capabilities]]></category>
		<category><![CDATA[proportionality]]></category>
		<category><![CDATA[second-strike capability]]></category>
		<category><![CDATA[strategic cyberattacks]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[strategic threats]]></category>
		<category><![CDATA[vital infrastructure]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32056</guid>

					<description><![CDATA[<p>Many of the world’s strategists still share the same conviction: as Kathryn Bigelow’s film A House of Dynamite (2025) dramatizes, nuclear escalation can only originate from a missile of unknown origin heading straight for Chicago. Yet, this old “Cold War” vision no longer seems entirely relevant. As cyberattacks target critical infrastructure, a long-taboo question arises: [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/">Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many of the world’s strategists still share the same conviction: as Kathryn Bigelow’s film <em>A House of Dynamite</em> (2025) dramatizes, nuclear escalation can only originate from a missile of unknown origin heading straight for Chicago. Yet, this old “Cold War” vision no longer seems entirely relevant. As cyberattacks target critical infrastructure, a long-taboo question arises: how far can we tolerate digital offensives that paralyze a country or manipulate an election before considering a nuclear response? What if the most dangerous attack to unfold in the late 2020s originates not from a silo, but from a single line of code?</p>
<p><strong>Cyber Shockwaves</strong></p>
<p>Imagine a simple piece of computer code shutting down nuclear power plants, paralyzing transportation networks, and disrupting <a href="https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-outcomes-dangerous-new-pathways-escalation">vital military systems</a>. For more than a decade, cyberattacks against critical infrastructure have been more than just intrusions; they can have effects comparable to those of conventional acts of war, and threatening global stability. For nuclear democracies, the question has become crucial: at what point does a digital incident cross the threshold of severity required to trigger deterrence calculations, or even justify a nuclear response?</p>
<p>Cyberspace is now a theater of constant confrontation where adversaries seek to undermine each other’s trust, disrupt economies, and test resilience. This invisible competition weakens traditional deterrence mechanisms, which rely on clear signals. In cyberspace, nothing is clear, with uncertain effects and often unintentional escalation. Yet, the potential damage of a sophisticated cyberattack against an electrical grid or supply chains could <a href="https://www.mdpi.com/1424-8220/23/8/4060">exceed that of a conventional bombing</a>. The problem stems from three major developments.</p>
<p><strong>Critical Weak Spots</strong></p>
<p>The first development is the <em>increasing vulnerability of critical infrastructure</em>, whose technical complexity creates countless points of <a href="https://www.gao.gov/blog/securing-u.s.-electricity-grid-cyberattacks">weakness</a>. Hospitals, refineries, water distribution systems, and railway networks rely on technologies that are sometimes outdated and rarely protected against determined state and non-state actors. A coordinated and simultaneous attack against multiple sectors could severely paralyze a country for weeks to months, causing economic chaos and widespread social disruption.</p>
<p>The second development concerns the <em>strong integration of cyberspace and nuclear power</em>. Command, control, and communication systems have become more digital than ever, and thus more <a href="https://www.ceeol.com/search/article-detail?id=1306879">exposed to cyberattacks</a>. Even a non-destructive intrusion, subtly targeted and difficult to detect, could be interpreted as an attempt to undermine the capacity to retaliate. In such cases, the precise or approximate perception of risk becomes as dangerous as the attack itself, amplifying the potential for misunderstandings and unintentional escalation.</p>
<p>The third development, finally, is the <em>bolder behavior of adversaries of democratic regimes</em>, who use cyberspace as a tool for exerting pressure without incurring significant costs. Who would doubt that Russia, China, North Korea, and Iran regularly demonstrate their ability to disrupt the institutions of democratic regimes? The relative success of their operations encourages them to <a href="https://www.ccdcoe.org/uploads/2025/07/Tkachuk_N_Tallinn_Paper_15_Ukraine-as-the-Frontline-of-European-Cyber-Defence.pdf">push the boundaries even further</a>, as they are aware of the existence of a “gray zone” where traditional deterrence does not fully apply.</p>
<p>These major transformations lead to a fundamental question: should democracies clarify as quickly as possible that certain cyberattacks could cross a threshold triggering a major military response, including nuclear? The objective of a new doctrine would then not be to lower the nuclear threshold, but to re-establish a credible and robust level of deterrence. Because if adversaries believe that cyberattacks are “zero-cost,” they will continue to systematically target vital infrastructure, exploiting critical vulnerabilities with impunity and minimal risk to themselves.</p>
<p><strong>Strategic High Stakes</strong></p>
<p>A first argument for clarifying the doctrine rests on proportionality: a massive cyberattack targeting critical infrastructure could have consequences comparable to a bombing. In this context, it would be consistent to specify that the response is not limited to conventional means. Analysts point out that U.S. nuclear doctrine already considers the possibility of devastating consequences from non-nuclear strategic attacks, and they believe that the nuclear threat is not explicitly excluded, even if the <a href="https://apps.dtic.mil/sti/html/trecms/AD1182360/"><em>no-first-use</em> scenario remains dominant</a>.</p>
<p>A second argument concerns strategic stability. Today, adversaries regularly stress the defenses of democratic regimes in the “gray zone,” without immediate risk of escalation. Clarifying the rules of engagement and explicitly integrating cyberspace into strategic thinking could strengthen deterrence and limit adversarial gambles in this gray zone. The United States, the United Kingdom, and France could thus reduce uncertainty regarding the potential consequences of sophisticated cyberattacks, one form of <a href="https://irregularwarfarecenter.org/wp-content/uploads/20230111_Perspectives_No_2.pdf">irregular warfare</a>, while emphasizing that any major offensive would have significant repercussions.</p>
<p>A third argument concerns the protection of nuclear command. Even a limited attack on control systems could be interpreted as an attempt to neutralize the second-strike capability, creating an extreme risk of miscalculation, especially with the <a href="https://www.europeanleadershipnetwork.org/wp-content/uploads/2023/11/AVC-Final-Report_online-version.pdf">increasing use of artificial intelligence</a>. By clearly announcing that such an intrusion would be considered a serious and unacceptable act, democratic regimes would strengthen their strategic stability, discouraging any hostile action and reducing the risk of unintentional escalation during times of international crisis.</p>
<p><strong>Perilous Lines</strong></p>
<p>This doctrinal shift, however, carries significant risks, notably the unintentional lowering of the nuclear threshold. Even if the clarification primarily aims to strengthen deterrence, it could be perceived as an excessive threat by non-democratic States, prompting them to rapidly modernize their nuclear arsenals or develop sophisticated offensive cyber capabilities. The proliferation of <a href="https://www.army.mil/article/288840/the_role_of_cyber_conflict_in_nuclear_deterrence">cyber threats</a> with potentially physical effects creates a low-profile but ultimately strategic space for competition, paradoxically exacerbating tensions and instability.</p>
<p>Responding to a cyberattack with a nuclear strike requires absolute certainty as to its true perpetrator. Yet, operations in cyberspace often involve <a href="https://apps.dtic.mil/sti/html/tr/ADA602150/">proxies, opaque international relays, and technical masking of the source</a>. An attribution error could have profound consequences. Additionally, a cyber intrusion seen as preparation for a major attack might provoke an overreaction during a crisis. Any doctrine that includes the possibility of a nuclear response must therefore incorporate rigorous <em>deconfliction mechanisms</em>, otherwise the worst will happen.</p>
<p>However, these risks should not obscure a strategic reality: current doctrine dates to a time when cyberattacks could not paralyze a country in minutes. This is no longer the case. Adversaries of democratic regimes have understood that cyberspace offers them a means of inflicting considerable damage while remaining below the threshold for a nuclear response. Doing nothing would amount to accepting a structural vulnerability, especially since middle ground is emerging. This involves explicitly defining two categories of cyberattacks likely to trigger an appropriate military response:</p>
<ol>
<li>Attacks causing massive impacts on the civilian population or critical infrastructure (hospitals and emergency services, water distribution networks, etc.).</li>
<li>Intrusions targeting the command systems of the armed forces, even without destructive effects, with the aim of degrading a country’s decision-making capacity.</li>
</ol>
<p>Though it would not directly reference nuclear weapons, this clarification would connect strategic cyberattacks to potential responses, giving decision-makers flexibility while clearly warning adversaries. A more explicit doctrine should reduce the risks of accidental escalation and limit the audacity of State and non-State actors willing to test the nerves of democratic regimes, in line with <a href="https://globalsecurityreview.com/arming-for-deterrence-a-nuclear-posture-for-the-next-decade/">recent analyses</a> on the evolution of the U.S. nuclear posture in the face of new strategic threats that the war in Ukraine has only exacerbated.</p>
<p><strong>About the Author</strong></p>
<p><em>Gilles A. Paché is a Professor of Marketing and Supply Chain Management at Aix-Marseille University, France, and a member of the CERGAM Lab. His research focuses on logistics strategy, distribution channel management, and military studies. On these topics, he has authored over 700 scholarly publications, including articles, book chapters, and conference papers, as well as 24 academic books. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Hacking-the-Apocalypse-How-Cyberattacks-Could-Trigger-Nuclear-Escalation.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="176" height="49" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 176px) 100vw, 176px" /></a></p>
<p><a href="https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/">Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</title>
		<link>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/</link>
					<comments>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/#respond</comments>
		
		<dc:creator><![CDATA[Greg Sharpe]]></dc:creator>
		<pubDate>Mon, 15 Dec 2025 13:14:00 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[advanced analytics]]></category>
		<category><![CDATA[advisory councils]]></category>
		<category><![CDATA[AI safety frameworks]]></category>
		<category><![CDATA[AI-enabled national preparedness]]></category>
		<category><![CDATA[Air Force Research Laboratory (AFRL)]]></category>
		<category><![CDATA[biosecurity infrastructure]]></category>
		<category><![CDATA[bipartisan engagement]]></category>
		<category><![CDATA[co-stewardship of national resilience]]></category>
		<category><![CDATA[codifying capabilities in law]]></category>
		<category><![CDATA[Congress as strategic partner]]></category>
		<category><![CDATA[continuity across administrations]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[defense planning ​]]></category>
		<category><![CDATA[democratic oversight]]></category>
		<category><![CDATA[Department of Energy (DOE) quantum networks]]></category>
		<category><![CDATA[disaster response]]></category>
		<category><![CDATA[distributed quantum networking testbed]]></category>
		<category><![CDATA[economic competitiveness]]></category>
		<category><![CDATA[Economic Security]]></category>
		<category><![CDATA[entanglement distribution]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[experimental infrastructure]]></category>
		<category><![CDATA[federal guidance]]></category>
		<category><![CDATA[intellectual property protections]]></category>
		<category><![CDATA[international norms]]></category>
		<category><![CDATA[ion-trap quantum computer]]></category>
		<category><![CDATA[mission-driven portfolios]]></category>
		<category><![CDATA[multi-stakeholder governance]]></category>
		<category><![CDATA[multi-year funding]]></category>
		<category><![CDATA[National Defense Authorization Act (NDAA)]]></category>
		<category><![CDATA[national power]]></category>
		<category><![CDATA[National Quantum Initiative (NQI)]]></category>
		<category><![CDATA[national resilience]]></category>
		<category><![CDATA[Navy quantum RDT&E]]></category>
		<category><![CDATA[near-term use cases]]></category>
		<category><![CDATA[nontraditional vendors]]></category>
		<category><![CDATA[Other Transaction Authority (OTA)]]></category>
		<category><![CDATA[oversight boards]]></category>
		<category><![CDATA[pilot programs]]></category>
		<category><![CDATA[public trust]]></category>
		<category><![CDATA[public-private partnerships]]></category>
		<category><![CDATA[quantum communications]]></category>
		<category><![CDATA[quantum communications corridor]]></category>
		<category><![CDATA[quantum networking testbeds]]></category>
		<category><![CDATA[quantum-resilient communications]]></category>
		<category><![CDATA[quantum-resistant secure transmission]]></category>
		<category><![CDATA[RDT&E portfolio]]></category>
		<category><![CDATA[responsible technology use]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[stable appropriations]]></category>
		<category><![CDATA[statutory roles for key technologies]]></category>
		<category><![CDATA[strategic competitiveness]]></category>
		<category><![CDATA[streamlined oversight]]></category>
		<category><![CDATA[supply-chain monitoring]]></category>
		<category><![CDATA[supply-chain security]]></category>
		<category><![CDATA[tech–government alliances]]></category>
		<category><![CDATA[threat detection]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Trust in government]]></category>
		<category><![CDATA[workforce opportunity]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31969</guid>

					<description><![CDATA[<p>The tech industry can increase the nation’s trust in government by becoming a reliable and visibly accountable partner for securing America’s technological edge. Specifically, the tech industry can help Congress codify critical capabilities in law and funding provisions that outlast political cycles. Doing so successfully will require long-term relationships with legislators, bipartisan support, and clear [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/">Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The tech industry can increase the nation’s trust in government by becoming a reliable and visibly accountable partner for securing America’s technological edge. Specifically, the tech industry can help Congress codify critical capabilities in law and funding provisions that outlast political cycles. Doing so successfully will require long-term relationships with legislators, bipartisan support, and clear safeguards that reassure the public that powerful technologies are used in the best interest of the nation.<a href="https://www.edelman.com/trust/2025/trust-barometer">[1</a>]​</p>
<p><strong>Why Trust and Continuity Matter</strong></p>
<p>Recent trust surveys show that public confidence in both government and business has declined, with many people believing institutional leaders are not honest with them. The 2025 Edelman Trust Barometer, for example, highlights a “crisis of grievance,” in which large segments of the population feel left behind and are more inclined to distrust complex policy and technology initiatives.<a href="https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/">[2</a>]​</p>
<p>This erosion of trust is particularly dangerous at a time when artificial intelligence, quantum technologies, and advanced biotechnologies are central to economic and military competition. A report submitted to Congress by U.S.–China policy experts emphasizes that both countries now treat these technologies as strategic industries, tying them directly to national power and long-term security.[<u>4]</u>​</p>
<p><strong>Building Durable Relationships with Legislators</strong></p>
<p>For technology companies, increasing national trust starts with treating Congress as a long‑term strategic partner, not simply as an annual budget gatekeeper.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[4]</a>​</p>
<ul>
<li>Institutionalize bipartisan technology engagement: Firms can create recurring, nonpartisan briefings and workshops with relevant committees to explain how artificial intelligence (AI), quantum, cyber, and bio tools affect national resilience, economic competitiveness, and workforce opportunity. By engaging members and staff from both parties, companies reduce the perception that emerging technologies are aligned with a single political faction.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[5]</a>​</li>
<li>Lead with ethics, safety, and security: Research on public attitudes toward AI suggests people are more supportive when they see clear safeguards, transparency, and accountability mechanisms within the tech industry. Companies can build trust by proactively presenting their AI safety frameworks, data-protection policies, and supply‑chain security measures, aligning them with federal guidance and international norms on responsible technology use.<a href="https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf">[6]</a>​</li>
</ul>
<p><strong>Securing Sustained Funding for Critical Technology</strong></p>
<p>Trust is reinforced when technology programs are clearly tied to enduring strategic missions and supported through stable, multi‑year funding rather than fragile pilots.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[5]</a>​</p>
<ul>
<li>Connect capabilities to mission portfolios: Instead of scattered line items, technology programs can be organized into mission‑driven portfolios—such as quantum‑resilient communications, AI‑enabled national preparedness, or biosecurity infrastructure—that span research, prototyping, and deployment over several years. Multi‑year authorizations and appropriations make it harder for any single administration to abruptly cancel essential capabilities.<a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">[4]</a>​</li>
<li>Use innovation tools that protect both government and industry: Policy analyses highlight the value of mechanisms like Other Transaction Authority and structured public‑private partnerships to bring nontraditional vendors into national security and infrastructure work more quickly. By pairing these tools with clearer intellectual property protections and streamlined oversight, legislators can encourage top-tier tech firms to stay engaged in sensitive missions over the long term.<a href="https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4">[8]</a>​</li>
</ul>
<p><strong>Embedding Technology in Law, Not Just Budgets</strong></p>
<p>To prevent critical technologies from being swapped out with each political shift, their roles must be written into statute and tied to democratic oversight.<a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">[9]</a>​</p>
<ul>
<li>Statutory roles for key technologies: Laws governing defense planning, critical infrastructure, and economic security should explicitly call for the use of AI, secure digital infrastructure, and advanced analytics in defined mission areas, such as threat detection, disaster response, and supply‑chain monitoring. Once these roles are codified, dismantling them requires visible legislative action rather than quiet executive changes.<a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">[9]</a>​</li>
<li>Multi-stakeholder governance in legislation: Legislated advisory councils and oversight boards that include government, industry, academia, and civil society should supervise high-impact technologies and publish regular reports. This structure signals that powerful tools are subject to ongoing, pluralistic scrutiny rather than being controlled solely by political appointees or corporate executives.<a href="https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf">[10]</a>​</li>
</ul>
<p><strong>Quantum Networking Testbed Infrastructure</strong></p>
<p>The National Defense Authorization Act (NDAA) put forth by Congress each year does not typically use a single, generic phrase like “quantum networking testbeds” in isolation; instead, it authorizes and directs specific programs and experiments that collectively constitute quantum networking testbed infrastructure. Several provisions and related authoritative documents are especially relevant to the future of quantum technology growth.</p>
<p>A Senate Armed Services Committee fact sheet on the fiscal year 2024 NDAA highlights language that “authorizes increased funding for a distributed quantum networking testbed” and the development of a next-generation ion‑trap quantum computer at the Air Force Research Laboratory (AFRL). While the fact sheet summarizes rather than reproduces the statutory text, it makes clear that Congress explicitly authorized a distributed quantum networking testbed as part of the defense Research, Development, Test, and Evaluation (RDT&amp;E) portfolio.<a href="https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/">[12]</a>​</p>
<p>Within the fiscal year 2025 NDAA, Congress, “authorizes funding to create a ‘quantum communications corridor’ as part of Navy research, development, test, and evaluation.” This is an explicit description of support for a testbed or network to advance quantum communication research so the Navy and the Department of Defense (DoD) can securely transmit information resistant to quantum computer decryption.<a href="https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa">[15]</a>​</p>
<p>Other recent NDAA cycles also include broader direction that reinforces these testbed authorizations, such as requirements for DoD to establish pilot programs for promising quantum computing capabilities and to identify near‑term use cases that can be fielded within two years. These provisions do not always use the word “testbed” in the operative clause, but they direct the department to stand up experimental infrastructure and pilots that, in practice, operate as quantum networking and computing testbeds for defense applications.<a href="https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/">[16]</a>​</p>
<p>In parallel, the National Quantum Initiative framework and associated Department of Energy (DOE) efforts describe quantum networking testbeds as shared infrastructure for entanglement distribution and quantum communications, and Congressional action has repeatedly referenced these federal testbeds and network efforts as part of the broader quantum information science ecosystem that the DoD can leverage.<a href="https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf">[13]</a>​</p>
<p>Ensuring key technologies not only protect the nation but are also provided with substantial investment and economic promise is a necessity for companies to further their developmental efforts. Demonstrating that quantum technologies are viable for multiple applications—within internal defense and external partnerships—is one possible solution as tech companies become increasingly concerned with the long-term payoff of their test bed programs. For now, defense authorization bills appear to be the most forward leaning avenue supported by government, but the long-term stability of this method has yet to be validated.</p>
<p><strong>How This Approach Builds Public Trust</strong></p>
<p>When the tech industry engages both parties and chambers in Congress, supports multi-year statutory programs, and accepts meaningful oversight, it demonstrates that emerging technologies are being developed within a framework of law, ethics, and long-term national interest. In such a system, citizens can see that AI, quantum computing, and other advanced capabilities are not partisan experiments or purely profit-driven ventures, but part of a durable national strategy subject to democratic control.<a href="https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance">[2]</a>​</p>
<p>The tech sector can both strengthen U.S. strategic competitiveness and contribute tangibly to rebuilding public trust in government by positioning itself as a co-steward of national resilience, helping design governance mechanisms, committing to transparency, and working with legislators to hard‑wire critical technologies into law and funding.<a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">[5]</a>​</p>
<p>Sources:</p>
<ol>
<li><a href="https://www.edelman.com/trust/2025/trust-barometer">https://www.edelman.com/trust/2025/trust-barometer</a></li>
<li><a href="https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/">https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/</a></li>
<li><a href="https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance">https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance</a></li>
<li><a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">https://www.uscc.gov/sites/default/files/2024-11/Chapter_3&#8211;U.S.-China_Competition_in_Emerging_Technologies.pdf</a></li>
<li><a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf</a></li>
<li><a href="https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf">https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf</a></li>
<li><a href="https://www.nationalsecurity.ai/chapter/executive-summary">https://www.nationalsecurity.ai/chapter/executive-summary</a></li>
<li><a href="https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4">https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4</a></li>
<li><a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/</a></li>
<li><a href="https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf">https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf</a></li>
<li><a href="https://www.imd.org/ibyimd/audio-articles/restoring-faith-in-leadership-in-the-age-of-grievance/">https://www.imd.org/ibyimd/audio-articles/restoring-faith-in-leadership-in-the-age-of-grievance/</a></li>
<li><a href="https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/">https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/</a></li>
<li><a href="https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf">https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf</a></li>
<li><a href="https://www.quantum.gov/wp-content/uploads/2024/12/NQI-Annual-Report-FY2025.pdf">https://www.quantum.gov/wp-content/uploads/2024/12/NQI-Annual-Report-FY2025.pdf</a></li>
<li><a href="https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa">https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa</a></li>
<li><a href="https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/">https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/</a></li>
</ol>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Beyond-the-Next-Administration-Building-Enduring-TechGovernment-Alliances-for-National-Power.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="256" height="71" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 256px) 100vw, 256px" /></a></p>
<p><a href="https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/">Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Signals of a New Revolution: Maven Smart System and the AI-RMA Horizon</title>
		<link>https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/</link>
					<comments>https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/#respond</comments>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Thu, 09 Oct 2025 13:47:00 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[AI-driven command]]></category>
		<category><![CDATA[AI/ML]]></category>
		<category><![CDATA[algorithmic warfare]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[battlefield intelligence]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Chief Digital and Artificial Intelligence Office]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[communication revolution]]></category>
		<category><![CDATA[data fusion]]></category>
		<category><![CDATA[decision-making]]></category>
		<category><![CDATA[Department of War]]></category>
		<category><![CDATA[doctrinal evolution]]></category>
		<category><![CDATA[edge computing]]></category>
		<category><![CDATA[human-machine teaming]]></category>
		<category><![CDATA[industrial revolution]]></category>
		<category><![CDATA[information environment]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[ISR fusion]]></category>
		<category><![CDATA[Joint AI Center]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Maven Smart System]]></category>
		<category><![CDATA[mosaic warfare]]></category>
		<category><![CDATA[multi-domain operations]]></category>
		<category><![CDATA[operational adaptation]]></category>
		<category><![CDATA[Project Maven]]></category>
		<category><![CDATA[real-time targeting]]></category>
		<category><![CDATA[Revolution in Military Affairs]]></category>
		<category><![CDATA[RMA]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[technological innovation]]></category>
		<category><![CDATA[telegraph]]></category>
		<category><![CDATA[warfare transformation]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31658</guid>

					<description><![CDATA[<p>The Department of War’s (DoW) Maven Smart System (MSS) may not yet constitute a revolution in military affairs (RMA), but it strongly signals one. The MSS is a relatively new system designed as the DoW’s answer to the challenges posed by the transition to multi-domain operations and artificial intelligence (AI) integration. It seeks to enhance [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/">Signals of a New Revolution: Maven Smart System and the AI-RMA Horizon</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Department of War’s (DoW) Maven Smart System (MSS) may not yet constitute a revolution in military affairs (RMA), but it strongly signals one. The MSS is a relatively new system designed as the DoW’s answer to the challenges posed by the transition to multi-domain operations and artificial intelligence (AI) integration. It seeks to enhance the common operating picture through artificial intelligence/machine learning (AI/ML) capabilities—now critical given the complexity and volume of today’s information environment.</p>
<p>Whether the MSS is indicative of an unfolding RMA remains a subject of debate. At a minimum, it represents a significant leap in how modern militaries sense, decide, and act in combat. From a scholarly perspective, RMAs are not defined by single technological breakthroughs but by clusters of innovations that fundamentally transform the conduct of warfare.</p>
<p>They typically involve shifts in doctrine, tactics, organization, culture, and technology. Unlike broader military revolutions, which reshape societies and political systems, RMAs are confined to the military sphere—and they often unfold quietly, only recognized in hindsight.</p>
<p>Several RMAs were identified in the past, providing a framework to anticipate future ones. In <a href="https://www.amazon.com/Dynamics-Military-Revolution-1300-2050/dp/052180079X/ref=sr_1_1?crid=5HYVA6NEEJ2N&amp;dib=eyJ2IjoiMSJ9.PWOVLU4sDyK-RCtubJVIvrJNqIzJG8HrY_8OsnwdKG0whYkhz7hPCaPxNoXZ-Eif6sXfjvwBA3XW82i7b1XrSOcSWvkDuCMxJiAToNDVx64umh_keykfO3919R6E94YVdDu67oCaYGKOCf90uvA9KzR9rYYN0lQJxb9o3szGvVkdIglughNbOe5Rb-QRyXP81q5NnLl3yvG73Xjm9JyRBfUu1J0V8Oit2GmnCMZOp0M.WEIrVM0xs7djc0-t3ELjygZepVFHBMazo0XNOAQWANQ&amp;dib_tag=se&amp;keywords=The+Dynamics+of+Military+Revolutions&amp;qid=1758480145&amp;sprefix=%2Caps%2C153&amp;sr=8-1"><em>The Dynamics of Military Revolutions</em></a><em>:</em><em> 1300–2050</em>, MacGregor Knox and Williamson Murray outline five significant military revolutions in the West since 1618. Each one, they argue, set off a chain of revolutionary changes in military affairs.</p>
<p>These include the emergence of the modern state with its standing armies, the political and social upheavals brought on by the French Revolution, the industrialization of warfare in the 19th century, the era of total war in the 20th century, and the transformative impact of nuclear weapons. If a new RMA is underway, we may not fully recognize it until it has already matured.</p>
<p>The concept of RMA has drawn justified criticism for being abstract, amorphous, and debated to the point of analytical paralysis. After the Gulf War, the DoD’s fixation on identifying the “next RMA” often overshadowed the operational impact of emerging capabilities. Scholars frequently focus on definitional purity rather than assessing real battlefield transformation.</p>
<p>Whether the MSS fits a textbook definition, adopted by the DoW or derived from historical theory, is less important than its functional impact. If an RMA is indeed emerging or approaching, there should be tangible real-world consequences. Otherwise, theory becomes disconnected from practice. In this light, the MSS may serve as a bridge between the long-unfolding information RMA and a new, AI-driven transformation.</p>
<p>The MSS could be indicative of another significant shift in command and control (C2). While the US Army’s command post computing environment (CPCE) already integrates legacy systems into a modular, cloud-capable architecture for multi-domain operations, the MSS pushes these capabilities toward revolutionary real-time situational awareness.</p>
<p>While initially developed to automate drone feed analysis, the MSS has evolved into an AI-powered battlefield intelligence engine. It fuses intelligence, surveillance, and reconnaissance (ISR) data, enables real-time targeting, and supports distributed decision-making. As with the telegraph in the 19th century, the MSS may redefine the military’s relationship with information and time.</p>
<p>Historically, C2 was slow and fragmented. Commanders relied on flags, runners, and direct observation, limited by geography and transmission delay. The Industrial Revolution began to change this. Introduced in 1793, Claude Chappe invented the optical telegraph which allowed faster coordination across long distances. It was Samuel Morse’s electrical telegraph, patented in <strong>1837,</strong> that truly revolutionized communication.</p>
<p>AI is reshaping combat just as electricity once did. Electricity transformed communication by creating the foundation for critical innovation, like the internet. The harnessing of electricity for industrial use itself was not an RMA, but it was the essential prerequisite for one. Without it, the revolution in communication that began with the telegraph would not have been possible. AI may not constitute a full RMA on its own, but it is the enabling foundation for one.</p>
<p>During the Crimean War and the American Civil War, the telegraph enabled real-time command for the first time. In the US, President Lincoln relied on the War Department telegraph office to direct Union forces and enforce strategic decisions. Strategic-level C2 became possible, and expectations for real-time situational awareness took hold. The rise of the steam-powered printing press and the expansion of railways accelerated this transformation, making war reporting nearly instantaneous—a precursor to modern information warfare.</p>
<p>Similarly, Project Maven, initiated in 2017, began as a machine learning initiative to automate drone video analysis. Since then, the MSS has grown to integrate cloud computing, ISR fusion, and targeting. The MSS delivers intelligence to the tactical edge at machine speed on enterprise cloud infrastructure. It processes unfathomable amounts of data in milliseconds— augmenting analysts and automating portions of the workflow.</p>
<p>Just like the electric telegraph centralized control and supported linear commander decisions, the MSS introduces machine learning, machine inference, and adaptive analytics to take command and control. The MSS provides a picture of the theater that is not merely quantitative, but qualitative.</p>
<p>A <a href="https://csbaonline.org/uploads/documents/2002.10.02-Military-Technical-Revolution.pdf">true RMA</a> requires more than new technology. It demands operational adaptation, organizational restructuring, and doctrinal evolution. The MSS checks many of these boxes. Technologically, the MSS merges AI, edge computing, and cloud infrastructure in a holistic fashion. Operationally, it uses human-machine teaming to accelerate kill chains. Organizationally, it catalyzed the creation of institutions such as the Joint AI Center (JAIC) and the Chief Digital and Artificial Intelligence Office. Doctrinally, it promotes shifts toward algorithmic and mosaic warfare, which are adaptive, data-driven models of conflict.</p>
<p>The MSS could signal a broader shift in military operations, much like the telegraph reshaped communication in the 19th century. By combining intelligence, surveillance, and reconnaissance (ISR) with artificial intelligence at operational speed, the MSS is changing how armed forces interpret the battlespace, make decisions, and coordinate action—all while improving the shared situational picture. Yet without a corresponding cultural shift, even the best tools can fail to yield a true RMA. Whether the Department of War can fully adapt its doctrine and institutions to leverage the MSS remains to be seen.</p>
<p><em>Lieutenant Colonel Matthew J. Fecteau is an information operations officer working with artificial intelligence. </em><em>The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of War, or the US Government. </em></p>
<p><em><a href="http://globalsecurityreview.com/wp-content/uploads/2025/10/Signals-of-a-New-Revolution.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png" alt="" width="239" height="66" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w" sizes="(max-width: 239px) 100vw, 239px" /></a> </em></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/">Signals of a New Revolution: Maven Smart System and the AI-RMA Horizon</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Role of Drones in Nuclear Deterrence</title>
		<link>https://globalsecurityreview.com/the-role-of-drones-in-nuclear-deterrence/</link>
					<comments>https://globalsecurityreview.com/the-role-of-drones-in-nuclear-deterrence/#respond</comments>
		
		<dc:creator><![CDATA[Stephen Cimbala&nbsp;&&nbsp;Adam Lowther]]></dc:creator>
		<pubDate>Thu, 25 Sep 2025 12:34:40 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[American Deterrence]]></category>
		<category><![CDATA[American nuclear posture]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[first-strike]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[sUAS]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[UAS]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31576</guid>

					<description><![CDATA[<p>&#160; Although the war in Ukraine firmly established the utility of drones in warfare, the relationship between drones and nuclear deterrence is still a largely unsettled topic. Suggesting that they are relevant is unlikely to draw much disagreement, but the exact form that relevance takes is where there may be disagreement. This leads to the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-role-of-drones-in-nuclear-deterrence/">The Role of Drones in Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Although the war in Ukraine firmly established the utility of drones in warfare, the relationship between drones and nuclear deterrence is still a largely unsettled topic. Suggesting that they are relevant is unlikely to draw much disagreement, but the exact form that relevance takes is where there may be disagreement. This leads to the following discussion.</p>
<p>Nuclear deterrence is a psychological effect where the perceived costs of taking an action that is undesirable to an adversary outweigh the perceived benefits. During the Cold War, the threat of catastrophic retaliation prevented the Soviet Union and the United States from initiating a nuclear attack against the other.</p>
<p>Historically, this doctrine relied on the survivability of nuclear arsenals in the event of a first strike by the adversary. Secure second-strike and a robust early-warning system were key elements of deterrence credibility. The introduction of drones into this framework in the years ahead creates new dimensions to the deterrence dynamic. Drones may enhance surveillance, improve command and control, and/or potentially deliver nuclear weapons.</p>
<p>Drones offer several advantages that make them attractive in the context of nuclear deterrence. They can provide continuous monitoring of adversary activities, bolstering early warning systems and reducing the risk of surprise attacks. Such a capability could increase strategic stability.</p>
<p>Advanced drones equipped with artificial intelligence (AI) could execute highly accurate <a href="https://thebulletin.org/2021/04/meet-the-future-weapon-of-mass-destruction-the-drone-swarm">first strikes</a>, which could neutralize enemy nuclear assets preemptively. This would likely prove destabilizing.</p>
<p>Fielding drones capable of ensuring the survivability of nuclear forces by serving as mobile and/or concealed platforms could ensure a state maintains a credible second-strike capability. Again, this would likely prove stabilizing.</p>
<p>Drones could also serve as command-and-control platforms in a degraded environment when, for example, space assets are lost early in a conflict. Such a capability could serve as a deterrent to attack.</p>
<p>The integration of artificial intelligence (AI) into drones has significantly expanded their operational capability. AI-enabled drones can autonomously navigate complex environments, identify targets, and execute missions with minimal human intervention. This autonomy is particularly valuable in nuclear scenarios, where rapid decision-making and precision are critical.</p>
<p>Moreover, drones are being developed to carry nuclear payloads, although this remains a controversial and largely theoretical capability. The miniaturization of warheads and improvements in drone propulsion systems make this possibility increasingly plausible. If realized, nuclear-armed drones could offer stealthier and more flexible delivery options compared to traditional ballistic missiles.</p>
<p>Recent conflicts demonstrate the strategic value of drones. In Ukraine, for instance, drones are used extensively for reconnaissance and precision strikes, prompting global powers to accelerate their investment in drone technologies. While these applications are conventional, they underscore the potential for drones to play a role in strategic deterrence.</p>
<p>In the United States, China, and Russia, military doctrines are certain to evolve and incorporate drones into nuclear command-and-control systems. These developments reflect a broader trend toward automation and digitization in defense strategies, raising questions about the future of human oversight in nuclear decisionmaking.</p>
<p>Despite their strategic benefits, drones introduce several risks that could undermine nuclear stability. Autonomous drones conducting reconnaissance near sensitive sites could be <a href="https://carnegieendowment.org/2018/08/08/escalation-through-entanglement-how-vulnerability-of-command-and-control-systems-raises-risks-of-inadvertent-nuclear-war-pub-77028">misinterpreted</a> as precursors to a nuclear strike, triggering unintended escalation. Increased autonomy in drone operations may reduce human oversight, heightening the risk of accidental or unauthorized use of nuclear weapons. The accessibility and affordability of drone technology could lead to its proliferation among non-nuclear states or rogue actors, complicating global arms control efforts. None of the challenges are guaranteed, but they are possibilities.</p>
<p>To mitigate the risks associated with drones in nuclear deterrence, the following policy measures are recommended. First, nuclear-armed states should develop treaties and agreements that define acceptable uses of drones in strategic scenarios, including restrictions on nuclear payloads. Second, there is a need for information-sharing among nuclear weapons states, designed to reduce misinterpretation of actions and build trust. Third, ensuring that critical decisions involving nuclear weapons remain under human control, even in automated systems, is an important component of any international agreement. Fourth, developing tools to monitor drone deployments and verify compliance with international agreements is also needed.</p>
<p>The potential for drones to enhance surveillance, improve targeting, and support second-strike capabilities makes them valuable assets in maintaining strategic stability. On the other hand, their autonomy, the potential to misinterpret their use, and the proliferation risks of some drones pose a significant challenge. As drone technology continues to evolve, it is imperative that policymakers and military experts work collaboratively to understand its benefits while safeguarding against its dangers. The future of nuclear deterrence stability may be influenced in significant ways by how well or poorly we adapt to drone technologies.</p>
<p><em>Steve Cimbala is a Senior Fellow at the National Institute for Deterrence Studies. Adam Lowther is the Vice President for Research at NIDS. Views express in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/09/Drones-and-Nuclear-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="238" height="66" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 238px) 100vw, 238px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-role-of-drones-in-nuclear-deterrence/">The Role of Drones in Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-role-of-drones-in-nuclear-deterrence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Quiet Dismantling of America’s AI Warfighting Edge</title>
		<link>https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/</link>
					<comments>https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/#respond</comments>
		
		<dc:creator><![CDATA[Greg Sharpe]]></dc:creator>
		<pubDate>Wed, 20 Aug 2025 12:16:15 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[advanced technologies]]></category>
		<category><![CDATA[adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI fellowships]]></category>
		<category><![CDATA[AI warfare]]></category>
		<category><![CDATA[algorithmic assessments]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[battlefield innovations]]></category>
		<category><![CDATA[battlefield losses]]></category>
		<category><![CDATA[CDAO]]></category>
		<category><![CDATA[Chief Digital and Artificial Intelligence Office]]></category>
		<category><![CDATA[Chief Technology Officer]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cost-cutting]]></category>
		<category><![CDATA[CTO]]></category>
		<category><![CDATA[Department of Government Efficiency]]></category>
		<category><![CDATA[Digital Corps]]></category>
		<category><![CDATA[DOGE]]></category>
		<category><![CDATA[efficiency mandates]]></category>
		<category><![CDATA[global AI dominance]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[institutional memory]]></category>
		<category><![CDATA[interoperability]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[propaganda]]></category>
		<category><![CDATA[readiness]]></category>
		<category><![CDATA[recruitment]]></category>
		<category><![CDATA[reform]]></category>
		<category><![CDATA[retention]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[siloed projects]]></category>
		<category><![CDATA[STEM professionals]]></category>
		<category><![CDATA[strategic deterrence]]></category>
		<category><![CDATA[techno-authoritarianism]]></category>
		<category><![CDATA[technological coherence]]></category>
		<category><![CDATA[technologists]]></category>
		<category><![CDATA[US Department of Defense]]></category>
		<category><![CDATA[wargames]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31400</guid>

					<description><![CDATA[<p>Amid the global artificial intelligence (AI) arms race, elite adversaries such as China and Russia are actively strengthening their military tech structures without any barriers from their government. They are maintaining robust chains of command, particularly in key tech leadership roles, to preserve momentum in AI-driven warfare. Meanwhile, the US Department of Defense (DoD) appears [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/">The Quiet Dismantling of America’s AI Warfighting Edge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Amid the global artificial intelligence (AI) arms race, elite adversaries such as China and Russia are actively strengthening their military tech structures without any barriers from their government. They are maintaining robust chains of command, particularly in key tech leadership roles, to preserve momentum in AI-driven warfare.</p>
<p>Meanwhile, the US Department of Defense (DoD) appears to be doing the opposite. The Chief Digital and Artificial Intelligence Office (CDAO) recently <a href="https://defensescoop.com/2025/07/03/pentagon-ai-office-cdao-eliminates-cto-efficiencies-doge">axed its Chief Technology Officer</a> (CTO) directorate, a move many analysts view as strategic self-sabotage.</p>
<p>This directorate, responsible for overseeing more than $340 million in AI and digital integrations in fiscal year 2024, represented a critical nexus linking battlefield innovations with institutional infrastructure. Its elimination, justified under “efficiency” mandates, alarmed defense observers who fear it fractures continuity, erases institutional memory, and sends a dangerous signal to adversaries willing to exploit perceived American weakness.</p>
<p><strong>The Strategic Misstep</strong></p>
<p>The CDAO was formed in 2022 by fusing key functions from the Joint Artificial Intelligence Center, Defense Digital Service, Chief Data Office, and Advana analytics, aiming to unify policy, technology, and digital services. Embedded within <a href="https://defensescoop.com/2025/05/07/dod-cdao-future-uncertain-top-leaders-tech-staffers-depart">CDAO, the CTO led cross-functional teams in AI, cyber, logistics, and command-and-control systems</a>, ensuring that new technologies remained interoperable and aligned with warfighter requirements.</p>
<p>Abruptly dismantling this directorate not only removes a pivotal vision and coordination role but also creates a void with no clear replacement. The result is fragmented efforts, lost synergy across mission areas, and a battlefield advantage handed to adversaries.</p>
<p><strong>Expertise Lost, Momentum Undermined</strong></p>
<p>Leadership and expertise take years, even decades, to develop. Figures like Bill Streilein, former CTO of <a href="https://en.wikipedia.org/wiki/Chief_Digital_and_Artificial_Intelligence_Office">CDAO</a> and veteran of MIT Lincoln Laboratory, carried institutional memory and high standards into Pentagon AI programs. But when top-tier professionals are sidelined under the label of “streamlining,” they often leave and seldom return.</p>
<p>This pattern has already occurred. The Defense Digital Service (DDS), once lauded as the Pentagon’s “<a href="https://www.politico.com/news/2025/04/15/pentagons-digital-resignations-00290930">SWAT team of nerds</a>,” lost almost all of its members by May 2025, prompting its demise. Nearly every DDS member, citing bureaucratic pressure from the Department of Government Efficiency (DOGE), chose to depart rather than conform.</p>
<p>These departures are not benign transfers. They represent the scattering of core innovators and connectors whose insight and trust networks are irreplaceable. Without them, emerging AI systems risk becoming siloed projects rather than battlefield-enabling capabilities.</p>
<p><strong>DOGE: Efficiency or Engineered Evisceration?</strong></p>
<p>DOGE, instituted by a presidential executive order in January 2025, is authorized to slash perceived inefficiencies across federal agencies—often through AI-enhanced, automated assessments. Under the leadership of figures tied to Elon Musk and Vivek Ramaswamy, <a href="https://en.wikipedia.org/wiki/Department_of_Government_Efficiency">DOGE</a> has repurposed its mandate to aggressively target leadership and innovation roles across the board—including in national defense.</p>
<p>DOGE has justified cuts using its proprietary AI systems to flag and eliminate “inefficient” programs, often without human oversight or contextual nuance. The CTO’s directorate was among its most high-profile targets, methodically identified and removed, despite its mission-critical nature.</p>
<p>To make matters worse, DOGE is reportedly comfortable with these decisions. One Pentagon official described it as a “theater of dominance,” not just cost-cutting, but deliberate erasure of institutional anchors to obfuscate the depth and breadth of the sacrifice.</p>
<p><strong>The High-Stakes Fallout</strong></p>
<p>Adversaries feast on the narrative that the US champions AI yet purges its own tech leadership overnight. “America cannibalizes its talent while claiming leadership in AI warfare,” such narratives go. These optics weaken American deterrence, erode allied confidence, and provide cover for Moscow, Beijing, and Pyongyang to reframe the battlefield narrative.</p>
<p>Domestic consequences are equally grim. The consistent removal of flagship tech roles projects a clear message to science, technology, engineering, and math (STEM) professionals; serve, and risk being discarded. That weakness is a recruitment boon for adversaries, national lab contractors, and tech-armed autocracies solving tomorrow’s warfare puzzles.</p>
<p>Real efficiencies lie not in gutting leadership but in fortifying it. Per the <a href="https://en.wikipedia.org/wiki/National_Security_Commission_on_Artificial_Intelligence">National Security Commission</a> on AI, prioritizing disciplined recruitment and retention of technical talent, including a <a href="https://www.youtube.com/shorts/59rGN1OhqDk">Digital Corps and AI fellowships</a>, is key to American competitiveness. Instead, we witness the dismantling of precisely those anchor roles meant to shepherd AI innovation into combat-relevant systems.</p>
<p><strong>The DOGE-Driven Dismantling of Tech Leadership</strong></p>
<p>The concepts herein are alarming and reflect an institutional unraveling that directly undermines America’s global security posture and strategic deterrence in five critical ways. <em>First</em>, the elimination of the Chief Technology Officer (CTO) directorate from the Chief Digital and Artificial Intelligence Office (CDAO) strips away a core pillar of the Pentagon’s ability to adapt emerging technologies for battlefield advantage. This directorate was not redundant bureaucracy; it was the crucible in which ideas from national labs, industry, and warfighters were harmonized into operational capability.</p>
<p>By abruptly dismantling this team, the Department of Defense has extinguished a pipeline of institutional memory and strategic insight at the precise moment when rapid, informed, and integrated decision-making is needed. This brain drain parallels a historical pattern of self-sabotage and leaves adversaries uncontested in the tech talent race.</p>
<p><em>Second</em>, the removal of high-level AI leadership is a propaganda gift to revisionist powers like China and Russia. These states are watching America voluntarily decapitate its own strategic leadership, an act they can now frame as proof of American decline. This strengthens their strategic messaging in influence campaigns aimed at allies, neutral states, and even American citizens.</p>
<p>“America cannibalizes its talent while claiming leadership in AI warfare” is not just a phrase, it is a weaponized narrative that demoralizes partners and emboldens adversaries to challenge American dominance in contested domains like cyberspace, space, and AI warfare.</p>
<p><em>Third</em>, strategic deterrence hinges on credible capability and the perception of cohesion. DOGE’s algorithmic-driven targeting of leadership roles without contextual assessment introduces chaos into the acquisition and integration life cycle of military AI systems. Instead of creating synergistic effects across logistics, cyber, and command and control, the US risks building a fractured, siloed ecosystem that fails in joint operations.</p>
<p>By removing the very leaders who prevent stove piping, the US sabotages its ability to develop and field interoperable, scalable, and warfighter-ready AI tools. This systemic breakdown makes deterrence brittle, vulnerable to being cracked in future high-end conflicts.</p>
<p><em>Fourth</em>, the US has struggled to compete with the private sector for AI and cybersecurity talent. By signaling that even elite government technologists are disposable under the guise of “efficiency,” this policy drives future talent away from public service. Those who might have joined a modern “Digital Corps” will instead seek stability and respect elsewhere, perhaps even abroad.</p>
<p>Strategic deterrence depends not only on weapons but on technologists who know how to deploy them. Gutting these roles ensures that tomorrow’s innovations will not make it past the lab, let alone onto the battlefield.</p>
<p><em>Fifth</em>, DOGE’s use of automated assessments to eliminate “inefficiencies” without human oversight is a grotesque parody of reform. Its reliance on cold, context-blind algorithms to purge critical roles mimics adversary models of techno-authoritarianism, not democratic accountability. If allowed to continue, this will hollow out innovation across government agencies and military branches.</p>
<p>Efficiency is not the enemy, misapplied efficiency is. Strategic deterrence requires smart investments, not cost-cutting theater that sacrifices our warfighting edge on the altar of political optics.</p>
<p><strong>Strategic Self-Sabotage Must Be Reversed</strong></p>
<p>This is not merely streamlining, it is full-blown surrender. The dismantling of the CDAO’s CTO directorate and the broader DOGE initiative represents an engineered unraveling of the very leadership needed to project U.S. strategic deterrence in the AI era. Leadership is the vector through which technology becomes capability. Remove it, and you hand your adversaries not only the advantage, but the narrative.</p>
<p>Unless reversed, these concepts and actions will echo through wargames, deterrence failures, and battlefield losses. The US must stop cannibalizing its competitive edge and re-center its national security strategy on strengthening, not sidelining, its AI leadership.</p>
<p><strong>Conclusion</strong></p>
<p>Leadership is not just overhead on the funding spreadsheet; these leaders are our ammunition in the fight for global AI dominance. Removing them during a strategic inflection point is not reform, it is a self-made vulnerability, and as the US disables its own leadership of advanced technologies, it is dismantling future readiness.</p>
<p>The nation must insist on accountability. Cost-cutting means nothing if it costs the technological coherence to compete in tomorrow’s battles. In the strategic competition unfolding now, leadership is the weapon, and ceding it is surrender. This page out of the DOGE handbook should be shredded and burned. Remember, Iranian nuclear scientists were not dismantled by their own regime, they were destroyed by US and Israeli bombs.</p>
<p><em>Greg Sharpe is Marketing Director at the National Institute for Deterrence Studies. He is retired from the US Air Force. The views expressed are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/Sabotage-from-Within-A-DOGE-Debocle.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="306" height="85" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 306px) 100vw, 306px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/">The Quiet Dismantling of America’s AI Warfighting Edge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tech-centric Partnership in the Indo-Pacific to Deter Digital Curtain</title>
		<link>https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/</link>
					<comments>https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/#respond</comments>
		
		<dc:creator><![CDATA[Abrar Rahman Namir]]></dc:creator>
		<pubDate>Tue, 05 Aug 2025 12:08:07 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Abrar Rahman Namir. ​]]></category>
		<category><![CDATA[Advanced Persistent Threat (APT)]]></category>
		<category><![CDATA[American Strategic Interests]]></category>
		<category><![CDATA[ASEAN]]></category>
		<category><![CDATA[asymmetric capabilities]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Critical and Emerging Technology]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[Cyber Coercion]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Cyber Incidents]]></category>
		<category><![CDATA[Cyberspace]]></category>
		<category><![CDATA[Democracies]]></category>
		<category><![CDATA[Digital Age]]></category>
		<category><![CDATA[Digital Curtain]]></category>
		<category><![CDATA[Digital Enforcement Body]]></category>
		<category><![CDATA[Digital Silk Road]]></category>
		<category><![CDATA[Disinformation campaigns]]></category>
		<category><![CDATA[Economic Security]]></category>
		<category><![CDATA[Free and Open Indo-Pacific]]></category>
		<category><![CDATA[Geopolitical Significance]]></category>
		<category><![CDATA[Gray Zone Tactics]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[Indo-Pacific Partnership for Maritime Domain Awareness (IPMDA)]]></category>
		<category><![CDATA[Maritime Initiative for Training in the Indo-Pacific (MAITRI)]]></category>
		<category><![CDATA[maritime security]]></category>
		<category><![CDATA[Pacific Island Forum]]></category>
		<category><![CDATA[Quad Cyber Challenge]]></category>
		<category><![CDATA[Quad Foreign Ministers’ Meeting]]></category>
		<category><![CDATA[Quad Partnership on Cable Connectivity and Resilience]]></category>
		<category><![CDATA[Regional Partners]]></category>
		<category><![CDATA[resource allocation]]></category>
		<category><![CDATA[Specialized Workers]]></category>
		<category><![CDATA[Strategic Inertia]]></category>
		<category><![CDATA[Tech-centric Partnership]]></category>
		<category><![CDATA[technological advancements]]></category>
		<category><![CDATA[Technology-enabled Authoritarianism]]></category>
		<category><![CDATA[Telecommunications Infrastructure]]></category>
		<category><![CDATA[Undersea Cables]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Volt Typhoon]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31294</guid>

					<description><![CDATA[<p>From Pakistan in the Indian Ocean to Kiribati in Oceania, a digital curtain is falling across the Indo-Pacific. Various actors are leveraging cyberspace and technological advancements to implement an alternative vision to a free and open Indo-Pacific—a direct affront to democracies and American strategic interests. It is reported that 77 percent of all known state-backed [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/">Tech-centric Partnership in the Indo-Pacific to Deter Digital Curtain</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>From Pakistan in the Indian Ocean to Kiribati in Oceania, a digital curtain is falling across the Indo-Pacific. Various actors are leveraging cyberspace and technological advancements to implement an alternative vision to a free and open Indo-Pacific—a direct affront to democracies and American strategic interests. It is reported that <a href="https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific">77 percent of all known state-backed cyber operations</a> emanate from China and its associates, while those attacks attempt to undermine societal institutions in countries such as Taiwan, Japan, Australia, and New Zealand, among others. These incidents reveal China’s broader strategic vision, one that entails shaping the regional structure in its favor.</p>
<p>The digital Silk Road (DSR), China’s initiative to invest in critical telecommunications and emerging technology in foreign countries, is a vehicle to lower the barriers to cyber coercion and propagate the digital curtain. By embedding its “<a href="https://www.cfr.org/china-digital-silk-road/">model of technology-enabled authoritarianism</a>” in recipient nations, Beijing seeks to shape the digital ecosystems of other countries in ways that serve its strategic interests. Such attempts call for a proactive and coordinated response from the United States and its regional partners—one that builds a resilient, tech-driven organization capable of countering China’s digital expansion across the the Indo-Pacific.</p>
<p>The United States and China are engaged in a great power competition, one which has seeped into multiple theaters and domains. The Indo-Pacific region is generally understood to be the frontline of this contest.</p>
<p>However, China’s burgeoning technological capacity has led to cyberspace being a critical juncture in this competition; one where traditional borders fade, thereby allowing the proliferation of gray zone tactics. Such tactics are deployed in various ways—<a href="https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific">infiltrating critical infrastructure</a>, cyber espionage, and disinformation campaigns—on key democracies in the region.</p>
<p>Considering the geopolitical significance of the Indo-Pacific, China’s attempts to use cyber coercion to cleave the region from the United States’ sphere of influence highlights a calculated strategy by the Chinese Communist Party (CCP). The region is home to over <a href="https://www.trade.gov/indo-pacific-commercial-service">50 percent</a> of the world’s population, and <a href="https://www.isdp.eu/publication/indo-pacific-security-in-2030-35-links-in-the-chain/">80 percent</a> of global trade volume transits through its channels. It houses “<a href="https://washingtondc.jhu.edu/news/three-observations-about-the-strategic-importance-of-the-indo-pacific/">seven of the world’s largest militaries, and five American treaty allies</a>.”</p>
<p>Moreover, digital connectivity and <a href="https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific">internet adoption rates</a> are the fastest growing compared to any region in the word, making it rife with opportunities and threats. These vulnerabilities not only indicate further volatility for regional governments but could also undermine American national security.</p>
<p>The list of cyber incidents already attributed to Chinese state-sponsored entities is extensive, and its targets are equally expansive. Advanced persistent threat (APT)—long-term, sophisticated, and entrenched cyber intrusions designed to hack, steal, and/or neutralize systems—have been a weapon of choice for those entities. For instance, <a href="https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific">APT-30 and APT-40</a>, which targeted Association of South East Asian Nations (ASEAN) members and New Zealand’s government, respectively, are reportedly linked to the Chinese government.</p>
<p>Furthermore, American intelligence and cybersecurity agencies recently confirmed that <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/china">Volt Typhoon</a>, a Chinese state-sponsored entity, compromised American critical infrastructure ranging from telecommunications to water systems; its reach even included US territories such as Guam.</p>
<p>While the specter of ATPs and digital intrusions have entered the purview of several governments in the Indo-Pacific region, individual efforts to deter those threats are futile. This is often due to strategic inertia, a shortage of specialized workers, and asymmetric capabilities.</p>
<p>A consolidated effort by the United States and its regional partners is needed to build consensus, direct resources, and establish a digital enforcement body. This could address those issues while mitigating any potential upheaval from China’s tactics. Fortunately, the groundwork for such a partnership is already in place.</p>
<p>On July 1, 2025, the 10th Quad foreign ministers’ meeting was hosted by US Secretary of State Marco Rubio, where he was joined by his counterparts from Japan, India, and Australia. It was the second such meeting since January, signifying the importance placed on the vision of the group by the Trump administration.</p>
<p>The measures agreed upon as a result are further evidence to that fact—<a href="https://www.state.gov/releases/office-of-the-spokesperson/2025/07/2025-quad-foreign-ministers-meeting/">initiatives to bolster maritime and transnational security, economic security, critical and emerging technology</a>, among others. Therefore, the vast security mandates of those initiatives provide a viable path to constructing a techno-centric partnership while addressing the region’s strategic, skills, and capabilities gaps when it comes to deterring China’s digital incursions.</p>
<p>The decision to expand the <a href="https://www.pmc.gov.au/resources/quad-leaders-summit-2023/indo-pacific-partnership-maritime-domain-awareness">Indo-Pacific Partnership for Maritime Domain Awareness</a> (IPMDA)—a technology-focused initiative to augment the maritime security landscape—provides a practical foundation for a techno-centric partnership. Its stated goal of developing a “<a href="https://www.state.gov/releases/office-of-the-spokesperson/2025/07/2025-quad-foreign-ministers-meeting/">common operating picture</a>” for the IPMDA could lead to the basis for a strategic consensus among potential members.</p>
<p>Furthermore, incorporating insights from the <a href="https://www.state.gov/releases/office-of-the-spokesperson/2025/07/2025-quad-foreign-ministers-meeting/">first Maritime Initiative for Training in the Indo-Pacific</a> (MAITRI) workshop could assist in closing the skills gap for a regional digital workforce, further adding to the partnership’s feasibility.</p>
<p>Additional features which could be utilized for the partnership and address the capabilities gap include the <a href="https://2021-2025.state.gov/2024-quad-cyber-challenge-joint-statement/">Quad Cyber Challenge</a> and the <a href="https://www.dfat.gov.au/international-relations/regional-architecture/quad/cable-connectivity-and-resilience-centre">Quad Partnership on Cable Connectivity and Resilience</a>. The Cyber Challenge seeks to enhance the cyber ecosystem, digital awareness, and resourcing among member nations.</p>
<p>The Partnership on Cable Connectivity and Resilience, on the other hand, bears a more tactical responsibility of strengthening telecommunications infrastructure, specifically, undersea cables—arguably the most critical component of the digital ecosystem. Although these initiatives are focused on Quad member-nations, they could be expanded in a larger forum to engage ASEAN and Pacific subregional organizations such as the Pacific Island Forum, providing more opportunities for resource allocation.</p>
<p>There is institutional and strategic momentum behind the formation of a tech-centric partnership, not to mention the critical security imperative that exists. The broad consensus, coupled with the runway to take near-term action, makes this a prospective enterprise. Such concrete action is necessitated if the US and its regional allies expect to maintain a free and open Indo-Pacific and establish an active deterrent to China, which seeks to write the rules and draw the margins of the evolving digital age.</p>
<p><em>Abrar Rahman Namir is currently interning at Associated Universities and assisting in the Batteries and Energies to Advance Commercialization and National Security program as a supply chains and trade analyst.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/Tech-centric.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="230" height="64" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 230px) 100vw, 230px" /></a></p>
<p><a href="https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/">Tech-centric Partnership in the Indo-Pacific to Deter Digital Curtain</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</title>
		<link>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/</link>
					<comments>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/#respond</comments>
		
		<dc:creator><![CDATA[Harry Geisler]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 12:17:17 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI-enabled navigation]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[autonomous weapons]]></category>
		<category><![CDATA[Civilian dual-use technologies]]></category>
		<category><![CDATA[collective defense]]></category>
		<category><![CDATA[counter-drone strategy]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[energy grid]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[export control regimes]]></category>
		<category><![CDATA[FPV drones]]></category>
		<category><![CDATA[global security policies]]></category>
		<category><![CDATA[governance gaps]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[infrastructure attacks]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[legal frameworks]]></category>
		<category><![CDATA[National defense]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nord Stream pipelines]]></category>
		<category><![CDATA[procurement pathways]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[start-ups]]></category>
		<category><![CDATA[transportation hubs]]></category>
		<category><![CDATA[unmanned aircraft systems]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31187</guid>

					<description><![CDATA[<p>In August 2024, police in northern Germany chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In August 2024, <a href="https://www.defensenews.com/global/europe/2024/08/29/drone-sightings-near-bases-infrastructure-unnerve-german-officials">police in northern Germany</a> chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting for sabotage.</p>
<p>This was not an isolated incident. Civilian-grade drones and other dual-use technologies are increasingly being used to survey or target public infrastructure. From energy grids to airports, the connective tissue of modern life is exposed to risks once confined to traditional warzones. These developments are reshaping global security policies and blurring the boundary between civilian and military domains.</p>
<h3><strong>Civilian Tech, Strategic Impact</strong></h3>
<p>Cheap unmanned aircraft systems (UAS) are now accessible worldwide. While drones were initially developed for military use, the most commonly deployed platforms today, such as DJI’s Mavic series, were originally built for civilian applications like aerial photography and videography. Their affordability, portability, and high-spec cameras made them commercially popular, but those same features have made them easy to repurpose for military contexts.</p>
<p>In particular, first-person view (FPV) drones, designed for immersive recreational flying, were rapidly adapted for frontline use in conflict. These drones are now routinely deployed with improvised explosives or used for precision reconnaissance. In Ukraine, both sides repurposed off-the-shelf drones in vast numbers; nearly two million were produced in 2024 alone. Many of these are equipped with AI-enabled navigation and targeting, underscoring how quickly civilian tech can be weaponised.</p>
<p>Non-state actors are following suit. Armed groups are using FPV drones for low-cost, high impact strikes on infrastructure, blurring the lines between military and civilian threats. This second drone age shows that national security vulnerabilities now stem as much from consumer technology as from conventional arsenals.</p>
<p>The broader implication is clear: private-sector innovations, often created without any defense intent, are shaping the battlefield. These companies bring novel use cases, technical advantages, or agile design processes that legacy defense contractors may overlook. Civilian tech is not just a risk; it is a potential strategic asset. Tapping into this ecosystem, especially among start-ups and experts, could redefine how the country protects critical infrastructure in an era of hybrid conflict.</p>
<p><strong>Infrastructure in the Crosshairs</strong></p>
<p>Modern infrastructure is a key target in modern conflicts or hybrid attacks, just like military bases traditionally were. In 2022, after the <a href="https://www.theguardian.com/business/2022/sep/29/nord-stream-attacks-highlight-vulnerability-undersea-pipelines-west">sabotage of the Nord Stream pipelines</a>, over 70 drone sightings were reported near Norwegian offshore oil platforms. Oslo feared Russian-linked hybrid operations targeting Europe’s energy supply and deployed naval assets and invited NATO allies to assist in patrols.</p>
<p>Meanwhile, Ukraine’s energy grid suffered repeated drone and missile attacks, with waves of <a href="https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign">low-cost Shahed drones</a> used to disable power plants. By spring 2024, <a href="https://www.bbc.co.uk/news/articles/czvvj4j4p8ro">roughly half of Ukraine’s electricity capacity</a> was destroyed, forcing nationwide blackouts.</p>
<p>Outside conflict zones, attacks on infrastructure are also rising. In Sudan, a <a href="https://www.bbc.co.uk/news/articles/cx20x8g2nego">drone strike on a power station caused regional outages,</a> and other drone attacks on water purification stations left the country on the <a href="https://www.bbc.co.uk/news/articles/c3v5n5ynl59o">brink of a significant Cholera outbreak</a>. In the US, federal officials stopped an attack on a power grid by a man using an <a href="https://domesticpreparedness.com/articles/protecting-critical-infrastructure-from-weaponized-drones">explosive-carrying drone</a>.</p>
<p>Transportation hubs are vulnerable, too. In January 2025, <a href="https://d-fendsolutions.com/blog/europes-drone-challenge-and-countermeasures-in-2025/">drone activity shut down Riga Airport</a>, disrupting dozens of flights.</p>
<p><strong> </strong><strong>Gaps in Governance</strong></p>
<p><strong> </strong>Despite growing risks, legal and operational frameworks remain fragmented. Drones and AI-driven surveillance systems often fall outside traditional arms control regimes. As a recent<a href="https://www.flyingmag.com/white-house-unveils-package-of-drone-measures-in-executive-order/"> executive order</a> put it, “Criminals, terrorists, and hostile foreign actors have intensified their weaponization of drone technologies, creating new and serious threats to our homeland.”</p>
<p>Jurisdictional confusion is common. In many countries, local authorities lack legal authority to respond to rogue drones above critical sites. Aviation safety rules and privacy laws create hesitation, giving bad actors a head start.</p>
<p>Even when threat awareness exists, coordination is inconsistent. The Cybersecurity and Infrastructure Security Agency warns that drones are used for surveillance and sabotage, yet they lack the comprehensive tools to oversee private-sector resilience or cross-border response.</p>
<p><strong> </strong><strong>A Global Security Challenge</strong></p>
<p><strong> </strong>Drone and AI threats are not confined by borders. In 2023, the <a href="https://ec.europa.eu/newsroom/cipr/items/805599/en">European Commission launched a new counter-drone strategy</a>, urging member states to harden infrastructure and coordinate airspace protections. NATO has added counter-UAS exercises to its joint drills, while AUKUS partners are beginning to share emerging drone and AI tactics.</p>
<p>But international law is lagging. There is still no global treaty governing the use of armed drones or autonomous surveillance. Export control regimes struggle to manage proliferation of AI-enabling components. At the UN, efforts to establish binding norms on autonomous weapons are stalled. Ad hoc coordination is, however, slowly improving.</p>
<p>When Norway’s oil platforms were threatened, NATO allies were called in within days. After drone sightings near Dutch and Belgian ports, neighboring governments exchanged countermeasure plans. These models suggest a path forward: rapid and collective responses based on shared tools, shared doctrine, and shared threat intelligence.</p>
<p>The future of civilian dual-use technologies will not be defined by innovators alone. Whether drones or AI software, these tools are already reshaping how adversaries threaten public safety and economic continuity. What is at stake is not just national security, but the resilience of infrastructure that supports daily life.</p>
<p><strong>The Crucial Role of Start-ups in National Defense</strong></p>
<p><strong> </strong>Civilian-origin technologies are now driving the next wave of defense capability. From FPV drones to AI surveillance tools, some of the most disruptive military applications today are emerging not from traditional defense primes but from commercial markets, often developed by start-ups with no military background.</p>
<p>A coordinated international framework is urgently needed, one that does not just support innovation and infrastructure protection but actively integrates civilian tech into defense planning. This means lowering the barriers for experts and start-ups to meaningfully contribute alongside legacy contractors. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">United Kingdom’s recent <em>Defence Review</em></a> hinted at this shift, recognising that smaller firms are vital to national resilience, particularly when civilian infrastructure is under threat.</p>
<p>What is truly needed is a NATO-wide or broader allied framework that enables cross-border collaboration, streamlines regulation, and opens up procurement pathways.</p>
<p>Today, many start-ups working at the intersection of security and technology face steep hurdles: limited access to capital, opaque compliance regimes, and procurement processes designed around, and for, large incumbents. Yet by creating space for their innovation, we can modernize collective defense from the ground up, using the very same civilian tools that adversaries are already turning into weapons.</p>
<p>A coordinated international framework is urgently needed, one that not only supports innovation and infrastructure protection but also lowers barriers to experts and start-ups to contribute more meaningfully alongside traditional defense primes. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">UK’s recent <em>Defence</em> <em>Review </em>hinted at this shift</a>, recognizing the value smaller firms bring to national resilience. It is time to take similar action at home.</p>
<p><em>Harry Geisler is the CEO of YAVA.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/How-Civilian-Dual-Use-Technologies-Are-Reshaping-Global-Security-Policies.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="180" height="50" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 180px) 100vw, 180px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The 5GW Playbook: Silent Wars and Invisible Battlefields</title>
		<link>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/</link>
					<comments>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/#respond</comments>
		
		<dc:creator><![CDATA[Syeda Fizzah Shuja]]></dc:creator>
		<pubDate>Mon, 19 May 2025 12:06:36 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[5GW]]></category>
		<category><![CDATA[5th-generation warfare]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Alouk water station]]></category>
		<category><![CDATA[ambition]]></category>
		<category><![CDATA[anti-satellite weapons]]></category>
		<category><![CDATA[ASAT]]></category>
		<category><![CDATA[autonomous drone strike]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[Berlin Wall]]></category>
		<category><![CDATA[biological warfare]]></category>
		<category><![CDATA[Bollywood]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CIPS]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[cyber networks]]></category>
		<category><![CDATA[cyber sabotage]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[deepfake propaganda]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[drought]]></category>
		<category><![CDATA[economic coercion]]></category>
		<category><![CDATA[economic manipulation]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[false news]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[financial system]]></category>
		<category><![CDATA[food control]]></category>
		<category><![CDATA[Hollywood]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[hybrid influence operations]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[information dominance]]></category>
		<category><![CDATA[K-pop]]></category>
		<category><![CDATA[Libya]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[manipulation]]></category>
		<category><![CDATA[maritime terrorism. ​]]></category>
		<category><![CDATA[military satellite market]]></category>
		<category><![CDATA[narratives]]></category>
		<category><![CDATA[One China Policy]]></category>
		<category><![CDATA[Palau]]></category>
		<category><![CDATA[pentagon]]></category>
		<category><![CDATA[perception battle]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[Ren Zhengfei]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[seabed]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[space dominance]]></category>
		<category><![CDATA[subsea communication cables]]></category>
		<category><![CDATA[SWIFT banking system]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecom networks]]></category>
		<category><![CDATA[THAAD missile defense system]]></category>
		<category><![CDATA[US dollar]]></category>
		<category><![CDATA[US sanctions]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[water scarcity]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30754</guid>

					<description><![CDATA[<p>War no longer announces itself with the roar of fighter jets or the march of soldiers. It now lurks in the shadows where the front line is undefined. The recent sabotage of Estlink 2 power cables, disruptions to Taiwan’s undersea communication lines, and the increasing presence of unidentified commercial vessels near critical infrastructure are signs [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/">The 5GW Playbook: Silent Wars and Invisible Battlefields</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>War no longer announces itself with the roar of fighter jets or the march of soldiers. It now lurks in the shadows where the front line is undefined. </strong>The recent sabotage of <strong>Estlink 2 power cables</strong>, disruptions to <strong>Taiwan’s undersea communication lines</strong>, and the increasing presence of <strong>unidentified commercial vessels near critical infrastructure</strong> are <a href="https://www.dailysabah.com/opinion/op-ed/beneath-the-surface-the-strategic-implications-of-seabed-warfare">signs</a> <strong>of 5th-generation warfare (5GW). Moreover, a high spike in emerging incidents like Russian hybrid tactics in Europe, artificial intelligence (AI)-powered cyberattacks on maritime infrastructure, and the weaponization of social media for disinformation</strong> suggests the evolving nature of contemporary warfare.</p>
<p><a href="https://moderndiplomacy.eu/2024/11/25/5th-generation-war-a-war-without-borders-and-its-impact-on-global-security/">5GW</a><strong> includes </strong>information dominance and manipulation, social engineering, economic coercion, cyber sabotage, and hybrid influence operations. It thrives on ambiguity, exploiting vulnerabilities without traditional combat. In 5GW, the lines between war and peace are blurred. No declarations, no clear enemies, just a relentless assault on stability. The goal is not to conquer land or destroy armies, but to cripple a nation’s spirit, economy, and infrastructure from within.</p>
<p>One of the most potent asymmetric tools of 5GW is economic manipulation. <a href="https://www.fdd.org/analysis/2024/11/02/palau-is-under-attack-from-prc/">Palau</a>, a serene archipelago of over <strong>500 islands</strong>, were untouched by war <strong>until 2017.</strong> Palau dared to reject <strong>Beijing’s “One China Policy.”</strong> This move sent shockwaves through its fragile economy in the form of economic strangulation. In a masterstroke of economic coercion, <strong>China’s state-backed tour operators erased Palau from the Web.</strong></p>
<p>Travel agencies stopped selling trips. Online searches yielded no results. <strong>Palau’s tourism industry, which accounted for </strong><a href="https://www.theguardian.com/global-development/2018/sep/08/palau-against-china-the-tiny-island-defying-the-worlds-biggest-country">45 percent of gross domestic product</a> (GDP)<strong>, collapsed.</strong> Hotels emptied, airlines shut down, and the once-thriving economy suffocated.</p>
<p>This was not an anomaly, but a pattern<strong>.</strong> In <strong>2016, South Korea agreed to facilitate the American </strong><a href="https://www.theguardian.com/world/2016/jul/08/south-korea-and-us-agree-to-deploy-thaad-missile-defence-system">THAAD missile defense system</a><strong>.</strong> China retaliated not with weapons but with <strong>economic muscle.</strong> Mysterious “fire and safety” violations suddenly appeared in South Korean businesses across China. <strong>A </strong><a href="https://www.forbes.com/sites/augustrick/2017/12/21/how-beijing-played-hardball-with-south-korea-using-the-2018-olympic-ticket-sales/">nine-month ban</a><strong> on Chinese tourism cost Seoul $6.5 billion.</strong> <strong>Retail giants like Lotte crumbled, thousands lost jobs, and yet, no war was declared.</strong></p>
<p>The more interconnected the world economy becomes, <strong>the more vulnerable nations are to economic blackmail.</strong> Even <strong>Venezuela, despite its fiery anti-American rhetoric,</strong> was bound to the US economy. In 2018, despite Washington branding <strong>Nicolás Maduro a dictator</strong> and Caracas calling the US a <strong>“white supremacist regime,”</strong> the two nations still had <strong>$24 billion in trade, </strong>a quarter of <a href="https://www.aljazeera.com/economy/2018/9/13/venezuelas-crisis-in-numbers">Venezuela’s GDP</a>.</p>
<p>Yet, when Washington imposed <strong>sweeping financial sanctions,</strong> Venezuela’s <a href="https://www.wsj.com/articles/the-tragedy-of-venezuela-1527177202">economy shrunk</a><strong> by 35 percent in a single year.</strong> After all, the United States does not just impose sanctions; <strong>it controls the very financial system that runs the world.</strong> The US dollar is the bloodline of global trade, and those who defy it <strong>find themselves cut off from international markets, unable to access capital or even conduct basic transactions. However, </strong>economic warfare breeds resistance.</p>
<p><strong>Russia and China saw the writing on the wall.</strong> Between 2017 and 2020, <strong>Moscow </strong><a href="https://www.rferl.org/a/russia-cuts-holdings-us-bonds-may-end-dollar-payments/29429653.html">slashed its holdings</a><strong> of US Treasury securities from $105 billion to just $3.8 billion</strong> and shifted towards China’s <strong>Cross-Border Interbank Payment System (</strong><a href="https://www.cnas.org/publications/commentary/why-chinas-cips-matters-and-not-for-the-reasons-you-think">CIPS</a><strong>),</strong> sidestepping American financial hegemony.</p>
<p>The true <strong>commanding heights of global dominance</strong> lie at the intersection of <strong>technology, finance, and unchecked ambition. China is not just selling 5G networks, it is embedding itself into the nervous system of global communication. On the other hand, the US does not just dominate finance, it controls the SWIFT banking system, ensuring economic warfare is just a sanction away. Similarly, corporations do not just innovate, they monopolize, influence, and quietly dictate policy behind closed doors.</strong></p>
<p><em>“Surge forward, killing as you go, to blaze us a trail of blood.”</em> A battle cry? <strong>Indeed.</strong> Not from a general on the battlefield, but from <strong>Ren Zhengfei, the founder of Huawei</strong>, a company waging a war not just against competitors but against entire nations. Britain’s telecom networks are suspected to have <a href="https://www.bbc.com/news/uk-53329005">Chinese backdoors</a>.</p>
<p>I<strong>nformation is now what oil was in the 1970s, a critical commodity to be controlled.</strong> Today, <strong>data is the new crude</strong>, and the battle to monopolize its flow has already begun. <strong>Quantum computing, AI, and machine learning</strong> are the new oil rigs, and the nations that dominate these technologies will dictate the future. Unlike oil, <strong>information is easily stolen, manipulated, or even weaponized in ways no physical resource ever could. </strong></p>
<p>The first lethal autonomous drone strike in Libya, recorded in <strong>March 2020</strong>, was a grim reminder of what is to come. <strong>A suicide drone, powered by AI, needed no human command—just a target. </strong><a href="https://journal.ciss.org.pk/index.php/ciss-insight/article/view/361">Fire and forget</a><strong> was the name of the game. </strong>Imagine the next phase: <strong>terrorist organizations deploying AI-powered swarms, able to strike with precision, invulnerability, and zero risk to human operatives.</strong> They would not negotiate, would not retreat, and would prove hard to stop. <strong> </strong></p>
<p>In a world where biological warfare is outlawed, <strong>the selective control of food, aid, and healthcare has replaced mass destruction with slow, calculated suffocation.</strong> Nations can now <strong>deny access to the very essentials of life</strong> to break their adversaries in a <strong>siege without walls and a war without battlefields. </strong>Over <a href="https://www.wri.org/insights/highest-water-stressed-countries">40 percent</a><strong> of the world’s population</strong> faces water scarcity, and by 2030, <a href="https://www.who.int/health-topics/drought#tab=tab_1">drought</a> could displace <strong>700 million people.</strong> The <strong>Turkish-backed militias that had control over the Alouk water station in Syria</strong> in 2020 was a stark reminder—<strong>when resources are weaponized, suffering becomes policy.</strong></p>
<p><strong>Interestingly, the battle of perception is gaining momentum more than ever. </strong>In an era of <strong>clickbait headlines and disinformation campaigns, lies travel faster than truth. The </strong><a href="https://news.mit.edu/2018/study-twitter-false-news-travels-faster-true-stories-0308">Massachusetts Institute of Technology</a> found that <strong>false news spreads 70 percent faster than real news.</strong> From <strong>the Soviet KGB planting the rumor in the 1980s that the US government created AIDS </strong>to modern <strong>deepfake propaganda,</strong> deception is the new artillery.</p>
<p>Even culture is not immune. <strong>Hollywood exported American ideals, Bollywood spread Indian influence, and K-pop turned South Korea into a global powerhouse. For instance,</strong> the Cold War was not just won by missiles, it was won when a <strong>West German band sang “Wind of Change,” which then became the anthem of the Berlin Wall’s collapse.</strong></p>
<p>If <strong>hunger, water, and financial systems</strong> hare already weaponized, the next battlefield is clear—space and the seabed<strong>.</strong> <strong>Subsea communication cables are responsible for carrying 97 percent of global data traffic and are the arteries of the modern economy. They enable over $10 trillion in financial transactions every single day.</strong> Yet, these vital lifelines remain <strong>shockingly unprotected and are vulnerable to sabotage, espionage, and strategic disruption.</strong> A targeted attack on just a handful of these cables could <a href="https://www.dailysabah.com/opinion/op-ed/beneath-the-surface-the-strategic-implications-of-seabed-warfare">cripple stock markets</a><strong>, paralyze banking systems, and sever military command structures—all without a single warship being deployed.</strong></p>
<p>Meanwhile, the <strong>race for space dominance is accelerating.</strong> From <strong>$63.66 billion in 2024 to an estimated $74.4 billion by 2028,</strong> the <a href="https://www.researchandmarkets.com/reports/5735299/military-satellites-market-report#:~:text=It%20will%20grow%20from%20$60.92%20billion%20in,compound%20annual%20growth%20rate%20(CAGR)%20of%204.5%.">global military satellite </a>market is growing, fueled by the realization that <strong>power no longer lies in boots on the ground, but in eyes in the sky.</strong> Satellites provide <strong>precision-strike capabilities, secure communication, and real-time battlefield intelligence.</strong> The <strong>Pentagon warns</strong> that the US is already vulnerable, with <strong>China and Russia developing anti-satellite (ASAT) weapons.</strong></p>
<p>In this realm, one can say that modern states wage wars without battlefields, where the goal is not to destroy but to <strong>subdue</strong>—crippling economies, infiltrating cyber networks, and manipulating narratives <strong>without a single shot fired.</strong> What is never openly begun is rarely officially ended. <strong>In 5th-generation warfare, silence is a weapon, perception is the battlefield, and survival means accepting that war never truly ends.</strong></p>
<p><em>Syeda Fizzah Shuja is a Research Associate at Pakistan Navy War College and an Mphil scholar in Peace and Counter Terrorism. Her work focuses on hybrid warfare and maritime terrorism. She can be contacted at fizzasyed2k@gmail.com.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/The-5GW-Playbook.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="245" height="68" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 245px) 100vw, 245px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/">The 5GW Playbook: Silent Wars and Invisible Battlefields</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</title>
		<link>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/</link>
					<comments>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/#respond</comments>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Tue, 06 May 2025 12:11:01 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI investment]]></category>
		<category><![CDATA[AI supremacy]]></category>
		<category><![CDATA[AI technical competency.]]></category>
		<category><![CDATA[AI training]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Baidu]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese aggression]]></category>
		<category><![CDATA[data centers]]></category>
		<category><![CDATA[decision dominance]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[DeepSeek]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[ERNIE model]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[gray zone conflict]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[joint force]]></category>
		<category><![CDATA[large language models]]></category>
		<category><![CDATA[malign information operations]]></category>
		<category><![CDATA[military affairs]]></category>
		<category><![CDATA[multidomain operations]]></category>
		<category><![CDATA[Nvidia chips]]></category>
		<category><![CDATA[open-source AI]]></category>
		<category><![CDATA[Project Maven]]></category>
		<category><![CDATA[psychological operations]]></category>
		<category><![CDATA[Qwen]]></category>
		<category><![CDATA[Spamouflage Dragon]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30686</guid>

					<description><![CDATA[<p>The DoD must incorporate artificial intelligence (AI) capabilities to counter the influence of China. Artificial intelligence will inevitably determine who shapes future conflicts. China is actively using these capabilities to gain decision dominance. Focusing on information operations is critical. Drones, for example, use artificial intelligence capabilities, as do defensive systems. However, conflict between near-peer adversaries [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/">China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The DoD must incorporate artificial intelligence (AI) capabilities to counter the influence of China. Artificial intelligence will inevitably determine who shapes future conflicts. China is actively using these capabilities to gain decision dominance.</p>
<p>Focusing on information operations is critical. Drones, for example, <a href="https://medium.com/@adelstein/ai-powered-defense-how-cutting-edge-technology-is-revolutionizing-national-security-against-drones-1934a13123fa">use artificial intelligence capabilities</a>, as do defensive systems. However, conflict between near-peer adversaries and competitors is still unlikely <a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/">as gray zone and hybrid conflict are the dominant avenues for competition</a>. With the information environment transcending all domains of warfare, artificial intelligence capabilities become the go-to capability to ensure and maintain information advantage.</p>
<p>China’s AI-enhanced information operations are becoming increasingly sophisticated. For example, the Chinese advanced persistent threat actor <a href="https://cyberscoop.com/tag/spamouflage-dragon/">Spamouflage Dragon</a> uses generative AI to create online personas to influence public opinion. China and its proxy companies seek to develop or compete for AI supremacy within the information environment.</p>
<p>Of course, China will use anything within its arsenal to shape strategic, operational, and tactical levels of war to its advantage, expand its influence, and create an ecosystem that is dependent on its technologies. For example, <a href="https://www.cnbc.com/2016/07/01/baidu--the-google-of-china--eyes-expansion-to-us-europe-ceo.html">Baidu, known as the “Google of China,</a>” invested billions into AI capabilities, creating the <a href="https://medium.com/ai-frontiers/baidu-goes-open-source-ernie-ai-model-to-be-released-by-june-2025-72a918897da4">proprietary ERNIE model</a>, which has been trained on billions of parameters, increasing the output’s quality and complexity.</p>
<p>However, China is also leveraging open-source AI models to shape the information environment. With the recent release of open-source <a href="https://www.thenationalnews.com/business/markets/2025/03/06/what-is-qwen-the-open-source-genai-model-from-alibaba-challenging-deepseek/">large language models such as DeepSeek and Qwen</a>, Chinese-linked subsidiaries, <a href="https://www.bloomberg.com/news/articles/2023-10-17/alibaba-tencent-join-funding-for-chinese-ai-high-flyer-baichuan">High-Flyer and Alibaba Group</a> created a way to expand their influence, revise history, and likely create a dependent ecosystem for target countries. Unlike the much more expensive ChatGPT, for which the more basic model is free, China’s investment in <a href="https://economictimes.indiatimes.com/tech/artificial-intelligence/alibaba-releases-ai-model-it-claims-surpasses-deepseek-v3/articleshow/117670287.cms?from=mdr">generative AI models is free</a> for the public and even surpasses <a href="https://www.sparkouttech.com/deepseek-vs-chatgpt/">ChatGPT’s in some respects</a>.</p>
<p>There is a debate about how China’s proxy state companies were able to create these advanced models without US-based critical components. China allegedly <a href="https://www.csis.org/analysis/deepseek-huawei-export-controls-and-future-us-china-ai-race">did not have access to the advanced critical Nvidia chips</a> for which most AI models are dependent. China seems to have created generative models just as suitable or even better than that of ChatGPT, but allegedly at a <a href="https://www.techpolicy.press/closing-the-loopholes-options-for-the-trump-administration-to-strengthen-ai-chip-export-controls/">fraction of the cost and free of charge to the public</a>. The US limited Nvidia chip exports to China, a market predicted to top <a href="https://www.forbes.com/sites/martineparis/2024/07/26/ai-to-drive-1-trillion-in-global-chip-sales-by-2030-as-nvidia-leads/">$1 trillion in revenue within a decade</a>. Still, the accusation is that the Chinese subsidiary leased or bought the more advanced <a href="https://www.business-standard.com/technology/tech-news/us-trade-rules-breached-singapore-detains-three-in-nvidia-gpu-crackdown-125030400651_1.html">Nvidia chips from Singapore, circumventing restrictions</a>, and used <a href="https://www.theverge.com/news/601195/openai-evidence-deepseek-distillation-ai-data">ChatGPT to train its model</a>.</p>
<p>Regardless of how China secured these critical technologies, the cat is indeed out of the bag. China has shown that it has the capability to develop new and emerging AI technologies. From the capabilities already built, it now has a baseline to create even more capabilities to develop its own AI chip ecosystem. With such capabilities, China will become more active within the information environment with the help of AI capabilities, and its motives are far from benevolent.</p>
<p>Why is the Chinese model free? China has several motives, but it is likely in hopes that data and information across the globe are the price tag for using the model while lessening a dependency on Western technologies and <a href="https://www.weforum.org/stories/2025/01/transforming-industries-with-ai-lessons-from-china/#:~:text=China's%20trajectory%20in%20AI%20is,for%20AI%20innovation%20by%202030.">becoming a global leader in AI by 2030</a>. Whatever data is obtained by the United States is icing on the cake. The West is not the primary target audience. Both models have servers in Singapore and China, where information is likely subject to Chinese laws, and terms and conditions are meaningless.</p>
<p>The Chinese will use AI technologies to gain an advantage in the information environment and seek to expand influence by creating an ecosystem for which other countries are dependent on their models. The incentive is to give countries this technology to foster dependency. The idea is similar to China’s debt-trap diplomacy—<a href="https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-initiative">the Belt and Road Initiative</a>. While ChatGPT’s basic model is free, China seeks to develop better models at a cheaper price to serve as leverage over countries that cannot afford the higher-end US-based models.</p>
<p>The United States is taking the right approach to maintaining its information advantage through AI development and investment. The <a href="https://www.reuters.com/technology/artificial-intelligence/behind-500-billion-ai-data-center-plan-us-startups-jockey-with-tech-giants-2025-01-23/">billions pouring into creating AI data centers</a> will play an important role in ensuring the United States has the edge in AI.</p>
<p>These data centers remain critical for identifying and countering any malign information operations against the United States, its partners, and its allies. When Iran attempted to influence the 2024 presidential election using the generative model GPT, <a href="https://openai.com/index/disrupting-deceptive-uses-of-AI-by-covert-influence-operations/">OpenAI detected and shut it down</a>. Without this expansive investment in AI data centers that keep information within the letter of US law and oversight, these interventions would be out of reach, and information operations may be even more challenging to detect.</p>
<p>However, this approach is insufficient without incorporating artificial Intelligence into all aspects of military operations. The DoD uses artificial intelligence within some branches, but given the expansive nature of AI, this is not enough. AI is expected to touch nearly all aspects of military operations, especially information operations, and may not have time to wait for its major AI initiative, <a href="https://interestingengineering.com/military/project-maven-the-epicenter-of-us-ai-military-efforts">Project Maven</a>, to fully develop.</p>
<p>Some military scholars have called something like this a <a href="https://www.csis.org/analysis/real-revolution-military-affairs">revolution in military affairs</a>, but perhaps, given the impact of war, it could be classified as such. <a href="https://nationalinterest.org/feature/nothing-new-why-revolution-military-affairs-same-old-one-77266">The concept is somewhat antiquated and outdated without some context</a>, but it remains the best way to describe what should take place within the DoD. The foundation is already in place through the conceptual framework of multidomain operations.</p>
<p>Artificial capabilities are widely available through graphical user interfaces in deployable, ready-to-use form, such as ChatGPT or even internal <a href="https://www.army.mil/article/283601/enhancing_military_operational_effectiveness_through_the_integration_of_camo_and_nipr_gpt">large language models</a>. The joint force should use these capabilities to the broadest extent possible. If anything, artificial intelligence, including large language models, will make joint and combined forces more lethal and accurate as they counter Chinese efforts within the information environment.</p>
<p>The DoD must adopt incentives for service members to understand the capabilities of AI and incorporate them in all training environments. These incentives can include bonuses for taking AI-driven courses. The DoD can also increase awareness and accessibility of AI courses on its education platforms which now have a paucity of artificial intelligence courses.</p>
<p>The DoD must also improve the training environment. With proprietary or off-the-shelf software, the DoD can incorporate AI offensive and defensive platforms within all training and mission-critical tasks. Even simply assisting with identifying generative outputs, e.g., deepfakes, will counter Chinese influence within the information environment, especially during hybrid conflict. Furthermore, military doctrine should recognize the importance of AI, especially information operations, with an emphasis on psychological operations.</p>
<p>While AI investment is critical to countering Chinese influence within the information environment, the only way to truly embrace multidomain operations is to ensure service members have the AI technical competency necessary to maneuver within the information environment deterring Chinese aggression.</p>
<p><em>US Army Lieutenant Colonel Matthew J. Fecteau is a PhD researcher at King’s College London studying how artificial Intelligence will impact conflict. He can be reached at matthew.fecteau.alumni@armywarcollege.edu.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/Chinas-AI-Driven-Information-Operations-are-Here.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="288" height="80" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 288px) 100vw, 288px" /></a></p>
<p><a href="https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/">China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</title>
		<link>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/</link>
					<comments>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/#respond</comments>
		
		<dc:creator><![CDATA[Huma Rehman]]></dc:creator>
		<pubDate>Thu, 10 Apr 2025 11:54:22 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Act]]></category>
		<category><![CDATA[AI have-nots]]></category>
		<category><![CDATA[AI haves]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[deregulation]]></category>
		<category><![CDATA[digital divide]]></category>
		<category><![CDATA[digital technology]]></category>
		<category><![CDATA[economic empowerment]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[geopolitical power]]></category>
		<category><![CDATA[global commons]]></category>
		<category><![CDATA[Global Partnership on Artificial Intelligence ​]]></category>
		<category><![CDATA[human development]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[international cooperation]]></category>
		<category><![CDATA[Paris Summit]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[social empowerment]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[tech race]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30505</guid>

					<description><![CDATA[<p> The rapid advancement of artificial intelligence (AI) is transforming industries, economies, societies, and global politics. However, this artificial intelligence and technological revolution also exacerbates existing competitions, creating a stark divide between states that are AI haves and AI have-nots. This digital divide is not just about access to technology but also about the ability to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/">AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong> </strong>The rapid advancement of artificial intelligence (AI) is transforming industries, economies, societies, and global politics. However, this artificial intelligence and technological revolution also exacerbates existing competitions, creating a stark divide between states that are AI haves and AI have-nots.</p>
<p>This digital divide is not just about access to technology but also about the ability to harness AI’s potential for economic, social, and global political empowerment. The implications of the AI divide are leading to a tech race that impact geopolitical power dynamics, exacerbating competition major powers like the US, China, France, and India. Depending on how the race ends, it could swing the balance of power in a negative direction.</p>
<p><strong>AI Paris Summit</strong></p>
<p>The recent <a href="https://www.elysee.fr/en/sommet-pour-l-action-sur-l-ia">AI Action Summit</a> held in Paris emerged as a pivotal event that highlights both the opportunities and challenges associated with this evolving AI tech race. This summit serves as a beacon of innovation, encouraging <a href="https://tribune.com.pk/story/2527932/frances-macron-calls-for-equal-access-to-ai-for-all-nations">France</a> and India to collaborate more closely, while also exposing the complex interplay of international reactions, particularly from major powers like the United States, United Kingdom (UK), and China.</p>
<p>The summit focused on expanding AI’s boundaries while respecting environmental and ethical obligations. France’s President Emmanuel <a href="https://www.elysee.fr/en/emmanuel-macron/2025/02/11/statement-on-inclusive-and-sustainable-artificial-intelligence-for-people-and-the-planet">Macron</a> reaffirmed his nation’s commitment to AI innovation, while maintaining high regulatory standards that draw parallels to Notre Dame Cathedral’s restoration. Such a strategy will likely accelerate AI ventures and foster innovation.</p>
<p>However, the regulation proposed was also a noose around the neck of the summit’s emphasis—deregulation. It is worth considering whether drastic deregulation will lead to genuine advances or the weakening of certain crucial safety nets as the world grapples with how to handle ever expanding data and the fragmentation that result from the intersection of geopolitical interests and the private ownership of data and capability. The US and China approach the issue differently than Europe, whose <a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai">adoption of the AI Act</a> (2023) will see the first comprehensive AI regulation in the world.</p>
<p>Many wondered how agentic AI will impact the balance of power. Whether AI will have a net positive or negative effect is uncertain. The rate at which agentic AI is developed and adopted in the three main economic blocs of China, Europe, and the United States will determine much.</p>
<p><strong>India-France AI Alliance </strong></p>
<p>India and France are forming a partnership to leverage AI’s full potential globally, sharing knowledge, resources, and best practices to create a robust framework for AI initiatives and global dialogue. <a href="https://www.csis.org/analysis/frances-ai-action-summit">During the summit</a>, leaders from both countries addressed how their alliance could facilitate joint ventures, research collaborations, and talent exchange programs. <a href="https://in.ambafrance.org/India-France-will-harness-AI-s-potential-for-global-good">Prime Minister Narendra Modi and President Macron foresaw</a> great potential for future cooperation in 2019 when they endorsed the <em>Indo-French Roadmap on Cybersecurity and Digital Technology</em>. India and France, founding members of the Global Partnership on Artificial Intelligence, aim to develop a safe, open, secure, and ethical AI for human development and global commons.</p>
<p><strong>Global Reactions</strong></p>
<p>As the world watches the developments in Paris, reactions from other global powers, notably <a href="https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/why-us-china-ai-competition-matters/">China and the United States</a>, added another layer of complexity to the conversation around AI regulation and collaboration. In recent years, both states have invested heavily in AI research and development, seeing it as critical to their national security and economic competitiveness.</p>
<p>China’s approach to AI governance contrasts significantly with that of France and India. While the <a href="http://fi.china-embassy.gov.cn/eng/kxjs/201710/P020210628714286134479.pdf">Chinese government</a> prioritizes rapid innovation with minimal regulatory oversight, this led to concerns about privacy, surveillance, and ethical implications. The US, on the other hand, grapples with debates around data privacy, corporate responsibility, and the potential for AI misuse. As a result, the responses from these two states illustrate differing philosophies about how best to harness AI’s potential while safeguarding public interests.</p>
<p><a href="https://www.theguardian.com/technology/2025/feb/11/us-uk-paris-ai-summit-artificial-intelligence-declaration">The US and UK declined</a> to sign a declaration on “inclusive and sustainable” artificial intelligence at the Paris summit, in a blow to hopes for a concerted approach to developing and regulating the technology. The document was backed by 60 other signatories on February 11, 2025, including France, <a href="https://www.theguardian.com/world/china">China</a>, India, Japan, Australia, and Canada.</p>
<p>The reactions from the relevant stakeholders highlight the urgent need for international cooperation and dialogue. As AI transcends borders, creating harmonized standards and frameworks could mitigate risks associated with its deployment.</p>
<p><strong>Opportunities and Challenges Ahead</strong></p>
<p>The summit concluded by emphasizing the need for proactive state engagement in AI regulation, prioritizing innovation while protecting individual rights and societal values. This, participants believed, would allow the world to fully capitalize on AI’s benefits.</p>
<p>As the world grapples with the realities of increasingly AI-driven technology, <a href="https://www.innovationaus.com/is-the-paris-ai-declaration-as-vulnerable-as-the-climate-accord/">the voices of diverse stakeholders</a>, including technologists, ethicists, policymakers, and civil society must be heard in shaping the future of AI. Under the flag of the AI Paris Summit, the India-France AI alliance is entering into a new and more unpredictable phase. By defying red tape and cultivating a spirit of cooperation, states are setting the pace for unlocking unprecedented opportunities while highlighting the inherent challenges of this transformative technology.</p>
<p><em>Huma Rehman is a project consultant, consultant, and defense and foreign affairs analyst. She can be reached at X @HumaRehman1.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/04/AI-Paris-Summit-and-Emerging-Paradox-of-AI-Haves-and-Have-Nots.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29601" src="http://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button.png" alt="Download here." width="302" height="84" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button-300x83.png 300w" sizes="(max-width: 302px) 100vw, 302px" /></a></p>
<p><a href="https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/">AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Defense Start-ups</title>
		<link>https://globalsecurityreview.com/ai-defense-start-ups/</link>
					<comments>https://globalsecurityreview.com/ai-defense-start-ups/#comments</comments>
		
		<dc:creator><![CDATA[Raphael Chiswick]]></dc:creator>
		<pubDate>Mon, 17 Mar 2025 12:13:27 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI Defense Start-ups]]></category>
		<category><![CDATA[AI programming companies]]></category>
		<category><![CDATA[AI-focused defense companies]]></category>
		<category><![CDATA[aid packages]]></category>
		<category><![CDATA[Airbus]]></category>
		<category><![CDATA[BAE]]></category>
		<category><![CDATA[boot camps]]></category>
		<category><![CDATA[Brave1 initiative]]></category>
		<category><![CDATA[Darkstar Coalition]]></category>
		<category><![CDATA[defense companies]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[drone swarm programs]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[engagement range]]></category>
		<category><![CDATA[engineers]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[European tech start-ups]]></category>
		<category><![CDATA[field testing]]></category>
		<category><![CDATA[funding]]></category>
		<category><![CDATA[German AI company]]></category>
		<category><![CDATA[Helsing]]></category>
		<category><![CDATA[HX-2 attack drones]]></category>
		<category><![CDATA[investors]]></category>
		<category><![CDATA[larger manned vehicles]]></category>
		<category><![CDATA[Lockheed Martin]]></category>
		<category><![CDATA[military experts]]></category>
		<category><![CDATA[missile systems]]></category>
		<category><![CDATA[Modern warfare]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[production cost]]></category>
		<category><![CDATA[reconnaissance drones]]></category>
		<category><![CDATA[resilience factories]]></category>
		<category><![CDATA[Russian invasion]]></category>
		<category><![CDATA[Russian Lancet drone]]></category>
		<category><![CDATA[signal disruption]]></category>
		<category><![CDATA[swarm missions]]></category>
		<category><![CDATA[Swarmer]]></category>
		<category><![CDATA[technical advice]]></category>
		<category><![CDATA[technological advances]]></category>
		<category><![CDATA[UAVs]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[Ukrainian defense budget]]></category>
		<category><![CDATA[unmanned aerial vehicles]]></category>
		<category><![CDATA[ZALA]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30291</guid>

					<description><![CDATA[<p>As the recent war in Ukraine makes abundantly clear, unmanned aerial vehicles, or drones, are firmly established as a key tool of modern warfare. Since the Russian invasion of Ukraine in 2022, both sides have made massive technological advances in their drone capabilities in what is essentially a drone production arms race. The Ukrainian government, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ai-defense-start-ups/">AI Defense Start-ups</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the recent war in Ukraine makes abundantly clear, unmanned aerial vehicles, or drones, are firmly established as a key tool of modern warfare. Since the Russian invasion of Ukraine in 2022, both sides have made massive technological advances in their drone capabilities in what is essentially a drone production arms race. The Ukrainian government, however, started to take an alternative route in the development and advancement of their tech by forging mutually beneficial relationships with small artificial intelligence (AI)-focused defense companies across Europe.</p>
<p>As it stands, Ukraine cannot rely entirely on aid packages from Europe and especially not the US who, under Trump, is taking a much more careful role in European conflict. So far, support for Ukraine from the international community is limited, costly, and dependent on repayment either in natural resources or as the United Kingdom said, “the extraordinary profits on immobilized Russian sovereign assets.”</p>
<p>There are certain things which, due to their higher cost, Ukraine must receive from aid deals with foreign governments, such as missile systems and larger manned vehicles. These more expensive items must be produced by larger defense contractors as they have greater access to raw materials and a larger production budget. UAVs, however, can be produced as effectively by smaller companies which are able and willing to provide the Ukrainian government a better deal financially. Over the past few years, a German AI company, Helsing, has filled an important role in providing affordable drone systems to the Ukrainian military. Four thousand reconnaissance drones, designed and manufactured by Helsing, are already operational in Ukraine, and a recent deal was struck to provide 6,000 of their new HX-2 attack drones.</p>
<p>The HX-2 attack drones are similar in design to the Russian Lancet drone, produced by Russian aerospace giant ZALA, but come with a few key advantages and innovations. The HX-2 is technologically advanced and able to avoid signal disruption, a feature which can transform drone capabilities on the Ukrainian battlefield. The engagement range is also far higher, at 100 kilometers (km) compared to the Lancet’s 40–60 km. Helsing is the developer of an AI software which allows the drones to travel on missions in a swarm, where many are piloted by one individual, allowing for incredibly destructive capabilities.</p>
<p>The key advantage of a company like Helsing, over a larger aerospace company with a wider range of products, such as ZALA, is the significantly lower production cost, which Helsing offers. Helsing has plans to increase output, building “resilience factories” across Europe, which allow for countries to carry out domestic production.</p>
<p>The Ukrainian government clearly spotted some of the advantages in giving smaller defense companies the opportunity to develop new and innovative products. Brave1 is an initiative run by the Ukrainian government, where investors, engineers, defense companies, and military experts are able to meet to address some of the gaps and issues that Ukraine faces on the battlefield. The idea is to fix issues and fill gaps as fast as possible, and so far, it has been successful. The Ukrainian government incentivizes both smaller and larger technology companies to innovate by offering them a shot at a lucrative government contract.</p>
<p>Another similar program aimed at kickstarting innovation in the European defense industry is the Darkstar Coalition. Listed as one of the partners of Brave1, Darkstar is a team of European tech start-up owners and investors who joined forces to boost European defense. Darkstar hosted two boot camps, where small tech start-ups demonstrate their creations and compete for the winning prize: cash to expand their operations. A third boot camp will take place in Spring of 2025, with a total of €1.5 million awarded to the two most successful companies. Even companies which do not win the funding will benefit from attending, as they are given the opportunity to carry out field testing, network with other companies, gain technical advice, and potentially receive funding externally from other interested attendees. The success of the boot camps demonstrates the previously underutilized talent and innovative ability in Europe in sectors such as engineering, robotics, AI, and cybersecurity. When incentivized and supported, these smaller start-ups can have a real impact on the war in Ukraine and European security more broadly.</p>
<p>It is not just defense manufacturing companies that are stepping up to meet the changing requirements of the Ukrainian government, but also AI programming companies such as Swarmer are also innovating. Swarmer is a company that creates drone swarm programs with huge capabilities in modern warfare. It is also a company which is consistently present at Brave1 tech summits, meeting with investors and Ukrainian military officials.</p>
<p>As the war enters a new phase, with reduced support from the US and the prospect of limited support from Europe, stretching the Ukrainian defense budget as far is it will go will become even more of a priority. This is where these smaller defense and tech start-ups will thrive. Whilst giants such as Lockheed Martin, BAE, or Airbus typically fill a majority of the orders during long-term conflicts, Ukraine recognized the power in allowing smaller, newer, more nimble defense technology companies to innovate.</p>
<p><em>Raphael Chiswick is an independent author. Views expressed are his own.  </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/03/European-Defence-Start-ups.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="277" height="77" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 277px) 100vw, 277px" /></a></p>
<p><a href="https://globalsecurityreview.com/ai-defense-start-ups/">AI Defense Start-ups</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ai-defense-start-ups/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Nuclear Deterrence and Drones: An Unpredictable Mix?</title>
		<link>https://globalsecurityreview.com/nuclear-deterrence-and-drones-an-unpredictable-mix/</link>
					<comments>https://globalsecurityreview.com/nuclear-deterrence-and-drones-an-unpredictable-mix/#comments</comments>
		
		<dc:creator><![CDATA[Stephen Cimbala]]></dc:creator>
		<pubDate>Thu, 06 Mar 2025 13:07:01 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Air Defense]]></category>
		<category><![CDATA[American nuclear modernization]]></category>
		<category><![CDATA[antimissile defense]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[autonomous vehicles]]></category>
		<category><![CDATA[conventional war]]></category>
		<category><![CDATA[credible threat]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[deterrence by denial]]></category>
		<category><![CDATA[drone swarms]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[electronic warfare]]></category>
		<category><![CDATA[gnostic center]]></category>
		<category><![CDATA[Hypersonic Weapons]]></category>
		<category><![CDATA[long-range strike]]></category>
		<category><![CDATA[missile silos]]></category>
		<category><![CDATA[multiple domains]]></category>
		<category><![CDATA[nuclear command and control]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear escalation]]></category>
		<category><![CDATA[nuclear strategy]]></category>
		<category><![CDATA[orbital satellites]]></category>
		<category><![CDATA[precision killing]]></category>
		<category><![CDATA[preemptive strike]]></category>
		<category><![CDATA[reconnaissance]]></category>
		<category><![CDATA[second-strike capability]]></category>
		<category><![CDATA[space-to-space weapons]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[surveillance]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30222</guid>

					<description><![CDATA[<p>On the surface, the subject matters of drones and nuclear deterrence seem far apart.  Drones and other autonomous vehicle technologies already influence the conduct of war in a significant way. So far, drones’ impact is discussed in the context of conventional war. They may also have potential impact on nuclear deterrence, altering nuclear strategy by [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/nuclear-deterrence-and-drones-an-unpredictable-mix/">Nuclear Deterrence and Drones: An Unpredictable Mix?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On the surface, the subject matters of drones and nuclear deterrence seem far apart.  Drones and other autonomous vehicle technologies already influence the conduct of war in a significant way. So far, drones’ impact is <a href="https://www.19fortyfive.com/2025/01/1200000-drones-ukraines-unmanned-weapons-are-transforming-warfare/">discussed</a> in the context of conventional war. They may also have potential impact on nuclear deterrence, altering nuclear strategy by undermining stable deterrence. This possibility has implications for future decisions concerning American nuclear modernization and for setting priorities in future arms control negotiations.</p>
<p>Their low cost, flexibility, and ability to operate without putting human pilots at risk make drones increasingly valuable in conventional military conflicts. Their capabilities already include reconnaissance and surveillance, long-range strike missions, electronic warfare, and precision killing.</p>
<p>With their precision-targeting ability, drones can be integrated into nuclear deterrence strategies. For instance, they could be used to ensure the survivability of a country’s nuclear forces by providing continuous surveillance and early warning against potential nuclear threats. Drones could also support a more viable second-strike capability, potentially increasing the credibility of nuclear deterrence by ensuring that a country retains a means to retaliate even after a nuclear first strike.</p>
<p>The use of drones in situations where nuclear escalation is a possibility could lead to unintended consequences. The increasing autonomy of drones raises the risk of misinterpretation, as drones could be perceived as a precursor to a larger attack, even when they are only conducting reconnaissance. This could trigger a preemptive nuclear strike by an adversary, leading to an inadvertent escalation into full-scale nuclear war. Cold War and subsequent histories show that the danger of inadvertent nuclear escalation is not trivial.</p>
<p>The possibility that expansion of the war in Ukraine from conventional weapons into nuclear first use could occur from Russian views of Ukrainian deep strikes into Russian territory, with NATO ballistic and cruise missiles, provides one example of concerns in this category.  Lewis A. Dunn <a href="https://www.foreignaffairs.com/united-states/last-chance-prevent-nuclear-anarchy">suggests</a> that President Donald Trump is faced with a world sliding into nuclear anarchy. He writes:</p>
<p>Brinkmanship among major nuclear powers is rising. China is relentlessly expanding its nuclear forces but rejecting serious engagement with the United States on arms control. US–Russia cooperation on nuclear matters, already in a dire state, has deteriorated further with President Vladimir Putin’s repeated nuclear threats in the course of Russia’s war in Ukraine. Recent reports based on information from senior US officials indicate that the United States, too, could modify its posture and expand its arsenal to strengthen deterrence of coordinated Russian, Chinese, and North Korean nuclear adventurism. All these developments have eroded critical pillars of nuclear order and raised the risk of nuclear warfare.</p>
<p>Drones are relatively fast, low-cost, and difficult to detect, which makes them ideal for preemptive strikes against high-value targets. In theory, a nation could deploy a drone strike against an adversary’s nuclear command-and-control infrastructure or missile silos, aiming to disrupt or neutralize a potential nuclear retaliation before it can be launched. In addition, drones equipped with nuclear payloads or advanced conventional weapons could be used as part of a disarming strike. The ability to carry out such strikes could shift the strategic calculations of nations, as adversaries might feel more vulnerable to a preemptive attack, especially if they believe their nuclear retaliation capabilities could be neutralized by <a href="https://thebulletin.org/2021/04/meet-the-future-weapon-of-mass-destruction-the-drone-swarm">fast-moving drone strikes</a>.</p>
<p>As drones become more autonomous, the risk of them making decisions without human oversight increases. In a nuclear context, where the consequences of any action are catastrophic, the delegation of decision-making to machines is highly controversial. The potential for autonomous drones to trigger a nuclear response or make fatal miscalculations due to algorithmic errors presents a <a href="https://www.nytimes.com/2025/01/27/opinion/ai-trump-military-national-security.html">possible threat to strategic stability</a>.</p>
<p>Given that drones can operate autonomously, one challenge is ensuring that their actions do not trigger unintended escalation. Moreover, the reliance on technological systems for communication and control in a nuclear context raises concerns about vulnerabilities in these systems, especially if adversaries employ <a href="https://watermark.silverchair.com/tyw017.pdf?token=AQECAHi208BE49Ooan9kkhW_Ercy7Dm3ZL_9Cf3qfKAc485ysgAAA18wggNbBgkqhkiG9w0BBwagggNMMIIDSAIBADCCA0EGCSqGSIb3DQEHATAeBglghkgBZQMEAS4wEQQM7SnWnmwrjhzQuXVBAgEQgIIDEkOrH_OofFqCBOlMLTdLfdU5uWLM_F-TpzSFraPfuhjw4gDyIDlrGA6peI6TShG95C46dY4adZ4IiBbM7c0eYXs1RpXGUFqnK6Bk8JsHTiBtJTS-9zWhjkGKHAm9U8HmsyDo7Kb2wtGCDWcAqM2iUai2jhH7vVnNqKkbszB2OXh6PaGnpBvhY2888Mnrp4jioVkt8UgTTEI8XPIdxIMHXPtIyAq30xVCkrOZnkfoVlhQL4XhoXS-wztcJUmAf7sqGYyeXRQFT-sMX-mRsQr29H9C8H_0pxD_5ssP6edU3q2RM8f047OiZHtwZEohLfnex0kgTM7geRjcbRB6cS5g9hkVobv-Bg0enhw4U1fSmHt7C_kfC283mDrj0QrU--Jl5K3xlh1w88m36D3BQIigrJKF9Ow3W7rnkZiURm4OEj6POzXdDKspYpPysDHSFyX5cedrjiTPzoD3g8smUFLbq_y0Sqb98MC2x3mILrchSn1gkNBZgnyZ6J_wnlfr2Sj48zQlk89h7N54zIAhI3vfSLlHcRL0SoRB6KnAZLc8v48Cp43IYr8_uesUedzcQd0fPYtLi5zB8L-8ynLyM1SUwTnmGTaA3AvEgi9sXQ82hFkjPRl069vpI_oLN0MpEZImy41aiP7e9FlunBpCDqeDOX7nbugJShn8YEaYc4cQwM1aBN9tikmRLxxt6sUk4p_u3lyXMXuASs4oceaymAfZ1u0pjDEeVKGCCCKDMltgehnguJu0BCAW1o9uomVl1t8fBAbl3UtSyKnJlLY_y4afcyBDdHUjN0zCyGj_KIqEPfn3nO_WJhlO13jX9oAotUOEJSfQ387VMe90aCdUcKjvk35dVRtmd-6IijJ1YgL9zkZSskf1uOtl7xPkRbpWwcEeZ644-1f17ef-RX_qhRnushUH8YjO-SYvN6D9I0TBA6f9T25vKdKgYqnWFamyOafnBYoza6A4MYhyAeGSlKrWhQMLTufWOU5bywLfNNAQKsA_EDUd1NAHht5mNj4mNV7Ew5x_e31Slim26hqn1PjC1Ar-Jg">cyberattacks or electronic warfare</a> tactics to disrupt drone operations.</p>
<p>Future generations of drones will interact with artificial intelligence that also supports other elements in the matrix of deterrence and defense. AI will privilege deterrence by denial compared to deterrence by credible threat of unacceptable retaliation. It will do so because states will have to quickly manage the deterrence and/or conduct conflicts in multiple domains: land, sea, air, space, cyberspace, and the information or knowledge domain. The knowledge domain wraps around all the others. It is the “gnostic center” that controls, connects, and prioritizes among the component parts of the various domains in order to provide for the correct response to threats or attacks.</p>
<p>AI-assisted attacks on the gnostic center will require immediate responses by AI-assisted defenses that can defeat or diminish the cost of those attacks. Absorbing the first blow and then retaliating may not be a choice that is available to beleaguered and time-pressed decision-makers. This situation poses an especially concerning challenge for nuclear deterrence. Decisions for or against nuclear war should allow policymakers sufficient time to deliberate alternatives with their advisors and to select the most appropriate option for the exigent circumstances. But the potential speed of AI-boosted attacks against space and cyber assets, together with the rising speed of kinetic strikes from hypersonic weapons, may leave leaders fearful of an enemy nuclear first strike to choose preemption instead of retaliation.</p>
<p>Just as we can conceive of drones as reconnaissance and strike platforms for offenses, it is also possible that drones can be part of any state’s comprehensive antimissile and air defense plan. One illustration is the use of drone swarms to defeat attacking drones tasked with reconnaissance or strike missions. Another example would be the use of drones for electromagnetic “hit to kill” within the atmosphere or, even more ambitiously, in midcourse intercept against attacking ballistic missile forces. Drones based on one or more lunar spaceports could protect American interests in cislunar space.</p>
<p>Futuristic drones with embedded AI and space-to-space weapons could defend orbital satellites against attack (so-called DSATs) or engage another state’s satellites that appear threatening (ASATs). Priority DSATs and ASATs would deter or defend against any threat to the viability of American satellites for warning and assessment; command, control, and communications; geolocation; and other missions.</p>
<p>Comparatively inexpensive drones could thus take over some of the strategic defense burden, otherwise requiring both upgraded terrestrial missile launchers and kill vehicles or, eventually, sophisticated ballistic missile defenses based on space-to-earth weapons such as lasers or particle beams. Future planners should expect a more crowded space domain, including newer generations of orbital satellites with diverse missions, space stations, and additional reconnaissance and strike weapons along with smarter drones and larger swarms.</p>
<p>The preceding discussion about drones and their possible relationship to nuclear deterrence has implications for nuclear arms control. It is important for a peace agreement to terminate the war in Ukraine for many reasons. One reason is so that the United States and Russia can resume negotiations about an arms control regime to succeed the New START agreement, due to expire in 2026.</p>
<p>The “beyond New START” consultations should include discussions about the two states’ arsenals of non-strategic nuclear weapons and protocols for nuclear first use. Vladimir Putin’s repeated warnings about the possibility of Russian nuclear first use in Ukraine is dismissed by some as bluffing for effect, a form of coercive diplomacy. On the other hand, Russia’s doctrinal shifts appear to move toward a more permissive standard as the war continues. In addition to clarifying this matter, the United States and Russia must acknowledge that China is an aspiring nuclear peer and include China in discussions about nuclear policy issues, including transparency about force structures and military doctrines. China is unlikely to be interested in arms reductions per se, but dialogue should be initiated at the expert level to clarify China’s thinking about strategy, arms control, and related issues.</p>
<p>The character of war changes with the advent of new technologies and strategic thinking.  But the nature of war is perennially the environment of competition and conflict, uncertainty, chance, and friction. The relationship between drones and nuclear deterrence represents a mixed blessing for military planners and arms control. Drones have the potential to enhance nuclear deterrence, but they also introduce significant risks in terms of escalation control and first-strike stability. As drone technology advances, it will be critical for policymakers to develop strategies that account for the unique challenges drones pose in nuclear deterrence and, as well, their future roles in space and cyber wars.</p>
<p><em>Professor Stephen Cimbala, PhD, is a Senior Fellow at the National Institute for Deterrence Studies.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/03/Nuclear-Deterrence-and-Drones-An-Unpredictable-Mix.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29719" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png" alt="" width="302" height="84" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png 300w" sizes="(max-width: 302px) 100vw, 302px" /></a></p>
<p><a href="https://globalsecurityreview.com/nuclear-deterrence-and-drones-an-unpredictable-mix/">Nuclear Deterrence and Drones: An Unpredictable Mix?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/nuclear-deterrence-and-drones-an-unpredictable-mix/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>TikTok: Security Threat or Political Pawn</title>
		<link>https://globalsecurityreview.com/tiktok-security-threat-or-political-pawn/</link>
					<comments>https://globalsecurityreview.com/tiktok-security-threat-or-political-pawn/#respond</comments>
		
		<dc:creator><![CDATA[Justin Miller]]></dc:creator>
		<pubDate>Tue, 25 Feb 2025 13:15:52 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[2020 ban]]></category>
		<category><![CDATA[2024 return]]></category>
		<category><![CDATA[American buyer]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Chinese government]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[electoral politics]]></category>
		<category><![CDATA[foreign influence]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[political pawn]]></category>
		<category><![CDATA[political rhetoric]]></category>
		<category><![CDATA[pragmatic governance]]></category>
		<category><![CDATA[public good]]></category>
		<category><![CDATA[public trust]]></category>
		<category><![CDATA[security threat]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[technology policy]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[transparency]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30150</guid>

					<description><![CDATA[<p>In modern politics, decisions often seem driven more by narrow interests than by a genuine concern for the public good. A prime example of this is the evolving stance on TikTok in American political discourse. In 2020, President Donald Trump led a campaign to ban TikTok, citing national security risks stemming from its Chinese ownership [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/tiktok-security-threat-or-political-pawn/">TikTok: Security Threat or Political Pawn</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In modern politics, decisions often seem driven more by narrow interests than by a genuine concern for the public good. A prime example of this is the evolving stance on TikTok in American political discourse.</p>
<p>In 2020, President Donald Trump led a <a href="https://www.npr.org/2020/08/06/900019185/trump-signs-executive-order-that-will-effectively-ban-use-of-tiktok-in-the-u-s">campaign to ban</a> TikTok, citing national security risks stemming from its Chinese ownership and compromise of private data by the Chinese government. Four years later, Trump <a href="https://www.reuters.com/technology/tiktok-goes-dark-us-users-trump-says-save-tiktok-2025-01-19/">delayed the removal</a> of TikTok from the American market as he looks to find an American buyer for the popular app. This apparent reversal raises the question, is this change motivated by legitimate considerations or political advantage?</p>
<p><strong>The 2020 Ban: National Security or Politics?</strong></p>
<p>During his first term, President Trump pushed to ban TikTok. This effort was framed as a national security measure. Concerns were raised that the app’s parent company, ByteDance, was sharing user data with the Chinese government, posing a threat to American citizens and government operations.</p>
<p>While these concerns were legitimate, critics argued the move was also a political maneuver. It allowed Trump to position himself as tough on China, appealing to his base and broader nationalistic sentiments during an election year. Few analysts considered that both can be true. Politics, particularly those surrounding a beloved video app, were too divisive.</p>
<p><strong>2024: The Return of TikTok?</strong></p>
<p>Fast forward to 2024, and the reported pivot to support TikTok’s return appears incongruous. The core issues cited in 2020—national security and data privacy—have not fundamentally changed. In fact, Americans better understand what it means to have sensitive personal data captured and potentially used for nefarious purposes by an adversary state. Highly contentious congressional testimony by the leaders of social media companies in 2024 only shined a further spotlight on how such firms do not work for the good of users.</p>
<p>Why then would President Trump seek to save the platform? One possible explanation is the platform’s immense popularity, particularly among younger demographics—a voting bloc Trump struggled to capture. Saving TikTok from the US Supreme Court’s <a href="https://www.vox.com/scotus/395462/supreme-court-tik-tok-garland-first-amendment-china">ruling</a> and ensuring its sale to an American firm could signal an attempt to appeal to these voters, making the move less about the app’s merits and more about electoral politics.</p>
<p><strong>Is It about the Public Good?</strong></p>
<p>President Trump’s changing perspective on TikTok may reveal a broader trend in modern politics—the prioritization of optics over substance. Leaders often take contradictory stances to align with prevailing public opinion or to cater to specific constituencies. In the case of TikTok, the narrative seems less about resolving genuine concerns and more about capitalizing on its cultural ubiquity. If national security was a pressing concern in 2020, the question remains why it would be any less urgent today.</p>
<p>Ironically, users fleeing from TikTok prior to its designated cutoff date did not flock to American social media platforms as some might expect, but other Chinese platforms similar to TikTok. It seems Americans are angrier and more concerned that Facebook, Instagram, and Snapchat are manipulating them than anything the Chinese Communist Party may do. Whether this is the wisest choice is yet to be determined.</p>
<p><strong>Political Rhetoric or Pragmatism?</strong></p>
<p>Ultimately, the fluctuating stance on TikTok underscores the blurred line between political rhetoric and pragmatic governance. Decisions on complex issues like technology and national security require consistency and transparency, yet they are often reduced to tools for political gain. This is a bipartisan issue that was not invented by President Trump. It has a long tradition dating back to the early days of the Republic. In fact, it is endemic to democratic systems.</p>
<p>Whether Trump’s recent position reflects a genuine change of heart or strategic posturing, it highlights the broader issue of political inconsistency. Leaders across the political spectrum often adjust their positions based on electoral strategy rather than principle, yet accountability for these shifts is rare. For example, former Vice President Kamala Harris initially endorsed “Medicare for All” during the 2020 Democrat primary, only to later soften her stance to appeal to moderate voters. These shifts demonstrate how political beliefs are easily adjusted to maximize votes. Whether on healthcare, national security, or technology policy, such reversals can erode public trust if not clearly explained to the electorate.</p>
<p>The ultimate resolution of TikTok’s future will depend on whether the app is sold to an American firm, as President Trump has stipulated, or whether it continues operating without a sale. Given the heightened concerns over data security and foreign influence, a lack of clarity on this issue could further weaken public confidence. While political reversals are common, abrupt shifts without clear explanations can make leadership appear inconsistent or opportunistic. Greater transparency from President Trump regarding his rationale would not only provide insight into the decision-making process but could also help mitigate skepticism about his motivations. At a time when trust in government is already fragile, reinforcing accountability and open communication is critical to maintaining public confidence.</p>
<p>The TikTok saga serves as a reminder that political decisions, especially those framed as national security concerns, are often entangled with strategic interests. In an era where public trust in government is fragile, transparency and consistency are essential. Without them, shifting narratives risk further eroding confidence in leadership—not just on TikTok, but on the larger issues that shape democracy itself.</p>
<p>Offering further explanation into President Trump’s plan and thinking would give the American people a better understanding of the variables under consideration and could potentially assuage some of the speculation into his motivation. Democracies require open communication between the citizenry and their representatives. TikTok is an example of just that.</p>
<p><em>Justin Miller is Associate Professor of Practice in the School of Cyber Studies at the </em><a href="https://cybersecurityonline.utulsa.edu/"><em>University of Tulsa</em></a><em>.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/02/TikTok_-Security-Threat-or-Political-Pawn_-Regardless-America-deserves-better.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29719" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png" alt="" width="367" height="102" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png 300w" sizes="(max-width: 367px) 100vw, 367px" /></a></p>
<p><a href="https://globalsecurityreview.com/tiktok-security-threat-or-political-pawn/">TikTok: Security Threat or Political Pawn</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/tiktok-security-threat-or-political-pawn/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Navigating the New Frontier: Agentic AI’s Promise and Challenges</title>
		<link>https://globalsecurityreview.com/navigating-the-new-frontier-agentic-ais-promise-and-challenges/</link>
					<comments>https://globalsecurityreview.com/navigating-the-new-frontier-agentic-ais-promise-and-challenges/#comments</comments>
		
		<dc:creator><![CDATA[Greg Sharpe]]></dc:creator>
		<pubDate>Tue, 04 Feb 2025 13:05:37 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[adaptability]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI decision-making]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[autonomy]]></category>
		<category><![CDATA[biases]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[continuous learning]]></category>
		<category><![CDATA[cybersecurity risks]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[ethical guidelines]]></category>
		<category><![CDATA[ethical implications]]></category>
		<category><![CDATA[financial analytics]]></category>
		<category><![CDATA[financial growth]]></category>
		<category><![CDATA[governance frameworks]]></category>
		<category><![CDATA[healthcare diagnostics]]></category>
		<category><![CDATA[inclusive decision-making]]></category>
		<category><![CDATA[job displacement]]></category>
		<category><![CDATA[job security]]></category>
		<category><![CDATA[legacy systems]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[natural language processing]]></category>
		<category><![CDATA[operational efficiency]]></category>
		<category><![CDATA[personalized customer experiences.]]></category>
		<category><![CDATA[predictive analytics]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[productivity]]></category>
		<category><![CDATA[real-time analytics]]></category>
		<category><![CDATA[regulatory oversight]]></category>
		<category><![CDATA[reskilling]]></category>
		<category><![CDATA[skill redundancy]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[upskilling]]></category>
		<category><![CDATA[venture capital]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29971</guid>

					<description><![CDATA[<p>Artificial intelligence (AI) is entering a new era with the rise of agentic AI, a groundbreaking innovation redefining how machines interact with the world and perform tasks. Unlike traditional AI systems that operate within the bounds of human-defined algorithms and instructions, agentic AI stands apart because it can act autonomously, adapt to changing environments, and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/navigating-the-new-frontier-agentic-ais-promise-and-challenges/">Navigating the New Frontier: Agentic AI’s Promise and Challenges</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Artificial intelligence (AI) is entering a new era with the rise of <a href="https://www.investors.com/news/technology/servicenow-stock-now-stock-mcdermott-interview-artificial-intelligence/">agentic AI</a>, a groundbreaking innovation redefining how machines interact with the world and perform tasks. Unlike traditional AI systems that operate within the bounds of human-defined algorithms and instructions, agentic AI stands apart because it can act autonomously, adapt to changing environments, and make decisions independently to achieve specific objectives. This evolution marks a paradigm shift, moving AI from a tool to an active agent capable of strategic reasoning and complex problem-solving.</p>
<p>Agentic AI quickly became a buzzword in the technology industry, drawing the attention of innovators, corporations, and policymakers alike. By combining machine learning, natural language processing, and real-time analytics, agentic AI systems can interpret nuanced data and execute multi-step tasks previously thought to require human intervention. This capability unlocks immense potential across industries, from healthcare and finance to manufacturing and customer service.</p>
<p>However, the rise of this transformative technology is accompanied by profound challenges. The potential for significant job displacement is actual and imminent. Roles that involve repetitive or analytical tasks could be rendered obsolete, leaving swathes of the workforce vulnerable. This shift is sparking resistance from employees and unions concerned about job security and the ethical implications of AI in the workplace.</p>
<p>In the workplace, agentic AI is already making waves. Businesses leverage these systems to automate complex workflows, enhance productivity, and reduce operational costs. For instance, AI agents are being deployed to streamline supply chains, personalize customer interactions, and even assist in groundbreaking research, such as drug discovery and financial forecasting. As organizations increasingly adopt this technology, the workplace transforms, promising greater efficiency and innovation.</p>
<p>However, the rise of agentic AI is not without challenges. Concerns about job displacement, ethical considerations, and security risks have fueled resistance from employees, unions, and policymakers. Trust in AI decision-making and transparency in its operations remain critical issues that must be addressed for widespread acceptance. Moreover, questions about accountability and regulatory oversight are at the forefront of discussions as the line between human and machine decision-making becomes increasingly blurred.</p>
<p>As this trend continues to gain momentum, agentic AI promises to become a cornerstone of the future economy. Its ability to think, learn, and act autonomously offers unprecedented opportunities to reshape industries and redefine the relationship between humans and technology. With careful implementation and robust ethical guidelines, agentic AI could usher in a new era of collaboration between intelligent systems and human ingenuity, setting the stage for innovations yet to be imagined.<strong> </strong></p>
<p><strong>Basics of Agentic AI</strong></p>
<p>Agentic AI represents a significant advancement in artificial intelligence, characterized by its autonomy in decision-making and action execution without direct human intervention. Unlike traditional AI systems that rely on predefined rules, agentic AI adapts to dynamic environments, processes vast data, and formulates strategies to achieve specific objectives. This autonomy enables agentic AI to handle complex, multi-step problems across various <a href="https://www.wsj.com/articles/how-are-companies-using-ai-agents-heres-a-look-at-five-early-users-of-the-bots-26f87845">industries</a>.</p>
<p>Integrating agentic AI into the workplace transforms business operations by automating intricate tasks and enhancing efficiency. Companies like ServiceNow are embedding agentic AI into their enterprise software to act as control towers for AI-driven business transformations, facilitating seamless system cooperation. Additionally, organizations such as Johnson &amp; Johnson and Moody’s are deploying AI agents for tasks ranging from drug discovery to financial analysis, demonstrating the versatility and impact of Agentic AI in various sectors.</p>
<p><strong>Potential Benefits</strong></p>
<p>Autonomy and adaptability are critical as agentic AI systems operate independently, making decisions and adapting to changing inputs to achieve specific goals without human oversight. Enhanced productivity is vital because agentic AI automates complex tasks, allowing employees to focus on strategic initiatives, thereby increasing overall productivity.</p>
<p>Agentic AI aids industry applications when it is utilized across various industries, including healthcare, manufacturing, and retail, to optimize processes and improve efficiency.</p>
<p><strong>Emerging Concerns</strong></p>
<p><strong> </strong>While promising enhanced productivity and operational efficiency, the integration of agentic AI in the workplace faces significant resistance from various groups due to various concerns. These objections stem from ethical, economic, and cultural implications. Worker advocacy organizations and unions express concern about the potential for large-scale job displacement.</p>
<p>Agentic AI, with its capacity to perform complex, multi-step tasks autonomously, threatens roles that rely on repetitive or analytical tasks, such as data analysis, customer service, and logistics coordination. These groups argue that businesses may prioritize short-term cost savings over employee welfare, exacerbating unemployment and wage stagnation.</p>
<p>Employees in affected industries, such as manufacturing, finance, and retail, fear job insecurity and skill redundancy. Their resistance stems from the perception that companies are deploying AI solutions without clear plans for retraining or upskilling displaced workers. Furthermore, employees often express discomfort working alongside autonomous systems due to a lack of trust and transparency in AI decision-making.</p>
<p>Civil rights groups and ethics committees raise alarm bells over the potential misuse of Agentic AI in surveillance, decision-making, and predictive analytics. Concerns center on the lack of accountability for autonomous decisions, biases in AI algorithms, and the possibility of violating individual privacy rights. These groups argue that deploying AI without clear ethical guidelines undermines trust and could harm marginalized communities disproportionately.</p>
<p>Many managers view agentic AI as threatening their authority and decision-making roles. With AI systems taking on responsibilities like resource allocation and strategic planning, resistance arises from concerns about <a href="https://scet.berkeley.edu/the-next-next-big-thing-agentic-ais-opportunities-and-risks/">diminished relevance</a> and influence in organizational hierarchies.</p>
<p><strong>C-Suite Leadership and Industry Best Practices</strong></p>
<p><strong> </strong>Executives, particularly C-suite leadership, often resist large-scale AI adoption due to high implementation costs, cybersecurity risks, and the challenges of integrating AI into legacy systems. They also face pressure to ensure ethical compliance, which slows decision-making processes and creates resistance to adopting agentic AI systems.</p>
<p>As agentic AI reshapes the corporate landscape, C-suite leaders face a dual imperative: embracing this <a href="https://www.exitcertified.com/blog/understanding-agentic-ai">transformative technology</a>, driving innovation, and remaining attractive to top talent while supporting existing employees. Forward-thinking executives recognize that successfully navigating this shift requires technical adoption and a strategic focus on building a resilient and inclusive workplace culture.</p>
<p>C-suite leaders emphasize reskilling and upskilling programs to keep <a href="https://venturebeat.com/programming-development/agentic-ai-can-help-you-to-get-a-new-software-engineering-job-in-2025/">talent coming</a>. By investing in continuous learning initiatives, leaders can empower employees to thrive alongside agentic AI, positioning their companies as industry leaders prioritizing professional growth. Additionally, fostering partnerships with academic institutions and specialized training providers enables businesses to cultivate a pipeline of skilled professionals eager to work with cutting-edge technologies.</p>
<p>Equally important is addressing employee concerns about job security and ethical AI deployment. Transparent communication about how agentic AI is integrated and its benefits to the organization and <a href="https://techbullion.com/copy-of-understanding-the-role-of-intentionality-in-agentic-ai/">workforce</a> helps build trust.</p>
<p>C-suite leaders should also protect their organizations by establishing best practices for ethical AI use, including governance frameworks, data privacy safeguards, and inclusive decision-making processes. These measures mitigate risks and position companies as responsible innovators, enhancing their reputation among employees, customers, and investors.</p>
<p><strong> </strong><strong>Ethics and Governance</strong></p>
<p><strong> </strong>In the broader policy perspective, regulatory authorities resist rapid adoption due to insufficient legislation governing AI ethics, accountability, and security. Policymakers advocate for stricter oversight and clearer governance frameworks to mitigate autonomy and data security risks.</p>
<p>While this innovation has much to be praised, consumer resistance stems from a lack of understanding and <a href="https://www.knime.com/blog/what-is-agentic-ai">trust in</a> agentic AI systems. Concerns about transparency in AI-driven decisions—such as pricing models, recommendations, or dispute resolutions—lead to skepticism about businesses that fully rely on such systems.</p>
<p><strong> </strong><strong>Tech Companies Eye Financial Windfall from Agentic AI</strong></p>
<p><strong> </strong><a href="https://www.investors.com/news/technology/servicenow-stock-now-stock-mcdermott-interview-artificial-intelligence/">Tech giants</a> are racing to position themselves at the forefront of the agentic AI revolution, recognizing its immense potential to drive financial growth. Companies like Google, Microsoft, and Amazon invest heavily in research and development to create advanced AI agents capable of autonomous decision-making. These firms view agentic AI as a transformative technology that can enhance their existing platforms, open new revenue streams, and cement their dominance in the AI landscape. For instance, <a href="https://venturebeat.com/ai/nvidia-launches-agentic-ai-blueprints-to-automate-work-for-enterprises/">enterprise solutions powered</a> by agentic AI are being marketed as tools to revolutionize industries by automating complex tasks, optimizing workflows, and delivering unprecedented efficiency.</p>
<p>Start-ups and established firms compete to attract venture capital funding, focusing on niche applications such as healthcare diagnostics, financial analytics, and personalized customer experiences. These targeted deployments promise significant cost savings for businesses, making them attractive investments. Additionally, tech companies are integrating agentic AI into cloud computing services, offering businesses scalable, AI-powered solutions that can be tailored to diverse needs.</p>
<p>In short, Agentic AI is coming. It will shape industry, government, and the military, and preparing for that future is critical.</p>
<p>Mr. Greg Sharpe is a Fellow and the director of Communications and Marketing for the National Institute for Deterrence Studies and the Managing Design Editor for the Global Security Review. He has 25+ years in marketing and communications with a focus on digital communications, organizational and institutional change, and analysis.  Greg has over 35 years of military, federal civilian, and defense contractor experience in the fields of database development, digital marketing &amp; analytics, and organizational outreach and engagement, technology use case exploration and assessment.</p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/02/The-Rise-of-Agentic-AI.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/navigating-the-new-frontier-agentic-ais-promise-and-challenges/">Navigating the New Frontier: Agentic AI’s Promise and Challenges</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/navigating-the-new-frontier-agentic-ais-promise-and-challenges/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Drones on the Loose</title>
		<link>https://globalsecurityreview.com/drones-on-the-loose/</link>
					<comments>https://globalsecurityreview.com/drones-on-the-loose/#respond</comments>
		
		<dc:creator><![CDATA[Stephen Cimbala]]></dc:creator>
		<pubDate>Wed, 18 Dec 2024 12:41:16 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Chinese Ministry of Defense]]></category>
		<category><![CDATA[citizens]]></category>
		<category><![CDATA[congress]]></category>
		<category><![CDATA[conspiracy theories]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[environmentalists]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[hawks]]></category>
		<category><![CDATA[Hollywood]]></category>
		<category><![CDATA[intelligence community]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[local government]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[National Institute for Deterrence Studies. ​]]></category>
		<category><![CDATA[New Jersey]]></category>
		<category><![CDATA[New York]]></category>
		<category><![CDATA[Penn State-Brandywine]]></category>
		<category><![CDATA[Pennsylvania tourists]]></category>
		<category><![CDATA[Russian Security Council]]></category>
		<category><![CDATA[sea gulls]]></category>
		<category><![CDATA[shore communities]]></category>
		<category><![CDATA[state department]]></category>
		<category><![CDATA[state government]]></category>
		<category><![CDATA[Steve Cimbala]]></category>
		<category><![CDATA[traffic circles]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29652</guid>

					<description><![CDATA[<p>The state of New Jersey is apparently facing an invasion by unstoppable drones. This development is creating demands for investigation on the part of federal, state, and local governments. Citizens are concerned and media curiosity is at fever pitch. Contacts with foreign sources were not very informative. The Chinese Ministry of Defense denied any use [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/drones-on-the-loose/">Drones on the Loose</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The state of New Jersey is apparently facing an invasion by unstoppable drones. This development is creating demands for investigation on the part of federal, state, and local governments. Citizens are concerned and media curiosity is at fever pitch.</p>
<p>Contacts with foreign sources were not very informative. The Chinese Ministry of Defense denied any use of drones over American or other territory, and their spokesperson added, “We get all the information we need from hacking into US government and industry sources.” They referred Americans to the Russians.</p>
<p>The Russian Security Council denied any involvement in flying drones over the East Coast. “Iran provides most of our drones, go talk to them,” was the only response we could get from officials. They added that President Putin has his own personal drone for use when he is hunting while riding bare chested in the Far East.</p>
<p>Iran’s Foreign Ministry was no more helpful on the issue saying, “Any drones we have will be used for surveillance of Israel or sent to the Russians for the Ukrainians to shoot down.”</p>
<p>Having exhausted foreign sources, Americans turned to domestic agencies. The Department of Homeland Security had no information about drones. “We are fully challenged to cope with unprecedented illegal border crossings, a meltdown of the Secret Service, and a FEMA fiasco in North Carolina to worry about drones,” said one agency official, on background.</p>
<p>The Department of Defense was not any more helpful. They denied having any information about drones, other than to say that there was no evidence of aliens being connected to drone activity in the United States. On the other hand, there was no evidence that the drones were not connected to aliens. They referred Americans to past episodes of <em>The X Files</em>.</p>
<p>The State Department reported that they had no contact with drones other than some foreign ambassadors who were posted to the United States and predictably uninformed about their activities.</p>
<p>The intelligence community said they did not necessarily know anything about drones, but even if they did, it would be classified and could not be shared with the media. This was an understandable reply.</p>
<p>A Republican member of Congress from New Jersey claimed that Iran had launched drones from a “mother ship” somewhere off the coast of the United States and that this information came from highly classified sources. This was corroborated by some boardwalk vendors of pizza in Ocean City and Wildwood, New Jersey. Their credibility was not challenged.</p>
<p>Some residents of New Jersey thought that tourists from Pennsylvania who visit New Jersey beaches during the summer are retaliating for exorbitant rental charges paid in previous years. Given prices, this is certainly an option worth exploring.</p>
<p>Others claimed that the drones were the work of environmentalists angered by shore communities’ wars against sea gulls, including the importation of hawks to chase gulls away from their natural habitats. Recent destruction of irreplicable works of art by environmentalists makes the illicit flying of drones over New Jersey easily conceivable.</p>
<p>Residents of New York suggested that New Jersey was seeking publicity to compensate for its comparative insignificance in national and regional affairs. “New Jersey is simply a suburb of New York and otherwise has no reason to attract news coverage,” was the explanation provided by one New Yorker.</p>
<p>But a New Jersey native came to her state’s defense. New Jersey residents, she said, were mentally exhausted from driving around in their infamous traffic circles until their brains boiled over; aliens or foreign enemies would be a welcome distraction.</p>
<p>An expert in artificial intelligence (AI) suggested that the drone swarms might be the result of an AI experiment gone awry, given the widespread use of “deepfakes” pervasive in social media and other sources. “The Jersey drone swarm could be the opening scene in the next Hollywood spectacular mixing fictitious events (alien invasions) with real events (military drone attacks) in order to smash box office records,” he noted.</p>
<p>Whatever the case may be is still undetermined. Needless to say, the longer it takes to find an answer, the more numerous the conspiracy theories will become. They will also grow increasingly more interesting for sure.</p>
<p><em>Professor Steve Cimbala, PhD, is a Senior Fellow at the National Institute for Deterrence Studies and Professor of Political Science at Penn State-Brandywine.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/Drones-on-the-Loose.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/drones-on-the-loose/">Drones on the Loose</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/drones-on-the-loose/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Paving the Ethical Route for AI</title>
		<link>https://globalsecurityreview.com/paving-the-ethical-route-for-ai/</link>
					<comments>https://globalsecurityreview.com/paving-the-ethical-route-for-ai/#respond</comments>
		
		<dc:creator><![CDATA[Huma Rehman]]></dc:creator>
		<pubDate>Tue, 08 Oct 2024 11:52:07 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Disclosure Act]]></category>
		<category><![CDATA[Algorithmic Accountability Act]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Artificial Intelligence Data Act]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Council of Europe]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[Digital Services Oversight and Safety Act]]></category>
		<category><![CDATA[ethical application]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[EU Artificial Intelligence Act]]></category>
		<category><![CDATA[European regulation]]></category>
		<category><![CDATA[explainability]]></category>
		<category><![CDATA[fairness]]></category>
		<category><![CDATA[Framework Convention]]></category>
		<category><![CDATA[Global AI Governance Initiative]]></category>
		<category><![CDATA[global governance]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[injustice]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[international cooperation]]></category>
		<category><![CDATA[liberal international order]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[National Defense Authorization Act]]></category>
		<category><![CDATA[openness]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[resource allocation]]></category>
		<category><![CDATA[rule of law]]></category>
		<category><![CDATA[sustainable development]]></category>
		<category><![CDATA[technology advancement. ​]]></category>
		<category><![CDATA[United Nations]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29041</guid>

					<description><![CDATA[<p>The complex landscape of artificial intelligence (AI) is increasingly relevant across all fields and nations. Since AI affects every state, its benefits and drawbacks must be addressed collectively. The recent passage of the Framework Convention on Artificial Intelligence by the Council of Europe marks a significant turning point in the quest for effective and long-lasting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/paving-the-ethical-route-for-ai/">Paving the Ethical Route for AI</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The complex landscape of artificial intelligence (AI) is increasingly relevant across all fields and nations. Since AI affects every state, its benefits and drawbacks must be addressed collectively.</p>
<p>The <a href="https://digital-strategy.ec.europa.eu/en/news/commission-signed-council-europe-framework-convention-artificial-intelligence-and-human-rights">recent passage</a> of the <a href="https://www.coe.int/en/web/artificial-intelligence/the-framework-convention-on-artificial-intelligence">Framework Convention on Artificial Intelligence</a> by the Council of Europe marks a significant turning point in the quest for effective and long-lasting control of AI. The document is a statement about how European states will harness AI, a relatively new and powerful technology, to empower humanity while limiting its abuses.</p>
<p>The March 2024 adoption of a US-led United Nations General Assembly resolution on seizing the opportunities of safe, secure, and trustworthy artificial intelligence systems for sustainable development also highlights the common ground the United States shares with Europe and democracies around the world. While the US differs in some <a href="https://www.state.gov/remarks-at-the-signing-ceremony-for-the-council-of-europe-framework-convention-on-artificial-intelligence-and-human-rights/">important areas with Europe</a>, the significant agreement is valuable. This convention provides a foundation for others to build on.</p>
<p>Although new technologies often appear benign at first glance, there are many ways AI, in particular, can negatively impact the values held dear by so many around the world. From facial recognition systems interfering with privacy to machine learning that amplifies injustice, the potential cost of AI’s misuse is high.</p>
<p>Until now, there was not an effort at global governance of AI. This fostered a string of national laws that lack the capacity to address the transnational nature of AI adequately. A system of fractured development silos creates a wide gap wherein technological advancement is prioritized over ethics.</p>
<p>There are a few <a href="https://www.spglobal.com/en/research-insights/featured/special-editorial/the-ai-governance-challenge">AI regulatory developments</a>  around the world for AI management worthy of note. First, the US House of Representatives debated the Digital Services Oversight and Safety Act of 2022 (H.R.6796) and the Algorithmic Accountability Act of 2023 (<a href="https://www.govinfo.gov/content/pkg/BILLS-118hr5628ih/pdf/BILLS-118hr5628ih.pdf">H.R. 5628</a>). The AI Disclosure Act of 2023 (<a href="https://www.congress.gov/118/bills/hr3831/BILLS-118hr3831ih.pdf">H.R. 3831</a>) was also introduced before the House of Representatives.</p>
<p>Canada saw the introduction of the Artificial Intelligence Data Act (<a href="https://www.parl.ca/DocumentViewer/en/44-1/bill/C-27/first-reading">AIDA</a>). The European Parliament began discussing the <a href="https://www.europarl.europa.eu/news/en/headlines/society/20230601STO93804/eu-ai-act-first-regulation-on-artificial-intelligence">EU Artificial Intelligence Act</a> in 2023, which represents a shift toward “hard law.” China is also addressing the issue and undertook the Interim Administrative <a href="https://www.pwccn.com/en/industries/telecommunications-media-and-technology/publications/interim-measures-for-generative-ai-services-implemented-aug2023.html">Measures</a> for the Management of Generative AI Services, which was enacted in 2023.</p>
<p>Recently, the United States <a href="https://www.defense.gov/News/News-Stories/Article/Article/3618367/congress-passes-fiscal-2024-defense-spending-bill-pay-raise-for-service-members/">passed</a> the 2024 National Defense Authorization Act, which <a href="https://www.congress.gov/117/bills/hr7776/BILLS-117hr7776enr.pdf">include</a>d a five-year implementation plan to adopt AI applications to accelerate decision advantage for both business efficacy as well as warfighting capability.</p>
<p>China also released <a href="http://geneva.china-mission.gov.cn/eng/dbtxwx/202311/t20231121_11184852.htm">the Global AI Governance Initiative</a>, “calling for all countries under the <a href="https://www.mfa.gov.cn/eng/wjdt_665385/2649_665393/202310/t20231020_11164834.html">principles</a> of extensive consultation, joint contribution, and shared benefits to enhance exchanges and cooperation, work together to prevent risks, and develop an AI governance framework based on broad consensus, to make AI technologies more secure, reliable, controllable, and equitable.”</p>
<p>The Council of Europe’s Framework Convention, discussed above, provides a comprehensive legal structure to protect human rights, democracy, and the rule of law, besides promoting innovation. This strikes a balance where the use of technology should not be limited but society must ensure that development is in the right direction—with most of the technologies promoting ethical usage.</p>
<p>The Convention <a href="https://www.reuters.com/technology/artificial-intelligence/us-britain-eu-sign-agreement-ai-standards-ft-reports-2024-09-05/">offers a set of guidelines</a> for the advancement of AI that include respecting human dignity and upholding the idea that one should not infringe upon the rights and liberties of others. There is a significant urge to pursue explainability, which requires an explanation for each decision an AI makes and highlights how these systems have the power to significantly impact people’s lives in fields like criminal justice and healthcare. Additionally, the Convention calls for fairness in the creation of AI by considering prejudice in learning systems.</p>
<p>The Convention clearly aspires to international cooperation, which is important because it is a central element of the liberal international order. Numerous states agreed to the treaty, realizing that artificial intelligence is not a local problem. Such collaboration is required since <a href="https://unidir.org/wp-content/uploads/2023/05/Brief-ResponsibleAI-Final.pdf">artificial intelligence affects all states</a>, and its advantages and disadvantages can only be addressed jointly. The agreement’s openness to other parties is crucial because it enables people from different backgrounds and cultures to voice their thoughts, enhancing and leveling the playing field.</p>
<p>As AI advances, concerns will grow about the agreement’s direction, applicability, and resource allocation. It implies that ethically right deeds now might turn unethical as technology develops, highlighting the necessity of a progressive framework for a code of ethics.</p>
<p>Since the development of AI must be accompanied by its ethical application, the Convention on Artificial Intelligence represents an important accomplishment in European regulation of the technology. Therefore, this treaty serves as a guide for how human rights, accountability, and openness should be upheld when integrating AI into society. The journey has only just begun. However, the political will and spirit to act, observe, and adopt the proper approach to governance can serve to achieve the benefits of AI.</p>
<p>Nevertheless, it will probably be difficult to put these rules and policies into foolproof practice. It will certainly be a work in progress. The European Council is certainly providing a road map for managing global mutual technology advancement concerns.</p>
<p><em>Huma Rehman is Director of Research at the Islamabad Policy Institute (IPI) and a Defense &amp; Foreign Affairs Analyst. The views expressed are her own.   </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/10/Paving-the-Ethical-Route-for-AI-Amid-Challenges.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/paving-the-ethical-route-for-ai/">Paving the Ethical Route for AI</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/paving-the-ethical-route-for-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Generative Artificial Intelligence and Deterrence Stability between India and Pakistan</title>
		<link>https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/</link>
					<comments>https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/#respond</comments>
		
		<dc:creator><![CDATA[Anum A. Khan]]></dc:creator>
		<pubDate>Mon, 23 Sep 2024 12:23:49 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI arms control]]></category>
		<category><![CDATA[AI arms control agreement.]]></category>
		<category><![CDATA[AI incident reporting]]></category>
		<category><![CDATA[AI mitigation centers]]></category>
		<category><![CDATA[AI regulation]]></category>
		<category><![CDATA[command-and-control systems]]></category>
		<category><![CDATA[confidence-building measures]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[deterrence stability]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[false flag operations]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[military purposes]]></category>
		<category><![CDATA[misinformation]]></category>
		<category><![CDATA[nuclear crisis]]></category>
		<category><![CDATA[nuclear safety]]></category>
		<category><![CDATA[nuclear war]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[perception building]]></category>
		<category><![CDATA[security mechanisms]]></category>
		<category><![CDATA[strategic communication]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[synthetic media]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28925</guid>

					<description><![CDATA[<p>Imagine a scene. It is the Indian military command center on the night of May 28, 2028. A high-ranking Indian military officer sends a message to a subordinate commander; Pakistan has initiated a preemptive strike. Prepare for a retaliatory strike. This is not a drill. Missile flight time between both India and Pakistan is a [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/">Generative Artificial Intelligence and Deterrence Stability between India and Pakistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine a scene. It is the Indian military command center on the night of May 28, 2028. A high-ranking Indian military officer sends a message to a subordinate commander; Pakistan has initiated a preemptive strike. Prepare for a retaliatory strike. This is not a drill.</p>
<p>Missile flight time between both India and Pakistan is a few minutes. Hence, commanders do not have time for verification and decide to launch a retaliatory strike on warning.</p>
<p>In Pakistan, a high-ranking Pakistani military officer contacts Pakistan’s prime minister to tell him India has initiated a nuclear strike, and an immediate response is required. The prime minister immediately orders a counterstrike. Pakistan proceeds to counterstrike protocols.</p>
<p>Missiles begin crossing borders between India and Pakistan as the world hurtles towards a nuclear catastrophe in South Asia. The world’s worst fears are realized. It is only later realized that the high-ranking Indian military officer’s message to an Indian commander was made by a nuclear command-and-control system embedded with generative artificial intelligence (AI).</p>
<p><strong>The Role of Generative AI in Modern Warfare</strong></p>
<p>The use of generative AI, which is best exemplified by ChatGPT, by an adversary, or third party, can impact deterrence stability between India and Pakistan. In a worst-case scenario, it could trigger a nuclear war, like the scene mentioned above. Should generative AI be embedded in nuclear command-and-control systems, it is theoretically possible that hyper-personalized messages, like the one described above, could be generated in a system that was not originally designed to allow such an outcome. The potential for a <a href="https://www.wins.org/wp-content/uploads/2024/02/7.-world-institute-for-nuclear-Security-feb-2024-Giulio-Corci.pdf">tailored</a> message, for specific individuals, is possible.</p>
<p>Traditionally, content and information generation were based on human creativity. However, at present, generative artificial intelligence is being considered as a tool for digital transformation. <a href="https://news.mit.edu/2023/explained-generative-ai-1109">Generative AI</a> is a deep learning model which has the capability to generate synthetic media including text, video, and audio—dependent on training.</p>
<p><strong>Perception Building and the Escalation of Crises</strong></p>
<p>Generative AI can also play a distinctly different role in leading to nuclear crisis. In a deterrence framework, the development of a narrative and perception are crucial. Similarly, communication of deterrence threats is also achieved through perception-building of an adversary—concerning a state’s capabilities and credibility. In the specific case of India and Pakistan, India is creating <a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=BGR-PksAAAAJ&amp;citation_for_view=BGR-PksAAAAJ:UeHWp8X0CEIC">misperceptions</a> regarding Pakistan’s nuclear program. Recently, Pakistani Ambassador Munir Akram, at the United Nations Security Council’s high-level debate, <a href="https://www.app.com.pk/global/pakistan-urges-intl-instrument-to-counter-cyberwarfare-recalls-indian-networks-disinformation-drive/#google_vignette">stated</a> that India is actively pursuing a state-led disinformation campaign to malign Pakistan.</p>
<p>He was referring to recent EU Disinfolab’s <a href="https://www.disinfo.eu/publications/bad-sources-how-indian-news-agency-ani-quoted-sources-that-do-not-exist/">reports</a> on how India is using fake nongovernmental organizations, think tanks, media outlets, and international organizations to malign Pakistan. Similarly, it is possible that India may use Generative AI to manipulate public opinion, thereby, creating misperceptions among Pakistan’s public. This could make the citizenry, as well as the government of both India and Pakistan, susceptible to separate facts from fiction—especially in a crisis situation. Hence, AI-driven narratives could push both countries to a crisis leading to warfighting.</p>
<p><strong>Misinformation and Crisis Management Challenges in South Asia</strong></p>
<p>Misinformation through generative AI can make crisis management and escalation dominance between India and Pakistan much more difficult. According to Heather Williams and Alexi Drew, Herman Kahn’s escalation ladder has transformed into a <a href="https://www.kcl.ac.uk/csss/assets/escalation-by-tweet-managing-the-new-nuclear-diplomacy-2020.pdf">web</a> across domains with multiple actors and alliances, especially in the age of social media. In South Asia, due to mated warheads and cannasterization of missiles by India, coupled with geographical contiguity with Pakistan, nuclear use may become <a href="https://ciss.org.pk/drivers-of-indian-mirv-ciss-strategic-view-v/">ultimate escalation</a> within minutes—without a ladder or a web. Social media could be a threat multiplier and can become lethal with the use of generative AI. Although, tweets are <a href="https://www.kcl.ac.uk/csss/assets/escalation-by-tweet-managing-the-new-nuclear-diplomacy-2020.pdf">unlikely</a> to independently start a crisis, tweets from government officials of India and Pakistan could be fabricated through utilizing hacking and generative AI to escalate an ongoing crisis.</p>
<p><strong>Risks of Generative AI in Command-and-Control Systems</strong></p>
<p>While Indian nuclear weapons may have an effective command and control where nuclear weapons have nuclear safety and security mechanisms, there was a “Brahmos missile crisis” in 2022. Inadvertent or accidental, the launch of a missile could trigger a reactionary strike by Pakistan as the missile is <a href="https://www.thehindu.com/news/international/BrahMos-gains-sub-strategic-super-weapon-capability/article12556559.ece">dual</a>-capable. Furthermore, this fog of war could undermine strategic stability. As a Group Captain was <a href="https://www.hindustantimes.com/india-news/accidental-missile-firing-incident-prima-facie-fingers-pointed-at-group-captain-101648015107516.html">blamed</a> for the launch, many commanders like him, who may be capable of launching nuclear missiles, even on Indian nuclear submarines, could be manipulated via high-level orders created through generative AI.</p>
<p><strong>False Flag Operations and Strategic Escalation</strong></p>
<p>India has also opted for adventurism against Pakistan through its false flag operations and surgical strikes. Pakistan has adopted a conventional strategy of quid-pro-quo plus as a conventional response to such Indian limited strike. However, malicious false flag operations through disinformation and fake news by India to garner public support for electoral gains and domestic politics can result in crisis escalation in such a competitive strategic environment. It is due to mistrust within the adversarial relationship of India and Pakistan.</p>
<p><strong>The Need for Confidence-Building Measures (CBM) in AI</strong></p>
<p>There is a dire need for risk reduction and confidence-building measures (CBM) between India and Pakistan in the domain of AI. However, the appetite for CBMs and dialogue on the Indian side is non-existent. India and Pakistan could establish bilateral AI incident reporting and mitigation centers to counter the use of AI as a tool for inducing false alarms and other escalatory actions. Furthermore, there is a need for India and Pakistan to further opt for unilateral AI security and regulation measures, especially for inter-organizational and inter-state strategic communications. If leading states like the United States, China, and Russia opt for an AI arms control agreement, less powerful states, including India and Pakistan, may be persuaded to follow suit. This will help establish a universal AI arms control regime regarding the use of AI for military purposes.</p>
<p><strong>Generative AI and Deterrence Stability: A Scenario for De-escalation</strong></p>
<p>It is the night of May 28, 2028, at India’s military command center. A high-ranking Indian military officer sends a message to a subordinate commander; Pakistan has initiated a preemptive strike. Prepare for a retaliatory strike. This is not a drill.</p>
<p>Flight time between India and Pakistan is a few minutes. Hence, commanders do not have time for verification and need to decide quickly whether to launch a retaliatory strike. He calls the command center to verify the message received.</p>
<p>India’s prime minister is contacted immediately concerning the message received by one of his commanders. He picks up the hotline to Pakistan’s prime minister and asks, “Have you launched nuclear weapons?”</p>
<p>Pakistan’s prime minister responds, “Not at all. This is fake!”</p>
<p>India’s prime minister informs the military command center. The crisis is averted, and nuclear weapons are not used.</p>
<p>Confidence-building measures, which were present in the second scenario, have the opportunity to change the outcome of a conflict. Given the potential for artificial intelligence to be used in nefarious ways, it is time to take action to avert such a crisis.</p>
<p><em>Ms. Anum A. Khan is an Associate Director at the Center for International Strategic Studies (CISS) Islamabad. She is also currently a Research Fellow at Comprehensive Test Ban Treaty Organization and a Project Associate of The Third Nuclear Age Project led by Prof. Andrew Futter.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/09/Generative-AI.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="333" height="92" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 333px) 100vw, 333px" /></a></p>
<p><a href="https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/">Generative Artificial Intelligence and Deterrence Stability between India and Pakistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/generative-artificial-intelligence-and-deterrence-stability-between-india-and-pakistan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Overload: Navigating the US Intelligence Community’s Data Deluge</title>
		<link>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/</link>
					<comments>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 11:46:03 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[industrial base]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[prototyping]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28553</guid>

					<description><![CDATA[<p>Open-Source Intelligence (OSINT) involves collecting, analyzing, and utilizing information from publicly available sources to inform decision-making within the intelligence community. It provides critical insights without the need for clandestine operations, making it a cost-effective and legally compliant method of gathering intelligence. The recent surge in OSINT intake is driven by the exponential growth of digital [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/">AI Overload: Navigating the US Intelligence Community’s Data Deluge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Open-Source Intelligence (OSINT) involves collecting, analyzing, and utilizing information from publicly available sources to inform decision-making within the intelligence community. It provides critical insights without the need for clandestine operations, making it a cost-effective and legally compliant method of gathering intelligence.</p>
<p>The recent <a href="https://breakingdefense.com/2024/05/osint-overdose-intelligence-agencies-seek-new-ways-to-manage-surge-of-open-source-intel/?utm_campaign=Systel&amp;utm_medium=email&amp;_hsenc=p2ANqtz-9IA7_kouL01rOsV2asU9iD7i7ktV-CJwFrGye2RBxBVB86GKrpx9ytcw8g9kgEj0aONw5urTQyr7P5tm2DHiJoBIKJPQ&amp;_hsmi=315235900&amp;utm_content=315235900&amp;utm_source=hs_email">surge</a> in OSINT intake is driven by the exponential growth of digital information, the proliferation of social media, and the increasing availability of online data. These factors have expanded the volume and variety of accessible information, enabling intelligence agencies to glean valuable insights from a vast array of sources, ranging from news articles and social media posts to academic publications and government reports. However, this influx of data necessitates advanced tools and techniques to manage, analyze, and extract actionable intelligence efficiently.</p>
<p>Artificial Intelligence (AI) and Machine Learning (ML) applications are being <a href="https://www.linkedin.com/pulse/intersection-ai-osint-how-artificial-intelligence-open-groeneveld/">implemented</a> across the American intelligence community to enhance capabilities, resulting in a significant increase in OSINT intake. Managing this surge requires leveraging advanced technology, enhancing analytical capabilities, and ensuring efficient collaboration. AI and ML algorithms automate data collection, filtering, and initial analysis. The development of natural language processing (NLP) tools to process large volumes of text data in multiple languages will mature over time with appropriate investment. Additional investment in scalable big data platforms that can handle OSINT data will be critical, utilizing cloud-based solutions for storage and processing to ensure scalability and flexibility.</p>
<p>Human capital enhancement is crucial for any strategic intelligence strategy. There must be an increased focus on recruiting and developing specialized training for intelligence analysts in OSINT techniques, tools, and methodologies. Continuous education programs will keep analysts updated on the latest technologies and trends. Expanding hiring efforts to identify experts in data science, cybersecurity, linguistics, and regional studies will increase the talent pool capable of enhancing the analytical capabilities of the intelligence community. By fostering an environment that promotes continuous learning and expertise in emerging technologies, the intelligence community can stay ahead of adversaries and ensure that their analysts have the necessary skills to leverage advanced tools effectively.</p>
<p>Interagency collaboration within the American intelligence community and with trusted allies is vital. Creating joint OSINT task forces involving multiple agencies fosters collaboration and information sharing, leveraging unique capabilities and expertise. Developing standardized protocols and best practices for OSINT collection and analysis enhances situational awareness and reduces duplication of efforts.</p>
<p>By establishing clear lines of communication and cooperation, intelligence agencies can ensure a more unified approach to addressing emerging threats and challenges. This collaboration also extends to international partners, creating a robust intelligence-sharing network that provides a broader perspective and pools resources to counteract the strategic moves of adversaries.</p>
<p>From a strategic perspective, developing secure and user-friendly platforms for sharing OSINT findings across different agencies is essential. Implementing interoperable systems for seamless data exchange, supported by comprehensive policies and guidelines aligned with legal mandates, builds trust between agencies and the public. Ensuring the security and integrity of data and communication channels is paramount, as it protects classified information from cyber intrusions and ensures the resilience of supply chains and critical infrastructure against cyber threats. Enhanced cybersecurity measures are essential for maintaining the trust and operational effectiveness of intelligence operations.</p>
<p>Reversing concerns about the expanding influence of the technology industry is necessary for the defense industry and intelligence community to embrace a collaborative environment that encourages growth, innovation, and trust. The technology industry already has expertise in these domains, which can be leveraged for public-private partnerships to access cutting-edge innovations. By fostering partnerships, the intelligence community can benefit from rapid advancements in technology and stay ahead of emerging threats. Collaboration with the technology industry also provides access to a pool of highly skilled professionals who can contribute to enhancing the capabilities of intelligence agencies.</p>
<p>The intelligence community must embrace public-private partnerships to foster a collaborative environment that encourages innovation. Establishing feedback mechanisms, conducting regular reviews, and setting up innovation labs within intelligence agencies ensures they stay ahead of emerging threats. Feedback mechanisms can include regular debriefings, user surveys, and performance metrics to assess the effectiveness of OSINT strategies. Review processes might involve periodic audits, peer reviews, and after-action reports to identify gaps and areas for improvement. Innovation labs can foster a culture of experimentation and rapid prototyping of new technologies and methodologies. By creating a space for testing and developing new ideas, innovation labs can drive significant advancements in intelligence operations and ensure that agencies are equipped to handle evolving threats.</p>
<p>Continuous improvement and adaptation will be key to maintaining a competitive edge in a dynamic and ever-changing global threat landscape. Establishing feedback mechanisms to continually assess the effectiveness of OSINT strategies and make necessary adjustments is essential. Conducting regular reviews and audits to identify gaps and areas for improvement will ensure that the intelligence community remains agile and responsive to emerging threats and challenges. Enhancing all-source analytical techniques for integrating OSINT with other intelligence sources (HUMINT, SIGINT, etc.) will provide a comprehensive view of the intelligence landscape, bridging the knowledge and awareness gaps that often plague the intelligence community.</p>
<p>To further support these advancements, the intelligence community must also embrace public-private partnerships to leverage the technology industry’s expertise and foster a collaborative environment that encourages innovation. Establishing feedback mechanisms, conducting regular reviews, and setting up innovation labs within intelligence agencies will ensure they stay ahead of emerging threats and challenges. By fostering a culture of experimentation and rapid prototyping, innovation labs can drive significant advancements in intelligence operations and ensure that agencies are equipped to handle evolving threats.</p>
<p>Managing the surge in OSINT requires a holistic approach that combines technological innovation, enhanced human capital, effective interagency collaboration, and robust policy frameworks. By adopting these strategies, the intelligence community can maintain its edge in an increasingly complex and dynamic world.</p>
<p><em>Joshua Thibert is a Senior Analyst at the</em> <a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em>.</em><em> With nearly 30 years of comprehensive expertise, his background encompasses roles as a former counterintelligence special agent within the Department of Defense and as a practitioner in compliance, security, and risk management in the private sector. Views expressed are his own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/07/AI-Overload_-Navigating-the-US-Intelligence-Communitys-Data-Deluge.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28497 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/">AI Overload: Navigating the US Intelligence Community’s Data Deluge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Air Force has entered into the ChatGPT game. </title>
		<link>https://globalsecurityreview.com/the-air-force-has-entered-into-the-chatgpt-game/</link>
					<comments>https://globalsecurityreview.com/the-air-force-has-entered-into-the-chatgpt-game/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Mon, 17 Jun 2024 19:14:01 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[human-machine teaming]]></category>
		<category><![CDATA[ML]]></category>
		<category><![CDATA[stealth-AI]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28147</guid>

					<description><![CDATA[<p>The Air Force has launched its own version of ChatGPT, only all of the hardware is surrounded by Defense Department safety and security guardrails.   You can&#8217;t test the capabilities of AI for the Military over the cloud, in open waters. This means the cost is going to be exorbitant over using the cloud&#8217;s &#8220;in-place&#8221; structure [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-air-force-has-entered-into-the-chatgpt-game/">The Air Force has entered into the ChatGPT game. </a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Air Force has launched its own version of ChatGPT, only all of the hardware is surrounded by Defense Department safety and security guardrails.   You can&#8217;t test the capabilities of AI for the Military over the cloud, in open waters.</p>
<p>This means the cost is going to be exorbitant over using the cloud&#8217;s &#8220;in-place&#8221; structure of GPUs, distributed power etc.  The DOD procured and set up their own system, but where is the data coming from?</p>
<blockquote class="wp-embedded-content" data-secret="twSPsyvT6Q"><p><a href="https://www.airandspaceforces.com/air-force-launches-generative-ai-chatbot/">Air Force Launches Its Own Generative AI Chatbot. Experts See Promise and Challenges</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Air Force Launches Its Own Generative AI Chatbot. Experts See Promise and Challenges&#8221; &#8212; Air &amp; Space Forces Magazine" src="https://www.airandspaceforces.com/air-force-launches-generative-ai-chatbot/embed/#?secret=f4DzBraYvj#?secret=twSPsyvT6Q" data-secret="twSPsyvT6Q" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p><a href="https://globalsecurityreview.com/the-air-force-has-entered-into-the-chatgpt-game/">The Air Force has entered into the ChatGPT game. </a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-air-force-has-entered-into-the-chatgpt-game/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Should artificial intelligence be banned from nuclear weapons systems?</title>
		<link>https://globalsecurityreview.com/should-artificial-intelligence-be-banned-from-nuclear-weapons-systems/</link>
					<comments>https://globalsecurityreview.com/should-artificial-intelligence-be-banned-from-nuclear-weapons-systems/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Fri, 07 Jun 2024 14:33:54 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Attributable responsibility]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28064</guid>

					<description><![CDATA[<p>By: Professor Steffan Puwal Against a backdrop of conflict and global security concerns, 2023 may prove to have also been a pivotal year for automated nuclear weapons systems. A year that began with chatbots and Artificial Intelligence (AI) as the subjects of major news stories &#8211; some with particularly concerning headlines &#8211; ended with members of the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/should-artificial-intelligence-be-banned-from-nuclear-weapons-systems/">Should artificial intelligence be banned from nuclear weapons systems?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>By: <strong>Professor Steffan Puwal</strong></p>
<p>Against a backdrop of conflict and global security concerns, 2023 may prove to have also been a pivotal year for automated nuclear weapons systems.</p>
<p>A year that began with chatbots and Artificial Intelligence (AI) as the subjects of major news stories &#8211; some with particularly concerning <a href="https://www.theatlantic.com/magazine/archive/2023/06/ai-warfare-nuclear-weapons-strike/673780/" target="_blank" rel="noopener">headlines</a> &#8211; ended with members of the United States Congress introducing <a href="https://www.congress.gov/bill/118th-congress/senate-bill/1394?q=%7B%22search%22%3A%22senate+1394%22%7D&amp;s=1&amp;r=2" target="_blank" rel="noopener">legislation</a> to ban AI systems from nuclear weapons and US President Biden signing an <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/" target="_blank" rel="noopener">Executive Order</a> on the subject. The issue was even raised in discussions between the United States and China at the Asia-Pacific Economic Cooperation forum, which met in San Francisco in November.</p>
<p>One can imagine a hypothetical scenario in which a nuclear weapon targets a naval base, but an approach pattern recognition determines that the target submarines have already put to sea, and so the missile opts for a redirected underwater strike instead of an atmospheric detonation. This is but one of many possible scenarios to consider involving AI.</p>
<p>AI systems offer an opportunity to strengthen nuclear deterrence by providing a more accurate and capable defensive nuclear response. The purpose of making nuclear weapons more accurate and capable is not to promote their usage. Such capabilities, instead, provide a more credible deterrence to nuclear war and are consistent with classic nuclear doctrine. AI is simply a strategic tool, like nuclear weapons themselves.</p>
<p><a href="https://www.nato.int/docu/review/articles/2024/04/12/should-artificial-intelligence-be-banned-from-nuclear-weapons-systems/index.html">Read More</a></p>
<p><a href="https://globalsecurityreview.com/should-artificial-intelligence-be-banned-from-nuclear-weapons-systems/">Should artificial intelligence be banned from nuclear weapons systems?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/should-artificial-intelligence-be-banned-from-nuclear-weapons-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deterrence Through AI-Enabled Detection and Attribution</title>
		<link>https://globalsecurityreview.com/deterrence-through-ai-enabled-detection-and-attribution/</link>
					<comments>https://globalsecurityreview.com/deterrence-through-ai-enabled-detection-and-attribution/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Fri, 07 Jun 2024 14:27:29 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28062</guid>

					<description><![CDATA[<p>Justin Lynch Senior Director, Defense, Special Competitive Studies Project Emma Morrison MSFS Candidate, Georgetown University Published July 2023 Johns Hopkins School of Advanced International Studies/Henry A. Kissinger Center for Global Affairs The Challenge to Deterrence Strategy Deterrence strategy, and a state’s ability to effectively employ it, is dependent on the state’s ability to demonstrate capability [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/deterrence-through-ai-enabled-detection-and-attribution/">Deterrence Through AI-Enabled Detection and Attribution</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Justin Lynch</h4>
<p>Senior Director, Defense, Special Competitive Studies Project</p>
<h4>Emma Morrison</h4>
<p>MSFS Candidate, Georgetown University</p>
<p>Published July 2023</p>
<p><a href="https://sais.jhu.edu/kissinger">Johns Hopkins School of Advanced International Studies/Henry A. Kissinger Center for Global Affairs</a></p>
<h3>The Challenge to Deterrence Strategy</h3>
<p>Deterrence strategy, and a state’s ability to effectively employ it, is dependent on the state’s ability to demonstrate capability and credibility and to clearly communicate those signals to a potential adversary. Credibility cannot be achieved without effective detection and attribution. Without detection, would-be deterrers are unable to mount an effective strategy of denial or threaten retaliation as part of a strategy of punishment. Without attribution, defense is possible, though punishment cannot be targeted at a specific actor. While detection and attribution are not the only components of credibility, they are essential.</p>
<p>Russia has come to depend on information operations as its “most effective gray zone tactic”—a tactic that continues “to be well-funded, relentless, and prolific,”<a name="_ednref18"></a><a href="https://sais.jhu.edu/kissinger/programs-and-projects/kissinger-center-papers/deterrence-through-ai-enabled-detection-and-attribution#_edn18"><sup>[18]</sup></a><sup> </sup>as expressed by Moscow’s military doctrine, which scholars have found “frequently equates the strategic impact of information weapons with that of weapons of mass destruction.&#8221;</p>
<p>When an adversary manages to ensure that its operations and preparations for those operations avoid detection and attribution, that reduces the probability that targeted countries will adequately prepare to respond. This increases the probability of the aggressor accomplishing its goals and decreases its likely cost of victory, undermining the credibility of deterrence strategies.</p>
<p>As with any strategy, the odds of deterrence achieving its desired effects are dependent on a clear understanding of the world at a given moment.</p>
<p><a href="https://sais.jhu.edu/kissinger/programs-and-projects/kissinger-center-papers/deterrence-through-ai-enabled-detection-and-attribution">Read More</a></p>
<p><a href="https://globalsecurityreview.com/deterrence-through-ai-enabled-detection-and-attribution/">Deterrence Through AI-Enabled Detection and Attribution</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/deterrence-through-ai-enabled-detection-and-attribution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI and the Future of Deterrence: Promises and Pitfalls</title>
		<link>https://globalsecurityreview.com/ai-and-the-future-of-deterrence-promises-and-pitfalls/</link>
					<comments>https://globalsecurityreview.com/ai-and-the-future-of-deterrence-promises-and-pitfalls/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Fri, 07 Jun 2024 14:18:36 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[human-machine teaming]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28057</guid>

					<description><![CDATA[<p>Alex Wilner November 28, 2022 Center for International Governance Innovation &#160; How might AI impact deterrence, highlighting both its potential benefits and challenges. AI could enhance defense capabilities and strategic planning but also introduce risks like escalatory pressures, ethical dilemmas, and misperceptions. The interplay between AI advancements and traditional deterrence concepts could reshape geopolitical dynamics. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ai-and-the-future-of-deterrence-promises-and-pitfalls/">AI and the Future of Deterrence: Promises and Pitfalls</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="flex flex-grow flex-col max-w-full">
<div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-2" dir="auto" data-message-author-role="assistant" data-message-id="5411e2e1-b4ec-4888-a65b-bd37602e239f">
<div class="flex w-full flex-col gap-1 juice:empty:hidden juice:first:pt-[3px]">
<div class="markdown prose w-full break-words dark:prose-invert dark">
<div class="custom-text-list authors"><a class="block-author" href="https://www.cigionline.org/people/alex-wilner/">Alex Wilner</a></div>
<div class="date">November 28, 2022</div>
<div>Center for International Governance Innovation</div>
<p>&nbsp;</p>
<p>How might AI impact deterrence, highlighting both its potential benefits and challenges. AI could enhance defense capabilities and strategic planning but also introduce risks like escalatory pressures, ethical dilemmas, and misperceptions. The interplay between AI advancements and traditional deterrence concepts could reshape geopolitical dynamics.</p>
<p>Read more: <a href="https://www.cigionline.org/articles/ai-and-the-future-of-deterrence-promises-and-pitfalls/" target="_new" rel="noreferrer noopener">AI and the Future of Deterrence: Promises and Pitfalls</a></p>
</div>
</div>
</div>
</div>
<p><a href="https://globalsecurityreview.com/ai-and-the-future-of-deterrence-promises-and-pitfalls/">AI and the Future of Deterrence: Promises and Pitfalls</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ai-and-the-future-of-deterrence-promises-and-pitfalls/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Artificial Intelligence for Nuclear Deterrence Strategy</title>
		<link>https://globalsecurityreview.com/artificial-intelligence-for-nuclear-deterrence-strategy/</link>
					<comments>https://globalsecurityreview.com/artificial-intelligence-for-nuclear-deterrence-strategy/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Fri, 07 Jun 2024 14:07:30 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[autonomous decisions. battlebots]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[ML]]></category>
		<category><![CDATA[nuclear capabilities]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[quantum theory]]></category>
		<category><![CDATA[robot missiles]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28050</guid>

					<description><![CDATA[<p>The document &#8220;Artificial Intelligence for Nuclear Deterrence Strategy 2023&#8221; outlines the Advanced Simulation and Computing (ASC) program&#8217;s strategy to integrate artificial intelligence (AI) and machine learning (ML) into the U.S. nuclear deterrence mission. Here are the key points: Foreword and Executive Summary: The ASC program has utilized high-performance computing for nearly three decades to support [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/artificial-intelligence-for-nuclear-deterrence-strategy/">Artificial Intelligence for Nuclear Deterrence Strategy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The document &#8220;Artificial Intelligence for Nuclear Deterrence Strategy 2023&#8221; outlines the Advanced Simulation and Computing (ASC) program&#8217;s strategy to integrate artificial intelligence (AI) and machine learning (ML) into the U.S. nuclear deterrence mission. Here are the key points:</p>
<ol>
<li><strong>Foreword and Executive Summary</strong>:
<ul>
<li>The ASC program has utilized high-performance computing for nearly three decades to support U.S. nuclear deterrence following the 1992 ban on underground nuclear testing.</li>
<li>The integration of AI technologies aims to accelerate problem-solving for national security challenges.</li>
<li>The strategy emphasizes combining AI with existing modeling and simulation capabilities to enhance the U.S. Stockpile Stewardship Program.</li>
</ul>
</li>
<li><strong>AI4ND Strategy Objectives</strong>:
<ul>
<li>Apply AI methods to nuclear security missions, focusing on design, production, and analysis.</li>
<li>Develop ML tools to function with limited data and stringent accuracy requirements.</li>
<li>Create scalable and secure data infrastructures to support ML applications.</li>
<li>Foster a data-driven workforce by investing in training and developing expertise in AI and ML.</li>
</ul>
</li>
<li><strong>Motivations for AI in Nuclear Deterrence</strong>:
<ul>
<li>AI can reduce time for material discovery, model development, manufacturing, and maintenance.</li>
<li>AI/ML technologies promise to enhance the efficiency and responsiveness of the nuclear weapons lifecycle, including discovery, design optimization, manufacturing, certification, and maintenance.</li>
</ul>
</li>
<li><strong>Enabling Capabilities and Investment Areas</strong>:
<ul>
<li><strong>Physics-Informed Machine Learning (PIML)</strong>: Embedding physical constraints in ML models to ensure accuracy and speed in simulations.</li>
<li><strong>Limited and Sparse Data Sets</strong>: Developing methods to work with limited experimental data and augmenting it with simulations.</li>
<li><strong>Verification, Validation, Uncertainty Qualification, and AI Trustworthiness</strong>: Ensuring AI models are reliable and explainable, integrating existing verification practices.</li>
<li><strong>Data Infrastructure</strong>: Investing in performant data storage, federated data environments, and flexible data access interfaces.</li>
<li><strong>Machine Learning Architectures and Systems</strong>: Developing high-performance ML systems integrated with existing HPC platforms.</li>
</ul>
</li>
<li><strong>Workforce, Collaborations, and Partnerships</strong>:
<ul>
<li>Establishing partnerships with industry, academia, and other U.S. government agencies to leverage external advancements in AI/ML.</li>
<li>Developing international collaborations with similar programs in France, the UK, and Japan.</li>
<li>Building a capable workforce through training programs and collaboration with universities.</li>
</ul>
</li>
<li><strong>Conclusion</strong>:
<ul>
<li>The successful execution of this AI4ND strategy will enhance the ASC program&#8217;s ability to meet national security needs, increase efficiency, and attract specialized talent.</li>
<li>Collaboration with academia, industry, and other government agencies is crucial to achieving these goals.</li>
</ul>
</li>
</ol>
<p>The document emphasizes the transformative potential of AI in ensuring a secure and reliable nuclear deterrent through strategic investments in technology, data infrastructure, and workforce development. Get the <a href="https://psaap.llnl.gov/file-download/download/public/1146#:~:text=DETERRENCE%20MISSION,-AI%20and%20ML&amp;text=AI%2FML%20are%20technologies%20that,and%20surveillance%20of%20ND%20systems.">report</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/artificial-intelligence-for-nuclear-deterrence-strategy/">Artificial Intelligence for Nuclear Deterrence Strategy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/artificial-intelligence-for-nuclear-deterrence-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
